{
    "apiVersion": "v1",
    "items": [
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "https://rekor-server-tssc-tas.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/api/v1/log/entries?logIndex=36",
                    "pipeline.tekton.dev/affinity-assistant": "affinity-assistant-d8ea942d58",
                    "pipeline.tekton.dev/release": "8910674cb953317a4373f33822024b9de8c5fa22",
                    "pipelinesascode.tekton.dev/branch": "main",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "Merge Request",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-qaegwq",
                    "pipelinesascode.tekton.dev/git-provider": "gitlab",
                    "pipelinesascode.tekton.dev/on-event": "[pull_request]",
                    "pipelinesascode.tekton.dev/on-target-branch": "[main]",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-gitops-on-pull-request",
                    "pipelinesascode.tekton.dev/pipeline": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/pipelines/gitops-pull-request-tssc.yaml",
                    "pipelinesascode.tekton.dev/pull-request": "2",
                    "pipelinesascode.tekton.dev/repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-gitops-repository",
                    "pipelinesascode.tekton.dev/sender": "rhtap-qe-test",
                    "pipelinesascode.tekton.dev/sha": "e395df7e0e4c64ad86da082463949a155dd916ac",
                    "pipelinesascode.tekton.dev/sha-title": "Promote to prod environment",
                    "pipelinesascode.tekton.dev/sha-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops/-/commit/e395df7e0e4c64ad86da082463949a155dd916ac",
                    "pipelinesascode.tekton.dev/source-branch": "promote-to-prod-1777392306677",
                    "pipelinesascode.tekton.dev/source-project-id": "81724368",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops",
                    "pipelinesascode.tekton.dev/target-project-id": "81724368",
                    "pipelinesascode.tekton.dev/task-0": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/git-clone.yaml",
                    "pipelinesascode.tekton.dev/task-1": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/gather-deploy-images.yaml",
                    "pipelinesascode.tekton.dev/task-2": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/verify-enterprise-contract.yaml",
                    "pipelinesascode.tekton.dev/task-3": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/gather-deploy-images.yaml",
                    "pipelinesascode.tekton.dev/task-4": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/download-sbom-from-url-in-attestation.yaml",
                    "pipelinesascode.tekton.dev/task-5": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/upload-sbom-to-trustification.yaml",
                    "pipelinesascode.tekton.dev/task-6": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/fetch-gitops-images.yaml",
                    "pipelinesascode.tekton.dev/task-7": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/verify-gitops-conforma.yaml",
                    "pipelinesascode.tekton.dev/task-8": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/download-gitops-sbom.yaml",
                    "pipelinesascode.tekton.dev/task-9": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/upload-gitops-sbom.yaml",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax-gitops",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "tssc-app-ci/results/6562839e-6164-47ff-a1e5-606e8f91821a/records/24074985-d464-4fa7-92ae-197977efc04c",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"e2e-tests-go-eciytfax-gitops\",\"commit\":\"e395df7e0e4c64ad86da082463949a155dd916ac\",\"eventType\":\"Merge Request\",\"pull_request-id\":2}",
                    "results.tekton.dev/result": "tssc-app-ci/results/6562839e-6164-47ff-a1e5-606e8f91821a",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/categories": "Git",
                    "tekton.dev/displayName": "git clone",
                    "tekton.dev/pipelines.minVersion": "0.21.0",
                    "tekton.dev/platforms": "linux/amd64,linux/s390x,linux/ppc64le,linux/arm64",
                    "tekton.dev/tags": "git"
                },
                "creationTimestamp": "2026-04-28T16:05:17Z",
                "finalizers": [
                    "results.tekton.dev/taskrun",
                    "chains.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/part-of": "e2e-tests-go-eciytfax",
                    "app.kubernetes.io/version": "v0.39.5",
                    "argocd/app-name": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-id": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-namespace": "tssc-app",
                    "janus-idp.io/tekton": "e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/event-type": "Merge_Request",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-gitops-on-pull-request",
                    "pipelinesascode.tekton.dev/pull-request": "2",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-gitops-repository",
                    "pipelinesascode.tekton.dev/sha": "e395df7e0e4c64ad86da082463949a155dd916ac",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax-gitops",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "e2e-tests-go-eciytfax-gitops-on-pull-request-xrtvv",
                    "tekton.dev/pipelineRun": "e2e-tests-go-eciytfax-gitops-on-pull-request-xrtvv",
                    "tekton.dev/pipelineRunUID": "6562839e-6164-47ff-a1e5-606e8f91821a",
                    "tekton.dev/pipelineTask": "clone-repository"
                },
                "name": "e2e-tests-go-e179bf1c0a6c1a1b450f1b75a461a4bb4-clone-repository",
                "namespace": "tssc-app-ci",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "e2e-tests-go-eciytfax-gitops-on-pull-request-xrtvv",
                        "uid": "6562839e-6164-47ff-a1e5-606e8f91821a"
                    }
                ],
                "resourceVersion": "45661",
                "uid": "24074985-d464-4fa7-92ae-197977efc04c"
            },
            "spec": {
                "params": [
                    {
                        "name": "url",
                        "value": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops"
                    },
                    {
                        "name": "revision",
                        "value": "e395df7e0e4c64ad86da082463949a155dd916ac"
                    },
                    {
                        "name": "fetchTags",
                        "value": "true"
                    },
                    {
                        "name": "depth",
                        "value": "0"
                    }
                ],
                "serviceAccountName": "pipeline",
                "taskSpec": {
                    "description": "The git-clone Task will clone a repo from the provided url into the output Workspace. By default the repo will be cloned into the root of your Workspace.",
                    "params": [
                        {
                            "description": "Repository URL to clone from.",
                            "name": "url",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Revision to checkout. (branch, tag, sha, ref, etc...)",
                            "name": "revision",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Refspec to fetch before checking out revision.",
                            "name": "refspec",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Initialize and fetch git submodules.",
                            "name": "submodules",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Comma-separated list of specific submodule paths to initialize and fetch. Only submodules in the specified directories and their subdirectories will be fetched.\nEmpty string fetches all submodules. Parameter \"submodules\" must be set to \"true\" to make this parameter applicable.\n",
                            "name": "submodulePaths",
                            "type": "string"
                        },
                        {
                            "default": "1",
                            "description": "Perform a shallow clone, fetching only the most recent N commits.",
                            "name": "depth",
                            "type": "string"
                        },
                        {
                            "default": "7",
                            "description": "Length of short commit SHA",
                            "name": "shortCommitLength",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Set the `http.sslVerify` global git config. Setting this to `false` is not advised unless you are sure that you trust your git remote.",
                            "name": "sslVerify",
                            "type": "string"
                        },
                        {
                            "default": "source",
                            "description": "Subdirectory inside the `output` Workspace to clone the repo into.",
                            "name": "subdirectory",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Define the directory patterns to match or exclude when performing a sparse checkout.",
                            "name": "sparseCheckoutDirectories",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Clean out the contents of the destination directory if it already exists before cloning.",
                            "name": "deleteExisting",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "HTTP proxy server for non-SSL requests.",
                            "name": "httpProxy",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "HTTPS proxy server for SSL requests.",
                            "name": "httpsProxy",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Opt out of proxying HTTP/HTTPS requests.",
                            "name": "noProxy",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Log the commands that are executed during `git-clone`'s operation.",
                            "name": "verbose",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Deprecated. Has no effect. Will be removed in the future.",
                            "name": "gitInitImage",
                            "type": "string"
                        },
                        {
                            "default": "/tekton/home",
                            "description": "Absolute path to the user's home directory. Set this explicitly if you are running the image as a non-root user.\n",
                            "name": "userHome",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Check symlinks in the repo. If they're pointing outside of the repo, the build will fail.\n",
                            "name": "enableSymlinkCheck",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Fetch all tags for the repo.",
                            "name": "fetchTags",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from.",
                            "name": "caTrustConfigMapName",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data.",
                            "name": "caTrustConfigMapKey",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Set to \"true\" to merge the targetBranch into the checked-out revision.",
                            "name": "mergeTargetBranch",
                            "type": "string"
                        },
                        {
                            "default": "main",
                            "description": "The target branch to merge into the revision (if mergeTargetBranch is true).",
                            "name": "targetBranch",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "URL of the repository to fetch the target branch from when mergeTargetBranch is true.\nIf empty, uses the same repository (origin). This allows merging a branch from a different repository.\n",
                            "name": "mergeSourceRepoUrl",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Perform a shallow fetch of the target branch, fetching only the most recent N commits.\nIf empty, fetches the full history of the target branch.\n",
                            "name": "mergeSourceDepth",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "The precise commit SHA that was fetched by this Task.",
                            "name": "commit",
                            "type": "string"
                        },
                        {
                            "description": "The commit SHA that was fetched by this Task limited to params.shortCommitLength number of characters",
                            "name": "short-commit",
                            "type": "string"
                        },
                        {
                            "description": "The precise URL that was fetched by this Task.",
                            "name": "url",
                            "type": "string"
                        },
                        {
                            "description": "The commit timestamp of the checkout",
                            "name": "commit-timestamp",
                            "type": "string"
                        },
                        {
                            "description": "The precise URL that was fetched by this Task. This result uses Chains type hinting to include in the provenance.",
                            "name": "CHAINS-GIT_URL",
                            "type": "string"
                        },
                        {
                            "description": "The precise commit SHA that was fetched by this Task. This result uses Chains type hinting to include in the provenance.",
                            "name": "CHAINS-GIT_COMMIT",
                            "type": "string"
                        },
                        {
                            "description": "The SHA of the commit after merging the target branch (if the param mergeTargetBranch is true).",
                            "name": "merged_sha",
                            "type": "string"
                        }
                    ],
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "HOME",
                                    "value": "$(params.userHome)"
                                },
                                {
                                    "name": "PARAM_URL",
                                    "value": "$(params.url)"
                                },
                                {
                                    "name": "PARAM_REVISION",
                                    "value": "e395df7e0e4c64ad86da082463949a155dd916ac"
                                },
                                {
                                    "name": "PARAM_REFSPEC",
                                    "value": "$(params.refspec)"
                                },
                                {
                                    "name": "PARAM_SUBMODULES",
                                    "value": "$(params.submodules)"
                                },
                                {
                                    "name": "PARAM_SUBMODULE_PATHS",
                                    "value": "$(params.submodulePaths)"
                                },
                                {
                                    "name": "PARAM_DEPTH",
                                    "value": "$(params.depth)"
                                },
                                {
                                    "name": "PARAM_SHORT_COMMIT_LENGTH",
                                    "value": "$(params.shortCommitLength)"
                                },
                                {
                                    "name": "PARAM_SSL_VERIFY",
                                    "value": "$(params.sslVerify)"
                                },
                                {
                                    "name": "PARAM_SUBDIRECTORY",
                                    "value": "$(params.subdirectory)"
                                },
                                {
                                    "name": "PARAM_DELETE_EXISTING",
                                    "value": "$(params.deleteExisting)"
                                },
                                {
                                    "name": "PARAM_HTTP_PROXY",
                                    "value": "$(params.httpProxy)"
                                },
                                {
                                    "name": "PARAM_HTTPS_PROXY",
                                    "value": "$(params.httpsProxy)"
                                },
                                {
                                    "name": "PARAM_NO_PROXY",
                                    "value": "$(params.noProxy)"
                                },
                                {
                                    "name": "PARAM_VERBOSE",
                                    "value": "$(params.verbose)"
                                },
                                {
                                    "name": "PARAM_SPARSE_CHECKOUT_DIRECTORIES",
                                    "value": "$(params.sparseCheckoutDirectories)"
                                },
                                {
                                    "name": "PARAM_USER_HOME",
                                    "value": "$(params.userHome)"
                                },
                                {
                                    "name": "PARAM_FETCH_TAGS",
                                    "value": "$(params.fetchTags)"
                                },
                                {
                                    "name": "PARAM_GIT_INIT_IMAGE",
                                    "value": "$(params.gitInitImage)"
                                },
                                {
                                    "name": "PARAM_MERGE_TARGET_BRANCH",
                                    "value": "$(params.mergeTargetBranch)"
                                },
                                {
                                    "name": "PARAM_TARGET_BRANCH",
                                    "value": "$(params.targetBranch)"
                                },
                                {
                                    "name": "PARAM_MERGE_SOURCE_REPO_URL",
                                    "value": "$(params.mergeSourceRepoUrl)"
                                },
                                {
                                    "name": "PARAM_MERGE_SOURCE_DEPTH",
                                    "value": "$(params.mergeSourceDepth)"
                                },
                                {
                                    "name": "WORKSPACE_OUTPUT_PATH",
                                    "value": "$(workspaces.output.path)"
                                },
                                {
                                    "name": "WORKSPACE_SSH_DIRECTORY_BOUND",
                                    "value": "$(workspaces.ssh-directory.bound)"
                                },
                                {
                                    "name": "WORKSPACE_SSH_DIRECTORY_PATH",
                                    "value": "$(workspaces.ssh-directory.path)"
                                },
                                {
                                    "name": "WORKSPACE_BASIC_AUTH_DIRECTORY_BOUND",
                                    "value": "$(workspaces.basic-auth.bound)"
                                },
                                {
                                    "name": "WORKSPACE_BASIC_AUTH_DIRECTORY_PATH",
                                    "value": "$(workspaces.basic-auth.path)"
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "clone",
                            "script": "#!/usr/bin/env sh\nset -eu\n\nif [ \"${PARAM_VERBOSE}\" = \"true\" ] ; then\n  set -x\nfi\n\nif [ -n \"${PARAM_GIT_INIT_IMAGE}\" ]; then\n  echo \"WARNING: provided deprecated gitInitImage parameter has no effect.\"\nfi\n\nif [ \"${WORKSPACE_BASIC_AUTH_DIRECTORY_BOUND}\" = \"true\" ] ; then\n  if [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.git-credentials\" ] \u0026\u0026 [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.gitconfig\" ]; then\n    cp \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.git-credentials\" \"${PARAM_USER_HOME}/.git-credentials\"\n    cp \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.gitconfig\" \"${PARAM_USER_HOME}/.gitconfig\"\n  # Compatibility with kubernetes.io/basic-auth secrets\n  elif [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/username\" ] \u0026\u0026 [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/password\" ]; then\n    HOSTNAME=$(echo $PARAM_URL | awk -F/ '{print $3}')\n    echo \"https://$(cat ${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/username):$(cat ${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/password)@$HOSTNAME\" \u003e \"${PARAM_USER_HOME}/.git-credentials\"\n    echo -e \"[credential \\\"https://$HOSTNAME\\\"]\\n  helper = store\" \u003e \"${PARAM_USER_HOME}/.gitconfig\"\n  else\n    echo \"Unknown basic-auth workspace format\"\n    exit 1\n  fi\n  chmod 400 \"${PARAM_USER_HOME}/.git-credentials\"\n  chmod 400 \"${PARAM_USER_HOME}/.gitconfig\"\nfi\n\n# Should be called after the gitconfig is copied from the repository secret\nca_bundle=/mnt/trusted-ca/ca-bundle.crt\nif [ -f \"$ca_bundle\" ]; then\n  echo \"INFO: Using mounted CA bundle: $ca_bundle\"\n  git config --global http.sslCAInfo \"$ca_bundle\"\nfi\n\nif [ \"${WORKSPACE_SSH_DIRECTORY_BOUND}\" = \"true\" ] ; then\n  cp -R \"${WORKSPACE_SSH_DIRECTORY_PATH}\" \"${PARAM_USER_HOME}\"/.ssh\n  chmod 700 \"${PARAM_USER_HOME}\"/.ssh\n  chmod -R 400 \"${PARAM_USER_HOME}\"/.ssh/*\nfi\n\nCHECKOUT_DIR=\"${WORKSPACE_OUTPUT_PATH}/${PARAM_SUBDIRECTORY}\"\n\ncleandir() {\n  # Delete any existing contents of the repo directory if it exists.\n  #\n  # We don't just \"rm -rf ${CHECKOUT_DIR}\" because ${CHECKOUT_DIR} might be \"/\"\n  # or the root of a mounted volume.\n  if [ -d \"${CHECKOUT_DIR}\" ] ; then\n    # Delete non-hidden files and directories\n    rm -rf \"${CHECKOUT_DIR:?}\"/*\n    # Delete files and directories starting with . but excluding ..\n    rm -rf \"${CHECKOUT_DIR}\"/.[!.]*\n    # Delete files and directories starting with .. plus any other character\n    rm -rf \"${CHECKOUT_DIR}\"/..?*\n  fi\n}\n\nif [ \"${PARAM_DELETE_EXISTING}\" = \"true\" ] ; then\n  cleandir\nfi\n\ntest -z \"${PARAM_HTTP_PROXY}\" || export HTTP_PROXY=\"${PARAM_HTTP_PROXY}\"\ntest -z \"${PARAM_HTTPS_PROXY}\" || export HTTPS_PROXY=\"${PARAM_HTTPS_PROXY}\"\ntest -z \"${PARAM_NO_PROXY}\" || export NO_PROXY=\"${PARAM_NO_PROXY}\"\n\n/ko-app/git-init \\\n  -url=\"${PARAM_URL}\" \\\n  -revision=\"${PARAM_REVISION}\" \\\n  -refspec=\"${PARAM_REFSPEC}\" \\\n  -path=\"${CHECKOUT_DIR}\" \\\n  -sslVerify=\"${PARAM_SSL_VERIFY}\" \\\n  -submodules=\"${PARAM_SUBMODULES}\" \\\n  -submodulePaths=\"${PARAM_SUBMODULE_PATHS}\" \\\n  -depth=\"${PARAM_DEPTH}\" \\\n  -sparseCheckoutDirectories=\"${PARAM_SPARSE_CHECKOUT_DIRECTORIES}\" \\\n  -retryMaxAttempts=10\ncd \"${CHECKOUT_DIR}\"\nRESULT_SHA=\"$(git rev-parse HEAD)\"\nRESULT_SHA_SHORT=\"$(git rev-parse --short=\"${PARAM_SHORT_COMMIT_LENGTH}\" HEAD)\"\nEXIT_CODE=\"$?\"\nif [ \"${EXIT_CODE}\" != 0 ] ; then\n  exit \"${EXIT_CODE}\"\nfi\nif [ \"${PARAM_MERGE_TARGET_BRANCH}\" = \"true\" ]; then\n  echo \"Merge option enabled. Attempting to merge target branch '${PARAM_TARGET_BRANCH}' into HEAD (${RESULT_SHA}).\"\n\n  if [ \"${PARAM_DEPTH}\" = \"1\" ]; then\n    echo \"WARNING: Shallow clone with depth=1 may cause merge conflicts due to insufficient commit history.\" \u003e\u00262\n  fi\n\n  if [ \"${PARAM_MERGE_SOURCE_DEPTH}\" = \"1\" ]; then\n    echo \"WARNING: Shallow fetch with mergeSourceDepth=1 may cause merge conflicts due to insufficient commit history.\" \u003e\u00262\n  fi\n\n  # Determine if merging from a different repository or the same one\n  if [ -n \"${PARAM_MERGE_SOURCE_REPO_URL}\" ]; then\n    # Normalize URLs for comparison (remove trailing slashes and .git suffix)\n    normalize_url() {\n      echo \"$1\" | sed -e 's#/$##' -e 's#\\.git$##'\n    }\n\n    NORMALIZED_ORIGIN_URL=$(normalize_url \"${PARAM_URL}\")\n    NORMALIZED_MERGE_URL=$(normalize_url \"${PARAM_MERGE_SOURCE_REPO_URL}\")\n\n    if [ \"${NORMALIZED_ORIGIN_URL}\" = \"${NORMALIZED_MERGE_URL}\" ]; then\n      echo \"Merge source URL is the same as origin. Using existing 'origin' remote.\"\n      MERGE_REMOTE=\"origin\"\n    else\n      echo \"Merging from different repository: ${PARAM_MERGE_SOURCE_REPO_URL}\"\n      echo \"Adding remote 'merge-source'...\"\n      git remote add merge-source \"${PARAM_MERGE_SOURCE_REPO_URL}\"\n      MERGE_REMOTE=\"merge-source\"\n    fi\n  else\n    echo \"Merging from the same repository (origin)\"\n    MERGE_REMOTE=\"origin\"\n  fi\n\n  echo \"Fetching target branch '${PARAM_TARGET_BRANCH}' from ${MERGE_REMOTE}...\"\n  if [ -n \"${PARAM_MERGE_SOURCE_DEPTH}\" ]; then\n    retry git fetch --depth=\"${PARAM_MERGE_SOURCE_DEPTH}\" ${MERGE_REMOTE} \"${PARAM_TARGET_BRANCH}\"\n  else\n    retry git fetch ${MERGE_REMOTE} \"${PARAM_TARGET_BRANCH}\"\n  fi\n  FETCH_EXIT_CODE=\"$?\"\n  if [ \"${FETCH_EXIT_CODE}\" != \"0\" ]; then\n    echo \"ERROR: Failed to fetch target branch '${PARAM_TARGET_BRANCH}' from ${MERGE_REMOTE}.\" \u003e\u00262\n    exit \"${FETCH_EXIT_CODE}\"\n  fi\n\n  echo \"Merging ${MERGE_REMOTE}/${PARAM_TARGET_BRANCH} into current HEAD...\"\n  git config --global user.email \"tekton-git-clone@tekton.dev\"\n  git config --global user.name \"Tekton Git Clone Task\"\n  git merge \"${MERGE_REMOTE}/${PARAM_TARGET_BRANCH}\" --no-commit --no-ff --allow-unrelated-histories\n  MERGE_CHECK_EXIT_CODE=\"$?\"\n  if [ \"${MERGE_CHECK_EXIT_CODE}\" != \"0\" ] ; then\n    echo \"ERROR: Merge conflict detected or merge failed before commit.\" \u003e\u00262\n    echo \"--- Git Status ---\"\n    git status\n    echo \"------------------\"\n    exit \"${MERGE_CHECK_EXIT_CODE}\"\n  else\n    # Check if there are changes that need to be merged, and if so, create a merge commit.\n    if git diff --staged --quiet; then\n      echo \"No diff was found, skipping merge...\" \u003e\u00262\n    else\n      echo \"Merge successful (no conflicts found), committing...\"\n      git commit -m \"Merge branch '${PARAM_TARGET_BRANCH}' from ${MERGE_REMOTE} into ${RESULT_SHA}\"\n      COMMIT_EXIT_CODE=\"$?\"\n      if [ \"${COMMIT_EXIT_CODE}\" != \"0\" ]; then\n        echo \"ERROR: Failed to commit merge.\" \u003e\u00262\n        exit \"${COMMIT_EXIT_CODE}\"\n      fi\n      MERGED_SHA=$(git rev-parse HEAD)\n      echo \"New HEAD after merge: ${MERGED_SHA}\"\n      echo \"${MERGED_SHA}\" \u003e \"$(results.merged_sha.path)\"\n    fi\n  fi\nelse\n  echo \"Merge option disabled. Using checked-out revision ${RESULT_SHA} directly.\"\nfi\nprintf \"%s\" \"${RESULT_SHA}\" \u003e \"$(results.commit.path)\"\nprintf \"%s\" \"${RESULT_SHA}\" \u003e \"$(results.CHAINS-GIT_COMMIT.path)\"\nprintf \"%s\" \"${RESULT_SHA_SHORT}\" \u003e \"$(results.short-commit.path)\"\nprintf \"%s\" \"${PARAM_URL}\" \u003e \"$(results.url.path)\"\nprintf \"%s\" \"${PARAM_URL}\" \u003e \"$(results.CHAINS-GIT_URL.path)\"\nprintf \"%s\" \"$(git log -1 --pretty=%ct)\" \u003e \"$(results.commit-timestamp.path)\"\n\nif [ \"${PARAM_FETCH_TAGS}\" = \"true\" ] ; then\n  echo \"Fetching tags\"\n  retry git fetch --tags\nfi\n",
                            "securityContext": {
                                "runAsUser": 0
                            },
                            "volumeMounts": [
                                {
                                    "mountPath": "/mnt/trusted-ca",
                                    "name": "trusted-ca",
                                    "readOnly": true
                                }
                            ]
                        },
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "PARAM_ENABLE_SYMLINK_CHECK",
                                    "value": "$(params.enableSymlinkCheck)"
                                },
                                {
                                    "name": "PARAM_SUBDIRECTORY",
                                    "value": "$(params.subdirectory)"
                                },
                                {
                                    "name": "WORKSPACE_OUTPUT_PATH",
                                    "value": "$(workspaces.output.path)"
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "symlink-check",
                            "script": "#!/usr/bin/env bash\nset -euo pipefail\n\nCHECKOUT_DIR=\"${WORKSPACE_OUTPUT_PATH}/${PARAM_SUBDIRECTORY}\"\ncheck_symlinks() {\n  FOUND_SYMLINK_POINTING_OUTSIDE_OF_REPO=false\n  while read -r symlink\n  do\n    target=$(readlink -m \"$symlink\")\n    if ! [[ \"$target\" =~ ^$CHECKOUT_DIR ]]; then\n      echo \"The cloned repository contains symlink pointing outside of the cloned repository: $symlink\"\n      FOUND_SYMLINK_POINTING_OUTSIDE_OF_REPO=true\n    fi\n  done \u003c \u003c(find $CHECKOUT_DIR -type l -print)\n  if [ \"$FOUND_SYMLINK_POINTING_OUTSIDE_OF_REPO\" = true ] ; then\n    return 1\n  fi\n}\n\nif [ \"${PARAM_ENABLE_SYMLINK_CHECK}\" = \"true\" ] ; then\n  echo \"Running symlink check\"\n  check_symlinks\nfi\n"
                        }
                    ],
                    "volumes": [
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "$(params.caTrustConfigMapKey)",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "$(params.caTrustConfigMapName)",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "The git repo will be cloned onto the volume backing this Workspace.",
                            "name": "output"
                        },
                        {
                            "description": "A .ssh directory with private key, known_hosts, config, etc. Copied to\nthe user's home before git commands are executed. Used to authenticate\nwith the git remote when performing the clone. Binding a Secret to this\nWorkspace is strongly recommended over other volume types.\n",
                            "name": "ssh-directory",
                            "optional": true
                        },
                        {
                            "description": "A Workspace containing a .gitconfig and .git-credentials file or username and password.\nThese will be copied to the user's home before any git commands are run. Any\nother files in this Workspace are ignored. It is strongly recommended\nto use ssh-directory over basic-auth whenever possible and to bind a\nSecret to this Workspace over other volume types.\n",
                            "name": "basic-auth",
                            "optional": true
                        }
                    ]
                },
                "timeout": "1h0m0s",
                "workspaces": [
                    {
                        "name": "output",
                        "persistentVolumeClaim": {
                            "claimName": "pvc-608e6ce161"
                        }
                    },
                    {
                        "name": "basic-auth",
                        "secret": {
                            "secretName": "pac-gitauth-qaegwq"
                        }
                    }
                ]
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-28T16:05:30Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-28T16:05:30Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "e2e-tests-go-e179bf1c0a6c1add2c4fb7749422dc7c46bcb76f52d188-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    }
                },
                "results": [
                    {
                        "name": "CHAINS-GIT_COMMIT",
                        "type": "string",
                        "value": "e395df7e0e4c64ad86da082463949a155dd916ac"
                    },
                    {
                        "name": "CHAINS-GIT_URL",
                        "type": "string",
                        "value": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops"
                    },
                    {
                        "name": "commit",
                        "type": "string",
                        "value": "e395df7e0e4c64ad86da082463949a155dd916ac"
                    },
                    {
                        "name": "commit-timestamp",
                        "type": "string",
                        "value": "1777392307"
                    },
                    {
                        "name": "short-commit",
                        "type": "string",
                        "value": "e395df7"
                    },
                    {
                        "name": "url",
                        "type": "string",
                        "value": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops"
                    }
                ],
                "startTime": "2026-04-28T16:05:18Z",
                "steps": [
                    {
                        "container": "step-clone",
                        "imageID": "quay.io/redhat-tssc/task-runner@sha256:db633cb62eb097a46ca9e3e0a54d21c8ebd444f81a074ce1f1afa61956185dbf",
                        "name": "clone",
                        "provenance": {},
                        "terminated": {
                            "containerID": "cri-o://936f2370c001cea04a95558a6a21dd526b7b2d5550e4f89041945c61102aa145",
                            "exitCode": 0,
                            "finishedAt": "2026-04-28T16:05:30Z",
                            "message": "[{\"key\":\"CHAINS-GIT_COMMIT\",\"value\":\"e395df7e0e4c64ad86da082463949a155dd916ac\",\"type\":1},{\"key\":\"CHAINS-GIT_URL\",\"value\":\"https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops\",\"type\":1},{\"key\":\"commit\",\"value\":\"e395df7e0e4c64ad86da082463949a155dd916ac\",\"type\":1},{\"key\":\"commit-timestamp\",\"value\":\"1777392307\",\"type\":1},{\"key\":\"short-commit\",\"value\":\"e395df7\",\"type\":1},{\"key\":\"url\",\"value\":\"https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-28T16:05:29Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-symlink-check",
                        "imageID": "quay.io/redhat-tssc/task-runner@sha256:db633cb62eb097a46ca9e3e0a54d21c8ebd444f81a074ce1f1afa61956185dbf",
                        "name": "symlink-check",
                        "provenance": {},
                        "terminated": {
                            "containerID": "cri-o://5ac9c02d7e68df317e6c755fc258044e472f6e0594ddefffdae773b8ef4fa3e3",
                            "exitCode": 0,
                            "finishedAt": "2026-04-28T16:05:30Z",
                            "message": "[{\"key\":\"CHAINS-GIT_COMMIT\",\"value\":\"e395df7e0e4c64ad86da082463949a155dd916ac\",\"type\":1},{\"key\":\"CHAINS-GIT_URL\",\"value\":\"https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops\",\"type\":1},{\"key\":\"commit\",\"value\":\"e395df7e0e4c64ad86da082463949a155dd916ac\",\"type\":1},{\"key\":\"commit-timestamp\",\"value\":\"1777392307\",\"type\":1},{\"key\":\"short-commit\",\"value\":\"e395df7\",\"type\":1},{\"key\":\"url\",\"value\":\"https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-28T16:05:30Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "The git-clone Task will clone a repo from the provided url into the output Workspace. By default the repo will be cloned into the root of your Workspace.",
                    "params": [
                        {
                            "description": "Repository URL to clone from.",
                            "name": "url",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Revision to checkout. (branch, tag, sha, ref, etc...)",
                            "name": "revision",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Refspec to fetch before checking out revision.",
                            "name": "refspec",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Initialize and fetch git submodules.",
                            "name": "submodules",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Comma-separated list of specific submodule paths to initialize and fetch. Only submodules in the specified directories and their subdirectories will be fetched.\nEmpty string fetches all submodules. Parameter \"submodules\" must be set to \"true\" to make this parameter applicable.\n",
                            "name": "submodulePaths",
                            "type": "string"
                        },
                        {
                            "default": "1",
                            "description": "Perform a shallow clone, fetching only the most recent N commits.",
                            "name": "depth",
                            "type": "string"
                        },
                        {
                            "default": "7",
                            "description": "Length of short commit SHA",
                            "name": "shortCommitLength",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Set the `http.sslVerify` global git config. Setting this to `false` is not advised unless you are sure that you trust your git remote.",
                            "name": "sslVerify",
                            "type": "string"
                        },
                        {
                            "default": "source",
                            "description": "Subdirectory inside the `output` Workspace to clone the repo into.",
                            "name": "subdirectory",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Define the directory patterns to match or exclude when performing a sparse checkout.",
                            "name": "sparseCheckoutDirectories",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Clean out the contents of the destination directory if it already exists before cloning.",
                            "name": "deleteExisting",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "HTTP proxy server for non-SSL requests.",
                            "name": "httpProxy",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "HTTPS proxy server for SSL requests.",
                            "name": "httpsProxy",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Opt out of proxying HTTP/HTTPS requests.",
                            "name": "noProxy",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Log the commands that are executed during `git-clone`'s operation.",
                            "name": "verbose",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Deprecated. Has no effect. Will be removed in the future.",
                            "name": "gitInitImage",
                            "type": "string"
                        },
                        {
                            "default": "/tekton/home",
                            "description": "Absolute path to the user's home directory. Set this explicitly if you are running the image as a non-root user.\n",
                            "name": "userHome",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Check symlinks in the repo. If they're pointing outside of the repo, the build will fail.\n",
                            "name": "enableSymlinkCheck",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Fetch all tags for the repo.",
                            "name": "fetchTags",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from.",
                            "name": "caTrustConfigMapName",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data.",
                            "name": "caTrustConfigMapKey",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Set to \"true\" to merge the targetBranch into the checked-out revision.",
                            "name": "mergeTargetBranch",
                            "type": "string"
                        },
                        {
                            "default": "main",
                            "description": "The target branch to merge into the revision (if mergeTargetBranch is true).",
                            "name": "targetBranch",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "URL of the repository to fetch the target branch from when mergeTargetBranch is true.\nIf empty, uses the same repository (origin). This allows merging a branch from a different repository.\n",
                            "name": "mergeSourceRepoUrl",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Perform a shallow fetch of the target branch, fetching only the most recent N commits.\nIf empty, fetches the full history of the target branch.\n",
                            "name": "mergeSourceDepth",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "The precise commit SHA that was fetched by this Task.",
                            "name": "commit",
                            "type": "string"
                        },
                        {
                            "description": "The commit SHA that was fetched by this Task limited to params.shortCommitLength number of characters",
                            "name": "short-commit",
                            "type": "string"
                        },
                        {
                            "description": "The precise URL that was fetched by this Task.",
                            "name": "url",
                            "type": "string"
                        },
                        {
                            "description": "The commit timestamp of the checkout",
                            "name": "commit-timestamp",
                            "type": "string"
                        },
                        {
                            "description": "The precise URL that was fetched by this Task. This result uses Chains type hinting to include in the provenance.",
                            "name": "CHAINS-GIT_URL",
                            "type": "string"
                        },
                        {
                            "description": "The precise commit SHA that was fetched by this Task. This result uses Chains type hinting to include in the provenance.",
                            "name": "CHAINS-GIT_COMMIT",
                            "type": "string"
                        },
                        {
                            "description": "The SHA of the commit after merging the target branch (if the param mergeTargetBranch is true).",
                            "name": "merged_sha",
                            "type": "string"
                        }
                    ],
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "HOME",
                                    "value": "/tekton/home"
                                },
                                {
                                    "name": "PARAM_URL",
                                    "value": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops"
                                },
                                {
                                    "name": "PARAM_REVISION",
                                    "value": "e395df7e0e4c64ad86da082463949a155dd916ac"
                                },
                                {
                                    "name": "PARAM_REFSPEC"
                                },
                                {
                                    "name": "PARAM_SUBMODULES",
                                    "value": "true"
                                },
                                {
                                    "name": "PARAM_SUBMODULE_PATHS"
                                },
                                {
                                    "name": "PARAM_DEPTH",
                                    "value": "0"
                                },
                                {
                                    "name": "PARAM_SHORT_COMMIT_LENGTH",
                                    "value": "7"
                                },
                                {
                                    "name": "PARAM_SSL_VERIFY",
                                    "value": "true"
                                },
                                {
                                    "name": "PARAM_SUBDIRECTORY",
                                    "value": "source"
                                },
                                {
                                    "name": "PARAM_DELETE_EXISTING",
                                    "value": "true"
                                },
                                {
                                    "name": "PARAM_HTTP_PROXY"
                                },
                                {
                                    "name": "PARAM_HTTPS_PROXY"
                                },
                                {
                                    "name": "PARAM_NO_PROXY"
                                },
                                {
                                    "name": "PARAM_VERBOSE",
                                    "value": "false"
                                },
                                {
                                    "name": "PARAM_SPARSE_CHECKOUT_DIRECTORIES"
                                },
                                {
                                    "name": "PARAM_USER_HOME",
                                    "value": "/tekton/home"
                                },
                                {
                                    "name": "PARAM_FETCH_TAGS",
                                    "value": "true"
                                },
                                {
                                    "name": "PARAM_GIT_INIT_IMAGE"
                                },
                                {
                                    "name": "PARAM_MERGE_TARGET_BRANCH",
                                    "value": "false"
                                },
                                {
                                    "name": "PARAM_TARGET_BRANCH",
                                    "value": "main"
                                },
                                {
                                    "name": "PARAM_MERGE_SOURCE_REPO_URL"
                                },
                                {
                                    "name": "PARAM_MERGE_SOURCE_DEPTH"
                                },
                                {
                                    "name": "WORKSPACE_OUTPUT_PATH",
                                    "value": "/workspace/output"
                                },
                                {
                                    "name": "WORKSPACE_SSH_DIRECTORY_BOUND",
                                    "value": "false"
                                },
                                {
                                    "name": "WORKSPACE_SSH_DIRECTORY_PATH"
                                },
                                {
                                    "name": "WORKSPACE_BASIC_AUTH_DIRECTORY_BOUND",
                                    "value": "true"
                                },
                                {
                                    "name": "WORKSPACE_BASIC_AUTH_DIRECTORY_PATH",
                                    "value": "/workspace/basic-auth"
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "clone",
                            "script": "#!/usr/bin/env sh\nset -eu\n\nif [ \"${PARAM_VERBOSE}\" = \"true\" ] ; then\n  set -x\nfi\n\nif [ -n \"${PARAM_GIT_INIT_IMAGE}\" ]; then\n  echo \"WARNING: provided deprecated gitInitImage parameter has no effect.\"\nfi\n\nif [ \"${WORKSPACE_BASIC_AUTH_DIRECTORY_BOUND}\" = \"true\" ] ; then\n  if [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.git-credentials\" ] \u0026\u0026 [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.gitconfig\" ]; then\n    cp \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.git-credentials\" \"${PARAM_USER_HOME}/.git-credentials\"\n    cp \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.gitconfig\" \"${PARAM_USER_HOME}/.gitconfig\"\n  # Compatibility with kubernetes.io/basic-auth secrets\n  elif [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/username\" ] \u0026\u0026 [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/password\" ]; then\n    HOSTNAME=$(echo $PARAM_URL | awk -F/ '{print $3}')\n    echo \"https://$(cat ${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/username):$(cat ${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/password)@$HOSTNAME\" \u003e \"${PARAM_USER_HOME}/.git-credentials\"\n    echo -e \"[credential \\\"https://$HOSTNAME\\\"]\\n  helper = store\" \u003e \"${PARAM_USER_HOME}/.gitconfig\"\n  else\n    echo \"Unknown basic-auth workspace format\"\n    exit 1\n  fi\n  chmod 400 \"${PARAM_USER_HOME}/.git-credentials\"\n  chmod 400 \"${PARAM_USER_HOME}/.gitconfig\"\nfi\n\n# Should be called after the gitconfig is copied from the repository secret\nca_bundle=/mnt/trusted-ca/ca-bundle.crt\nif [ -f \"$ca_bundle\" ]; then\n  echo \"INFO: Using mounted CA bundle: $ca_bundle\"\n  git config --global http.sslCAInfo \"$ca_bundle\"\nfi\n\nif [ \"${WORKSPACE_SSH_DIRECTORY_BOUND}\" = \"true\" ] ; then\n  cp -R \"${WORKSPACE_SSH_DIRECTORY_PATH}\" \"${PARAM_USER_HOME}\"/.ssh\n  chmod 700 \"${PARAM_USER_HOME}\"/.ssh\n  chmod -R 400 \"${PARAM_USER_HOME}\"/.ssh/*\nfi\n\nCHECKOUT_DIR=\"${WORKSPACE_OUTPUT_PATH}/${PARAM_SUBDIRECTORY}\"\n\ncleandir() {\n  # Delete any existing contents of the repo directory if it exists.\n  #\n  # We don't just \"rm -rf ${CHECKOUT_DIR}\" because ${CHECKOUT_DIR} might be \"/\"\n  # or the root of a mounted volume.\n  if [ -d \"${CHECKOUT_DIR}\" ] ; then\n    # Delete non-hidden files and directories\n    rm -rf \"${CHECKOUT_DIR:?}\"/*\n    # Delete files and directories starting with . but excluding ..\n    rm -rf \"${CHECKOUT_DIR}\"/.[!.]*\n    # Delete files and directories starting with .. plus any other character\n    rm -rf \"${CHECKOUT_DIR}\"/..?*\n  fi\n}\n\nif [ \"${PARAM_DELETE_EXISTING}\" = \"true\" ] ; then\n  cleandir\nfi\n\ntest -z \"${PARAM_HTTP_PROXY}\" || export HTTP_PROXY=\"${PARAM_HTTP_PROXY}\"\ntest -z \"${PARAM_HTTPS_PROXY}\" || export HTTPS_PROXY=\"${PARAM_HTTPS_PROXY}\"\ntest -z \"${PARAM_NO_PROXY}\" || export NO_PROXY=\"${PARAM_NO_PROXY}\"\n\n/ko-app/git-init \\\n  -url=\"${PARAM_URL}\" \\\n  -revision=\"${PARAM_REVISION}\" \\\n  -refspec=\"${PARAM_REFSPEC}\" \\\n  -path=\"${CHECKOUT_DIR}\" \\\n  -sslVerify=\"${PARAM_SSL_VERIFY}\" \\\n  -submodules=\"${PARAM_SUBMODULES}\" \\\n  -submodulePaths=\"${PARAM_SUBMODULE_PATHS}\" \\\n  -depth=\"${PARAM_DEPTH}\" \\\n  -sparseCheckoutDirectories=\"${PARAM_SPARSE_CHECKOUT_DIRECTORIES}\" \\\n  -retryMaxAttempts=10\ncd \"${CHECKOUT_DIR}\"\nRESULT_SHA=\"$(git rev-parse HEAD)\"\nRESULT_SHA_SHORT=\"$(git rev-parse --short=\"${PARAM_SHORT_COMMIT_LENGTH}\" HEAD)\"\nEXIT_CODE=\"$?\"\nif [ \"${EXIT_CODE}\" != 0 ] ; then\n  exit \"${EXIT_CODE}\"\nfi\nif [ \"${PARAM_MERGE_TARGET_BRANCH}\" = \"true\" ]; then\n  echo \"Merge option enabled. Attempting to merge target branch '${PARAM_TARGET_BRANCH}' into HEAD (${RESULT_SHA}).\"\n\n  if [ \"${PARAM_DEPTH}\" = \"1\" ]; then\n    echo \"WARNING: Shallow clone with depth=1 may cause merge conflicts due to insufficient commit history.\" \u003e\u00262\n  fi\n\n  if [ \"${PARAM_MERGE_SOURCE_DEPTH}\" = \"1\" ]; then\n    echo \"WARNING: Shallow fetch with mergeSourceDepth=1 may cause merge conflicts due to insufficient commit history.\" \u003e\u00262\n  fi\n\n  # Determine if merging from a different repository or the same one\n  if [ -n \"${PARAM_MERGE_SOURCE_REPO_URL}\" ]; then\n    # Normalize URLs for comparison (remove trailing slashes and .git suffix)\n    normalize_url() {\n      echo \"$1\" | sed -e 's#/$##' -e 's#\\.git$##'\n    }\n\n    NORMALIZED_ORIGIN_URL=$(normalize_url \"${PARAM_URL}\")\n    NORMALIZED_MERGE_URL=$(normalize_url \"${PARAM_MERGE_SOURCE_REPO_URL}\")\n\n    if [ \"${NORMALIZED_ORIGIN_URL}\" = \"${NORMALIZED_MERGE_URL}\" ]; then\n      echo \"Merge source URL is the same as origin. Using existing 'origin' remote.\"\n      MERGE_REMOTE=\"origin\"\n    else\n      echo \"Merging from different repository: ${PARAM_MERGE_SOURCE_REPO_URL}\"\n      echo \"Adding remote 'merge-source'...\"\n      git remote add merge-source \"${PARAM_MERGE_SOURCE_REPO_URL}\"\n      MERGE_REMOTE=\"merge-source\"\n    fi\n  else\n    echo \"Merging from the same repository (origin)\"\n    MERGE_REMOTE=\"origin\"\n  fi\n\n  echo \"Fetching target branch '${PARAM_TARGET_BRANCH}' from ${MERGE_REMOTE}...\"\n  if [ -n \"${PARAM_MERGE_SOURCE_DEPTH}\" ]; then\n    retry git fetch --depth=\"${PARAM_MERGE_SOURCE_DEPTH}\" ${MERGE_REMOTE} \"${PARAM_TARGET_BRANCH}\"\n  else\n    retry git fetch ${MERGE_REMOTE} \"${PARAM_TARGET_BRANCH}\"\n  fi\n  FETCH_EXIT_CODE=\"$?\"\n  if [ \"${FETCH_EXIT_CODE}\" != \"0\" ]; then\n    echo \"ERROR: Failed to fetch target branch '${PARAM_TARGET_BRANCH}' from ${MERGE_REMOTE}.\" \u003e\u00262\n    exit \"${FETCH_EXIT_CODE}\"\n  fi\n\n  echo \"Merging ${MERGE_REMOTE}/${PARAM_TARGET_BRANCH} into current HEAD...\"\n  git config --global user.email \"tekton-git-clone@tekton.dev\"\n  git config --global user.name \"Tekton Git Clone Task\"\n  git merge \"${MERGE_REMOTE}/${PARAM_TARGET_BRANCH}\" --no-commit --no-ff --allow-unrelated-histories\n  MERGE_CHECK_EXIT_CODE=\"$?\"\n  if [ \"${MERGE_CHECK_EXIT_CODE}\" != \"0\" ] ; then\n    echo \"ERROR: Merge conflict detected or merge failed before commit.\" \u003e\u00262\n    echo \"--- Git Status ---\"\n    git status\n    echo \"------------------\"\n    exit \"${MERGE_CHECK_EXIT_CODE}\"\n  else\n    # Check if there are changes that need to be merged, and if so, create a merge commit.\n    if git diff --staged --quiet; then\n      echo \"No diff was found, skipping merge...\" \u003e\u00262\n    else\n      echo \"Merge successful (no conflicts found), committing...\"\n      git commit -m \"Merge branch '${PARAM_TARGET_BRANCH}' from ${MERGE_REMOTE} into ${RESULT_SHA}\"\n      COMMIT_EXIT_CODE=\"$?\"\n      if [ \"${COMMIT_EXIT_CODE}\" != \"0\" ]; then\n        echo \"ERROR: Failed to commit merge.\" \u003e\u00262\n        exit \"${COMMIT_EXIT_CODE}\"\n      fi\n      MERGED_SHA=$(git rev-parse HEAD)\n      echo \"New HEAD after merge: ${MERGED_SHA}\"\n      echo \"${MERGED_SHA}\" \u003e \"/tekton/results/merged_sha\"\n    fi\n  fi\nelse\n  echo \"Merge option disabled. Using checked-out revision ${RESULT_SHA} directly.\"\nfi\nprintf \"%s\" \"${RESULT_SHA}\" \u003e \"/tekton/results/commit\"\nprintf \"%s\" \"${RESULT_SHA}\" \u003e \"/tekton/results/CHAINS-GIT_COMMIT\"\nprintf \"%s\" \"${RESULT_SHA_SHORT}\" \u003e \"/tekton/results/short-commit\"\nprintf \"%s\" \"${PARAM_URL}\" \u003e \"/tekton/results/url\"\nprintf \"%s\" \"${PARAM_URL}\" \u003e \"/tekton/results/CHAINS-GIT_URL\"\nprintf \"%s\" \"$(git log -1 --pretty=%ct)\" \u003e \"/tekton/results/commit-timestamp\"\n\nif [ \"${PARAM_FETCH_TAGS}\" = \"true\" ] ; then\n  echo \"Fetching tags\"\n  retry git fetch --tags\nfi\n",
                            "securityContext": {
                                "runAsUser": 0
                            },
                            "volumeMounts": [
                                {
                                    "mountPath": "/mnt/trusted-ca",
                                    "name": "trusted-ca",
                                    "readOnly": true
                                }
                            ]
                        },
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "PARAM_ENABLE_SYMLINK_CHECK",
                                    "value": "true"
                                },
                                {
                                    "name": "PARAM_SUBDIRECTORY",
                                    "value": "source"
                                },
                                {
                                    "name": "WORKSPACE_OUTPUT_PATH",
                                    "value": "/workspace/output"
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "symlink-check",
                            "script": "#!/usr/bin/env bash\nset -euo pipefail\n\nCHECKOUT_DIR=\"${WORKSPACE_OUTPUT_PATH}/${PARAM_SUBDIRECTORY}\"\ncheck_symlinks() {\n  FOUND_SYMLINK_POINTING_OUTSIDE_OF_REPO=false\n  while read -r symlink\n  do\n    target=$(readlink -m \"$symlink\")\n    if ! [[ \"$target\" =~ ^$CHECKOUT_DIR ]]; then\n      echo \"The cloned repository contains symlink pointing outside of the cloned repository: $symlink\"\n      FOUND_SYMLINK_POINTING_OUTSIDE_OF_REPO=true\n    fi\n  done \u003c \u003c(find $CHECKOUT_DIR -type l -print)\n  if [ \"$FOUND_SYMLINK_POINTING_OUTSIDE_OF_REPO\" = true ] ; then\n    return 1\n  fi\n}\n\nif [ \"${PARAM_ENABLE_SYMLINK_CHECK}\" = \"true\" ] ; then\n  echo \"Running symlink check\"\n  check_symlinks\nfi\n"
                        }
                    ],
                    "volumes": [
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "The git repo will be cloned onto the volume backing this Workspace.",
                            "name": "output"
                        },
                        {
                            "description": "A .ssh directory with private key, known_hosts, config, etc. Copied to\nthe user's home before git commands are executed. Used to authenticate\nwith the git remote when performing the clone. Binding a Secret to this\nWorkspace is strongly recommended over other volume types.\n",
                            "name": "ssh-directory",
                            "optional": true
                        },
                        {
                            "description": "A Workspace containing a .gitconfig and .git-credentials file or username and password.\nThese will be copied to the user's home before any git commands are run. Any\nother files in this Workspace are ignored. It is strongly recommended\nto use ssh-directory over basic-auth whenever possible and to bind a\nSecret to this Workspace over other volume types.\n",
                            "name": "basic-auth",
                            "optional": true
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "https://rekor-server-tssc-tas.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/api/v1/log/entries?logIndex=28",
                    "pipeline.tekton.dev/affinity-assistant": "affinity-assistant-686ee97ecc",
                    "pipeline.tekton.dev/release": "8910674cb953317a4373f33822024b9de8c5fa22",
                    "pipelinesascode.tekton.dev/branch": "main",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "Merge Request",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-xtymyk",
                    "pipelinesascode.tekton.dev/git-provider": "gitlab",
                    "pipelinesascode.tekton.dev/on-event": "[pull_request]",
                    "pipelinesascode.tekton.dev/on-target-branch": "[main]",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-gitops-on-pull-request",
                    "pipelinesascode.tekton.dev/pipeline": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/pipelines/gitops-pull-request-tssc.yaml",
                    "pipelinesascode.tekton.dev/pull-request": "1",
                    "pipelinesascode.tekton.dev/repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-gitops-repository",
                    "pipelinesascode.tekton.dev/sender": "rhtap-qe-test",
                    "pipelinesascode.tekton.dev/sha": "ced3321e2172a8a3a52c00fd150c43b38aaaa1dd",
                    "pipelinesascode.tekton.dev/sha-title": "Promote to stage environment",
                    "pipelinesascode.tekton.dev/sha-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops/-/commit/ced3321e2172a8a3a52c00fd150c43b38aaaa1dd",
                    "pipelinesascode.tekton.dev/source-branch": "promote-to-stage-1777392186938",
                    "pipelinesascode.tekton.dev/source-project-id": "81724368",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops",
                    "pipelinesascode.tekton.dev/target-project-id": "81724368",
                    "pipelinesascode.tekton.dev/task-0": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/git-clone.yaml",
                    "pipelinesascode.tekton.dev/task-1": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/gather-deploy-images.yaml",
                    "pipelinesascode.tekton.dev/task-2": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/verify-enterprise-contract.yaml",
                    "pipelinesascode.tekton.dev/task-3": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/gather-deploy-images.yaml",
                    "pipelinesascode.tekton.dev/task-4": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/download-sbom-from-url-in-attestation.yaml",
                    "pipelinesascode.tekton.dev/task-5": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/upload-sbom-to-trustification.yaml",
                    "pipelinesascode.tekton.dev/task-6": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/fetch-gitops-images.yaml",
                    "pipelinesascode.tekton.dev/task-7": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/verify-gitops-conforma.yaml",
                    "pipelinesascode.tekton.dev/task-8": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/download-gitops-sbom.yaml",
                    "pipelinesascode.tekton.dev/task-9": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/upload-gitops-sbom.yaml",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax-gitops",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "tssc-app-ci/results/ab4f5fdf-b85e-44b0-b185-5e3ca1ce7431/records/a3fc73cf-d2bd-41b6-b004-59ffec62610a",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"e2e-tests-go-eciytfax-gitops\",\"commit\":\"ced3321e2172a8a3a52c00fd150c43b38aaaa1dd\",\"eventType\":\"Merge Request\",\"pull_request-id\":1}",
                    "results.tekton.dev/result": "tssc-app-ci/results/ab4f5fdf-b85e-44b0-b185-5e3ca1ce7431",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/categories": "Git",
                    "tekton.dev/displayName": "git clone",
                    "tekton.dev/pipelines.minVersion": "0.21.0",
                    "tekton.dev/platforms": "linux/amd64,linux/s390x,linux/ppc64le,linux/arm64",
                    "tekton.dev/tags": "git"
                },
                "creationTimestamp": "2026-04-28T16:03:17Z",
                "finalizers": [
                    "chains.tekton.dev/taskrun",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/part-of": "e2e-tests-go-eciytfax",
                    "app.kubernetes.io/version": "v0.39.5",
                    "argocd/app-name": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-id": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-namespace": "tssc-app",
                    "janus-idp.io/tekton": "e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/event-type": "Merge_Request",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-gitops-on-pull-request",
                    "pipelinesascode.tekton.dev/pull-request": "1",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-gitops-repository",
                    "pipelinesascode.tekton.dev/sha": "ced3321e2172a8a3a52c00fd150c43b38aaaa1dd",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax-gitops",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "e2e-tests-go-eciytfax-gitops-on-pull-request-7rgs2",
                    "tekton.dev/pipelineRun": "e2e-tests-go-eciytfax-gitops-on-pull-request-7rgs2",
                    "tekton.dev/pipelineRunUID": "ab4f5fdf-b85e-44b0-b185-5e3ca1ce7431",
                    "tekton.dev/pipelineTask": "clone-repository"
                },
                "name": "e2e-tests-go-e49db8dcb9468fe2a9d354d396d5b01aa-clone-repository",
                "namespace": "tssc-app-ci",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "e2e-tests-go-eciytfax-gitops-on-pull-request-7rgs2",
                        "uid": "ab4f5fdf-b85e-44b0-b185-5e3ca1ce7431"
                    }
                ],
                "resourceVersion": "43551",
                "uid": "a3fc73cf-d2bd-41b6-b004-59ffec62610a"
            },
            "spec": {
                "params": [
                    {
                        "name": "url",
                        "value": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops"
                    },
                    {
                        "name": "revision",
                        "value": "ced3321e2172a8a3a52c00fd150c43b38aaaa1dd"
                    },
                    {
                        "name": "fetchTags",
                        "value": "true"
                    },
                    {
                        "name": "depth",
                        "value": "0"
                    }
                ],
                "serviceAccountName": "pipeline",
                "taskSpec": {
                    "description": "The git-clone Task will clone a repo from the provided url into the output Workspace. By default the repo will be cloned into the root of your Workspace.",
                    "params": [
                        {
                            "description": "Repository URL to clone from.",
                            "name": "url",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Revision to checkout. (branch, tag, sha, ref, etc...)",
                            "name": "revision",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Refspec to fetch before checking out revision.",
                            "name": "refspec",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Initialize and fetch git submodules.",
                            "name": "submodules",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Comma-separated list of specific submodule paths to initialize and fetch. Only submodules in the specified directories and their subdirectories will be fetched.\nEmpty string fetches all submodules. Parameter \"submodules\" must be set to \"true\" to make this parameter applicable.\n",
                            "name": "submodulePaths",
                            "type": "string"
                        },
                        {
                            "default": "1",
                            "description": "Perform a shallow clone, fetching only the most recent N commits.",
                            "name": "depth",
                            "type": "string"
                        },
                        {
                            "default": "7",
                            "description": "Length of short commit SHA",
                            "name": "shortCommitLength",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Set the `http.sslVerify` global git config. Setting this to `false` is not advised unless you are sure that you trust your git remote.",
                            "name": "sslVerify",
                            "type": "string"
                        },
                        {
                            "default": "source",
                            "description": "Subdirectory inside the `output` Workspace to clone the repo into.",
                            "name": "subdirectory",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Define the directory patterns to match or exclude when performing a sparse checkout.",
                            "name": "sparseCheckoutDirectories",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Clean out the contents of the destination directory if it already exists before cloning.",
                            "name": "deleteExisting",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "HTTP proxy server for non-SSL requests.",
                            "name": "httpProxy",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "HTTPS proxy server for SSL requests.",
                            "name": "httpsProxy",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Opt out of proxying HTTP/HTTPS requests.",
                            "name": "noProxy",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Log the commands that are executed during `git-clone`'s operation.",
                            "name": "verbose",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Deprecated. Has no effect. Will be removed in the future.",
                            "name": "gitInitImage",
                            "type": "string"
                        },
                        {
                            "default": "/tekton/home",
                            "description": "Absolute path to the user's home directory. Set this explicitly if you are running the image as a non-root user.\n",
                            "name": "userHome",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Check symlinks in the repo. If they're pointing outside of the repo, the build will fail.\n",
                            "name": "enableSymlinkCheck",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Fetch all tags for the repo.",
                            "name": "fetchTags",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from.",
                            "name": "caTrustConfigMapName",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data.",
                            "name": "caTrustConfigMapKey",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Set to \"true\" to merge the targetBranch into the checked-out revision.",
                            "name": "mergeTargetBranch",
                            "type": "string"
                        },
                        {
                            "default": "main",
                            "description": "The target branch to merge into the revision (if mergeTargetBranch is true).",
                            "name": "targetBranch",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "URL of the repository to fetch the target branch from when mergeTargetBranch is true.\nIf empty, uses the same repository (origin). This allows merging a branch from a different repository.\n",
                            "name": "mergeSourceRepoUrl",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Perform a shallow fetch of the target branch, fetching only the most recent N commits.\nIf empty, fetches the full history of the target branch.\n",
                            "name": "mergeSourceDepth",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "The precise commit SHA that was fetched by this Task.",
                            "name": "commit",
                            "type": "string"
                        },
                        {
                            "description": "The commit SHA that was fetched by this Task limited to params.shortCommitLength number of characters",
                            "name": "short-commit",
                            "type": "string"
                        },
                        {
                            "description": "The precise URL that was fetched by this Task.",
                            "name": "url",
                            "type": "string"
                        },
                        {
                            "description": "The commit timestamp of the checkout",
                            "name": "commit-timestamp",
                            "type": "string"
                        },
                        {
                            "description": "The precise URL that was fetched by this Task. This result uses Chains type hinting to include in the provenance.",
                            "name": "CHAINS-GIT_URL",
                            "type": "string"
                        },
                        {
                            "description": "The precise commit SHA that was fetched by this Task. This result uses Chains type hinting to include in the provenance.",
                            "name": "CHAINS-GIT_COMMIT",
                            "type": "string"
                        },
                        {
                            "description": "The SHA of the commit after merging the target branch (if the param mergeTargetBranch is true).",
                            "name": "merged_sha",
                            "type": "string"
                        }
                    ],
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "HOME",
                                    "value": "$(params.userHome)"
                                },
                                {
                                    "name": "PARAM_URL",
                                    "value": "$(params.url)"
                                },
                                {
                                    "name": "PARAM_REVISION",
                                    "value": "ced3321e2172a8a3a52c00fd150c43b38aaaa1dd"
                                },
                                {
                                    "name": "PARAM_REFSPEC",
                                    "value": "$(params.refspec)"
                                },
                                {
                                    "name": "PARAM_SUBMODULES",
                                    "value": "$(params.submodules)"
                                },
                                {
                                    "name": "PARAM_SUBMODULE_PATHS",
                                    "value": "$(params.submodulePaths)"
                                },
                                {
                                    "name": "PARAM_DEPTH",
                                    "value": "$(params.depth)"
                                },
                                {
                                    "name": "PARAM_SHORT_COMMIT_LENGTH",
                                    "value": "$(params.shortCommitLength)"
                                },
                                {
                                    "name": "PARAM_SSL_VERIFY",
                                    "value": "$(params.sslVerify)"
                                },
                                {
                                    "name": "PARAM_SUBDIRECTORY",
                                    "value": "$(params.subdirectory)"
                                },
                                {
                                    "name": "PARAM_DELETE_EXISTING",
                                    "value": "$(params.deleteExisting)"
                                },
                                {
                                    "name": "PARAM_HTTP_PROXY",
                                    "value": "$(params.httpProxy)"
                                },
                                {
                                    "name": "PARAM_HTTPS_PROXY",
                                    "value": "$(params.httpsProxy)"
                                },
                                {
                                    "name": "PARAM_NO_PROXY",
                                    "value": "$(params.noProxy)"
                                },
                                {
                                    "name": "PARAM_VERBOSE",
                                    "value": "$(params.verbose)"
                                },
                                {
                                    "name": "PARAM_SPARSE_CHECKOUT_DIRECTORIES",
                                    "value": "$(params.sparseCheckoutDirectories)"
                                },
                                {
                                    "name": "PARAM_USER_HOME",
                                    "value": "$(params.userHome)"
                                },
                                {
                                    "name": "PARAM_FETCH_TAGS",
                                    "value": "$(params.fetchTags)"
                                },
                                {
                                    "name": "PARAM_GIT_INIT_IMAGE",
                                    "value": "$(params.gitInitImage)"
                                },
                                {
                                    "name": "PARAM_MERGE_TARGET_BRANCH",
                                    "value": "$(params.mergeTargetBranch)"
                                },
                                {
                                    "name": "PARAM_TARGET_BRANCH",
                                    "value": "$(params.targetBranch)"
                                },
                                {
                                    "name": "PARAM_MERGE_SOURCE_REPO_URL",
                                    "value": "$(params.mergeSourceRepoUrl)"
                                },
                                {
                                    "name": "PARAM_MERGE_SOURCE_DEPTH",
                                    "value": "$(params.mergeSourceDepth)"
                                },
                                {
                                    "name": "WORKSPACE_OUTPUT_PATH",
                                    "value": "$(workspaces.output.path)"
                                },
                                {
                                    "name": "WORKSPACE_SSH_DIRECTORY_BOUND",
                                    "value": "$(workspaces.ssh-directory.bound)"
                                },
                                {
                                    "name": "WORKSPACE_SSH_DIRECTORY_PATH",
                                    "value": "$(workspaces.ssh-directory.path)"
                                },
                                {
                                    "name": "WORKSPACE_BASIC_AUTH_DIRECTORY_BOUND",
                                    "value": "$(workspaces.basic-auth.bound)"
                                },
                                {
                                    "name": "WORKSPACE_BASIC_AUTH_DIRECTORY_PATH",
                                    "value": "$(workspaces.basic-auth.path)"
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "clone",
                            "script": "#!/usr/bin/env sh\nset -eu\n\nif [ \"${PARAM_VERBOSE}\" = \"true\" ] ; then\n  set -x\nfi\n\nif [ -n \"${PARAM_GIT_INIT_IMAGE}\" ]; then\n  echo \"WARNING: provided deprecated gitInitImage parameter has no effect.\"\nfi\n\nif [ \"${WORKSPACE_BASIC_AUTH_DIRECTORY_BOUND}\" = \"true\" ] ; then\n  if [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.git-credentials\" ] \u0026\u0026 [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.gitconfig\" ]; then\n    cp \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.git-credentials\" \"${PARAM_USER_HOME}/.git-credentials\"\n    cp \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.gitconfig\" \"${PARAM_USER_HOME}/.gitconfig\"\n  # Compatibility with kubernetes.io/basic-auth secrets\n  elif [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/username\" ] \u0026\u0026 [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/password\" ]; then\n    HOSTNAME=$(echo $PARAM_URL | awk -F/ '{print $3}')\n    echo \"https://$(cat ${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/username):$(cat ${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/password)@$HOSTNAME\" \u003e \"${PARAM_USER_HOME}/.git-credentials\"\n    echo -e \"[credential \\\"https://$HOSTNAME\\\"]\\n  helper = store\" \u003e \"${PARAM_USER_HOME}/.gitconfig\"\n  else\n    echo \"Unknown basic-auth workspace format\"\n    exit 1\n  fi\n  chmod 400 \"${PARAM_USER_HOME}/.git-credentials\"\n  chmod 400 \"${PARAM_USER_HOME}/.gitconfig\"\nfi\n\n# Should be called after the gitconfig is copied from the repository secret\nca_bundle=/mnt/trusted-ca/ca-bundle.crt\nif [ -f \"$ca_bundle\" ]; then\n  echo \"INFO: Using mounted CA bundle: $ca_bundle\"\n  git config --global http.sslCAInfo \"$ca_bundle\"\nfi\n\nif [ \"${WORKSPACE_SSH_DIRECTORY_BOUND}\" = \"true\" ] ; then\n  cp -R \"${WORKSPACE_SSH_DIRECTORY_PATH}\" \"${PARAM_USER_HOME}\"/.ssh\n  chmod 700 \"${PARAM_USER_HOME}\"/.ssh\n  chmod -R 400 \"${PARAM_USER_HOME}\"/.ssh/*\nfi\n\nCHECKOUT_DIR=\"${WORKSPACE_OUTPUT_PATH}/${PARAM_SUBDIRECTORY}\"\n\ncleandir() {\n  # Delete any existing contents of the repo directory if it exists.\n  #\n  # We don't just \"rm -rf ${CHECKOUT_DIR}\" because ${CHECKOUT_DIR} might be \"/\"\n  # or the root of a mounted volume.\n  if [ -d \"${CHECKOUT_DIR}\" ] ; then\n    # Delete non-hidden files and directories\n    rm -rf \"${CHECKOUT_DIR:?}\"/*\n    # Delete files and directories starting with . but excluding ..\n    rm -rf \"${CHECKOUT_DIR}\"/.[!.]*\n    # Delete files and directories starting with .. plus any other character\n    rm -rf \"${CHECKOUT_DIR}\"/..?*\n  fi\n}\n\nif [ \"${PARAM_DELETE_EXISTING}\" = \"true\" ] ; then\n  cleandir\nfi\n\ntest -z \"${PARAM_HTTP_PROXY}\" || export HTTP_PROXY=\"${PARAM_HTTP_PROXY}\"\ntest -z \"${PARAM_HTTPS_PROXY}\" || export HTTPS_PROXY=\"${PARAM_HTTPS_PROXY}\"\ntest -z \"${PARAM_NO_PROXY}\" || export NO_PROXY=\"${PARAM_NO_PROXY}\"\n\n/ko-app/git-init \\\n  -url=\"${PARAM_URL}\" \\\n  -revision=\"${PARAM_REVISION}\" \\\n  -refspec=\"${PARAM_REFSPEC}\" \\\n  -path=\"${CHECKOUT_DIR}\" \\\n  -sslVerify=\"${PARAM_SSL_VERIFY}\" \\\n  -submodules=\"${PARAM_SUBMODULES}\" \\\n  -submodulePaths=\"${PARAM_SUBMODULE_PATHS}\" \\\n  -depth=\"${PARAM_DEPTH}\" \\\n  -sparseCheckoutDirectories=\"${PARAM_SPARSE_CHECKOUT_DIRECTORIES}\" \\\n  -retryMaxAttempts=10\ncd \"${CHECKOUT_DIR}\"\nRESULT_SHA=\"$(git rev-parse HEAD)\"\nRESULT_SHA_SHORT=\"$(git rev-parse --short=\"${PARAM_SHORT_COMMIT_LENGTH}\" HEAD)\"\nEXIT_CODE=\"$?\"\nif [ \"${EXIT_CODE}\" != 0 ] ; then\n  exit \"${EXIT_CODE}\"\nfi\nif [ \"${PARAM_MERGE_TARGET_BRANCH}\" = \"true\" ]; then\n  echo \"Merge option enabled. Attempting to merge target branch '${PARAM_TARGET_BRANCH}' into HEAD (${RESULT_SHA}).\"\n\n  if [ \"${PARAM_DEPTH}\" = \"1\" ]; then\n    echo \"WARNING: Shallow clone with depth=1 may cause merge conflicts due to insufficient commit history.\" \u003e\u00262\n  fi\n\n  if [ \"${PARAM_MERGE_SOURCE_DEPTH}\" = \"1\" ]; then\n    echo \"WARNING: Shallow fetch with mergeSourceDepth=1 may cause merge conflicts due to insufficient commit history.\" \u003e\u00262\n  fi\n\n  # Determine if merging from a different repository or the same one\n  if [ -n \"${PARAM_MERGE_SOURCE_REPO_URL}\" ]; then\n    # Normalize URLs for comparison (remove trailing slashes and .git suffix)\n    normalize_url() {\n      echo \"$1\" | sed -e 's#/$##' -e 's#\\.git$##'\n    }\n\n    NORMALIZED_ORIGIN_URL=$(normalize_url \"${PARAM_URL}\")\n    NORMALIZED_MERGE_URL=$(normalize_url \"${PARAM_MERGE_SOURCE_REPO_URL}\")\n\n    if [ \"${NORMALIZED_ORIGIN_URL}\" = \"${NORMALIZED_MERGE_URL}\" ]; then\n      echo \"Merge source URL is the same as origin. Using existing 'origin' remote.\"\n      MERGE_REMOTE=\"origin\"\n    else\n      echo \"Merging from different repository: ${PARAM_MERGE_SOURCE_REPO_URL}\"\n      echo \"Adding remote 'merge-source'...\"\n      git remote add merge-source \"${PARAM_MERGE_SOURCE_REPO_URL}\"\n      MERGE_REMOTE=\"merge-source\"\n    fi\n  else\n    echo \"Merging from the same repository (origin)\"\n    MERGE_REMOTE=\"origin\"\n  fi\n\n  echo \"Fetching target branch '${PARAM_TARGET_BRANCH}' from ${MERGE_REMOTE}...\"\n  if [ -n \"${PARAM_MERGE_SOURCE_DEPTH}\" ]; then\n    retry git fetch --depth=\"${PARAM_MERGE_SOURCE_DEPTH}\" ${MERGE_REMOTE} \"${PARAM_TARGET_BRANCH}\"\n  else\n    retry git fetch ${MERGE_REMOTE} \"${PARAM_TARGET_BRANCH}\"\n  fi\n  FETCH_EXIT_CODE=\"$?\"\n  if [ \"${FETCH_EXIT_CODE}\" != \"0\" ]; then\n    echo \"ERROR: Failed to fetch target branch '${PARAM_TARGET_BRANCH}' from ${MERGE_REMOTE}.\" \u003e\u00262\n    exit \"${FETCH_EXIT_CODE}\"\n  fi\n\n  echo \"Merging ${MERGE_REMOTE}/${PARAM_TARGET_BRANCH} into current HEAD...\"\n  git config --global user.email \"tekton-git-clone@tekton.dev\"\n  git config --global user.name \"Tekton Git Clone Task\"\n  git merge \"${MERGE_REMOTE}/${PARAM_TARGET_BRANCH}\" --no-commit --no-ff --allow-unrelated-histories\n  MERGE_CHECK_EXIT_CODE=\"$?\"\n  if [ \"${MERGE_CHECK_EXIT_CODE}\" != \"0\" ] ; then\n    echo \"ERROR: Merge conflict detected or merge failed before commit.\" \u003e\u00262\n    echo \"--- Git Status ---\"\n    git status\n    echo \"------------------\"\n    exit \"${MERGE_CHECK_EXIT_CODE}\"\n  else\n    # Check if there are changes that need to be merged, and if so, create a merge commit.\n    if git diff --staged --quiet; then\n      echo \"No diff was found, skipping merge...\" \u003e\u00262\n    else\n      echo \"Merge successful (no conflicts found), committing...\"\n      git commit -m \"Merge branch '${PARAM_TARGET_BRANCH}' from ${MERGE_REMOTE} into ${RESULT_SHA}\"\n      COMMIT_EXIT_CODE=\"$?\"\n      if [ \"${COMMIT_EXIT_CODE}\" != \"0\" ]; then\n        echo \"ERROR: Failed to commit merge.\" \u003e\u00262\n        exit \"${COMMIT_EXIT_CODE}\"\n      fi\n      MERGED_SHA=$(git rev-parse HEAD)\n      echo \"New HEAD after merge: ${MERGED_SHA}\"\n      echo \"${MERGED_SHA}\" \u003e \"$(results.merged_sha.path)\"\n    fi\n  fi\nelse\n  echo \"Merge option disabled. Using checked-out revision ${RESULT_SHA} directly.\"\nfi\nprintf \"%s\" \"${RESULT_SHA}\" \u003e \"$(results.commit.path)\"\nprintf \"%s\" \"${RESULT_SHA}\" \u003e \"$(results.CHAINS-GIT_COMMIT.path)\"\nprintf \"%s\" \"${RESULT_SHA_SHORT}\" \u003e \"$(results.short-commit.path)\"\nprintf \"%s\" \"${PARAM_URL}\" \u003e \"$(results.url.path)\"\nprintf \"%s\" \"${PARAM_URL}\" \u003e \"$(results.CHAINS-GIT_URL.path)\"\nprintf \"%s\" \"$(git log -1 --pretty=%ct)\" \u003e \"$(results.commit-timestamp.path)\"\n\nif [ \"${PARAM_FETCH_TAGS}\" = \"true\" ] ; then\n  echo \"Fetching tags\"\n  retry git fetch --tags\nfi\n",
                            "securityContext": {
                                "runAsUser": 0
                            },
                            "volumeMounts": [
                                {
                                    "mountPath": "/mnt/trusted-ca",
                                    "name": "trusted-ca",
                                    "readOnly": true
                                }
                            ]
                        },
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "PARAM_ENABLE_SYMLINK_CHECK",
                                    "value": "$(params.enableSymlinkCheck)"
                                },
                                {
                                    "name": "PARAM_SUBDIRECTORY",
                                    "value": "$(params.subdirectory)"
                                },
                                {
                                    "name": "WORKSPACE_OUTPUT_PATH",
                                    "value": "$(workspaces.output.path)"
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "symlink-check",
                            "script": "#!/usr/bin/env bash\nset -euo pipefail\n\nCHECKOUT_DIR=\"${WORKSPACE_OUTPUT_PATH}/${PARAM_SUBDIRECTORY}\"\ncheck_symlinks() {\n  FOUND_SYMLINK_POINTING_OUTSIDE_OF_REPO=false\n  while read -r symlink\n  do\n    target=$(readlink -m \"$symlink\")\n    if ! [[ \"$target\" =~ ^$CHECKOUT_DIR ]]; then\n      echo \"The cloned repository contains symlink pointing outside of the cloned repository: $symlink\"\n      FOUND_SYMLINK_POINTING_OUTSIDE_OF_REPO=true\n    fi\n  done \u003c \u003c(find $CHECKOUT_DIR -type l -print)\n  if [ \"$FOUND_SYMLINK_POINTING_OUTSIDE_OF_REPO\" = true ] ; then\n    return 1\n  fi\n}\n\nif [ \"${PARAM_ENABLE_SYMLINK_CHECK}\" = \"true\" ] ; then\n  echo \"Running symlink check\"\n  check_symlinks\nfi\n"
                        }
                    ],
                    "volumes": [
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "$(params.caTrustConfigMapKey)",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "$(params.caTrustConfigMapName)",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "The git repo will be cloned onto the volume backing this Workspace.",
                            "name": "output"
                        },
                        {
                            "description": "A .ssh directory with private key, known_hosts, config, etc. Copied to\nthe user's home before git commands are executed. Used to authenticate\nwith the git remote when performing the clone. Binding a Secret to this\nWorkspace is strongly recommended over other volume types.\n",
                            "name": "ssh-directory",
                            "optional": true
                        },
                        {
                            "description": "A Workspace containing a .gitconfig and .git-credentials file or username and password.\nThese will be copied to the user's home before any git commands are run. Any\nother files in this Workspace are ignored. It is strongly recommended\nto use ssh-directory over basic-auth whenever possible and to bind a\nSecret to this Workspace over other volume types.\n",
                            "name": "basic-auth",
                            "optional": true
                        }
                    ]
                },
                "timeout": "1h0m0s",
                "workspaces": [
                    {
                        "name": "output",
                        "persistentVolumeClaim": {
                            "claimName": "pvc-96c0e1d35f"
                        }
                    },
                    {
                        "name": "basic-auth",
                        "secret": {
                            "secretName": "pac-gitauth-xtymyk"
                        }
                    }
                ]
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-28T16:03:33Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-28T16:03:33Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "e2e-tests-go-e49db8dcb9468f0e0c2b0884bdcf68ea64af74bf7c943f-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    }
                },
                "results": [
                    {
                        "name": "CHAINS-GIT_COMMIT",
                        "type": "string",
                        "value": "ced3321e2172a8a3a52c00fd150c43b38aaaa1dd"
                    },
                    {
                        "name": "CHAINS-GIT_URL",
                        "type": "string",
                        "value": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops"
                    },
                    {
                        "name": "commit",
                        "type": "string",
                        "value": "ced3321e2172a8a3a52c00fd150c43b38aaaa1dd"
                    },
                    {
                        "name": "commit-timestamp",
                        "type": "string",
                        "value": "1777392188"
                    },
                    {
                        "name": "short-commit",
                        "type": "string",
                        "value": "ced3321"
                    },
                    {
                        "name": "url",
                        "type": "string",
                        "value": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops"
                    }
                ],
                "startTime": "2026-04-28T16:03:18Z",
                "steps": [
                    {
                        "container": "step-clone",
                        "imageID": "quay.io/redhat-tssc/task-runner@sha256:db633cb62eb097a46ca9e3e0a54d21c8ebd444f81a074ce1f1afa61956185dbf",
                        "name": "clone",
                        "provenance": {},
                        "terminated": {
                            "containerID": "cri-o://06ad2a1c16caf6135dd9586c27eb3a29bc2ff9881fef426f01dbf89869de19b7",
                            "exitCode": 0,
                            "finishedAt": "2026-04-28T16:03:32Z",
                            "message": "[{\"key\":\"CHAINS-GIT_COMMIT\",\"value\":\"ced3321e2172a8a3a52c00fd150c43b38aaaa1dd\",\"type\":1},{\"key\":\"CHAINS-GIT_URL\",\"value\":\"https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops\",\"type\":1},{\"key\":\"commit\",\"value\":\"ced3321e2172a8a3a52c00fd150c43b38aaaa1dd\",\"type\":1},{\"key\":\"commit-timestamp\",\"value\":\"1777392188\",\"type\":1},{\"key\":\"short-commit\",\"value\":\"ced3321\",\"type\":1},{\"key\":\"url\",\"value\":\"https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-28T16:03:30Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-symlink-check",
                        "imageID": "quay.io/redhat-tssc/task-runner@sha256:db633cb62eb097a46ca9e3e0a54d21c8ebd444f81a074ce1f1afa61956185dbf",
                        "name": "symlink-check",
                        "provenance": {},
                        "terminated": {
                            "containerID": "cri-o://85fff5b9016d67e646c4d0c27b62cc2046841ab22559708f8c5ec7e2e583978a",
                            "exitCode": 0,
                            "finishedAt": "2026-04-28T16:03:33Z",
                            "message": "[{\"key\":\"CHAINS-GIT_COMMIT\",\"value\":\"ced3321e2172a8a3a52c00fd150c43b38aaaa1dd\",\"type\":1},{\"key\":\"CHAINS-GIT_URL\",\"value\":\"https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops\",\"type\":1},{\"key\":\"commit\",\"value\":\"ced3321e2172a8a3a52c00fd150c43b38aaaa1dd\",\"type\":1},{\"key\":\"commit-timestamp\",\"value\":\"1777392188\",\"type\":1},{\"key\":\"short-commit\",\"value\":\"ced3321\",\"type\":1},{\"key\":\"url\",\"value\":\"https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-28T16:03:33Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "The git-clone Task will clone a repo from the provided url into the output Workspace. By default the repo will be cloned into the root of your Workspace.",
                    "params": [
                        {
                            "description": "Repository URL to clone from.",
                            "name": "url",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Revision to checkout. (branch, tag, sha, ref, etc...)",
                            "name": "revision",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Refspec to fetch before checking out revision.",
                            "name": "refspec",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Initialize and fetch git submodules.",
                            "name": "submodules",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Comma-separated list of specific submodule paths to initialize and fetch. Only submodules in the specified directories and their subdirectories will be fetched.\nEmpty string fetches all submodules. Parameter \"submodules\" must be set to \"true\" to make this parameter applicable.\n",
                            "name": "submodulePaths",
                            "type": "string"
                        },
                        {
                            "default": "1",
                            "description": "Perform a shallow clone, fetching only the most recent N commits.",
                            "name": "depth",
                            "type": "string"
                        },
                        {
                            "default": "7",
                            "description": "Length of short commit SHA",
                            "name": "shortCommitLength",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Set the `http.sslVerify` global git config. Setting this to `false` is not advised unless you are sure that you trust your git remote.",
                            "name": "sslVerify",
                            "type": "string"
                        },
                        {
                            "default": "source",
                            "description": "Subdirectory inside the `output` Workspace to clone the repo into.",
                            "name": "subdirectory",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Define the directory patterns to match or exclude when performing a sparse checkout.",
                            "name": "sparseCheckoutDirectories",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Clean out the contents of the destination directory if it already exists before cloning.",
                            "name": "deleteExisting",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "HTTP proxy server for non-SSL requests.",
                            "name": "httpProxy",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "HTTPS proxy server for SSL requests.",
                            "name": "httpsProxy",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Opt out of proxying HTTP/HTTPS requests.",
                            "name": "noProxy",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Log the commands that are executed during `git-clone`'s operation.",
                            "name": "verbose",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Deprecated. Has no effect. Will be removed in the future.",
                            "name": "gitInitImage",
                            "type": "string"
                        },
                        {
                            "default": "/tekton/home",
                            "description": "Absolute path to the user's home directory. Set this explicitly if you are running the image as a non-root user.\n",
                            "name": "userHome",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Check symlinks in the repo. If they're pointing outside of the repo, the build will fail.\n",
                            "name": "enableSymlinkCheck",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Fetch all tags for the repo.",
                            "name": "fetchTags",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from.",
                            "name": "caTrustConfigMapName",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data.",
                            "name": "caTrustConfigMapKey",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Set to \"true\" to merge the targetBranch into the checked-out revision.",
                            "name": "mergeTargetBranch",
                            "type": "string"
                        },
                        {
                            "default": "main",
                            "description": "The target branch to merge into the revision (if mergeTargetBranch is true).",
                            "name": "targetBranch",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "URL of the repository to fetch the target branch from when mergeTargetBranch is true.\nIf empty, uses the same repository (origin). This allows merging a branch from a different repository.\n",
                            "name": "mergeSourceRepoUrl",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Perform a shallow fetch of the target branch, fetching only the most recent N commits.\nIf empty, fetches the full history of the target branch.\n",
                            "name": "mergeSourceDepth",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "The precise commit SHA that was fetched by this Task.",
                            "name": "commit",
                            "type": "string"
                        },
                        {
                            "description": "The commit SHA that was fetched by this Task limited to params.shortCommitLength number of characters",
                            "name": "short-commit",
                            "type": "string"
                        },
                        {
                            "description": "The precise URL that was fetched by this Task.",
                            "name": "url",
                            "type": "string"
                        },
                        {
                            "description": "The commit timestamp of the checkout",
                            "name": "commit-timestamp",
                            "type": "string"
                        },
                        {
                            "description": "The precise URL that was fetched by this Task. This result uses Chains type hinting to include in the provenance.",
                            "name": "CHAINS-GIT_URL",
                            "type": "string"
                        },
                        {
                            "description": "The precise commit SHA that was fetched by this Task. This result uses Chains type hinting to include in the provenance.",
                            "name": "CHAINS-GIT_COMMIT",
                            "type": "string"
                        },
                        {
                            "description": "The SHA of the commit after merging the target branch (if the param mergeTargetBranch is true).",
                            "name": "merged_sha",
                            "type": "string"
                        }
                    ],
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "HOME",
                                    "value": "/tekton/home"
                                },
                                {
                                    "name": "PARAM_URL",
                                    "value": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops"
                                },
                                {
                                    "name": "PARAM_REVISION",
                                    "value": "ced3321e2172a8a3a52c00fd150c43b38aaaa1dd"
                                },
                                {
                                    "name": "PARAM_REFSPEC"
                                },
                                {
                                    "name": "PARAM_SUBMODULES",
                                    "value": "true"
                                },
                                {
                                    "name": "PARAM_SUBMODULE_PATHS"
                                },
                                {
                                    "name": "PARAM_DEPTH",
                                    "value": "0"
                                },
                                {
                                    "name": "PARAM_SHORT_COMMIT_LENGTH",
                                    "value": "7"
                                },
                                {
                                    "name": "PARAM_SSL_VERIFY",
                                    "value": "true"
                                },
                                {
                                    "name": "PARAM_SUBDIRECTORY",
                                    "value": "source"
                                },
                                {
                                    "name": "PARAM_DELETE_EXISTING",
                                    "value": "true"
                                },
                                {
                                    "name": "PARAM_HTTP_PROXY"
                                },
                                {
                                    "name": "PARAM_HTTPS_PROXY"
                                },
                                {
                                    "name": "PARAM_NO_PROXY"
                                },
                                {
                                    "name": "PARAM_VERBOSE",
                                    "value": "false"
                                },
                                {
                                    "name": "PARAM_SPARSE_CHECKOUT_DIRECTORIES"
                                },
                                {
                                    "name": "PARAM_USER_HOME",
                                    "value": "/tekton/home"
                                },
                                {
                                    "name": "PARAM_FETCH_TAGS",
                                    "value": "true"
                                },
                                {
                                    "name": "PARAM_GIT_INIT_IMAGE"
                                },
                                {
                                    "name": "PARAM_MERGE_TARGET_BRANCH",
                                    "value": "false"
                                },
                                {
                                    "name": "PARAM_TARGET_BRANCH",
                                    "value": "main"
                                },
                                {
                                    "name": "PARAM_MERGE_SOURCE_REPO_URL"
                                },
                                {
                                    "name": "PARAM_MERGE_SOURCE_DEPTH"
                                },
                                {
                                    "name": "WORKSPACE_OUTPUT_PATH",
                                    "value": "/workspace/output"
                                },
                                {
                                    "name": "WORKSPACE_SSH_DIRECTORY_BOUND",
                                    "value": "false"
                                },
                                {
                                    "name": "WORKSPACE_SSH_DIRECTORY_PATH"
                                },
                                {
                                    "name": "WORKSPACE_BASIC_AUTH_DIRECTORY_BOUND",
                                    "value": "true"
                                },
                                {
                                    "name": "WORKSPACE_BASIC_AUTH_DIRECTORY_PATH",
                                    "value": "/workspace/basic-auth"
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "clone",
                            "script": "#!/usr/bin/env sh\nset -eu\n\nif [ \"${PARAM_VERBOSE}\" = \"true\" ] ; then\n  set -x\nfi\n\nif [ -n \"${PARAM_GIT_INIT_IMAGE}\" ]; then\n  echo \"WARNING: provided deprecated gitInitImage parameter has no effect.\"\nfi\n\nif [ \"${WORKSPACE_BASIC_AUTH_DIRECTORY_BOUND}\" = \"true\" ] ; then\n  if [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.git-credentials\" ] \u0026\u0026 [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.gitconfig\" ]; then\n    cp \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.git-credentials\" \"${PARAM_USER_HOME}/.git-credentials\"\n    cp \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.gitconfig\" \"${PARAM_USER_HOME}/.gitconfig\"\n  # Compatibility with kubernetes.io/basic-auth secrets\n  elif [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/username\" ] \u0026\u0026 [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/password\" ]; then\n    HOSTNAME=$(echo $PARAM_URL | awk -F/ '{print $3}')\n    echo \"https://$(cat ${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/username):$(cat ${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/password)@$HOSTNAME\" \u003e \"${PARAM_USER_HOME}/.git-credentials\"\n    echo -e \"[credential \\\"https://$HOSTNAME\\\"]\\n  helper = store\" \u003e \"${PARAM_USER_HOME}/.gitconfig\"\n  else\n    echo \"Unknown basic-auth workspace format\"\n    exit 1\n  fi\n  chmod 400 \"${PARAM_USER_HOME}/.git-credentials\"\n  chmod 400 \"${PARAM_USER_HOME}/.gitconfig\"\nfi\n\n# Should be called after the gitconfig is copied from the repository secret\nca_bundle=/mnt/trusted-ca/ca-bundle.crt\nif [ -f \"$ca_bundle\" ]; then\n  echo \"INFO: Using mounted CA bundle: $ca_bundle\"\n  git config --global http.sslCAInfo \"$ca_bundle\"\nfi\n\nif [ \"${WORKSPACE_SSH_DIRECTORY_BOUND}\" = \"true\" ] ; then\n  cp -R \"${WORKSPACE_SSH_DIRECTORY_PATH}\" \"${PARAM_USER_HOME}\"/.ssh\n  chmod 700 \"${PARAM_USER_HOME}\"/.ssh\n  chmod -R 400 \"${PARAM_USER_HOME}\"/.ssh/*\nfi\n\nCHECKOUT_DIR=\"${WORKSPACE_OUTPUT_PATH}/${PARAM_SUBDIRECTORY}\"\n\ncleandir() {\n  # Delete any existing contents of the repo directory if it exists.\n  #\n  # We don't just \"rm -rf ${CHECKOUT_DIR}\" because ${CHECKOUT_DIR} might be \"/\"\n  # or the root of a mounted volume.\n  if [ -d \"${CHECKOUT_DIR}\" ] ; then\n    # Delete non-hidden files and directories\n    rm -rf \"${CHECKOUT_DIR:?}\"/*\n    # Delete files and directories starting with . but excluding ..\n    rm -rf \"${CHECKOUT_DIR}\"/.[!.]*\n    # Delete files and directories starting with .. plus any other character\n    rm -rf \"${CHECKOUT_DIR}\"/..?*\n  fi\n}\n\nif [ \"${PARAM_DELETE_EXISTING}\" = \"true\" ] ; then\n  cleandir\nfi\n\ntest -z \"${PARAM_HTTP_PROXY}\" || export HTTP_PROXY=\"${PARAM_HTTP_PROXY}\"\ntest -z \"${PARAM_HTTPS_PROXY}\" || export HTTPS_PROXY=\"${PARAM_HTTPS_PROXY}\"\ntest -z \"${PARAM_NO_PROXY}\" || export NO_PROXY=\"${PARAM_NO_PROXY}\"\n\n/ko-app/git-init \\\n  -url=\"${PARAM_URL}\" \\\n  -revision=\"${PARAM_REVISION}\" \\\n  -refspec=\"${PARAM_REFSPEC}\" \\\n  -path=\"${CHECKOUT_DIR}\" \\\n  -sslVerify=\"${PARAM_SSL_VERIFY}\" \\\n  -submodules=\"${PARAM_SUBMODULES}\" \\\n  -submodulePaths=\"${PARAM_SUBMODULE_PATHS}\" \\\n  -depth=\"${PARAM_DEPTH}\" \\\n  -sparseCheckoutDirectories=\"${PARAM_SPARSE_CHECKOUT_DIRECTORIES}\" \\\n  -retryMaxAttempts=10\ncd \"${CHECKOUT_DIR}\"\nRESULT_SHA=\"$(git rev-parse HEAD)\"\nRESULT_SHA_SHORT=\"$(git rev-parse --short=\"${PARAM_SHORT_COMMIT_LENGTH}\" HEAD)\"\nEXIT_CODE=\"$?\"\nif [ \"${EXIT_CODE}\" != 0 ] ; then\n  exit \"${EXIT_CODE}\"\nfi\nif [ \"${PARAM_MERGE_TARGET_BRANCH}\" = \"true\" ]; then\n  echo \"Merge option enabled. Attempting to merge target branch '${PARAM_TARGET_BRANCH}' into HEAD (${RESULT_SHA}).\"\n\n  if [ \"${PARAM_DEPTH}\" = \"1\" ]; then\n    echo \"WARNING: Shallow clone with depth=1 may cause merge conflicts due to insufficient commit history.\" \u003e\u00262\n  fi\n\n  if [ \"${PARAM_MERGE_SOURCE_DEPTH}\" = \"1\" ]; then\n    echo \"WARNING: Shallow fetch with mergeSourceDepth=1 may cause merge conflicts due to insufficient commit history.\" \u003e\u00262\n  fi\n\n  # Determine if merging from a different repository or the same one\n  if [ -n \"${PARAM_MERGE_SOURCE_REPO_URL}\" ]; then\n    # Normalize URLs for comparison (remove trailing slashes and .git suffix)\n    normalize_url() {\n      echo \"$1\" | sed -e 's#/$##' -e 's#\\.git$##'\n    }\n\n    NORMALIZED_ORIGIN_URL=$(normalize_url \"${PARAM_URL}\")\n    NORMALIZED_MERGE_URL=$(normalize_url \"${PARAM_MERGE_SOURCE_REPO_URL}\")\n\n    if [ \"${NORMALIZED_ORIGIN_URL}\" = \"${NORMALIZED_MERGE_URL}\" ]; then\n      echo \"Merge source URL is the same as origin. Using existing 'origin' remote.\"\n      MERGE_REMOTE=\"origin\"\n    else\n      echo \"Merging from different repository: ${PARAM_MERGE_SOURCE_REPO_URL}\"\n      echo \"Adding remote 'merge-source'...\"\n      git remote add merge-source \"${PARAM_MERGE_SOURCE_REPO_URL}\"\n      MERGE_REMOTE=\"merge-source\"\n    fi\n  else\n    echo \"Merging from the same repository (origin)\"\n    MERGE_REMOTE=\"origin\"\n  fi\n\n  echo \"Fetching target branch '${PARAM_TARGET_BRANCH}' from ${MERGE_REMOTE}...\"\n  if [ -n \"${PARAM_MERGE_SOURCE_DEPTH}\" ]; then\n    retry git fetch --depth=\"${PARAM_MERGE_SOURCE_DEPTH}\" ${MERGE_REMOTE} \"${PARAM_TARGET_BRANCH}\"\n  else\n    retry git fetch ${MERGE_REMOTE} \"${PARAM_TARGET_BRANCH}\"\n  fi\n  FETCH_EXIT_CODE=\"$?\"\n  if [ \"${FETCH_EXIT_CODE}\" != \"0\" ]; then\n    echo \"ERROR: Failed to fetch target branch '${PARAM_TARGET_BRANCH}' from ${MERGE_REMOTE}.\" \u003e\u00262\n    exit \"${FETCH_EXIT_CODE}\"\n  fi\n\n  echo \"Merging ${MERGE_REMOTE}/${PARAM_TARGET_BRANCH} into current HEAD...\"\n  git config --global user.email \"tekton-git-clone@tekton.dev\"\n  git config --global user.name \"Tekton Git Clone Task\"\n  git merge \"${MERGE_REMOTE}/${PARAM_TARGET_BRANCH}\" --no-commit --no-ff --allow-unrelated-histories\n  MERGE_CHECK_EXIT_CODE=\"$?\"\n  if [ \"${MERGE_CHECK_EXIT_CODE}\" != \"0\" ] ; then\n    echo \"ERROR: Merge conflict detected or merge failed before commit.\" \u003e\u00262\n    echo \"--- Git Status ---\"\n    git status\n    echo \"------------------\"\n    exit \"${MERGE_CHECK_EXIT_CODE}\"\n  else\n    # Check if there are changes that need to be merged, and if so, create a merge commit.\n    if git diff --staged --quiet; then\n      echo \"No diff was found, skipping merge...\" \u003e\u00262\n    else\n      echo \"Merge successful (no conflicts found), committing...\"\n      git commit -m \"Merge branch '${PARAM_TARGET_BRANCH}' from ${MERGE_REMOTE} into ${RESULT_SHA}\"\n      COMMIT_EXIT_CODE=\"$?\"\n      if [ \"${COMMIT_EXIT_CODE}\" != \"0\" ]; then\n        echo \"ERROR: Failed to commit merge.\" \u003e\u00262\n        exit \"${COMMIT_EXIT_CODE}\"\n      fi\n      MERGED_SHA=$(git rev-parse HEAD)\n      echo \"New HEAD after merge: ${MERGED_SHA}\"\n      echo \"${MERGED_SHA}\" \u003e \"/tekton/results/merged_sha\"\n    fi\n  fi\nelse\n  echo \"Merge option disabled. Using checked-out revision ${RESULT_SHA} directly.\"\nfi\nprintf \"%s\" \"${RESULT_SHA}\" \u003e \"/tekton/results/commit\"\nprintf \"%s\" \"${RESULT_SHA}\" \u003e \"/tekton/results/CHAINS-GIT_COMMIT\"\nprintf \"%s\" \"${RESULT_SHA_SHORT}\" \u003e \"/tekton/results/short-commit\"\nprintf \"%s\" \"${PARAM_URL}\" \u003e \"/tekton/results/url\"\nprintf \"%s\" \"${PARAM_URL}\" \u003e \"/tekton/results/CHAINS-GIT_URL\"\nprintf \"%s\" \"$(git log -1 --pretty=%ct)\" \u003e \"/tekton/results/commit-timestamp\"\n\nif [ \"${PARAM_FETCH_TAGS}\" = \"true\" ] ; then\n  echo \"Fetching tags\"\n  retry git fetch --tags\nfi\n",
                            "securityContext": {
                                "runAsUser": 0
                            },
                            "volumeMounts": [
                                {
                                    "mountPath": "/mnt/trusted-ca",
                                    "name": "trusted-ca",
                                    "readOnly": true
                                }
                            ]
                        },
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "PARAM_ENABLE_SYMLINK_CHECK",
                                    "value": "true"
                                },
                                {
                                    "name": "PARAM_SUBDIRECTORY",
                                    "value": "source"
                                },
                                {
                                    "name": "WORKSPACE_OUTPUT_PATH",
                                    "value": "/workspace/output"
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "symlink-check",
                            "script": "#!/usr/bin/env bash\nset -euo pipefail\n\nCHECKOUT_DIR=\"${WORKSPACE_OUTPUT_PATH}/${PARAM_SUBDIRECTORY}\"\ncheck_symlinks() {\n  FOUND_SYMLINK_POINTING_OUTSIDE_OF_REPO=false\n  while read -r symlink\n  do\n    target=$(readlink -m \"$symlink\")\n    if ! [[ \"$target\" =~ ^$CHECKOUT_DIR ]]; then\n      echo \"The cloned repository contains symlink pointing outside of the cloned repository: $symlink\"\n      FOUND_SYMLINK_POINTING_OUTSIDE_OF_REPO=true\n    fi\n  done \u003c \u003c(find $CHECKOUT_DIR -type l -print)\n  if [ \"$FOUND_SYMLINK_POINTING_OUTSIDE_OF_REPO\" = true ] ; then\n    return 1\n  fi\n}\n\nif [ \"${PARAM_ENABLE_SYMLINK_CHECK}\" = \"true\" ] ; then\n  echo \"Running symlink check\"\n  check_symlinks\nfi\n"
                        }
                    ],
                    "volumes": [
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "The git repo will be cloned onto the volume backing this Workspace.",
                            "name": "output"
                        },
                        {
                            "description": "A .ssh directory with private key, known_hosts, config, etc. Copied to\nthe user's home before git commands are executed. Used to authenticate\nwith the git remote when performing the clone. Binding a Secret to this\nWorkspace is strongly recommended over other volume types.\n",
                            "name": "ssh-directory",
                            "optional": true
                        },
                        {
                            "description": "A Workspace containing a .gitconfig and .git-credentials file or username and password.\nThese will be copied to the user's home before any git commands are run. Any\nother files in this Workspace are ignored. It is strongly recommended\nto use ssh-directory over basic-auth whenever possible and to bind a\nSecret to this Workspace over other volume types.\n",
                            "name": "basic-auth",
                            "optional": true
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "https://rekor-server-tssc-tas.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/api/v1/log/entries?logIndex=40",
                    "pipeline.tekton.dev/affinity-assistant": "affinity-assistant-d8ea942d58",
                    "pipeline.tekton.dev/release": "8910674cb953317a4373f33822024b9de8c5fa22",
                    "pipelinesascode.tekton.dev/branch": "main",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "Merge Request",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-qaegwq",
                    "pipelinesascode.tekton.dev/git-provider": "gitlab",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/k8s/ns/tssc-app-ci/tekton.dev~v1~PipelineRun/e2e-tests-go-eciytfax-gitops-on-pull-request-xrtvv",
                    "pipelinesascode.tekton.dev/on-event": "[pull_request]",
                    "pipelinesascode.tekton.dev/on-target-branch": "[main]",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-gitops-on-pull-request",
                    "pipelinesascode.tekton.dev/pipeline": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/pipelines/gitops-pull-request-tssc.yaml",
                    "pipelinesascode.tekton.dev/pull-request": "2",
                    "pipelinesascode.tekton.dev/repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-gitops-repository",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-qe-test",
                    "pipelinesascode.tekton.dev/sha": "e395df7e0e4c64ad86da082463949a155dd916ac",
                    "pipelinesascode.tekton.dev/sha-title": "Promote to prod environment",
                    "pipelinesascode.tekton.dev/sha-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops/-/commit/e395df7e0e4c64ad86da082463949a155dd916ac",
                    "pipelinesascode.tekton.dev/source-branch": "promote-to-prod-1777392306677",
                    "pipelinesascode.tekton.dev/source-project-id": "81724368",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/target-project-id": "81724368",
                    "pipelinesascode.tekton.dev/task-0": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/git-clone.yaml",
                    "pipelinesascode.tekton.dev/task-1": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/gather-deploy-images.yaml",
                    "pipelinesascode.tekton.dev/task-2": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/verify-enterprise-contract.yaml",
                    "pipelinesascode.tekton.dev/task-3": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/gather-deploy-images.yaml",
                    "pipelinesascode.tekton.dev/task-4": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/download-sbom-from-url-in-attestation.yaml",
                    "pipelinesascode.tekton.dev/task-5": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/upload-sbom-to-trustification.yaml",
                    "pipelinesascode.tekton.dev/task-6": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/fetch-gitops-images.yaml",
                    "pipelinesascode.tekton.dev/task-7": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/verify-gitops-conforma.yaml",
                    "pipelinesascode.tekton.dev/task-8": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/download-gitops-sbom.yaml",
                    "pipelinesascode.tekton.dev/task-9": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/upload-gitops-sbom.yaml",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax-gitops",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "tssc-app-ci/results/6562839e-6164-47ff-a1e5-606e8f91821a/records/3c5b518c-a88f-40e5-adbe-9a1b26891024",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"e2e-tests-go-eciytfax-gitops\",\"commit\":\"e395df7e0e4c64ad86da082463949a155dd916ac\",\"eventType\":\"Merge Request\",\"pull_request-id\":2}",
                    "results.tekton.dev/result": "tssc-app-ci/results/6562839e-6164-47ff-a1e5-606e8f91821a",
                    "results.tekton.dev/stored": "true"
                },
                "creationTimestamp": "2026-04-28T16:05:36Z",
                "finalizers": [
                    "chains.tekton.dev/taskrun",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/part-of": "e2e-tests-go-eciytfax",
                    "app.kubernetes.io/version": "v0.39.5",
                    "argocd/app-name": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-id": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-namespace": "tssc-app",
                    "janus-idp.io/tekton": "e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/event-type": "Merge_Request",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-gitops-on-pull-request",
                    "pipelinesascode.tekton.dev/pull-request": "2",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-gitops-repository",
                    "pipelinesascode.tekton.dev/sha": "e395df7e0e4c64ad86da082463949a155dd916ac",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax-gitops",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "e2e-tests-go-eciytfax-gitops-on-pull-request-xrtvv",
                    "tekton.dev/pipelineRun": "e2e-tests-go-eciytfax-gitops-on-pull-request-xrtvv",
                    "tekton.dev/pipelineRunUID": "6562839e-6164-47ff-a1e5-606e8f91821a",
                    "tekton.dev/pipelineTask": "verify-conforma"
                },
                "name": "e2e-tests-go-ec179bf1c0a6c1a1b450f1b75a461a4bb4-verify-conforma",
                "namespace": "tssc-app-ci",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "e2e-tests-go-eciytfax-gitops-on-pull-request-xrtvv",
                        "uid": "6562839e-6164-47ff-a1e5-606e8f91821a"
                    }
                ],
                "resourceVersion": "46197",
                "uid": "3c5b518c-a88f-40e5-adbe-9a1b26891024"
            },
            "spec": {
                "params": [
                    {
                        "name": "STRICT",
                        "value": "true"
                    },
                    {
                        "name": "POLICY_CONFIGURATION",
                        "value": "github.com/redhat-appstudio/tssc-dev-multi-ci//samples/conforma/policies/tekton-slsa3-v0.7"
                    },
                    {
                        "name": "COSIGN_PUBLIC_KEY",
                        "value": "LS0tLS1CRUdJTiBQVUJMSUMgS0VZLS0tLS0KTUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFbERobEtmeUdBdkFiOWU2KzAxbmFwbWFtdUZEYwp6clZsNVVzSkxtUWVUc1Z0N0J6SFUwQThwdENkT2dzcFJTS2cyQ3J6ajlkZEg4cjVWZ05NOWhEelFRPT0KLS0tLS1FTkQgUFVCTElDIEtFWS0tLS0tCg==\n"
                    }
                ],
                "serviceAccountName": "pipeline",
                "taskSpec": {
                    "description": "Verify the enterprise contract is met",
                    "params": [
                        {
                            "default": "",
                            "description": "Public key used to verify signatures. Must be a base64 encoded key.",
                            "name": "COSIGN_PUBLIC_KEY",
                            "type": "string"
                        },
                        {
                            "default": "enterprise-contract-service/default",
                            "description": "Name of the policy configuration (EnterpriseContractPolicy\nresource) to use. `namespace/name` or `name` syntax supported. If\nnamespace is omitted the namespace where the task runs is used.\nYou can also specify a policy configuration using a git url, e.g.\n`github.com/conforma/config//slsa3`.\n",
                            "name": "POLICY_CONFIGURATION",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Fail the task if policy fails. Set to `\"false\"` to disable it.",
                            "name": "STRICT",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Short summary of the policy evaluation for each image.",
                            "name": "TEST_OUTPUT",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "CI_TYPE",
                                "value": "tekton"
                            },
                            {
                                "name": "STRICT",
                                "value": "$(params.STRICT)"
                            },
                            {
                                "name": "POLICY_CONFIGURATION",
                                "value": "$(params.POLICY_CONFIGURATION)"
                            },
                            {
                                "name": "REKOR_HOST",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "rekor_url",
                                        "name": "tas-secret"
                                    }
                                }
                            },
                            {
                                "name": "TUF_MIRROR",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "tuf_url",
                                        "name": "tas-secret"
                                    }
                                }
                            },
                            {
                                "name": "COSIGN_PUBLIC_KEY",
                                "value": "$(params.COSIGN_PUBLIC_KEY)"
                            }
                        ],
                        "workingDir": "$(workspaces.source.path)/source"
                    },
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "STRICT",
                                    "value": "$(params.STRICT)"
                                },
                                {
                                    "name": "POLICY_CONFIGURATION",
                                    "value": "$(params.POLICY_CONFIGURATION)"
                                },
                                {
                                    "name": "REKOR_HOST",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "rekor_url",
                                            "name": "tas-secret"
                                        }
                                    }
                                },
                                {
                                    "name": "TUF_MIRROR",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "tuf_url",
                                            "name": "tas-secret"
                                        }
                                    }
                                },
                                {
                                    "name": "COSIGN_PUBLIC_KEY",
                                    "value": "$(params.COSIGN_PUBLIC_KEY)"
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "verify",
                            "script": "echo \"running verify-conforma\"\n$(workspaces.source.path)/tssc/verify-conforma.sh\ncat ./results/verify-conforma/TEST_OUTPUT \u003e $(results.TEST_OUTPUT.path)\n",
                            "workingDir": "$(workspaces.source.path)/source"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "Should contain a cloned gitops repo at the ./source subpath",
                            "name": "source"
                        }
                    ]
                },
                "timeout": "1h0m0s",
                "workspaces": [
                    {
                        "name": "source",
                        "persistentVolumeClaim": {
                            "claimName": "pvc-608e6ce161"
                        }
                    }
                ]
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-28T16:06:00Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-28T16:06:00Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "e2e-tests-go-ec179bf1c0a6c1fcbc8a5339bb7fc3caf306845c642a14-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    }
                },
                "results": [
                    {
                        "name": "TEST_OUTPUT",
                        "type": "string",
                        "value": "{\"timestamp\":\"1777392359\",\"namespace\":\"\",\"successes\":16,\"failures\":0,\"warnings\":0,\"result\":\"SUCCESS\"}\n"
                    }
                ],
                "startTime": "2026-04-28T16:05:36Z",
                "steps": [
                    {
                        "container": "step-verify",
                        "imageID": "quay.io/redhat-tssc/task-runner@sha256:db633cb62eb097a46ca9e3e0a54d21c8ebd444f81a074ce1f1afa61956185dbf",
                        "name": "verify",
                        "provenance": {},
                        "terminated": {
                            "containerID": "cri-o://f1b72145966717fce813bc3454bde3ab0149b51f4f2416bab5e2973c89e8cfd4",
                            "exitCode": 0,
                            "finishedAt": "2026-04-28T16:05:59Z",
                            "message": "[{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"timestamp\\\":\\\"1777392359\\\",\\\"namespace\\\":\\\"\\\",\\\"successes\\\":16,\\\"failures\\\":0,\\\"warnings\\\":0,\\\"result\\\":\\\"SUCCESS\\\"}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-28T16:05:42Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Verify the enterprise contract is met",
                    "params": [
                        {
                            "default": "",
                            "description": "Public key used to verify signatures. Must be a base64 encoded key.",
                            "name": "COSIGN_PUBLIC_KEY",
                            "type": "string"
                        },
                        {
                            "default": "enterprise-contract-service/default",
                            "description": "Name of the policy configuration (EnterpriseContractPolicy\nresource) to use. `namespace/name` or `name` syntax supported. If\nnamespace is omitted the namespace where the task runs is used.\nYou can also specify a policy configuration using a git url, e.g.\n`github.com/conforma/config//slsa3`.\n",
                            "name": "POLICY_CONFIGURATION",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Fail the task if policy fails. Set to `\"false\"` to disable it.",
                            "name": "STRICT",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Short summary of the policy evaluation for each image.",
                            "name": "TEST_OUTPUT",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "CI_TYPE",
                                "value": "tekton"
                            },
                            {
                                "name": "STRICT",
                                "value": "true"
                            },
                            {
                                "name": "POLICY_CONFIGURATION",
                                "value": "github.com/redhat-appstudio/tssc-dev-multi-ci//samples/conforma/policies/tekton-slsa3-v0.7"
                            },
                            {
                                "name": "REKOR_HOST",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "rekor_url",
                                        "name": "tas-secret"
                                    }
                                }
                            },
                            {
                                "name": "TUF_MIRROR",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "tuf_url",
                                        "name": "tas-secret"
                                    }
                                }
                            },
                            {
                                "name": "COSIGN_PUBLIC_KEY",
                                "value": "LS0tLS1CRUdJTiBQVUJMSUMgS0VZLS0tLS0KTUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFbERobEtmeUdBdkFiOWU2KzAxbmFwbWFtdUZEYwp6clZsNVVzSkxtUWVUc1Z0N0J6SFUwQThwdENkT2dzcFJTS2cyQ3J6ajlkZEg4cjVWZ05NOWhEelFRPT0KLS0tLS1FTkQgUFVCTElDIEtFWS0tLS0tCg==\n"
                            }
                        ],
                        "workingDir": "/workspace/source/source"
                    },
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "STRICT",
                                    "value": "true"
                                },
                                {
                                    "name": "POLICY_CONFIGURATION",
                                    "value": "github.com/redhat-appstudio/tssc-dev-multi-ci//samples/conforma/policies/tekton-slsa3-v0.7"
                                },
                                {
                                    "name": "REKOR_HOST",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "rekor_url",
                                            "name": "tas-secret"
                                        }
                                    }
                                },
                                {
                                    "name": "TUF_MIRROR",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "tuf_url",
                                            "name": "tas-secret"
                                        }
                                    }
                                },
                                {
                                    "name": "COSIGN_PUBLIC_KEY",
                                    "value": "LS0tLS1CRUdJTiBQVUJMSUMgS0VZLS0tLS0KTUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFbERobEtmeUdBdkFiOWU2KzAxbmFwbWFtdUZEYwp6clZsNVVzSkxtUWVUc1Z0N0J6SFUwQThwdENkT2dzcFJTS2cyQ3J6ajlkZEg4cjVWZ05NOWhEelFRPT0KLS0tLS1FTkQgUFVCTElDIEtFWS0tLS0tCg==\n"
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "verify",
                            "script": "echo \"running verify-conforma\"\n/workspace/source/tssc/verify-conforma.sh\ncat ./results/verify-conforma/TEST_OUTPUT \u003e /tekton/results/TEST_OUTPUT\n",
                            "workingDir": "/workspace/source/source"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "Should contain a cloned gitops repo at the ./source subpath",
                            "name": "source"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "https://rekor-server-tssc-tas.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/api/v1/log/entries?logIndex=32",
                    "pipeline.tekton.dev/affinity-assistant": "affinity-assistant-686ee97ecc",
                    "pipeline.tekton.dev/release": "8910674cb953317a4373f33822024b9de8c5fa22",
                    "pipelinesascode.tekton.dev/branch": "main",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "Merge Request",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-xtymyk",
                    "pipelinesascode.tekton.dev/git-provider": "gitlab",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/k8s/ns/tssc-app-ci/tekton.dev~v1~PipelineRun/e2e-tests-go-eciytfax-gitops-on-pull-request-7rgs2",
                    "pipelinesascode.tekton.dev/on-event": "[pull_request]",
                    "pipelinesascode.tekton.dev/on-target-branch": "[main]",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-gitops-on-pull-request",
                    "pipelinesascode.tekton.dev/pipeline": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/pipelines/gitops-pull-request-tssc.yaml",
                    "pipelinesascode.tekton.dev/pull-request": "1",
                    "pipelinesascode.tekton.dev/repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-gitops-repository",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-qe-test",
                    "pipelinesascode.tekton.dev/sha": "ced3321e2172a8a3a52c00fd150c43b38aaaa1dd",
                    "pipelinesascode.tekton.dev/sha-title": "Promote to stage environment",
                    "pipelinesascode.tekton.dev/sha-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops/-/commit/ced3321e2172a8a3a52c00fd150c43b38aaaa1dd",
                    "pipelinesascode.tekton.dev/source-branch": "promote-to-stage-1777392186938",
                    "pipelinesascode.tekton.dev/source-project-id": "81724368",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/target-project-id": "81724368",
                    "pipelinesascode.tekton.dev/task-0": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/git-clone.yaml",
                    "pipelinesascode.tekton.dev/task-1": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/gather-deploy-images.yaml",
                    "pipelinesascode.tekton.dev/task-2": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/verify-enterprise-contract.yaml",
                    "pipelinesascode.tekton.dev/task-3": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/gather-deploy-images.yaml",
                    "pipelinesascode.tekton.dev/task-4": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/download-sbom-from-url-in-attestation.yaml",
                    "pipelinesascode.tekton.dev/task-5": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/upload-sbom-to-trustification.yaml",
                    "pipelinesascode.tekton.dev/task-6": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/fetch-gitops-images.yaml",
                    "pipelinesascode.tekton.dev/task-7": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/verify-gitops-conforma.yaml",
                    "pipelinesascode.tekton.dev/task-8": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/download-gitops-sbom.yaml",
                    "pipelinesascode.tekton.dev/task-9": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/upload-gitops-sbom.yaml",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax-gitops",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "tssc-app-ci/results/ab4f5fdf-b85e-44b0-b185-5e3ca1ce7431/records/171dff57-1586-423e-96c1-66b9e150dfa6",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"e2e-tests-go-eciytfax-gitops\",\"commit\":\"ced3321e2172a8a3a52c00fd150c43b38aaaa1dd\",\"eventType\":\"Merge Request\",\"pull_request-id\":1}",
                    "results.tekton.dev/result": "tssc-app-ci/results/ab4f5fdf-b85e-44b0-b185-5e3ca1ce7431",
                    "results.tekton.dev/stored": "true"
                },
                "creationTimestamp": "2026-04-28T16:03:40Z",
                "finalizers": [
                    "chains.tekton.dev/taskrun",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/part-of": "e2e-tests-go-eciytfax",
                    "app.kubernetes.io/version": "v0.39.5",
                    "argocd/app-name": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-id": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-namespace": "tssc-app",
                    "janus-idp.io/tekton": "e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/event-type": "Merge_Request",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-gitops-on-pull-request",
                    "pipelinesascode.tekton.dev/pull-request": "1",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-gitops-repository",
                    "pipelinesascode.tekton.dev/sha": "ced3321e2172a8a3a52c00fd150c43b38aaaa1dd",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax-gitops",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "e2e-tests-go-eciytfax-gitops-on-pull-request-7rgs2",
                    "tekton.dev/pipelineRun": "e2e-tests-go-eciytfax-gitops-on-pull-request-7rgs2",
                    "tekton.dev/pipelineRunUID": "ab4f5fdf-b85e-44b0-b185-5e3ca1ce7431",
                    "tekton.dev/pipelineTask": "verify-conforma"
                },
                "name": "e2e-tests-go-ec49db8dcb9468fe2a9d354d396d5b01aa-verify-conforma",
                "namespace": "tssc-app-ci",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "e2e-tests-go-eciytfax-gitops-on-pull-request-7rgs2",
                        "uid": "ab4f5fdf-b85e-44b0-b185-5e3ca1ce7431"
                    }
                ],
                "resourceVersion": "44183",
                "uid": "171dff57-1586-423e-96c1-66b9e150dfa6"
            },
            "spec": {
                "params": [
                    {
                        "name": "STRICT",
                        "value": "true"
                    },
                    {
                        "name": "POLICY_CONFIGURATION",
                        "value": "github.com/redhat-appstudio/tssc-dev-multi-ci//samples/conforma/policies/tekton-slsa3-v0.7"
                    },
                    {
                        "name": "COSIGN_PUBLIC_KEY",
                        "value": "LS0tLS1CRUdJTiBQVUJMSUMgS0VZLS0tLS0KTUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFbERobEtmeUdBdkFiOWU2KzAxbmFwbWFtdUZEYwp6clZsNVVzSkxtUWVUc1Z0N0J6SFUwQThwdENkT2dzcFJTS2cyQ3J6ajlkZEg4cjVWZ05NOWhEelFRPT0KLS0tLS1FTkQgUFVCTElDIEtFWS0tLS0tCg==\n"
                    }
                ],
                "serviceAccountName": "pipeline",
                "taskSpec": {
                    "description": "Verify the enterprise contract is met",
                    "params": [
                        {
                            "default": "",
                            "description": "Public key used to verify signatures. Must be a base64 encoded key.",
                            "name": "COSIGN_PUBLIC_KEY",
                            "type": "string"
                        },
                        {
                            "default": "enterprise-contract-service/default",
                            "description": "Name of the policy configuration (EnterpriseContractPolicy\nresource) to use. `namespace/name` or `name` syntax supported. If\nnamespace is omitted the namespace where the task runs is used.\nYou can also specify a policy configuration using a git url, e.g.\n`github.com/conforma/config//slsa3`.\n",
                            "name": "POLICY_CONFIGURATION",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Fail the task if policy fails. Set to `\"false\"` to disable it.",
                            "name": "STRICT",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Short summary of the policy evaluation for each image.",
                            "name": "TEST_OUTPUT",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "CI_TYPE",
                                "value": "tekton"
                            },
                            {
                                "name": "STRICT",
                                "value": "$(params.STRICT)"
                            },
                            {
                                "name": "POLICY_CONFIGURATION",
                                "value": "$(params.POLICY_CONFIGURATION)"
                            },
                            {
                                "name": "REKOR_HOST",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "rekor_url",
                                        "name": "tas-secret"
                                    }
                                }
                            },
                            {
                                "name": "TUF_MIRROR",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "tuf_url",
                                        "name": "tas-secret"
                                    }
                                }
                            },
                            {
                                "name": "COSIGN_PUBLIC_KEY",
                                "value": "$(params.COSIGN_PUBLIC_KEY)"
                            }
                        ],
                        "workingDir": "$(workspaces.source.path)/source"
                    },
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "STRICT",
                                    "value": "$(params.STRICT)"
                                },
                                {
                                    "name": "POLICY_CONFIGURATION",
                                    "value": "$(params.POLICY_CONFIGURATION)"
                                },
                                {
                                    "name": "REKOR_HOST",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "rekor_url",
                                            "name": "tas-secret"
                                        }
                                    }
                                },
                                {
                                    "name": "TUF_MIRROR",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "tuf_url",
                                            "name": "tas-secret"
                                        }
                                    }
                                },
                                {
                                    "name": "COSIGN_PUBLIC_KEY",
                                    "value": "$(params.COSIGN_PUBLIC_KEY)"
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "verify",
                            "script": "echo \"running verify-conforma\"\n$(workspaces.source.path)/tssc/verify-conforma.sh\ncat ./results/verify-conforma/TEST_OUTPUT \u003e $(results.TEST_OUTPUT.path)\n",
                            "workingDir": "$(workspaces.source.path)/source"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "Should contain a cloned gitops repo at the ./source subpath",
                            "name": "source"
                        }
                    ]
                },
                "timeout": "1h0m0s",
                "workspaces": [
                    {
                        "name": "source",
                        "persistentVolumeClaim": {
                            "claimName": "pvc-96c0e1d35f"
                        }
                    }
                ]
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-28T16:04:03Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-28T16:04:03Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "e2e-tests-go-ec49db8dcb9468026fc9d8dc308f21e1acb815e2242b5e-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    }
                },
                "results": [
                    {
                        "name": "TEST_OUTPUT",
                        "type": "string",
                        "value": "{\"timestamp\":\"1777392243\",\"namespace\":\"\",\"successes\":16,\"failures\":0,\"warnings\":0,\"result\":\"SUCCESS\"}\n"
                    }
                ],
                "startTime": "2026-04-28T16:03:40Z",
                "steps": [
                    {
                        "container": "step-verify",
                        "imageID": "quay.io/redhat-tssc/task-runner@sha256:db633cb62eb097a46ca9e3e0a54d21c8ebd444f81a074ce1f1afa61956185dbf",
                        "name": "verify",
                        "provenance": {},
                        "terminated": {
                            "containerID": "cri-o://afcde4c33dd1c6310cb31a49fbff54a192b5ce447016118cc15575422e24d2a6",
                            "exitCode": 0,
                            "finishedAt": "2026-04-28T16:04:03Z",
                            "message": "[{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"timestamp\\\":\\\"1777392243\\\",\\\"namespace\\\":\\\"\\\",\\\"successes\\\":16,\\\"failures\\\":0,\\\"warnings\\\":0,\\\"result\\\":\\\"SUCCESS\\\"}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-28T16:03:46Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Verify the enterprise contract is met",
                    "params": [
                        {
                            "default": "",
                            "description": "Public key used to verify signatures. Must be a base64 encoded key.",
                            "name": "COSIGN_PUBLIC_KEY",
                            "type": "string"
                        },
                        {
                            "default": "enterprise-contract-service/default",
                            "description": "Name of the policy configuration (EnterpriseContractPolicy\nresource) to use. `namespace/name` or `name` syntax supported. If\nnamespace is omitted the namespace where the task runs is used.\nYou can also specify a policy configuration using a git url, e.g.\n`github.com/conforma/config//slsa3`.\n",
                            "name": "POLICY_CONFIGURATION",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Fail the task if policy fails. Set to `\"false\"` to disable it.",
                            "name": "STRICT",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Short summary of the policy evaluation for each image.",
                            "name": "TEST_OUTPUT",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "CI_TYPE",
                                "value": "tekton"
                            },
                            {
                                "name": "STRICT",
                                "value": "true"
                            },
                            {
                                "name": "POLICY_CONFIGURATION",
                                "value": "github.com/redhat-appstudio/tssc-dev-multi-ci//samples/conforma/policies/tekton-slsa3-v0.7"
                            },
                            {
                                "name": "REKOR_HOST",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "rekor_url",
                                        "name": "tas-secret"
                                    }
                                }
                            },
                            {
                                "name": "TUF_MIRROR",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "tuf_url",
                                        "name": "tas-secret"
                                    }
                                }
                            },
                            {
                                "name": "COSIGN_PUBLIC_KEY",
                                "value": "LS0tLS1CRUdJTiBQVUJMSUMgS0VZLS0tLS0KTUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFbERobEtmeUdBdkFiOWU2KzAxbmFwbWFtdUZEYwp6clZsNVVzSkxtUWVUc1Z0N0J6SFUwQThwdENkT2dzcFJTS2cyQ3J6ajlkZEg4cjVWZ05NOWhEelFRPT0KLS0tLS1FTkQgUFVCTElDIEtFWS0tLS0tCg==\n"
                            }
                        ],
                        "workingDir": "/workspace/source/source"
                    },
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "STRICT",
                                    "value": "true"
                                },
                                {
                                    "name": "POLICY_CONFIGURATION",
                                    "value": "github.com/redhat-appstudio/tssc-dev-multi-ci//samples/conforma/policies/tekton-slsa3-v0.7"
                                },
                                {
                                    "name": "REKOR_HOST",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "rekor_url",
                                            "name": "tas-secret"
                                        }
                                    }
                                },
                                {
                                    "name": "TUF_MIRROR",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "tuf_url",
                                            "name": "tas-secret"
                                        }
                                    }
                                },
                                {
                                    "name": "COSIGN_PUBLIC_KEY",
                                    "value": "LS0tLS1CRUdJTiBQVUJMSUMgS0VZLS0tLS0KTUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFbERobEtmeUdBdkFiOWU2KzAxbmFwbWFtdUZEYwp6clZsNVVzSkxtUWVUc1Z0N0J6SFUwQThwdENkT2dzcFJTS2cyQ3J6ajlkZEg4cjVWZ05NOWhEelFRPT0KLS0tLS1FTkQgUFVCTElDIEtFWS0tLS0tCg==\n"
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "verify",
                            "script": "echo \"running verify-conforma\"\n/workspace/source/tssc/verify-conforma.sh\ncat ./results/verify-conforma/TEST_OUTPUT \u003e /tekton/results/TEST_OUTPUT\n",
                            "workingDir": "/workspace/source/source"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "Should contain a cloned gitops repo at the ./source subpath",
                            "name": "source"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "https://rekor-server-tssc-tas.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/api/v1/log/entries?logIndex=38",
                    "pipeline.tekton.dev/affinity-assistant": "affinity-assistant-d8ea942d58",
                    "pipeline.tekton.dev/release": "8910674cb953317a4373f33822024b9de8c5fa22",
                    "pipelinesascode.tekton.dev/branch": "main",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "Merge Request",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-qaegwq",
                    "pipelinesascode.tekton.dev/git-provider": "gitlab",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/k8s/ns/tssc-app-ci/tekton.dev~v1~PipelineRun/e2e-tests-go-eciytfax-gitops-on-pull-request-xrtvv",
                    "pipelinesascode.tekton.dev/on-event": "[pull_request]",
                    "pipelinesascode.tekton.dev/on-target-branch": "[main]",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-gitops-on-pull-request",
                    "pipelinesascode.tekton.dev/pipeline": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/pipelines/gitops-pull-request-tssc.yaml",
                    "pipelinesascode.tekton.dev/pull-request": "2",
                    "pipelinesascode.tekton.dev/repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-gitops-repository",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-qe-test",
                    "pipelinesascode.tekton.dev/sha": "e395df7e0e4c64ad86da082463949a155dd916ac",
                    "pipelinesascode.tekton.dev/sha-title": "Promote to prod environment",
                    "pipelinesascode.tekton.dev/sha-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops/-/commit/e395df7e0e4c64ad86da082463949a155dd916ac",
                    "pipelinesascode.tekton.dev/source-branch": "promote-to-prod-1777392306677",
                    "pipelinesascode.tekton.dev/source-project-id": "81724368",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/target-project-id": "81724368",
                    "pipelinesascode.tekton.dev/task-0": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/git-clone.yaml",
                    "pipelinesascode.tekton.dev/task-1": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/gather-deploy-images.yaml",
                    "pipelinesascode.tekton.dev/task-2": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/verify-enterprise-contract.yaml",
                    "pipelinesascode.tekton.dev/task-3": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/gather-deploy-images.yaml",
                    "pipelinesascode.tekton.dev/task-4": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/download-sbom-from-url-in-attestation.yaml",
                    "pipelinesascode.tekton.dev/task-5": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/upload-sbom-to-trustification.yaml",
                    "pipelinesascode.tekton.dev/task-6": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/fetch-gitops-images.yaml",
                    "pipelinesascode.tekton.dev/task-7": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/verify-gitops-conforma.yaml",
                    "pipelinesascode.tekton.dev/task-8": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/download-gitops-sbom.yaml",
                    "pipelinesascode.tekton.dev/task-9": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/upload-gitops-sbom.yaml",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax-gitops",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "tssc-app-ci/results/6562839e-6164-47ff-a1e5-606e8f91821a/records/28aa992a-466f-4705-b433-7b5acc834265",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"e2e-tests-go-eciytfax-gitops\",\"commit\":\"e395df7e0e4c64ad86da082463949a155dd916ac\",\"eventType\":\"Merge Request\",\"pull_request-id\":2}",
                    "results.tekton.dev/result": "tssc-app-ci/results/6562839e-6164-47ff-a1e5-606e8f91821a",
                    "results.tekton.dev/stored": "true"
                },
                "creationTimestamp": "2026-04-28T16:05:36Z",
                "finalizers": [
                    "chains.tekton.dev/taskrun",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/part-of": "e2e-tests-go-eciytfax",
                    "app.kubernetes.io/version": "v0.39.5",
                    "argocd/app-name": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-id": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-namespace": "tssc-app",
                    "janus-idp.io/tekton": "e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/event-type": "Merge_Request",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-gitops-on-pull-request",
                    "pipelinesascode.tekton.dev/pull-request": "2",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-gitops-repository",
                    "pipelinesascode.tekton.dev/sha": "e395df7e0e4c64ad86da082463949a155dd916ac",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax-gitops",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "e2e-tests-go-eciytfax-gitops-on-pull-request-xrtvv",
                    "tekton.dev/pipelineRun": "e2e-tests-go-eciytfax-gitops-on-pull-request-xrtvv",
                    "tekton.dev/pipelineRunUID": "6562839e-6164-47ff-a1e5-606e8f91821a",
                    "tekton.dev/pipelineTask": "download-sboms"
                },
                "name": "e2e-tests-go-eci179bf1c0a6c1a1b450f1b75a461a4bb4-download-sboms",
                "namespace": "tssc-app-ci",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "e2e-tests-go-eciytfax-gitops-on-pull-request-xrtvv",
                        "uid": "6562839e-6164-47ff-a1e5-606e8f91821a"
                    }
                ],
                "resourceVersion": "46053",
                "uid": "28aa992a-466f-4705-b433-7b5acc834265"
            },
            "spec": {
                "params": [
                    {
                        "name": "COSIGN_PUBLIC_KEY",
                        "value": "LS0tLS1CRUdJTiBQVUJMSUMgS0VZLS0tLS0KTUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFbERobEtmeUdBdkFiOWU2KzAxbmFwbWFtdUZEYwp6clZsNVVzSkxtUWVUc1Z0N0J6SFUwQThwdENkT2dzcFJTS2cyQ3J6ajlkZEg4cjVWZ05NOWhEelFRPT0KLS0tLS1FTkQgUFVCTElDIEtFWS0tLS0tCg==\n"
                    },
                    {
                        "name": "SBOM_IMAGES",
                        "value": "{\"components\":[{\"containerImage\":\"nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc\"}]}\n"
                    }
                ],
                "serviceAccountName": "pipeline",
                "taskSpec": {
                    "description": "Download SBOM from images",
                    "params": [
                        {
                            "default": "",
                            "description": "Public key used to verify signatures. Must be a base64 encoded key.",
                            "name": "COSIGN_PUBLIC_KEY",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Images to be considered for SBOM download.",
                            "name": "SBOM_IMAGES",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "CI_TYPE",
                                "value": "tekton"
                            },
                            {
                                "name": "COSIGN_PUBLIC_KEY",
                                "value": "$(params.COSIGN_PUBLIC_KEY)"
                            },
                            {
                                "name": "IMAGES",
                                "value": "$(params.SBOM_IMAGES)"
                            },
                            {
                                "name": "REKOR_HOST",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "rekor_url",
                                        "name": "tas-secret"
                                    }
                                }
                            },
                            {
                                "name": "TUF_MIRROR",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "tuf_url",
                                        "name": "tas-secret"
                                    }
                                }
                            }
                        ],
                        "workingDir": "$(workspaces.source.path)/source"
                    },
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "COSIGN_PUBLIC_KEY",
                                    "value": "$(params.COSIGN_PUBLIC_KEY)"
                                },
                                {
                                    "name": "IMAGES",
                                    "value": "$(params.SBOM_IMAGES)"
                                },
                                {
                                    "name": "REKOR_HOST",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "rekor_url",
                                            "name": "tas-secret"
                                        }
                                    }
                                },
                                {
                                    "name": "TUF_MIRROR",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "tuf_url",
                                            "name": "tas-secret"
                                        }
                                    }
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "download",
                            "script": "echo \"running download-sbom-from-url-in-attestation\"\n$(workspaces.source.path)/tssc/download-sbom-from-url-in-attestation.sh\n",
                            "workingDir": "$(workspaces.source.path)/source"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "Should contain a cloned gitops repo at the ./source subpath",
                            "name": "source"
                        }
                    ]
                },
                "timeout": "1h0m0s",
                "workspaces": [
                    {
                        "name": "source",
                        "persistentVolumeClaim": {
                            "claimName": "pvc-608e6ce161"
                        }
                    }
                ]
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-28T16:05:44Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-28T16:05:44Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "e2e-tests-go-eci179bf1c0a6c85efbd3c41439a38ad62e76a38cb2b9e-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    }
                },
                "startTime": "2026-04-28T16:05:37Z",
                "steps": [
                    {
                        "container": "step-download",
                        "imageID": "quay.io/redhat-tssc/task-runner@sha256:db633cb62eb097a46ca9e3e0a54d21c8ebd444f81a074ce1f1afa61956185dbf",
                        "name": "download",
                        "provenance": {},
                        "terminated": {
                            "containerID": "cri-o://5f6ca5db1aaf523ad7c2112e0d074001545698f3d5db58fb93b5da2817f39fc3",
                            "exitCode": 0,
                            "finishedAt": "2026-04-28T16:05:43Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-28T16:05:43Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Download SBOM from images",
                    "params": [
                        {
                            "default": "",
                            "description": "Public key used to verify signatures. Must be a base64 encoded key.",
                            "name": "COSIGN_PUBLIC_KEY",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Images to be considered for SBOM download.",
                            "name": "SBOM_IMAGES",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "CI_TYPE",
                                "value": "tekton"
                            },
                            {
                                "name": "COSIGN_PUBLIC_KEY",
                                "value": "LS0tLS1CRUdJTiBQVUJMSUMgS0VZLS0tLS0KTUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFbERobEtmeUdBdkFiOWU2KzAxbmFwbWFtdUZEYwp6clZsNVVzSkxtUWVUc1Z0N0J6SFUwQThwdENkT2dzcFJTS2cyQ3J6ajlkZEg4cjVWZ05NOWhEelFRPT0KLS0tLS1FTkQgUFVCTElDIEtFWS0tLS0tCg==\n"
                            },
                            {
                                "name": "IMAGES",
                                "value": "{\"components\":[{\"containerImage\":\"nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc\"}]}\n"
                            },
                            {
                                "name": "REKOR_HOST",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "rekor_url",
                                        "name": "tas-secret"
                                    }
                                }
                            },
                            {
                                "name": "TUF_MIRROR",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "tuf_url",
                                        "name": "tas-secret"
                                    }
                                }
                            }
                        ],
                        "workingDir": "/workspace/source/source"
                    },
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "COSIGN_PUBLIC_KEY",
                                    "value": "LS0tLS1CRUdJTiBQVUJMSUMgS0VZLS0tLS0KTUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFbERobEtmeUdBdkFiOWU2KzAxbmFwbWFtdUZEYwp6clZsNVVzSkxtUWVUc1Z0N0J6SFUwQThwdENkT2dzcFJTS2cyQ3J6ajlkZEg4cjVWZ05NOWhEelFRPT0KLS0tLS1FTkQgUFVCTElDIEtFWS0tLS0tCg==\n"
                                },
                                {
                                    "name": "IMAGES",
                                    "value": "{\"components\":[{\"containerImage\":\"nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc\"}]}\n"
                                },
                                {
                                    "name": "REKOR_HOST",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "rekor_url",
                                            "name": "tas-secret"
                                        }
                                    }
                                },
                                {
                                    "name": "TUF_MIRROR",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "tuf_url",
                                            "name": "tas-secret"
                                        }
                                    }
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "download",
                            "script": "echo \"running download-sbom-from-url-in-attestation\"\n/workspace/source/tssc/download-sbom-from-url-in-attestation.sh\n",
                            "workingDir": "/workspace/source/source"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "Should contain a cloned gitops repo at the ./source subpath",
                            "name": "source"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "https://rekor-server-tssc-tas.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/api/v1/log/entries?logIndex=30",
                    "pipeline.tekton.dev/affinity-assistant": "affinity-assistant-686ee97ecc",
                    "pipeline.tekton.dev/release": "8910674cb953317a4373f33822024b9de8c5fa22",
                    "pipelinesascode.tekton.dev/branch": "main",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "Merge Request",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-xtymyk",
                    "pipelinesascode.tekton.dev/git-provider": "gitlab",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/k8s/ns/tssc-app-ci/tekton.dev~v1~PipelineRun/e2e-tests-go-eciytfax-gitops-on-pull-request-7rgs2",
                    "pipelinesascode.tekton.dev/on-event": "[pull_request]",
                    "pipelinesascode.tekton.dev/on-target-branch": "[main]",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-gitops-on-pull-request",
                    "pipelinesascode.tekton.dev/pipeline": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/pipelines/gitops-pull-request-tssc.yaml",
                    "pipelinesascode.tekton.dev/pull-request": "1",
                    "pipelinesascode.tekton.dev/repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-gitops-repository",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-qe-test",
                    "pipelinesascode.tekton.dev/sha": "ced3321e2172a8a3a52c00fd150c43b38aaaa1dd",
                    "pipelinesascode.tekton.dev/sha-title": "Promote to stage environment",
                    "pipelinesascode.tekton.dev/sha-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops/-/commit/ced3321e2172a8a3a52c00fd150c43b38aaaa1dd",
                    "pipelinesascode.tekton.dev/source-branch": "promote-to-stage-1777392186938",
                    "pipelinesascode.tekton.dev/source-project-id": "81724368",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/target-project-id": "81724368",
                    "pipelinesascode.tekton.dev/task-0": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/git-clone.yaml",
                    "pipelinesascode.tekton.dev/task-1": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/gather-deploy-images.yaml",
                    "pipelinesascode.tekton.dev/task-2": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/verify-enterprise-contract.yaml",
                    "pipelinesascode.tekton.dev/task-3": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/gather-deploy-images.yaml",
                    "pipelinesascode.tekton.dev/task-4": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/download-sbom-from-url-in-attestation.yaml",
                    "pipelinesascode.tekton.dev/task-5": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/upload-sbom-to-trustification.yaml",
                    "pipelinesascode.tekton.dev/task-6": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/fetch-gitops-images.yaml",
                    "pipelinesascode.tekton.dev/task-7": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/verify-gitops-conforma.yaml",
                    "pipelinesascode.tekton.dev/task-8": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/download-gitops-sbom.yaml",
                    "pipelinesascode.tekton.dev/task-9": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/upload-gitops-sbom.yaml",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax-gitops",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "tssc-app-ci/results/ab4f5fdf-b85e-44b0-b185-5e3ca1ce7431/records/810e7d98-379f-47e7-958e-376dd83d09e6",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"e2e-tests-go-eciytfax-gitops\",\"commit\":\"ced3321e2172a8a3a52c00fd150c43b38aaaa1dd\",\"eventType\":\"Merge Request\",\"pull_request-id\":1}",
                    "results.tekton.dev/result": "tssc-app-ci/results/ab4f5fdf-b85e-44b0-b185-5e3ca1ce7431",
                    "results.tekton.dev/stored": "true"
                },
                "creationTimestamp": "2026-04-28T16:03:40Z",
                "finalizers": [
                    "chains.tekton.dev/taskrun",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/part-of": "e2e-tests-go-eciytfax",
                    "app.kubernetes.io/version": "v0.39.5",
                    "argocd/app-name": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-id": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-namespace": "tssc-app",
                    "janus-idp.io/tekton": "e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/event-type": "Merge_Request",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-gitops-on-pull-request",
                    "pipelinesascode.tekton.dev/pull-request": "1",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-gitops-repository",
                    "pipelinesascode.tekton.dev/sha": "ced3321e2172a8a3a52c00fd150c43b38aaaa1dd",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax-gitops",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "e2e-tests-go-eciytfax-gitops-on-pull-request-7rgs2",
                    "tekton.dev/pipelineRun": "e2e-tests-go-eciytfax-gitops-on-pull-request-7rgs2",
                    "tekton.dev/pipelineRunUID": "ab4f5fdf-b85e-44b0-b185-5e3ca1ce7431",
                    "tekton.dev/pipelineTask": "download-sboms"
                },
                "name": "e2e-tests-go-eci49db8dcb9468fe2a9d354d396d5b01aa-download-sboms",
                "namespace": "tssc-app-ci",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "e2e-tests-go-eciytfax-gitops-on-pull-request-7rgs2",
                        "uid": "ab4f5fdf-b85e-44b0-b185-5e3ca1ce7431"
                    }
                ],
                "resourceVersion": "44040",
                "uid": "810e7d98-379f-47e7-958e-376dd83d09e6"
            },
            "spec": {
                "params": [
                    {
                        "name": "COSIGN_PUBLIC_KEY",
                        "value": "LS0tLS1CRUdJTiBQVUJMSUMgS0VZLS0tLS0KTUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFbERobEtmeUdBdkFiOWU2KzAxbmFwbWFtdUZEYwp6clZsNVVzSkxtUWVUc1Z0N0J6SFUwQThwdENkT2dzcFJTS2cyQ3J6ajlkZEg4cjVWZ05NOWhEelFRPT0KLS0tLS1FTkQgUFVCTElDIEtFWS0tLS0tCg==\n"
                    },
                    {
                        "name": "SBOM_IMAGES",
                        "value": "{\"components\":[{\"containerImage\":\"nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc\"}]}\n"
                    }
                ],
                "serviceAccountName": "pipeline",
                "taskSpec": {
                    "description": "Download SBOM from images",
                    "params": [
                        {
                            "default": "",
                            "description": "Public key used to verify signatures. Must be a base64 encoded key.",
                            "name": "COSIGN_PUBLIC_KEY",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Images to be considered for SBOM download.",
                            "name": "SBOM_IMAGES",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "CI_TYPE",
                                "value": "tekton"
                            },
                            {
                                "name": "COSIGN_PUBLIC_KEY",
                                "value": "$(params.COSIGN_PUBLIC_KEY)"
                            },
                            {
                                "name": "IMAGES",
                                "value": "$(params.SBOM_IMAGES)"
                            },
                            {
                                "name": "REKOR_HOST",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "rekor_url",
                                        "name": "tas-secret"
                                    }
                                }
                            },
                            {
                                "name": "TUF_MIRROR",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "tuf_url",
                                        "name": "tas-secret"
                                    }
                                }
                            }
                        ],
                        "workingDir": "$(workspaces.source.path)/source"
                    },
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "COSIGN_PUBLIC_KEY",
                                    "value": "$(params.COSIGN_PUBLIC_KEY)"
                                },
                                {
                                    "name": "IMAGES",
                                    "value": "$(params.SBOM_IMAGES)"
                                },
                                {
                                    "name": "REKOR_HOST",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "rekor_url",
                                            "name": "tas-secret"
                                        }
                                    }
                                },
                                {
                                    "name": "TUF_MIRROR",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "tuf_url",
                                            "name": "tas-secret"
                                        }
                                    }
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "download",
                            "script": "echo \"running download-sbom-from-url-in-attestation\"\n$(workspaces.source.path)/tssc/download-sbom-from-url-in-attestation.sh\n",
                            "workingDir": "$(workspaces.source.path)/source"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "Should contain a cloned gitops repo at the ./source subpath",
                            "name": "source"
                        }
                    ]
                },
                "timeout": "1h0m0s",
                "workspaces": [
                    {
                        "name": "source",
                        "persistentVolumeClaim": {
                            "claimName": "pvc-96c0e1d35f"
                        }
                    }
                ]
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-28T16:03:47Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-28T16:03:47Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "e2e-tests-go-eci49db8dcb946da646b2fb6904ad57a7125ea7f86260b-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    }
                },
                "startTime": "2026-04-28T16:03:40Z",
                "steps": [
                    {
                        "container": "step-download",
                        "imageID": "quay.io/redhat-tssc/task-runner@sha256:db633cb62eb097a46ca9e3e0a54d21c8ebd444f81a074ce1f1afa61956185dbf",
                        "name": "download",
                        "provenance": {},
                        "terminated": {
                            "containerID": "cri-o://379b36b5495c57e72bfc0f6a6f72d0d6a16296f2f170d6aa1bef52ae8f0720db",
                            "exitCode": 0,
                            "finishedAt": "2026-04-28T16:03:46Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-28T16:03:46Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Download SBOM from images",
                    "params": [
                        {
                            "default": "",
                            "description": "Public key used to verify signatures. Must be a base64 encoded key.",
                            "name": "COSIGN_PUBLIC_KEY",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Images to be considered for SBOM download.",
                            "name": "SBOM_IMAGES",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "CI_TYPE",
                                "value": "tekton"
                            },
                            {
                                "name": "COSIGN_PUBLIC_KEY",
                                "value": "LS0tLS1CRUdJTiBQVUJMSUMgS0VZLS0tLS0KTUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFbERobEtmeUdBdkFiOWU2KzAxbmFwbWFtdUZEYwp6clZsNVVzSkxtUWVUc1Z0N0J6SFUwQThwdENkT2dzcFJTS2cyQ3J6ajlkZEg4cjVWZ05NOWhEelFRPT0KLS0tLS1FTkQgUFVCTElDIEtFWS0tLS0tCg==\n"
                            },
                            {
                                "name": "IMAGES",
                                "value": "{\"components\":[{\"containerImage\":\"nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc\"}]}\n"
                            },
                            {
                                "name": "REKOR_HOST",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "rekor_url",
                                        "name": "tas-secret"
                                    }
                                }
                            },
                            {
                                "name": "TUF_MIRROR",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "tuf_url",
                                        "name": "tas-secret"
                                    }
                                }
                            }
                        ],
                        "workingDir": "/workspace/source/source"
                    },
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "COSIGN_PUBLIC_KEY",
                                    "value": "LS0tLS1CRUdJTiBQVUJMSUMgS0VZLS0tLS0KTUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFbERobEtmeUdBdkFiOWU2KzAxbmFwbWFtdUZEYwp6clZsNVVzSkxtUWVUc1Z0N0J6SFUwQThwdENkT2dzcFJTS2cyQ3J6ajlkZEg4cjVWZ05NOWhEelFRPT0KLS0tLS1FTkQgUFVCTElDIEtFWS0tLS0tCg==\n"
                                },
                                {
                                    "name": "IMAGES",
                                    "value": "{\"components\":[{\"containerImage\":\"nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc\"}]}\n"
                                },
                                {
                                    "name": "REKOR_HOST",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "rekor_url",
                                            "name": "tas-secret"
                                        }
                                    }
                                },
                                {
                                    "name": "TUF_MIRROR",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "tuf_url",
                                            "name": "tas-secret"
                                        }
                                    }
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "download",
                            "script": "echo \"running download-sbom-from-url-in-attestation\"\n/workspace/source/tssc/download-sbom-from-url-in-attestation.sh\n",
                            "workingDir": "/workspace/source/source"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "Should contain a cloned gitops repo at the ./source subpath",
                            "name": "source"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "https://rekor-server-tssc-tas.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/api/v1/log/entries?logIndex=29",
                    "pipeline.tekton.dev/affinity-assistant": "affinity-assistant-686ee97ecc",
                    "pipeline.tekton.dev/release": "8910674cb953317a4373f33822024b9de8c5fa22",
                    "pipelinesascode.tekton.dev/branch": "main",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "Merge Request",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-xtymyk",
                    "pipelinesascode.tekton.dev/git-provider": "gitlab",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/k8s/ns/tssc-app-ci/tekton.dev~v1~PipelineRun/e2e-tests-go-eciytfax-gitops-on-pull-request-7rgs2",
                    "pipelinesascode.tekton.dev/on-event": "[pull_request]",
                    "pipelinesascode.tekton.dev/on-target-branch": "[main]",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-gitops-on-pull-request",
                    "pipelinesascode.tekton.dev/pipeline": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/pipelines/gitops-pull-request-tssc.yaml",
                    "pipelinesascode.tekton.dev/pull-request": "1",
                    "pipelinesascode.tekton.dev/repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-gitops-repository",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-qe-test",
                    "pipelinesascode.tekton.dev/sha": "ced3321e2172a8a3a52c00fd150c43b38aaaa1dd",
                    "pipelinesascode.tekton.dev/sha-title": "Promote to stage environment",
                    "pipelinesascode.tekton.dev/sha-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops/-/commit/ced3321e2172a8a3a52c00fd150c43b38aaaa1dd",
                    "pipelinesascode.tekton.dev/source-branch": "promote-to-stage-1777392186938",
                    "pipelinesascode.tekton.dev/source-project-id": "81724368",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/target-project-id": "81724368",
                    "pipelinesascode.tekton.dev/task-0": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/git-clone.yaml",
                    "pipelinesascode.tekton.dev/task-1": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/gather-deploy-images.yaml",
                    "pipelinesascode.tekton.dev/task-2": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/verify-enterprise-contract.yaml",
                    "pipelinesascode.tekton.dev/task-3": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/gather-deploy-images.yaml",
                    "pipelinesascode.tekton.dev/task-4": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/download-sbom-from-url-in-attestation.yaml",
                    "pipelinesascode.tekton.dev/task-5": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/upload-sbom-to-trustification.yaml",
                    "pipelinesascode.tekton.dev/task-6": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/fetch-gitops-images.yaml",
                    "pipelinesascode.tekton.dev/task-7": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/verify-gitops-conforma.yaml",
                    "pipelinesascode.tekton.dev/task-8": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/download-gitops-sbom.yaml",
                    "pipelinesascode.tekton.dev/task-9": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/upload-gitops-sbom.yaml",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax-gitops",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "tssc-app-ci/results/ab4f5fdf-b85e-44b0-b185-5e3ca1ce7431/records/8b4f8f09-a87a-42dc-9e46-6d2566b8cfa5",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"e2e-tests-go-eciytfax-gitops\",\"commit\":\"ced3321e2172a8a3a52c00fd150c43b38aaaa1dd\",\"eventType\":\"Merge Request\",\"pull_request-id\":1}",
                    "results.tekton.dev/result": "tssc-app-ci/results/ab4f5fdf-b85e-44b0-b185-5e3ca1ce7431",
                    "results.tekton.dev/stored": "true"
                },
                "creationTimestamp": "2026-04-28T16:03:33Z",
                "finalizers": [
                    "results.tekton.dev/taskrun",
                    "chains.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/part-of": "e2e-tests-go-eciytfax",
                    "app.kubernetes.io/version": "v0.39.5",
                    "argocd/app-name": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-id": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-namespace": "tssc-app",
                    "janus-idp.io/tekton": "e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/event-type": "Merge_Request",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-gitops-on-pull-request",
                    "pipelinesascode.tekton.dev/pull-request": "1",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-gitops-repository",
                    "pipelinesascode.tekton.dev/sha": "ced3321e2172a8a3a52c00fd150c43b38aaaa1dd",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax-gitops",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "e2e-tests-go-eciytfax-gitops-on-pull-request-7rgs2",
                    "tekton.dev/pipelineRun": "e2e-tests-go-eciytfax-gitops-on-pull-request-7rgs2",
                    "tekton.dev/pipelineRunUID": "ab4f5fdf-b85e-44b0-b185-5e3ca1ce7431",
                    "tekton.dev/pipelineTask": "get-images"
                },
                "name": "e2e-tests-go-eciytfax-gitops-on-pull-request-7rgs2-get-images",
                "namespace": "tssc-app-ci",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "e2e-tests-go-eciytfax-gitops-on-pull-request-7rgs2",
                        "uid": "ab4f5fdf-b85e-44b0-b185-5e3ca1ce7431"
                    }
                ],
                "resourceVersion": "43900",
                "uid": "8b4f8f09-a87a-42dc-9e46-6d2566b8cfa5"
            },
            "spec": {
                "params": [
                    {
                        "name": "PUBLIC_KEY_URL",
                        "value": "k8s://tssc-app-ci/cosign-pub"
                    },
                    {
                        "name": "TARGET_BRANCH",
                        "value": "main"
                    }
                ],
                "serviceAccountName": "pipeline",
                "taskSpec": {
                    "description": "Extract images from deployment YAML to pass to Conforma for validation",
                    "params": [
                        {
                            "default": "",
                            "description": "Public key used to verify signatures. Must be a valid k8s cosign reference, e.g. k8s://my-space/my-secret where my-secret contains the expected cosign.pub attribute.",
                            "name": "PUBLIC_KEY_URL",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "If specified, will gather only the images that changed between the current revision and the target branch. Useful for pull requests. Note that the repository cloned on the source workspace must already contain the origin/$TARGET_BRANCH reference.\n",
                            "name": "TARGET_BRANCH",
                            "type": "string"
                        },
                        {
                            "default": [
                                "development",
                                "stage",
                                "prod"
                            ],
                            "description": "Gather images from the manifest files for the specified environments",
                            "name": "ENVIRONMENTS",
                            "type": "array"
                        }
                    ],
                    "results": [
                        {
                            "description": "Cosign base64 encoded public key fetched from secrets.",
                            "name": "COSIGN_PUBLIC_KEY",
                            "type": "string"
                        },
                        {
                            "description": "The images with SBOMs to upload to Trustification \n",
                            "name": "SBOM_IMAGES",
                            "type": "string"
                        },
                        {
                            "description": "The images to be verified, in a format compatible with https://github.com/konflux-ci/build-definitions/tree/main/task/verify-enterprise-contract/0.1. When there are no images to verify, this is an empty string.\n",
                            "name": "CONFORMA_IMAGES",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "CI_TYPE",
                                "value": "tekton"
                            },
                            {
                                "name": "TARGET_BRANCH",
                                "value": "$(params.TARGET_BRANCH)"
                            },
                            {
                                "name": "PUBLIC_KEY_URL",
                                "value": "$(params.PUBLIC_KEY_URL)"
                            }
                        ],
                        "workingDir": "$(workspaces.source.path)/source"
                    },
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "TARGET_BRANCH",
                                    "value": "$(params.TARGET_BRANCH)"
                                },
                                {
                                    "name": "PUBLIC_KEY_URL",
                                    "value": "$(params.PUBLIC_KEY_URL)"
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "init",
                            "script": "pwd\nls -la\n# Sync scripts to the writable workspace\ncp -rf /work/tssc/ $(workspaces.source.path)/\n# Append the dummy function to common.sh\nprintf '\\nfunction registry-login() {\\n  echo \"--- Registry Auth Bypass Active ---\"\\n  return 0\\n}\\n' \u003e\u003e $(workspaces.source.path)/tssc/common.sh\necho \"Successfully patched $(workspaces.source.path)/tssc/common.sh\"\n\necho \"Parsing public key url\"\nCLEAN_URL=\"${PUBLIC_KEY_URL#k8s://}\"\nNS=\"${CLEAN_URL%/*}\"\nSECRET=\"${CLEAN_URL##*/}\"\nCOSIGN_PUBLIC_KEY=$(oc get secrets $SECRET -n $NS -o json | jq -r '.data.\"cosign.pub\"')\necho $COSIGN_PUBLIC_KEY \u003e $(results.COSIGN_PUBLIC_KEY.path)\n",
                            "workingDir": "$(workspaces.source.path)/source"
                        },
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "TARGET_BRANCH",
                                    "value": "$(params.TARGET_BRANCH)"
                                },
                                {
                                    "name": "PUBLIC_KEY_URL",
                                    "value": "$(params.PUBLIC_KEY_URL)"
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "get-images",
                            "script": "echo \"running gather-images-to-upload-sbom\"\n$(workspaces.source.path)/tssc/gather-images-to-upload-sbom.sh\nmv ./results/gather-deploy-images ./results/sbom-images \ncat ./results/sbom-images/IMAGES_TO_VERIFY \u003e $(results.SBOM_IMAGES.path)\n\necho \"running gather-deploy-images\"\n$(workspaces.source.path)/tssc/gather-deploy-images.sh\ncat ./results/gather-deploy-images/IMAGES_TO_VERIFY \u003e $(results.CONFORMA_IMAGES.path)\n",
                            "workingDir": "$(workspaces.source.path)/source"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "Should contain a cloned gitops repo at the ./source subpath",
                            "name": "source"
                        }
                    ]
                },
                "timeout": "1h0m0s",
                "workspaces": [
                    {
                        "name": "source",
                        "persistentVolumeClaim": {
                            "claimName": "pvc-96c0e1d35f"
                        }
                    }
                ]
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-28T16:03:40Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-28T16:03:40Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "e2e-tests-go-eciytfax-gitop75979eb6503626067af23e6263cc25b0-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    }
                },
                "results": [
                    {
                        "name": "COSIGN_PUBLIC_KEY",
                        "type": "string",
                        "value": "LS0tLS1CRUdJTiBQVUJMSUMgS0VZLS0tLS0KTUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFbERobEtmeUdBdkFiOWU2KzAxbmFwbWFtdUZEYwp6clZsNVVzSkxtUWVUc1Z0N0J6SFUwQThwdENkT2dzcFJTS2cyQ3J6ajlkZEg4cjVWZ05NOWhEelFRPT0KLS0tLS1FTkQgUFVCTElDIEtFWS0tLS0tCg==\n"
                    },
                    {
                        "name": "CONFORMA_IMAGES",
                        "type": "string",
                        "value": "{\"components\":[{\"containerImage\":\"nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc\"}]}\n"
                    },
                    {
                        "name": "SBOM_IMAGES",
                        "type": "string",
                        "value": "{\"components\":[{\"containerImage\":\"nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc\"}]}\n"
                    }
                ],
                "startTime": "2026-04-28T16:03:33Z",
                "steps": [
                    {
                        "container": "step-init",
                        "imageID": "quay.io/redhat-tssc/task-runner@sha256:db633cb62eb097a46ca9e3e0a54d21c8ebd444f81a074ce1f1afa61956185dbf",
                        "name": "init",
                        "provenance": {},
                        "terminated": {
                            "containerID": "cri-o://7187ed36637d3c5c1bba9d9dc3079b645d661c01f3093c3db02b53d6d4806518",
                            "exitCode": 0,
                            "finishedAt": "2026-04-28T16:03:40Z",
                            "message": "[{\"key\":\"COSIGN_PUBLIC_KEY\",\"value\":\"LS0tLS1CRUdJTiBQVUJMSUMgS0VZLS0tLS0KTUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFbERobEtmeUdBdkFiOWU2KzAxbmFwbWFtdUZEYwp6clZsNVVzSkxtUWVUc1Z0N0J6SFUwQThwdENkT2dzcFJTS2cyQ3J6ajlkZEg4cjVWZ05NOWhEelFRPT0KLS0tLS1FTkQgUFVCTElDIEtFWS0tLS0tCg==\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-28T16:03:40Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-get-images",
                        "imageID": "quay.io/redhat-tssc/task-runner@sha256:db633cb62eb097a46ca9e3e0a54d21c8ebd444f81a074ce1f1afa61956185dbf",
                        "name": "get-images",
                        "provenance": {},
                        "terminated": {
                            "containerID": "cri-o://cc363ee396f1bfa51a4c10573e361242626f0314b121c5b5adf4be44e7d9a040",
                            "exitCode": 0,
                            "finishedAt": "2026-04-28T16:03:40Z",
                            "message": "[{\"key\":\"CONFORMA_IMAGES\",\"value\":\"{\\\"components\\\":[{\\\"containerImage\\\":\\\"nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc\\\"}]}\\n\",\"type\":1},{\"key\":\"COSIGN_PUBLIC_KEY\",\"value\":\"LS0tLS1CRUdJTiBQVUJMSUMgS0VZLS0tLS0KTUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFbERobEtmeUdBdkFiOWU2KzAxbmFwbWFtdUZEYwp6clZsNVVzSkxtUWVUc1Z0N0J6SFUwQThwdENkT2dzcFJTS2cyQ3J6ajlkZEg4cjVWZ05NOWhEelFRPT0KLS0tLS1FTkQgUFVCTElDIEtFWS0tLS0tCg==\\n\",\"type\":1},{\"key\":\"SBOM_IMAGES\",\"value\":\"{\\\"components\\\":[{\\\"containerImage\\\":\\\"nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc\\\"}]}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-28T16:03:40Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Extract images from deployment YAML to pass to Conforma for validation",
                    "params": [
                        {
                            "default": "",
                            "description": "Public key used to verify signatures. Must be a valid k8s cosign reference, e.g. k8s://my-space/my-secret where my-secret contains the expected cosign.pub attribute.",
                            "name": "PUBLIC_KEY_URL",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "If specified, will gather only the images that changed between the current revision and the target branch. Useful for pull requests. Note that the repository cloned on the source workspace must already contain the origin/$TARGET_BRANCH reference.\n",
                            "name": "TARGET_BRANCH",
                            "type": "string"
                        },
                        {
                            "default": [
                                "development",
                                "stage",
                                "prod"
                            ],
                            "description": "Gather images from the manifest files for the specified environments",
                            "name": "ENVIRONMENTS",
                            "type": "array"
                        }
                    ],
                    "results": [
                        {
                            "description": "Cosign base64 encoded public key fetched from secrets.",
                            "name": "COSIGN_PUBLIC_KEY",
                            "type": "string"
                        },
                        {
                            "description": "The images with SBOMs to upload to Trustification \n",
                            "name": "SBOM_IMAGES",
                            "type": "string"
                        },
                        {
                            "description": "The images to be verified, in a format compatible with https://github.com/konflux-ci/build-definitions/tree/main/task/verify-enterprise-contract/0.1. When there are no images to verify, this is an empty string.\n",
                            "name": "CONFORMA_IMAGES",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "CI_TYPE",
                                "value": "tekton"
                            },
                            {
                                "name": "TARGET_BRANCH",
                                "value": "main"
                            },
                            {
                                "name": "PUBLIC_KEY_URL",
                                "value": "k8s://tssc-app-ci/cosign-pub"
                            }
                        ],
                        "workingDir": "/workspace/source/source"
                    },
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "TARGET_BRANCH",
                                    "value": "main"
                                },
                                {
                                    "name": "PUBLIC_KEY_URL",
                                    "value": "k8s://tssc-app-ci/cosign-pub"
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "init",
                            "script": "pwd\nls -la\n# Sync scripts to the writable workspace\ncp -rf /work/tssc/ /workspace/source/\n# Append the dummy function to common.sh\nprintf '\\nfunction registry-login() {\\n  echo \"--- Registry Auth Bypass Active ---\"\\n  return 0\\n}\\n' \u003e\u003e /workspace/source/tssc/common.sh\necho \"Successfully patched /workspace/source/tssc/common.sh\"\n\necho \"Parsing public key url\"\nCLEAN_URL=\"${PUBLIC_KEY_URL#k8s://}\"\nNS=\"${CLEAN_URL%/*}\"\nSECRET=\"${CLEAN_URL##*/}\"\nCOSIGN_PUBLIC_KEY=$(oc get secrets $SECRET -n $NS -o json | jq -r '.data.\"cosign.pub\"')\necho $COSIGN_PUBLIC_KEY \u003e /tekton/results/COSIGN_PUBLIC_KEY\n",
                            "workingDir": "/workspace/source/source"
                        },
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "TARGET_BRANCH",
                                    "value": "main"
                                },
                                {
                                    "name": "PUBLIC_KEY_URL",
                                    "value": "k8s://tssc-app-ci/cosign-pub"
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "get-images",
                            "script": "echo \"running gather-images-to-upload-sbom\"\n/workspace/source/tssc/gather-images-to-upload-sbom.sh\nmv ./results/gather-deploy-images ./results/sbom-images \ncat ./results/sbom-images/IMAGES_TO_VERIFY \u003e /tekton/results/SBOM_IMAGES\n\necho \"running gather-deploy-images\"\n/workspace/source/tssc/gather-deploy-images.sh\ncat ./results/gather-deploy-images/IMAGES_TO_VERIFY \u003e /tekton/results/CONFORMA_IMAGES\n",
                            "workingDir": "/workspace/source/source"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "Should contain a cloned gitops repo at the ./source subpath",
                            "name": "source"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "https://rekor-server-tssc-tas.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/api/v1/log/entries?logIndex=31",
                    "pipeline.tekton.dev/affinity-assistant": "affinity-assistant-686ee97ecc",
                    "pipeline.tekton.dev/release": "8910674cb953317a4373f33822024b9de8c5fa22",
                    "pipelinesascode.tekton.dev/branch": "main",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "Merge Request",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-xtymyk",
                    "pipelinesascode.tekton.dev/git-provider": "gitlab",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/k8s/ns/tssc-app-ci/tekton.dev~v1~PipelineRun/e2e-tests-go-eciytfax-gitops-on-pull-request-7rgs2",
                    "pipelinesascode.tekton.dev/on-event": "[pull_request]",
                    "pipelinesascode.tekton.dev/on-target-branch": "[main]",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-gitops-on-pull-request",
                    "pipelinesascode.tekton.dev/pipeline": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/pipelines/gitops-pull-request-tssc.yaml",
                    "pipelinesascode.tekton.dev/pull-request": "1",
                    "pipelinesascode.tekton.dev/repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-gitops-repository",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-qe-test",
                    "pipelinesascode.tekton.dev/sha": "ced3321e2172a8a3a52c00fd150c43b38aaaa1dd",
                    "pipelinesascode.tekton.dev/sha-title": "Promote to stage environment",
                    "pipelinesascode.tekton.dev/sha-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops/-/commit/ced3321e2172a8a3a52c00fd150c43b38aaaa1dd",
                    "pipelinesascode.tekton.dev/source-branch": "promote-to-stage-1777392186938",
                    "pipelinesascode.tekton.dev/source-project-id": "81724368",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/target-project-id": "81724368",
                    "pipelinesascode.tekton.dev/task-0": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/git-clone.yaml",
                    "pipelinesascode.tekton.dev/task-1": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/gather-deploy-images.yaml",
                    "pipelinesascode.tekton.dev/task-2": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/verify-enterprise-contract.yaml",
                    "pipelinesascode.tekton.dev/task-3": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/gather-deploy-images.yaml",
                    "pipelinesascode.tekton.dev/task-4": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/download-sbom-from-url-in-attestation.yaml",
                    "pipelinesascode.tekton.dev/task-5": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/upload-sbom-to-trustification.yaml",
                    "pipelinesascode.tekton.dev/task-6": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/fetch-gitops-images.yaml",
                    "pipelinesascode.tekton.dev/task-7": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/verify-gitops-conforma.yaml",
                    "pipelinesascode.tekton.dev/task-8": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/download-gitops-sbom.yaml",
                    "pipelinesascode.tekton.dev/task-9": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/upload-gitops-sbom.yaml",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax-gitops",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "tssc-app-ci/results/ab4f5fdf-b85e-44b0-b185-5e3ca1ce7431/records/395edf94-4d47-44b7-805e-a5bb270f36b8",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"e2e-tests-go-eciytfax-gitops\",\"commit\":\"ced3321e2172a8a3a52c00fd150c43b38aaaa1dd\",\"eventType\":\"Merge Request\",\"pull_request-id\":1}",
                    "results.tekton.dev/result": "tssc-app-ci/results/ab4f5fdf-b85e-44b0-b185-5e3ca1ce7431",
                    "results.tekton.dev/stored": "true"
                },
                "creationTimestamp": "2026-04-28T16:03:47Z",
                "finalizers": [
                    "chains.tekton.dev/taskrun",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/part-of": "e2e-tests-go-eciytfax",
                    "app.kubernetes.io/version": "v0.39.5",
                    "argocd/app-name": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-id": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-namespace": "tssc-app",
                    "janus-idp.io/tekton": "e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/event-type": "Merge_Request",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-gitops-on-pull-request",
                    "pipelinesascode.tekton.dev/pull-request": "1",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-gitops-repository",
                    "pipelinesascode.tekton.dev/sha": "ced3321e2172a8a3a52c00fd150c43b38aaaa1dd",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax-gitops",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "e2e-tests-go-eciytfax-gitops-on-pull-request-7rgs2",
                    "tekton.dev/pipelineRun": "e2e-tests-go-eciytfax-gitops-on-pull-request-7rgs2",
                    "tekton.dev/pipelineRunUID": "ab4f5fdf-b85e-44b0-b185-5e3ca1ce7431",
                    "tekton.dev/pipelineTask": "upload-sboms"
                },
                "name": "e2e-tests-go-eciytfax-gitops-on-pull-request-7rgs2-upload-sboms",
                "namespace": "tssc-app-ci",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "e2e-tests-go-eciytfax-gitops-on-pull-request-7rgs2",
                        "uid": "ab4f5fdf-b85e-44b0-b185-5e3ca1ce7431"
                    }
                ],
                "resourceVersion": "44067",
                "uid": "395edf94-4d47-44b7-805e-a5bb270f36b8"
            },
            "spec": {
                "params": [
                    {
                        "name": "TPA_SECRET",
                        "value": "tpa-secret"
                    }
                ],
                "serviceAccountName": "pipeline",
                "taskSpec": {
                    "description": "Upload SBOMs to Trustification",
                    "params": [
                        {
                            "description": "TPA Secret to obtain Trustification vars from.",
                            "name": "TPA_SECRET",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "CI_TYPE",
                                "value": "tekton"
                            },
                            {
                                "name": "TRUSTIFICATION_BOMBASTIC_API_URL",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "bombastic_api_url",
                                        "name": "$(params.TPA_SECRET)"
                                    }
                                }
                            },
                            {
                                "name": "TRUSTIFICATION_OIDC_CLIENT_ID",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "oidc_client_id",
                                        "name": "$(params.TPA_SECRET)"
                                    }
                                }
                            },
                            {
                                "name": "TRUSTIFICATION_OIDC_CLIENT_SECRET",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "oidc_client_secret",
                                        "name": "$(params.TPA_SECRET)"
                                    }
                                }
                            },
                            {
                                "name": "TRUSTIFICATION_OIDC_ISSUER_URL",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "oidc_issuer_url",
                                        "name": "$(params.TPA_SECRET)"
                                    }
                                }
                            },
                            {
                                "name": "TRUSTIFICATION_SUPPORTED_CYCLONEDX_VERSION",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "supported_cyclonedx_version",
                                        "name": "$(params.TPA_SECRET)"
                                    }
                                }
                            }
                        ],
                        "workingDir": "$(workspaces.source.path)/source"
                    },
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "TRUSTIFICATION_BOMBASTIC_API_URL",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "bombastic_api_url",
                                            "name": "$(params.TPA_SECRET)"
                                        }
                                    }
                                },
                                {
                                    "name": "TRUSTIFICATION_OIDC_CLIENT_ID",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "oidc_client_id",
                                            "name": "$(params.TPA_SECRET)"
                                        }
                                    }
                                },
                                {
                                    "name": "TRUSTIFICATION_OIDC_CLIENT_SECRET",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "oidc_client_secret",
                                            "name": "$(params.TPA_SECRET)"
                                        }
                                    }
                                },
                                {
                                    "name": "TRUSTIFICATION_OIDC_ISSUER_URL",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "oidc_issuer_url",
                                            "name": "$(params.TPA_SECRET)"
                                        }
                                    }
                                },
                                {
                                    "name": "TRUSTIFICATION_SUPPORTED_CYCLONEDX_VERSION",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "supported_cyclonedx_version",
                                            "name": "$(params.TPA_SECRET)"
                                        }
                                    }
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "upload",
                            "script": "echo \"running upload-sbom-to-trustification\"\n$(workspaces.source.path)/tssc/upload-sbom-to-trustification.sh\n",
                            "workingDir": "$(workspaces.source.path)/source"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "Should contain a cloned gitops repo at the ./source subpath",
                            "name": "source"
                        }
                    ]
                },
                "timeout": "1h0m0s",
                "workspaces": [
                    {
                        "name": "source",
                        "persistentVolumeClaim": {
                            "claimName": "pvc-96c0e1d35f"
                        }
                    }
                ]
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-28T16:03:53Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-28T16:03:53Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "e2e-tests-go-eciytfax-gitop005b2e603c641a4353c9569f9bb0b6fa-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    }
                },
                "startTime": "2026-04-28T16:03:47Z",
                "steps": [
                    {
                        "container": "step-upload",
                        "imageID": "quay.io/redhat-tssc/task-runner@sha256:db633cb62eb097a46ca9e3e0a54d21c8ebd444f81a074ce1f1afa61956185dbf",
                        "name": "upload",
                        "provenance": {},
                        "terminated": {
                            "containerID": "cri-o://7e7f382955010dc9cbfede34be0016e19ebbbf7aab743f869436b91255fb8aa3",
                            "exitCode": 0,
                            "finishedAt": "2026-04-28T16:03:53Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-28T16:03:53Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Upload SBOMs to Trustification",
                    "params": [
                        {
                            "description": "TPA Secret to obtain Trustification vars from.",
                            "name": "TPA_SECRET",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "CI_TYPE",
                                "value": "tekton"
                            },
                            {
                                "name": "TRUSTIFICATION_BOMBASTIC_API_URL",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "bombastic_api_url",
                                        "name": "tpa-secret"
                                    }
                                }
                            },
                            {
                                "name": "TRUSTIFICATION_OIDC_CLIENT_ID",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "oidc_client_id",
                                        "name": "tpa-secret"
                                    }
                                }
                            },
                            {
                                "name": "TRUSTIFICATION_OIDC_CLIENT_SECRET",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "oidc_client_secret",
                                        "name": "tpa-secret"
                                    }
                                }
                            },
                            {
                                "name": "TRUSTIFICATION_OIDC_ISSUER_URL",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "oidc_issuer_url",
                                        "name": "tpa-secret"
                                    }
                                }
                            },
                            {
                                "name": "TRUSTIFICATION_SUPPORTED_CYCLONEDX_VERSION",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "supported_cyclonedx_version",
                                        "name": "tpa-secret"
                                    }
                                }
                            }
                        ],
                        "workingDir": "/workspace/source/source"
                    },
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "TRUSTIFICATION_BOMBASTIC_API_URL",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "bombastic_api_url",
                                            "name": "tpa-secret"
                                        }
                                    }
                                },
                                {
                                    "name": "TRUSTIFICATION_OIDC_CLIENT_ID",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "oidc_client_id",
                                            "name": "tpa-secret"
                                        }
                                    }
                                },
                                {
                                    "name": "TRUSTIFICATION_OIDC_CLIENT_SECRET",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "oidc_client_secret",
                                            "name": "tpa-secret"
                                        }
                                    }
                                },
                                {
                                    "name": "TRUSTIFICATION_OIDC_ISSUER_URL",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "oidc_issuer_url",
                                            "name": "tpa-secret"
                                        }
                                    }
                                },
                                {
                                    "name": "TRUSTIFICATION_SUPPORTED_CYCLONEDX_VERSION",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "supported_cyclonedx_version",
                                            "name": "tpa-secret"
                                        }
                                    }
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "upload",
                            "script": "echo \"running upload-sbom-to-trustification\"\n/workspace/source/tssc/upload-sbom-to-trustification.sh\n",
                            "workingDir": "/workspace/source/source"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "Should contain a cloned gitops repo at the ./source subpath",
                            "name": "source"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "https://rekor-server-tssc-tas.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/api/v1/log/entries?logIndex=37",
                    "pipeline.tekton.dev/affinity-assistant": "affinity-assistant-d8ea942d58",
                    "pipeline.tekton.dev/release": "8910674cb953317a4373f33822024b9de8c5fa22",
                    "pipelinesascode.tekton.dev/branch": "main",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "Merge Request",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-qaegwq",
                    "pipelinesascode.tekton.dev/git-provider": "gitlab",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/k8s/ns/tssc-app-ci/tekton.dev~v1~PipelineRun/e2e-tests-go-eciytfax-gitops-on-pull-request-xrtvv",
                    "pipelinesascode.tekton.dev/on-event": "[pull_request]",
                    "pipelinesascode.tekton.dev/on-target-branch": "[main]",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-gitops-on-pull-request",
                    "pipelinesascode.tekton.dev/pipeline": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/pipelines/gitops-pull-request-tssc.yaml",
                    "pipelinesascode.tekton.dev/pull-request": "2",
                    "pipelinesascode.tekton.dev/repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-gitops-repository",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-qe-test",
                    "pipelinesascode.tekton.dev/sha": "e395df7e0e4c64ad86da082463949a155dd916ac",
                    "pipelinesascode.tekton.dev/sha-title": "Promote to prod environment",
                    "pipelinesascode.tekton.dev/sha-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops/-/commit/e395df7e0e4c64ad86da082463949a155dd916ac",
                    "pipelinesascode.tekton.dev/source-branch": "promote-to-prod-1777392306677",
                    "pipelinesascode.tekton.dev/source-project-id": "81724368",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/target-project-id": "81724368",
                    "pipelinesascode.tekton.dev/task-0": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/git-clone.yaml",
                    "pipelinesascode.tekton.dev/task-1": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/gather-deploy-images.yaml",
                    "pipelinesascode.tekton.dev/task-2": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/verify-enterprise-contract.yaml",
                    "pipelinesascode.tekton.dev/task-3": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/gather-deploy-images.yaml",
                    "pipelinesascode.tekton.dev/task-4": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/download-sbom-from-url-in-attestation.yaml",
                    "pipelinesascode.tekton.dev/task-5": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/upload-sbom-to-trustification.yaml",
                    "pipelinesascode.tekton.dev/task-6": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/fetch-gitops-images.yaml",
                    "pipelinesascode.tekton.dev/task-7": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/verify-gitops-conforma.yaml",
                    "pipelinesascode.tekton.dev/task-8": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/download-gitops-sbom.yaml",
                    "pipelinesascode.tekton.dev/task-9": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/upload-gitops-sbom.yaml",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax-gitops",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "tssc-app-ci/results/6562839e-6164-47ff-a1e5-606e8f91821a/records/b865c380-59d7-4500-b099-5c7cb2ac2e89",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"e2e-tests-go-eciytfax-gitops\",\"commit\":\"e395df7e0e4c64ad86da082463949a155dd916ac\",\"eventType\":\"Merge Request\",\"pull_request-id\":2}",
                    "results.tekton.dev/result": "tssc-app-ci/results/6562839e-6164-47ff-a1e5-606e8f91821a",
                    "results.tekton.dev/stored": "true"
                },
                "creationTimestamp": "2026-04-28T16:05:30Z",
                "finalizers": [
                    "chains.tekton.dev/taskrun",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/part-of": "e2e-tests-go-eciytfax",
                    "app.kubernetes.io/version": "v0.39.5",
                    "argocd/app-name": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-id": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-namespace": "tssc-app",
                    "janus-idp.io/tekton": "e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/event-type": "Merge_Request",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-gitops-on-pull-request",
                    "pipelinesascode.tekton.dev/pull-request": "2",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-gitops-repository",
                    "pipelinesascode.tekton.dev/sha": "e395df7e0e4c64ad86da082463949a155dd916ac",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax-gitops",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "e2e-tests-go-eciytfax-gitops-on-pull-request-xrtvv",
                    "tekton.dev/pipelineRun": "e2e-tests-go-eciytfax-gitops-on-pull-request-xrtvv",
                    "tekton.dev/pipelineRunUID": "6562839e-6164-47ff-a1e5-606e8f91821a",
                    "tekton.dev/pipelineTask": "get-images"
                },
                "name": "e2e-tests-go-eciytfax-gitops-on-pull-request-xrtvv-get-images",
                "namespace": "tssc-app-ci",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "e2e-tests-go-eciytfax-gitops-on-pull-request-xrtvv",
                        "uid": "6562839e-6164-47ff-a1e5-606e8f91821a"
                    }
                ],
                "resourceVersion": "45902",
                "uid": "b865c380-59d7-4500-b099-5c7cb2ac2e89"
            },
            "spec": {
                "params": [
                    {
                        "name": "PUBLIC_KEY_URL",
                        "value": "k8s://tssc-app-ci/cosign-pub"
                    },
                    {
                        "name": "TARGET_BRANCH",
                        "value": "main"
                    }
                ],
                "serviceAccountName": "pipeline",
                "taskSpec": {
                    "description": "Extract images from deployment YAML to pass to Conforma for validation",
                    "params": [
                        {
                            "default": "",
                            "description": "Public key used to verify signatures. Must be a valid k8s cosign reference, e.g. k8s://my-space/my-secret where my-secret contains the expected cosign.pub attribute.",
                            "name": "PUBLIC_KEY_URL",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "If specified, will gather only the images that changed between the current revision and the target branch. Useful for pull requests. Note that the repository cloned on the source workspace must already contain the origin/$TARGET_BRANCH reference.\n",
                            "name": "TARGET_BRANCH",
                            "type": "string"
                        },
                        {
                            "default": [
                                "development",
                                "stage",
                                "prod"
                            ],
                            "description": "Gather images from the manifest files for the specified environments",
                            "name": "ENVIRONMENTS",
                            "type": "array"
                        }
                    ],
                    "results": [
                        {
                            "description": "Cosign base64 encoded public key fetched from secrets.",
                            "name": "COSIGN_PUBLIC_KEY",
                            "type": "string"
                        },
                        {
                            "description": "The images with SBOMs to upload to Trustification \n",
                            "name": "SBOM_IMAGES",
                            "type": "string"
                        },
                        {
                            "description": "The images to be verified, in a format compatible with https://github.com/konflux-ci/build-definitions/tree/main/task/verify-enterprise-contract/0.1. When there are no images to verify, this is an empty string.\n",
                            "name": "CONFORMA_IMAGES",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "CI_TYPE",
                                "value": "tekton"
                            },
                            {
                                "name": "TARGET_BRANCH",
                                "value": "$(params.TARGET_BRANCH)"
                            },
                            {
                                "name": "PUBLIC_KEY_URL",
                                "value": "$(params.PUBLIC_KEY_URL)"
                            }
                        ],
                        "workingDir": "$(workspaces.source.path)/source"
                    },
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "TARGET_BRANCH",
                                    "value": "$(params.TARGET_BRANCH)"
                                },
                                {
                                    "name": "PUBLIC_KEY_URL",
                                    "value": "$(params.PUBLIC_KEY_URL)"
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "init",
                            "script": "pwd\nls -la\n# Sync scripts to the writable workspace\ncp -rf /work/tssc/ $(workspaces.source.path)/\n# Append the dummy function to common.sh\nprintf '\\nfunction registry-login() {\\n  echo \"--- Registry Auth Bypass Active ---\"\\n  return 0\\n}\\n' \u003e\u003e $(workspaces.source.path)/tssc/common.sh\necho \"Successfully patched $(workspaces.source.path)/tssc/common.sh\"\n\necho \"Parsing public key url\"\nCLEAN_URL=\"${PUBLIC_KEY_URL#k8s://}\"\nNS=\"${CLEAN_URL%/*}\"\nSECRET=\"${CLEAN_URL##*/}\"\nCOSIGN_PUBLIC_KEY=$(oc get secrets $SECRET -n $NS -o json | jq -r '.data.\"cosign.pub\"')\necho $COSIGN_PUBLIC_KEY \u003e $(results.COSIGN_PUBLIC_KEY.path)\n",
                            "workingDir": "$(workspaces.source.path)/source"
                        },
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "TARGET_BRANCH",
                                    "value": "$(params.TARGET_BRANCH)"
                                },
                                {
                                    "name": "PUBLIC_KEY_URL",
                                    "value": "$(params.PUBLIC_KEY_URL)"
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "get-images",
                            "script": "echo \"running gather-images-to-upload-sbom\"\n$(workspaces.source.path)/tssc/gather-images-to-upload-sbom.sh\nmv ./results/gather-deploy-images ./results/sbom-images \ncat ./results/sbom-images/IMAGES_TO_VERIFY \u003e $(results.SBOM_IMAGES.path)\n\necho \"running gather-deploy-images\"\n$(workspaces.source.path)/tssc/gather-deploy-images.sh\ncat ./results/gather-deploy-images/IMAGES_TO_VERIFY \u003e $(results.CONFORMA_IMAGES.path)\n",
                            "workingDir": "$(workspaces.source.path)/source"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "Should contain a cloned gitops repo at the ./source subpath",
                            "name": "source"
                        }
                    ]
                },
                "timeout": "1h0m0s",
                "workspaces": [
                    {
                        "name": "source",
                        "persistentVolumeClaim": {
                            "claimName": "pvc-608e6ce161"
                        }
                    }
                ]
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-28T16:05:36Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-28T16:05:36Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "e2e-tests-go-eciytfax-gitop176c487e000f0b28e48a3efbb1450eec-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    }
                },
                "results": [
                    {
                        "name": "COSIGN_PUBLIC_KEY",
                        "type": "string",
                        "value": "LS0tLS1CRUdJTiBQVUJMSUMgS0VZLS0tLS0KTUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFbERobEtmeUdBdkFiOWU2KzAxbmFwbWFtdUZEYwp6clZsNVVzSkxtUWVUc1Z0N0J6SFUwQThwdENkT2dzcFJTS2cyQ3J6ajlkZEg4cjVWZ05NOWhEelFRPT0KLS0tLS1FTkQgUFVCTElDIEtFWS0tLS0tCg==\n"
                    },
                    {
                        "name": "CONFORMA_IMAGES",
                        "type": "string",
                        "value": "{\"components\":[{\"containerImage\":\"nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc\"}]}\n"
                    },
                    {
                        "name": "SBOM_IMAGES",
                        "type": "string",
                        "value": "{\"components\":[{\"containerImage\":\"nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc\"}]}\n"
                    }
                ],
                "startTime": "2026-04-28T16:05:30Z",
                "steps": [
                    {
                        "container": "step-init",
                        "imageID": "quay.io/redhat-tssc/task-runner@sha256:db633cb62eb097a46ca9e3e0a54d21c8ebd444f81a074ce1f1afa61956185dbf",
                        "name": "init",
                        "provenance": {},
                        "terminated": {
                            "containerID": "cri-o://82fc82e9f6fce070a84f6c9adc3007e5e8b7835af94a8793b176b23909788513",
                            "exitCode": 0,
                            "finishedAt": "2026-04-28T16:05:36Z",
                            "message": "[{\"key\":\"COSIGN_PUBLIC_KEY\",\"value\":\"LS0tLS1CRUdJTiBQVUJMSUMgS0VZLS0tLS0KTUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFbERobEtmeUdBdkFiOWU2KzAxbmFwbWFtdUZEYwp6clZsNVVzSkxtUWVUc1Z0N0J6SFUwQThwdENkT2dzcFJTS2cyQ3J6ajlkZEg4cjVWZ05NOWhEelFRPT0KLS0tLS1FTkQgUFVCTElDIEtFWS0tLS0tCg==\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-28T16:05:36Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-get-images",
                        "imageID": "quay.io/redhat-tssc/task-runner@sha256:db633cb62eb097a46ca9e3e0a54d21c8ebd444f81a074ce1f1afa61956185dbf",
                        "name": "get-images",
                        "provenance": {},
                        "terminated": {
                            "containerID": "cri-o://49220abcfd43cfe465ddd43b1f85a5a97ec5a7fbccf3be4710f5da7d827ef5d3",
                            "exitCode": 0,
                            "finishedAt": "2026-04-28T16:05:36Z",
                            "message": "[{\"key\":\"CONFORMA_IMAGES\",\"value\":\"{\\\"components\\\":[{\\\"containerImage\\\":\\\"nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc\\\"}]}\\n\",\"type\":1},{\"key\":\"COSIGN_PUBLIC_KEY\",\"value\":\"LS0tLS1CRUdJTiBQVUJMSUMgS0VZLS0tLS0KTUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFbERobEtmeUdBdkFiOWU2KzAxbmFwbWFtdUZEYwp6clZsNVVzSkxtUWVUc1Z0N0J6SFUwQThwdENkT2dzcFJTS2cyQ3J6ajlkZEg4cjVWZ05NOWhEelFRPT0KLS0tLS1FTkQgUFVCTElDIEtFWS0tLS0tCg==\\n\",\"type\":1},{\"key\":\"SBOM_IMAGES\",\"value\":\"{\\\"components\\\":[{\\\"containerImage\\\":\\\"nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc\\\"}]}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-28T16:05:36Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Extract images from deployment YAML to pass to Conforma for validation",
                    "params": [
                        {
                            "default": "",
                            "description": "Public key used to verify signatures. Must be a valid k8s cosign reference, e.g. k8s://my-space/my-secret where my-secret contains the expected cosign.pub attribute.",
                            "name": "PUBLIC_KEY_URL",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "If specified, will gather only the images that changed between the current revision and the target branch. Useful for pull requests. Note that the repository cloned on the source workspace must already contain the origin/$TARGET_BRANCH reference.\n",
                            "name": "TARGET_BRANCH",
                            "type": "string"
                        },
                        {
                            "default": [
                                "development",
                                "stage",
                                "prod"
                            ],
                            "description": "Gather images from the manifest files for the specified environments",
                            "name": "ENVIRONMENTS",
                            "type": "array"
                        }
                    ],
                    "results": [
                        {
                            "description": "Cosign base64 encoded public key fetched from secrets.",
                            "name": "COSIGN_PUBLIC_KEY",
                            "type": "string"
                        },
                        {
                            "description": "The images with SBOMs to upload to Trustification \n",
                            "name": "SBOM_IMAGES",
                            "type": "string"
                        },
                        {
                            "description": "The images to be verified, in a format compatible with https://github.com/konflux-ci/build-definitions/tree/main/task/verify-enterprise-contract/0.1. When there are no images to verify, this is an empty string.\n",
                            "name": "CONFORMA_IMAGES",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "CI_TYPE",
                                "value": "tekton"
                            },
                            {
                                "name": "TARGET_BRANCH",
                                "value": "main"
                            },
                            {
                                "name": "PUBLIC_KEY_URL",
                                "value": "k8s://tssc-app-ci/cosign-pub"
                            }
                        ],
                        "workingDir": "/workspace/source/source"
                    },
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "TARGET_BRANCH",
                                    "value": "main"
                                },
                                {
                                    "name": "PUBLIC_KEY_URL",
                                    "value": "k8s://tssc-app-ci/cosign-pub"
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "init",
                            "script": "pwd\nls -la\n# Sync scripts to the writable workspace\ncp -rf /work/tssc/ /workspace/source/\n# Append the dummy function to common.sh\nprintf '\\nfunction registry-login() {\\n  echo \"--- Registry Auth Bypass Active ---\"\\n  return 0\\n}\\n' \u003e\u003e /workspace/source/tssc/common.sh\necho \"Successfully patched /workspace/source/tssc/common.sh\"\n\necho \"Parsing public key url\"\nCLEAN_URL=\"${PUBLIC_KEY_URL#k8s://}\"\nNS=\"${CLEAN_URL%/*}\"\nSECRET=\"${CLEAN_URL##*/}\"\nCOSIGN_PUBLIC_KEY=$(oc get secrets $SECRET -n $NS -o json | jq -r '.data.\"cosign.pub\"')\necho $COSIGN_PUBLIC_KEY \u003e /tekton/results/COSIGN_PUBLIC_KEY\n",
                            "workingDir": "/workspace/source/source"
                        },
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "TARGET_BRANCH",
                                    "value": "main"
                                },
                                {
                                    "name": "PUBLIC_KEY_URL",
                                    "value": "k8s://tssc-app-ci/cosign-pub"
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "get-images",
                            "script": "echo \"running gather-images-to-upload-sbom\"\n/workspace/source/tssc/gather-images-to-upload-sbom.sh\nmv ./results/gather-deploy-images ./results/sbom-images \ncat ./results/sbom-images/IMAGES_TO_VERIFY \u003e /tekton/results/SBOM_IMAGES\n\necho \"running gather-deploy-images\"\n/workspace/source/tssc/gather-deploy-images.sh\ncat ./results/gather-deploy-images/IMAGES_TO_VERIFY \u003e /tekton/results/CONFORMA_IMAGES\n",
                            "workingDir": "/workspace/source/source"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "Should contain a cloned gitops repo at the ./source subpath",
                            "name": "source"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "https://rekor-server-tssc-tas.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/api/v1/log/entries?logIndex=39",
                    "pipeline.tekton.dev/affinity-assistant": "affinity-assistant-d8ea942d58",
                    "pipeline.tekton.dev/release": "8910674cb953317a4373f33822024b9de8c5fa22",
                    "pipelinesascode.tekton.dev/branch": "main",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "Merge Request",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-qaegwq",
                    "pipelinesascode.tekton.dev/git-provider": "gitlab",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/k8s/ns/tssc-app-ci/tekton.dev~v1~PipelineRun/e2e-tests-go-eciytfax-gitops-on-pull-request-xrtvv",
                    "pipelinesascode.tekton.dev/on-event": "[pull_request]",
                    "pipelinesascode.tekton.dev/on-target-branch": "[main]",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-gitops-on-pull-request",
                    "pipelinesascode.tekton.dev/pipeline": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/pipelines/gitops-pull-request-tssc.yaml",
                    "pipelinesascode.tekton.dev/pull-request": "2",
                    "pipelinesascode.tekton.dev/repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-gitops-repository",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-qe-test",
                    "pipelinesascode.tekton.dev/sha": "e395df7e0e4c64ad86da082463949a155dd916ac",
                    "pipelinesascode.tekton.dev/sha-title": "Promote to prod environment",
                    "pipelinesascode.tekton.dev/sha-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops/-/commit/e395df7e0e4c64ad86da082463949a155dd916ac",
                    "pipelinesascode.tekton.dev/source-branch": "promote-to-prod-1777392306677",
                    "pipelinesascode.tekton.dev/source-project-id": "81724368",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax-gitops",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/target-project-id": "81724368",
                    "pipelinesascode.tekton.dev/task-0": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/git-clone.yaml",
                    "pipelinesascode.tekton.dev/task-1": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/gather-deploy-images.yaml",
                    "pipelinesascode.tekton.dev/task-2": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/verify-enterprise-contract.yaml",
                    "pipelinesascode.tekton.dev/task-3": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/gather-deploy-images.yaml",
                    "pipelinesascode.tekton.dev/task-4": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/download-sbom-from-url-in-attestation.yaml",
                    "pipelinesascode.tekton.dev/task-5": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/upload-sbom-to-trustification.yaml",
                    "pipelinesascode.tekton.dev/task-6": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/fetch-gitops-images.yaml",
                    "pipelinesascode.tekton.dev/task-7": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/verify-gitops-conforma.yaml",
                    "pipelinesascode.tekton.dev/task-8": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/download-gitops-sbom.yaml",
                    "pipelinesascode.tekton.dev/task-9": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/upload-gitops-sbom.yaml",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax-gitops",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "tssc-app-ci/results/6562839e-6164-47ff-a1e5-606e8f91821a/records/cc665f12-de19-4ce9-a031-894365299f68",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"e2e-tests-go-eciytfax-gitops\",\"commit\":\"e395df7e0e4c64ad86da082463949a155dd916ac\",\"eventType\":\"Merge Request\",\"pull_request-id\":2}",
                    "results.tekton.dev/result": "tssc-app-ci/results/6562839e-6164-47ff-a1e5-606e8f91821a",
                    "results.tekton.dev/stored": "true"
                },
                "creationTimestamp": "2026-04-28T16:05:44Z",
                "finalizers": [
                    "chains.tekton.dev/taskrun",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/part-of": "e2e-tests-go-eciytfax",
                    "app.kubernetes.io/version": "v0.39.5",
                    "argocd/app-name": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-id": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-namespace": "tssc-app",
                    "janus-idp.io/tekton": "e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/event-type": "Merge_Request",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-gitops-on-pull-request",
                    "pipelinesascode.tekton.dev/pull-request": "2",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-gitops-repository",
                    "pipelinesascode.tekton.dev/sha": "e395df7e0e4c64ad86da082463949a155dd916ac",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax-gitops",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "e2e-tests-go-eciytfax-gitops-on-pull-request-xrtvv",
                    "tekton.dev/pipelineRun": "e2e-tests-go-eciytfax-gitops-on-pull-request-xrtvv",
                    "tekton.dev/pipelineRunUID": "6562839e-6164-47ff-a1e5-606e8f91821a",
                    "tekton.dev/pipelineTask": "upload-sboms"
                },
                "name": "e2e-tests-go-eciytfax-gitops-on-pull-request-xrtvv-upload-sboms",
                "namespace": "tssc-app-ci",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "e2e-tests-go-eciytfax-gitops-on-pull-request-xrtvv",
                        "uid": "6562839e-6164-47ff-a1e5-606e8f91821a"
                    }
                ],
                "resourceVersion": "46141",
                "uid": "cc665f12-de19-4ce9-a031-894365299f68"
            },
            "spec": {
                "params": [
                    {
                        "name": "TPA_SECRET",
                        "value": "tpa-secret"
                    }
                ],
                "serviceAccountName": "pipeline",
                "taskSpec": {
                    "description": "Upload SBOMs to Trustification",
                    "params": [
                        {
                            "description": "TPA Secret to obtain Trustification vars from.",
                            "name": "TPA_SECRET",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "CI_TYPE",
                                "value": "tekton"
                            },
                            {
                                "name": "TRUSTIFICATION_BOMBASTIC_API_URL",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "bombastic_api_url",
                                        "name": "$(params.TPA_SECRET)"
                                    }
                                }
                            },
                            {
                                "name": "TRUSTIFICATION_OIDC_CLIENT_ID",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "oidc_client_id",
                                        "name": "$(params.TPA_SECRET)"
                                    }
                                }
                            },
                            {
                                "name": "TRUSTIFICATION_OIDC_CLIENT_SECRET",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "oidc_client_secret",
                                        "name": "$(params.TPA_SECRET)"
                                    }
                                }
                            },
                            {
                                "name": "TRUSTIFICATION_OIDC_ISSUER_URL",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "oidc_issuer_url",
                                        "name": "$(params.TPA_SECRET)"
                                    }
                                }
                            },
                            {
                                "name": "TRUSTIFICATION_SUPPORTED_CYCLONEDX_VERSION",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "supported_cyclonedx_version",
                                        "name": "$(params.TPA_SECRET)"
                                    }
                                }
                            }
                        ],
                        "workingDir": "$(workspaces.source.path)/source"
                    },
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "TRUSTIFICATION_BOMBASTIC_API_URL",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "bombastic_api_url",
                                            "name": "$(params.TPA_SECRET)"
                                        }
                                    }
                                },
                                {
                                    "name": "TRUSTIFICATION_OIDC_CLIENT_ID",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "oidc_client_id",
                                            "name": "$(params.TPA_SECRET)"
                                        }
                                    }
                                },
                                {
                                    "name": "TRUSTIFICATION_OIDC_CLIENT_SECRET",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "oidc_client_secret",
                                            "name": "$(params.TPA_SECRET)"
                                        }
                                    }
                                },
                                {
                                    "name": "TRUSTIFICATION_OIDC_ISSUER_URL",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "oidc_issuer_url",
                                            "name": "$(params.TPA_SECRET)"
                                        }
                                    }
                                },
                                {
                                    "name": "TRUSTIFICATION_SUPPORTED_CYCLONEDX_VERSION",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "supported_cyclonedx_version",
                                            "name": "$(params.TPA_SECRET)"
                                        }
                                    }
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "upload",
                            "script": "echo \"running upload-sbom-to-trustification\"\n$(workspaces.source.path)/tssc/upload-sbom-to-trustification.sh\n",
                            "workingDir": "$(workspaces.source.path)/source"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "Should contain a cloned gitops repo at the ./source subpath",
                            "name": "source"
                        }
                    ]
                },
                "timeout": "1h0m0s",
                "workspaces": [
                    {
                        "name": "source",
                        "persistentVolumeClaim": {
                            "claimName": "pvc-608e6ce161"
                        }
                    }
                ]
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-28T16:05:50Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-28T16:05:50Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "e2e-tests-go-eciytfax-gitop26117b165b55133ad3705b252e2e7713-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    }
                },
                "startTime": "2026-04-28T16:05:44Z",
                "steps": [
                    {
                        "container": "step-upload",
                        "imageID": "quay.io/redhat-tssc/task-runner@sha256:db633cb62eb097a46ca9e3e0a54d21c8ebd444f81a074ce1f1afa61956185dbf",
                        "name": "upload",
                        "provenance": {},
                        "terminated": {
                            "containerID": "cri-o://21ee6195cab6c5ea5840cde6ab0d0be997264a2a05ac7d4d53796c8d73c19100",
                            "exitCode": 0,
                            "finishedAt": "2026-04-28T16:05:50Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-28T16:05:50Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Upload SBOMs to Trustification",
                    "params": [
                        {
                            "description": "TPA Secret to obtain Trustification vars from.",
                            "name": "TPA_SECRET",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "CI_TYPE",
                                "value": "tekton"
                            },
                            {
                                "name": "TRUSTIFICATION_BOMBASTIC_API_URL",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "bombastic_api_url",
                                        "name": "tpa-secret"
                                    }
                                }
                            },
                            {
                                "name": "TRUSTIFICATION_OIDC_CLIENT_ID",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "oidc_client_id",
                                        "name": "tpa-secret"
                                    }
                                }
                            },
                            {
                                "name": "TRUSTIFICATION_OIDC_CLIENT_SECRET",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "oidc_client_secret",
                                        "name": "tpa-secret"
                                    }
                                }
                            },
                            {
                                "name": "TRUSTIFICATION_OIDC_ISSUER_URL",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "oidc_issuer_url",
                                        "name": "tpa-secret"
                                    }
                                }
                            },
                            {
                                "name": "TRUSTIFICATION_SUPPORTED_CYCLONEDX_VERSION",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "supported_cyclonedx_version",
                                        "name": "tpa-secret"
                                    }
                                }
                            }
                        ],
                        "workingDir": "/workspace/source/source"
                    },
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "TRUSTIFICATION_BOMBASTIC_API_URL",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "bombastic_api_url",
                                            "name": "tpa-secret"
                                        }
                                    }
                                },
                                {
                                    "name": "TRUSTIFICATION_OIDC_CLIENT_ID",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "oidc_client_id",
                                            "name": "tpa-secret"
                                        }
                                    }
                                },
                                {
                                    "name": "TRUSTIFICATION_OIDC_CLIENT_SECRET",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "oidc_client_secret",
                                            "name": "tpa-secret"
                                        }
                                    }
                                },
                                {
                                    "name": "TRUSTIFICATION_OIDC_ISSUER_URL",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "oidc_issuer_url",
                                            "name": "tpa-secret"
                                        }
                                    }
                                },
                                {
                                    "name": "TRUSTIFICATION_SUPPORTED_CYCLONEDX_VERSION",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "supported_cyclonedx_version",
                                            "name": "tpa-secret"
                                        }
                                    }
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "upload",
                            "script": "echo \"running upload-sbom-to-trustification\"\n/workspace/source/tssc/upload-sbom-to-trustification.sh\n",
                            "workingDir": "/workspace/source/source"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "Should contain a cloned gitops repo at the ./source subpath",
                            "name": "source"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.redhat.com/build-type": "docker",
                    "build.appstudio.redhat.com/task-name": "build-workload",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "https://rekor-server-tssc-tas.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/api/v1/log/entries?logIndex=2",
                    "pipeline.tekton.dev/affinity-assistant": "affinity-assistant-f53ad6fc68",
                    "pipeline.tekton.dev/release": "8910674cb953317a4373f33822024b9de8c5fa22",
                    "pipelinesascode.tekton.dev/branch": "main",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "Merge Request",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-mgzism",
                    "pipelinesascode.tekton.dev/git-provider": "gitlab",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/k8s/ns/tssc-app-ci/tekton.dev~v1~PipelineRun/e2e-tests-go-eciytfax-on-pull-request-mrdzj",
                    "pipelinesascode.tekton.dev/max-keep-runs": "2",
                    "pipelinesascode.tekton.dev/on-event": "[pull_request]",
                    "pipelinesascode.tekton.dev/on-target-branch": "[main]",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-on-pull-request",
                    "pipelinesascode.tekton.dev/pipeline": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/pipelines/docker-build-tssc.yaml",
                    "pipelinesascode.tekton.dev/pull-request": "1",
                    "pipelinesascode.tekton.dev/repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-repository",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-qe-test",
                    "pipelinesascode.tekton.dev/sha": "ef9a55fab5ef515b87eb96a4ff9102565595f5f4",
                    "pipelinesascode.tekton.dev/sha-title": "Test MR from TSSC e2e test",
                    "pipelinesascode.tekton.dev/sha-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax/-/commit/ef9a55fab5ef515b87eb96a4ff9102565595f5f4",
                    "pipelinesascode.tekton.dev/source-branch": "test-branch-1777391866587",
                    "pipelinesascode.tekton.dev/source-project-id": "81724388",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/target-project-id": "81724388",
                    "pipelinesascode.tekton.dev/task-0": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/init.yaml",
                    "pipelinesascode.tekton.dev/task-1": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/git-clone.yaml",
                    "pipelinesascode.tekton.dev/task-10": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/deploy-workload.yaml",
                    "pipelinesascode.tekton.dev/task-11": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/scan-workload.yaml",
                    "pipelinesascode.tekton.dev/task-12": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/summarize-workload.yaml",
                    "pipelinesascode.tekton.dev/task-13": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/show-workload-sbom.yaml",
                    "pipelinesascode.tekton.dev/task-14": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/deploy-workload-check.yaml",
                    "pipelinesascode.tekton.dev/task-2": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/buildah-rhtap.yaml",
                    "pipelinesascode.tekton.dev/task-3": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/acs-image-check.yaml",
                    "pipelinesascode.tekton.dev/task-4": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/acs-image-scan.yaml",
                    "pipelinesascode.tekton.dev/task-5": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/acs-deploy-check.yaml",
                    "pipelinesascode.tekton.dev/task-6": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/update-deployment.yaml",
                    "pipelinesascode.tekton.dev/task-7": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/show-sbom-rhdh.yaml",
                    "pipelinesascode.tekton.dev/task-8": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/summary.yaml",
                    "pipelinesascode.tekton.dev/task-9": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/build-workload.yaml",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "tssc-app-ci/results/cc51d2ff-0302-4b38-a87c-a1c40cccb31d/records/de6e500d-5b46-4f95-8ffe-5f1b47ca992c",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"e2e-tests-go-eciytfax\",\"commit\":\"ef9a55fab5ef515b87eb96a4ff9102565595f5f4\",\"eventType\":\"Merge Request\",\"pull_request-id\":1}",
                    "results.tekton.dev/result": "tssc-app-ci/results/cc51d2ff-0302-4b38-a87c-a1c40cccb31d",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "containers, tssc"
                },
                "creationTimestamp": "2026-04-28T15:58:08Z",
                "finalizers": [
                    "chains.tekton.dev/taskrun",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/part-of": "e2e-tests-go-eciytfax",
                    "app.kubernetes.io/version": "v0.39.5",
                    "argocd/app-name": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-id": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-namespace": "tssc-app",
                    "build.appstudio.redhat.com/build_type": "docker",
                    "janus-idp.io/tekton": "e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/event-type": "Merge_Request",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-on-pull-request",
                    "pipelinesascode.tekton.dev/pull-request": "1",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-repository",
                    "pipelinesascode.tekton.dev/sha": "ef9a55fab5ef515b87eb96a4ff9102565595f5f4",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "e2e-tests-go-eciytfax-on-pull-request-mrdzj",
                    "tekton.dev/pipelineRun": "e2e-tests-go-eciytfax-on-pull-request-mrdzj",
                    "tekton.dev/pipelineRunUID": "cc51d2ff-0302-4b38-a87c-a1c40cccb31d",
                    "tekton.dev/pipelineTask": "build"
                },
                "name": "e2e-tests-go-eciytfax-on-pull-request-mrdzj-build",
                "namespace": "tssc-app-ci",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "e2e-tests-go-eciytfax-on-pull-request-mrdzj",
                        "uid": "cc51d2ff-0302-4b38-a87c-a1c40cccb31d"
                    }
                ],
                "resourceVersion": "39047",
                "uid": "de6e500d-5b46-4f95-8ffe-5f1b47ca992c"
            },
            "spec": {
                "params": [
                    {
                        "name": "rox-secret-name",
                        "value": "rox-api-token"
                    },
                    {
                        "name": "gitops-secret-name",
                        "value": "gitlab-auth-secret"
                    },
                    {
                        "name": "cosign-public-secret-name",
                        "value": "cosign-pub"
                    },
                    {
                        "name": "tpa_secret_name",
                        "value": "tpa-secret"
                    },
                    {
                        "name": "IMAGE",
                        "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:on-pr-ef9a55fab5ef515b87eb96a4ff9102565595f5f4"
                    },
                    {
                        "name": "DOCKERFILE",
                        "value": "docker/Dockerfile"
                    },
                    {
                        "name": "CONTEXT",
                        "value": "."
                    },
                    {
                        "name": "IMAGE_EXPIRES_AFTER",
                        "value": "5d"
                    },
                    {
                        "name": "COMMIT_SHA",
                        "value": "ef9a55fab5ef515b87eb96a4ff9102565595f5f4"
                    },
                    {
                        "name": "BUILD_ARGS",
                        "value": []
                    },
                    {
                        "name": "BUILD_ARGS_FILE",
                        "value": ""
                    }
                ],
                "serviceAccountName": "pipeline",
                "taskSpec": {
                    "description": "Builds source code into a container image and pushes the image into container registry using buildah tool.\nIn addition it generates a SBOM file, injects the SBOM file into final container image and pushes the SBOM file as separate image using cosign tool.",
                    "params": [
                        {
                            "description": "Reference of the image buildah will produce.",
                            "name": "IMAGE",
                            "type": "string"
                        },
                        {
                            "default": "./Dockerfile",
                            "description": "Path to the Dockerfile to build.",
                            "name": "DOCKERFILE",
                            "type": "string"
                        },
                        {
                            "default": ".",
                            "description": "Path to the directory to use as context.",
                            "name": "CONTEXT",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Verify the TLS on the registry endpoint (for push/pull to a non-TLS registry)",
                            "name": "TLSVERIFY",
                            "type": "string"
                        },
                        {
                            "default": [],
                            "description": "Array of --build-arg values (\"arg=value\" strings)",
                            "name": "BUILD_ARGS",
                            "type": "array"
                        },
                        {
                            "default": "",
                            "description": "Path to a file with build arguments, see https://www.mankier.com/1/buildah-build#--build-arg-file",
                            "name": "BUILD_ARGS_FILE",
                            "type": "string"
                        },
                        {
                            "default": "vfs",
                            "description": "Storage driver to configure for buildah",
                            "name": "STORAGE_DRIVER",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Digest of the image just built",
                            "name": "IMAGE_DIGEST",
                            "type": "string"
                        },
                        {
                            "description": "Image repository and tag where the built image was pushed",
                            "name": "IMAGE_URL",
                            "type": "string"
                        },
                        {
                            "description": "Digests of the base images used for build",
                            "name": "BASE_IMAGES_DIGESTS",
                            "type": "string"
                        },
                        {
                            "description": "Link to the SBOM layer pushed to the registry as part of an OCI artifact.",
                            "name": "SBOM_BLOB_URL",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "CI_TYPE",
                                "value": "tekton"
                            },
                            {
                                "name": "STORAGE_DRIVER",
                                "value": "$(params.STORAGE_DRIVER)"
                            },
                            {
                                "name": "CONTEXT",
                                "value": "$(params.CONTEXT)"
                            },
                            {
                                "name": "DOCKERFILE",
                                "value": "$(params.DOCKERFILE)"
                            },
                            {
                                "name": "IMAGE",
                                "value": "$(params.IMAGE)"
                            },
                            {
                                "name": "IMAGE_URL",
                                "value": "$(params.IMAGE)"
                            },
                            {
                                "name": "TLSVERIFY",
                                "value": "$(params.TLSVERIFY)"
                            },
                            {
                                "name": "BUILD_ARGS_FILE",
                                "value": "$(params.BUILD_ARGS_FILE)"
                            },
                            {
                                "name": "_BUILDAH_STARTED_IN_USERNS"
                            },
                            {
                                "name": "BUILDAH_ISOLATION",
                                "value": "chroot"
                            },
                            {
                                "name": "COSIGN_SECRET_PASSWORD",
                                "value": "dummy"
                            },
                            {
                                "name": "COSIGN_SECRET_KEY",
                                "value": "dummy"
                            },
                            {
                                "name": "ROX_CENTRAL_ENDPOINT",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "rox-api-endpoint",
                                        "name": "$(params.rox-secret-name)"
                                    }
                                }
                            },
                            {
                                "name": "TRUSTIFICATION_SUPPORTED_CYCLONEDX_VERSION",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "supported_cyclonedx_version",
                                        "name": "$(params.tpa_secret_name)"
                                    }
                                }
                            },
                            {
                                "name": "ROX_API_TOKEN",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "rox-api-token",
                                        "name": "$(params.rox-secret-name)"
                                    }
                                }
                            },
                            {
                                "name": "GITOPS_AUTH_PASSWORD",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "password",
                                        "name": "$(params.gitops-secret-name)"
                                    }
                                }
                            },
                            {
                                "name": "GITOPS_AUTH_USERNAME",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "username",
                                        "name": "$(params.gitops-secret-name)"
                                    }
                                }
                            },
                            {
                                "name": "COSIGN_PUBLIC_KEY",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "cosign.pub",
                                        "name": "$(params.cosign-public-secret-name)"
                                    }
                                }
                            }
                        ],
                        "workingDir": "$(workspaces.source.path)/source"
                    },
                    "steps": [
                        {
                            "args": [
                                "$(params.BUILD_ARGS[*])"
                            ],
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "STORAGE_DRIVER",
                                    "value": "$(params.STORAGE_DRIVER)"
                                },
                                {
                                    "name": "CONTEXT",
                                    "value": "$(params.CONTEXT)"
                                },
                                {
                                    "name": "DOCKERFILE",
                                    "value": "$(params.DOCKERFILE)"
                                },
                                {
                                    "name": "IMAGE",
                                    "value": "$(params.IMAGE)"
                                },
                                {
                                    "name": "IMAGE_URL",
                                    "value": "$(params.IMAGE)"
                                },
                                {
                                    "name": "TLSVERIFY",
                                    "value": "$(params.TLSVERIFY)"
                                },
                                {
                                    "name": "BUILD_ARGS_FILE",
                                    "value": "$(params.BUILD_ARGS_FILE)"
                                },
                                {
                                    "name": "_BUILDAH_STARTED_IN_USERNS"
                                },
                                {
                                    "name": "BUILDAH_ISOLATION",
                                    "value": "chroot"
                                },
                                {
                                    "name": "COSIGN_SECRET_PASSWORD",
                                    "value": "dummy"
                                },
                                {
                                    "name": "COSIGN_SECRET_KEY",
                                    "value": "dummy"
                                },
                                {
                                    "name": "ROX_CENTRAL_ENDPOINT",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "rox-api-endpoint",
                                            "name": "$(params.rox-secret-name)"
                                        }
                                    }
                                },
                                {
                                    "name": "TRUSTIFICATION_SUPPORTED_CYCLONEDX_VERSION",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "supported_cyclonedx_version",
                                            "name": "$(params.tpa_secret_name)"
                                        }
                                    }
                                },
                                {
                                    "name": "ROX_API_TOKEN",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "rox-api-token",
                                            "name": "$(params.rox-secret-name)"
                                        }
                                    }
                                },
                                {
                                    "name": "GITOPS_AUTH_PASSWORD",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "password",
                                            "name": "$(params.gitops-secret-name)"
                                        }
                                    }
                                },
                                {
                                    "name": "GITOPS_AUTH_USERNAME",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "username",
                                            "name": "$(params.gitops-secret-name)"
                                        }
                                    }
                                },
                                {
                                    "name": "COSIGN_PUBLIC_KEY",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "cosign.pub",
                                            "name": "$(params.cosign-public-secret-name)"
                                        }
                                    }
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "init",
                            "script": "# Sync scripts to the writable workspace\ncp -rf /work/tssc/ /workspace/source/\n# Append the dummy function to common.sh\nprintf '\\nfunction registry-login() {\\n  echo \"--- Registry Auth Bypass Active ---\"\\n  return 0\\n}\\n' \u003e\u003e /workspace/source/tssc/common.sh\necho \"Successfully patched /workspace/source/tssc/common.sh\"\necho \"running init\"\npwd\nls -la\n/workspace/source/tssc/init.sh\n",
                            "securityContext": {
                                "capabilities": {
                                    "add": [
                                        "SETFCAP"
                                    ]
                                }
                            },
                            "volumeMounts": [
                                {
                                    "mountPath": "/var/lib/containers",
                                    "name": "varlibcontainers"
                                },
                                {
                                    "mountPath": "/tmp/files",
                                    "name": "tmpfiles"
                                }
                            ],
                            "workingDir": "$(workspaces.source.path)/source"
                        },
                        {
                            "args": [
                                "$(params.BUILD_ARGS[*])"
                            ],
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "STORAGE_DRIVER",
                                    "value": "$(params.STORAGE_DRIVER)"
                                },
                                {
                                    "name": "CONTEXT",
                                    "value": "$(params.CONTEXT)"
                                },
                                {
                                    "name": "DOCKERFILE",
                                    "value": "$(params.DOCKERFILE)"
                                },
                                {
                                    "name": "IMAGE",
                                    "value": "$(params.IMAGE)"
                                },
                                {
                                    "name": "IMAGE_URL",
                                    "value": "$(params.IMAGE)"
                                },
                                {
                                    "name": "TLSVERIFY",
                                    "value": "$(params.TLSVERIFY)"
                                },
                                {
                                    "name": "BUILD_ARGS_FILE",
                                    "value": "$(params.BUILD_ARGS_FILE)"
                                },
                                {
                                    "name": "_BUILDAH_STARTED_IN_USERNS"
                                },
                                {
                                    "name": "BUILDAH_ISOLATION",
                                    "value": "chroot"
                                },
                                {
                                    "name": "COSIGN_SECRET_PASSWORD",
                                    "value": "dummy"
                                },
                                {
                                    "name": "COSIGN_SECRET_KEY",
                                    "value": "dummy"
                                },
                                {
                                    "name": "ROX_CENTRAL_ENDPOINT",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "rox-api-endpoint",
                                            "name": "$(params.rox-secret-name)"
                                        }
                                    }
                                },
                                {
                                    "name": "TRUSTIFICATION_SUPPORTED_CYCLONEDX_VERSION",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "supported_cyclonedx_version",
                                            "name": "$(params.tpa_secret_name)"
                                        }
                                    }
                                },
                                {
                                    "name": "ROX_API_TOKEN",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "rox-api-token",
                                            "name": "$(params.rox-secret-name)"
                                        }
                                    }
                                },
                                {
                                    "name": "GITOPS_AUTH_PASSWORD",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "password",
                                            "name": "$(params.gitops-secret-name)"
                                        }
                                    }
                                },
                                {
                                    "name": "GITOPS_AUTH_USERNAME",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "username",
                                            "name": "$(params.gitops-secret-name)"
                                        }
                                    }
                                },
                                {
                                    "name": "COSIGN_PUBLIC_KEY",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "cosign.pub",
                                            "name": "$(params.cosign-public-secret-name)"
                                        }
                                    }
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "build",
                            "script": "echo \"running buildah-tssc\"\n/workspace/source/tssc/buildah-tssc.sh\ncat ./results/buildah-tssc/BASE_IMAGES_DIGESTS \u003e $(results.BASE_IMAGES_DIGESTS.path)\ncat ./results/buildah-tssc/IMAGE_DIGEST \u003e $(results.IMAGE_DIGEST.path)\ncat ./results/buildah-tssc/IMAGE_URL \u003e $(results.IMAGE_URL.path)\ncat ./results/buildah-tssc/SBOM_BLOB_URL \u003e $(results.SBOM_BLOB_URL.path)\n",
                            "securityContext": {
                                "capabilities": {
                                    "add": [
                                        "SETFCAP"
                                    ]
                                }
                            },
                            "volumeMounts": [
                                {
                                    "mountPath": "/var/lib/containers",
                                    "name": "varlibcontainers"
                                },
                                {
                                    "mountPath": "/tmp/files",
                                    "name": "tmpfiles"
                                }
                            ],
                            "workingDir": "$(workspaces.source.path)/source"
                        }
                    ],
                    "volumes": [
                        {
                            "emptyDir": {},
                            "name": "varlibcontainers"
                        },
                        {
                            "emptyDir": {},
                            "name": "tmpfiles"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "Workspace containing the source code to build.",
                            "name": "source"
                        }
                    ]
                },
                "timeout": "1h0m0s",
                "workspaces": [
                    {
                        "name": "source",
                        "persistentVolumeClaim": {
                            "claimName": "pvc-b52b665ade"
                        }
                    }
                ]
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-28T15:59:42Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-28T15:59:42Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "e2e-tests-go-eciytfax-on-pull-request-mrdzj-build-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    }
                },
                "results": [
                    {
                        "name": "BASE_IMAGES_DIGESTS",
                        "type": "string",
                        "value": "registry.access.redhat.com/ubi9/ubi-micro:latest@sha256:2173487b3b72b1a7b11edc908e9bbf1726f9df46a4f78fd6d19a2bab0a701f38\nregistry.access.redhat.com/ubi9/go-toolset:9.7-1773088126@sha256:6da1160c0e8da15b585560ac6ef7b0179f17686aeaaa477ead6427daf8948fea\n"
                    },
                    {
                        "name": "IMAGE_DIGEST",
                        "type": "string",
                        "value": "sha256:057166a3e913f766116b96637efd0ee4efa6b908c28a41a8379f516b82e2e2fb"
                    },
                    {
                        "name": "IMAGE_URL",
                        "type": "string",
                        "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:on-pr-ef9a55fab5ef515b87eb96a4ff9102565595f5f4"
                    },
                    {
                        "name": "SBOM_BLOB_URL",
                        "type": "string",
                        "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax@sha256:08e711792fbee750bb4a542671ca8d4aff9577dff81def3b52d971d43a5ef32c"
                    }
                ],
                "startTime": "2026-04-28T15:58:08Z",
                "steps": [
                    {
                        "container": "step-init",
                        "imageID": "quay.io/redhat-tssc/task-runner@sha256:db633cb62eb097a46ca9e3e0a54d21c8ebd444f81a074ce1f1afa61956185dbf",
                        "name": "init",
                        "provenance": {},
                        "terminated": {
                            "containerID": "cri-o://44b1f36a9bb8533780481129296050282f84b642376b4fccdf2ede5cfebd8759",
                            "exitCode": 0,
                            "finishedAt": "2026-04-28T15:58:16Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-28T15:58:16Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-build",
                        "imageID": "quay.io/redhat-tssc/task-runner@sha256:db633cb62eb097a46ca9e3e0a54d21c8ebd444f81a074ce1f1afa61956185dbf",
                        "name": "build",
                        "provenance": {},
                        "terminated": {
                            "containerID": "cri-o://7482411b432274e4861a015ca3e3e934ab562b31deba41d8d88706779ad531e2",
                            "exitCode": 0,
                            "finishedAt": "2026-04-28T15:59:42Z",
                            "message": "[{\"key\":\"BASE_IMAGES_DIGESTS\",\"value\":\"registry.access.redhat.com/ubi9/ubi-micro:latest@sha256:2173487b3b72b1a7b11edc908e9bbf1726f9df46a4f78fd6d19a2bab0a701f38\\nregistry.access.redhat.com/ubi9/go-toolset:9.7-1773088126@sha256:6da1160c0e8da15b585560ac6ef7b0179f17686aeaaa477ead6427daf8948fea\\n\",\"type\":1},{\"key\":\"IMAGE_DIGEST\",\"value\":\"sha256:057166a3e913f766116b96637efd0ee4efa6b908c28a41a8379f516b82e2e2fb\",\"type\":1},{\"key\":\"IMAGE_URL\",\"value\":\"nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:on-pr-ef9a55fab5ef515b87eb96a4ff9102565595f5f4\",\"type\":1},{\"key\":\"SBOM_BLOB_URL\",\"value\":\"nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax@sha256:08e711792fbee750bb4a542671ca8d4aff9577dff81def3b52d971d43a5ef32c\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-28T15:58:16Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Builds source code into a container image and pushes the image into container registry using buildah tool.\nIn addition it generates a SBOM file, injects the SBOM file into final container image and pushes the SBOM file as separate image using cosign tool.",
                    "params": [
                        {
                            "description": "Reference of the image buildah will produce.",
                            "name": "IMAGE",
                            "type": "string"
                        },
                        {
                            "default": "./Dockerfile",
                            "description": "Path to the Dockerfile to build.",
                            "name": "DOCKERFILE",
                            "type": "string"
                        },
                        {
                            "default": ".",
                            "description": "Path to the directory to use as context.",
                            "name": "CONTEXT",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Verify the TLS on the registry endpoint (for push/pull to a non-TLS registry)",
                            "name": "TLSVERIFY",
                            "type": "string"
                        },
                        {
                            "default": [],
                            "description": "Array of --build-arg values (\"arg=value\" strings)",
                            "name": "BUILD_ARGS",
                            "type": "array"
                        },
                        {
                            "default": "",
                            "description": "Path to a file with build arguments, see https://www.mankier.com/1/buildah-build#--build-arg-file",
                            "name": "BUILD_ARGS_FILE",
                            "type": "string"
                        },
                        {
                            "default": "vfs",
                            "description": "Storage driver to configure for buildah",
                            "name": "STORAGE_DRIVER",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Digest of the image just built",
                            "name": "IMAGE_DIGEST",
                            "type": "string"
                        },
                        {
                            "description": "Image repository and tag where the built image was pushed",
                            "name": "IMAGE_URL",
                            "type": "string"
                        },
                        {
                            "description": "Digests of the base images used for build",
                            "name": "BASE_IMAGES_DIGESTS",
                            "type": "string"
                        },
                        {
                            "description": "Link to the SBOM layer pushed to the registry as part of an OCI artifact.",
                            "name": "SBOM_BLOB_URL",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "CI_TYPE",
                                "value": "tekton"
                            },
                            {
                                "name": "STORAGE_DRIVER",
                                "value": "vfs"
                            },
                            {
                                "name": "CONTEXT",
                                "value": "."
                            },
                            {
                                "name": "DOCKERFILE",
                                "value": "docker/Dockerfile"
                            },
                            {
                                "name": "IMAGE",
                                "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:on-pr-ef9a55fab5ef515b87eb96a4ff9102565595f5f4"
                            },
                            {
                                "name": "IMAGE_URL",
                                "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:on-pr-ef9a55fab5ef515b87eb96a4ff9102565595f5f4"
                            },
                            {
                                "name": "TLSVERIFY",
                                "value": "true"
                            },
                            {
                                "name": "BUILD_ARGS_FILE"
                            },
                            {
                                "name": "_BUILDAH_STARTED_IN_USERNS"
                            },
                            {
                                "name": "BUILDAH_ISOLATION",
                                "value": "chroot"
                            },
                            {
                                "name": "COSIGN_SECRET_PASSWORD",
                                "value": "dummy"
                            },
                            {
                                "name": "COSIGN_SECRET_KEY",
                                "value": "dummy"
                            },
                            {
                                "name": "ROX_CENTRAL_ENDPOINT",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "rox-api-endpoint",
                                        "name": "rox-api-token"
                                    }
                                }
                            },
                            {
                                "name": "TRUSTIFICATION_SUPPORTED_CYCLONEDX_VERSION",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "supported_cyclonedx_version",
                                        "name": "tpa-secret"
                                    }
                                }
                            },
                            {
                                "name": "ROX_API_TOKEN",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "rox-api-token",
                                        "name": "rox-api-token"
                                    }
                                }
                            },
                            {
                                "name": "GITOPS_AUTH_PASSWORD",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "password",
                                        "name": "gitlab-auth-secret"
                                    }
                                }
                            },
                            {
                                "name": "GITOPS_AUTH_USERNAME",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "username",
                                        "name": "gitlab-auth-secret"
                                    }
                                }
                            },
                            {
                                "name": "COSIGN_PUBLIC_KEY",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "cosign.pub",
                                        "name": "cosign-pub"
                                    }
                                }
                            }
                        ],
                        "workingDir": "/workspace/source/source"
                    },
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "STORAGE_DRIVER",
                                    "value": "vfs"
                                },
                                {
                                    "name": "CONTEXT",
                                    "value": "."
                                },
                                {
                                    "name": "DOCKERFILE",
                                    "value": "docker/Dockerfile"
                                },
                                {
                                    "name": "IMAGE",
                                    "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:on-pr-ef9a55fab5ef515b87eb96a4ff9102565595f5f4"
                                },
                                {
                                    "name": "IMAGE_URL",
                                    "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:on-pr-ef9a55fab5ef515b87eb96a4ff9102565595f5f4"
                                },
                                {
                                    "name": "TLSVERIFY",
                                    "value": "true"
                                },
                                {
                                    "name": "BUILD_ARGS_FILE"
                                },
                                {
                                    "name": "_BUILDAH_STARTED_IN_USERNS"
                                },
                                {
                                    "name": "BUILDAH_ISOLATION",
                                    "value": "chroot"
                                },
                                {
                                    "name": "COSIGN_SECRET_PASSWORD",
                                    "value": "dummy"
                                },
                                {
                                    "name": "COSIGN_SECRET_KEY",
                                    "value": "dummy"
                                },
                                {
                                    "name": "ROX_CENTRAL_ENDPOINT",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "rox-api-endpoint",
                                            "name": "rox-api-token"
                                        }
                                    }
                                },
                                {
                                    "name": "TRUSTIFICATION_SUPPORTED_CYCLONEDX_VERSION",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "supported_cyclonedx_version",
                                            "name": "tpa-secret"
                                        }
                                    }
                                },
                                {
                                    "name": "ROX_API_TOKEN",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "rox-api-token",
                                            "name": "rox-api-token"
                                        }
                                    }
                                },
                                {
                                    "name": "GITOPS_AUTH_PASSWORD",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "password",
                                            "name": "gitlab-auth-secret"
                                        }
                                    }
                                },
                                {
                                    "name": "GITOPS_AUTH_USERNAME",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "username",
                                            "name": "gitlab-auth-secret"
                                        }
                                    }
                                },
                                {
                                    "name": "COSIGN_PUBLIC_KEY",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "cosign.pub",
                                            "name": "cosign-pub"
                                        }
                                    }
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "init",
                            "script": "# Sync scripts to the writable workspace\ncp -rf /work/tssc/ /workspace/source/\n# Append the dummy function to common.sh\nprintf '\\nfunction registry-login() {\\n  echo \"--- Registry Auth Bypass Active ---\"\\n  return 0\\n}\\n' \u003e\u003e /workspace/source/tssc/common.sh\necho \"Successfully patched /workspace/source/tssc/common.sh\"\necho \"running init\"\npwd\nls -la\n/workspace/source/tssc/init.sh\n",
                            "securityContext": {
                                "capabilities": {
                                    "add": [
                                        "SETFCAP"
                                    ]
                                }
                            },
                            "volumeMounts": [
                                {
                                    "mountPath": "/var/lib/containers",
                                    "name": "varlibcontainers"
                                },
                                {
                                    "mountPath": "/tmp/files",
                                    "name": "tmpfiles"
                                }
                            ],
                            "workingDir": "/workspace/source/source"
                        },
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "STORAGE_DRIVER",
                                    "value": "vfs"
                                },
                                {
                                    "name": "CONTEXT",
                                    "value": "."
                                },
                                {
                                    "name": "DOCKERFILE",
                                    "value": "docker/Dockerfile"
                                },
                                {
                                    "name": "IMAGE",
                                    "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:on-pr-ef9a55fab5ef515b87eb96a4ff9102565595f5f4"
                                },
                                {
                                    "name": "IMAGE_URL",
                                    "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:on-pr-ef9a55fab5ef515b87eb96a4ff9102565595f5f4"
                                },
                                {
                                    "name": "TLSVERIFY",
                                    "value": "true"
                                },
                                {
                                    "name": "BUILD_ARGS_FILE"
                                },
                                {
                                    "name": "_BUILDAH_STARTED_IN_USERNS"
                                },
                                {
                                    "name": "BUILDAH_ISOLATION",
                                    "value": "chroot"
                                },
                                {
                                    "name": "COSIGN_SECRET_PASSWORD",
                                    "value": "dummy"
                                },
                                {
                                    "name": "COSIGN_SECRET_KEY",
                                    "value": "dummy"
                                },
                                {
                                    "name": "ROX_CENTRAL_ENDPOINT",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "rox-api-endpoint",
                                            "name": "rox-api-token"
                                        }
                                    }
                                },
                                {
                                    "name": "TRUSTIFICATION_SUPPORTED_CYCLONEDX_VERSION",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "supported_cyclonedx_version",
                                            "name": "tpa-secret"
                                        }
                                    }
                                },
                                {
                                    "name": "ROX_API_TOKEN",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "rox-api-token",
                                            "name": "rox-api-token"
                                        }
                                    }
                                },
                                {
                                    "name": "GITOPS_AUTH_PASSWORD",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "password",
                                            "name": "gitlab-auth-secret"
                                        }
                                    }
                                },
                                {
                                    "name": "GITOPS_AUTH_USERNAME",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "username",
                                            "name": "gitlab-auth-secret"
                                        }
                                    }
                                },
                                {
                                    "name": "COSIGN_PUBLIC_KEY",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "cosign.pub",
                                            "name": "cosign-pub"
                                        }
                                    }
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "build",
                            "script": "echo \"running buildah-tssc\"\n/workspace/source/tssc/buildah-tssc.sh\ncat ./results/buildah-tssc/BASE_IMAGES_DIGESTS \u003e /tekton/results/BASE_IMAGES_DIGESTS\ncat ./results/buildah-tssc/IMAGE_DIGEST \u003e /tekton/results/IMAGE_DIGEST\ncat ./results/buildah-tssc/IMAGE_URL \u003e /tekton/results/IMAGE_URL\ncat ./results/buildah-tssc/SBOM_BLOB_URL \u003e /tekton/results/SBOM_BLOB_URL\n",
                            "securityContext": {
                                "capabilities": {
                                    "add": [
                                        "SETFCAP"
                                    ]
                                }
                            },
                            "volumeMounts": [
                                {
                                    "mountPath": "/var/lib/containers",
                                    "name": "varlibcontainers"
                                },
                                {
                                    "mountPath": "/tmp/files",
                                    "name": "tmpfiles"
                                }
                            ],
                            "workingDir": "/workspace/source/source"
                        }
                    ],
                    "volumes": [
                        {
                            "emptyDir": {},
                            "name": "varlibcontainers"
                        },
                        {
                            "emptyDir": {},
                            "name": "tmpfiles"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "Workspace containing the source code to build.",
                            "name": "source"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "https://rekor-server-tssc-tas.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/api/v1/log/entries?logIndex=0",
                    "pipeline.tekton.dev/affinity-assistant": "affinity-assistant-f53ad6fc68",
                    "pipeline.tekton.dev/release": "8910674cb953317a4373f33822024b9de8c5fa22",
                    "pipelinesascode.tekton.dev/branch": "main",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "Merge Request",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-mgzism",
                    "pipelinesascode.tekton.dev/git-provider": "gitlab",
                    "pipelinesascode.tekton.dev/max-keep-runs": "2",
                    "pipelinesascode.tekton.dev/on-event": "[pull_request]",
                    "pipelinesascode.tekton.dev/on-target-branch": "[main]",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-on-pull-request",
                    "pipelinesascode.tekton.dev/pipeline": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/pipelines/docker-build-tssc.yaml",
                    "pipelinesascode.tekton.dev/pull-request": "1",
                    "pipelinesascode.tekton.dev/repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-repository",
                    "pipelinesascode.tekton.dev/sender": "rhtap-qe-test",
                    "pipelinesascode.tekton.dev/sha": "ef9a55fab5ef515b87eb96a4ff9102565595f5f4",
                    "pipelinesascode.tekton.dev/sha-title": "Test MR from TSSC e2e test",
                    "pipelinesascode.tekton.dev/sha-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax/-/commit/ef9a55fab5ef515b87eb96a4ff9102565595f5f4",
                    "pipelinesascode.tekton.dev/source-branch": "test-branch-1777391866587",
                    "pipelinesascode.tekton.dev/source-project-id": "81724388",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/target-project-id": "81724388",
                    "pipelinesascode.tekton.dev/task-0": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/init.yaml",
                    "pipelinesascode.tekton.dev/task-1": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/git-clone.yaml",
                    "pipelinesascode.tekton.dev/task-10": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/deploy-workload.yaml",
                    "pipelinesascode.tekton.dev/task-11": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/scan-workload.yaml",
                    "pipelinesascode.tekton.dev/task-12": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/summarize-workload.yaml",
                    "pipelinesascode.tekton.dev/task-13": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/show-workload-sbom.yaml",
                    "pipelinesascode.tekton.dev/task-14": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/deploy-workload-check.yaml",
                    "pipelinesascode.tekton.dev/task-2": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/buildah-rhtap.yaml",
                    "pipelinesascode.tekton.dev/task-3": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/acs-image-check.yaml",
                    "pipelinesascode.tekton.dev/task-4": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/acs-image-scan.yaml",
                    "pipelinesascode.tekton.dev/task-5": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/acs-deploy-check.yaml",
                    "pipelinesascode.tekton.dev/task-6": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/update-deployment.yaml",
                    "pipelinesascode.tekton.dev/task-7": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/show-sbom-rhdh.yaml",
                    "pipelinesascode.tekton.dev/task-8": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/summary.yaml",
                    "pipelinesascode.tekton.dev/task-9": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/build-workload.yaml",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "tssc-app-ci/results/cc51d2ff-0302-4b38-a87c-a1c40cccb31d/records/f24954a8-cfd6-4587-9139-0c3493dcbc04",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"e2e-tests-go-eciytfax\",\"commit\":\"ef9a55fab5ef515b87eb96a4ff9102565595f5f4\",\"eventType\":\"Merge Request\",\"pull_request-id\":1}",
                    "results.tekton.dev/result": "tssc-app-ci/results/cc51d2ff-0302-4b38-a87c-a1c40cccb31d",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/categories": "Git",
                    "tekton.dev/displayName": "git clone",
                    "tekton.dev/pipelines.minVersion": "0.21.0",
                    "tekton.dev/platforms": "linux/amd64,linux/s390x,linux/ppc64le,linux/arm64",
                    "tekton.dev/tags": "git"
                },
                "creationTimestamp": "2026-04-28T15:57:51Z",
                "finalizers": [
                    "chains.tekton.dev/taskrun",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/part-of": "e2e-tests-go-eciytfax",
                    "app.kubernetes.io/version": "v0.39.5",
                    "argocd/app-name": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-id": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-namespace": "tssc-app",
                    "janus-idp.io/tekton": "e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/event-type": "Merge_Request",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-on-pull-request",
                    "pipelinesascode.tekton.dev/pull-request": "1",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-repository",
                    "pipelinesascode.tekton.dev/sha": "ef9a55fab5ef515b87eb96a4ff9102565595f5f4",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "e2e-tests-go-eciytfax-on-pull-request-mrdzj",
                    "tekton.dev/pipelineRun": "e2e-tests-go-eciytfax-on-pull-request-mrdzj",
                    "tekton.dev/pipelineRunUID": "cc51d2ff-0302-4b38-a87c-a1c40cccb31d",
                    "tekton.dev/pipelineTask": "clone-repository"
                },
                "name": "e2e-tests-go-eciytfax-on-pull-request-mrdzj-clone-repository",
                "namespace": "tssc-app-ci",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "e2e-tests-go-eciytfax-on-pull-request-mrdzj",
                        "uid": "cc51d2ff-0302-4b38-a87c-a1c40cccb31d"
                    }
                ],
                "resourceVersion": "37682",
                "uid": "f24954a8-cfd6-4587-9139-0c3493dcbc04"
            },
            "spec": {
                "params": [
                    {
                        "name": "url",
                        "value": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax"
                    },
                    {
                        "name": "revision",
                        "value": "ef9a55fab5ef515b87eb96a4ff9102565595f5f4"
                    },
                    {
                        "name": "depth",
                        "value": "0"
                    }
                ],
                "serviceAccountName": "pipeline",
                "taskSpec": {
                    "description": "The git-clone Task will clone a repo from the provided url into the output Workspace. By default the repo will be cloned into the root of your Workspace.",
                    "params": [
                        {
                            "description": "Repository URL to clone from.",
                            "name": "url",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Revision to checkout. (branch, tag, sha, ref, etc...)",
                            "name": "revision",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Refspec to fetch before checking out revision.",
                            "name": "refspec",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Initialize and fetch git submodules.",
                            "name": "submodules",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Comma-separated list of specific submodule paths to initialize and fetch. Only submodules in the specified directories and their subdirectories will be fetched.\nEmpty string fetches all submodules. Parameter \"submodules\" must be set to \"true\" to make this parameter applicable.\n",
                            "name": "submodulePaths",
                            "type": "string"
                        },
                        {
                            "default": "1",
                            "description": "Perform a shallow clone, fetching only the most recent N commits.",
                            "name": "depth",
                            "type": "string"
                        },
                        {
                            "default": "7",
                            "description": "Length of short commit SHA",
                            "name": "shortCommitLength",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Set the `http.sslVerify` global git config. Setting this to `false` is not advised unless you are sure that you trust your git remote.",
                            "name": "sslVerify",
                            "type": "string"
                        },
                        {
                            "default": "source",
                            "description": "Subdirectory inside the `output` Workspace to clone the repo into.",
                            "name": "subdirectory",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Define the directory patterns to match or exclude when performing a sparse checkout.",
                            "name": "sparseCheckoutDirectories",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Clean out the contents of the destination directory if it already exists before cloning.",
                            "name": "deleteExisting",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "HTTP proxy server for non-SSL requests.",
                            "name": "httpProxy",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "HTTPS proxy server for SSL requests.",
                            "name": "httpsProxy",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Opt out of proxying HTTP/HTTPS requests.",
                            "name": "noProxy",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Log the commands that are executed during `git-clone`'s operation.",
                            "name": "verbose",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Deprecated. Has no effect. Will be removed in the future.",
                            "name": "gitInitImage",
                            "type": "string"
                        },
                        {
                            "default": "/tekton/home",
                            "description": "Absolute path to the user's home directory. Set this explicitly if you are running the image as a non-root user.\n",
                            "name": "userHome",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Check symlinks in the repo. If they're pointing outside of the repo, the build will fail.\n",
                            "name": "enableSymlinkCheck",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Fetch all tags for the repo.",
                            "name": "fetchTags",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from.",
                            "name": "caTrustConfigMapName",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data.",
                            "name": "caTrustConfigMapKey",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Set to \"true\" to merge the targetBranch into the checked-out revision.",
                            "name": "mergeTargetBranch",
                            "type": "string"
                        },
                        {
                            "default": "main",
                            "description": "The target branch to merge into the revision (if mergeTargetBranch is true).",
                            "name": "targetBranch",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "URL of the repository to fetch the target branch from when mergeTargetBranch is true.\nIf empty, uses the same repository (origin). This allows merging a branch from a different repository.\n",
                            "name": "mergeSourceRepoUrl",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Perform a shallow fetch of the target branch, fetching only the most recent N commits.\nIf empty, fetches the full history of the target branch.\n",
                            "name": "mergeSourceDepth",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "The precise commit SHA that was fetched by this Task.",
                            "name": "commit",
                            "type": "string"
                        },
                        {
                            "description": "The commit SHA that was fetched by this Task limited to params.shortCommitLength number of characters",
                            "name": "short-commit",
                            "type": "string"
                        },
                        {
                            "description": "The precise URL that was fetched by this Task.",
                            "name": "url",
                            "type": "string"
                        },
                        {
                            "description": "The commit timestamp of the checkout",
                            "name": "commit-timestamp",
                            "type": "string"
                        },
                        {
                            "description": "The precise URL that was fetched by this Task. This result uses Chains type hinting to include in the provenance.",
                            "name": "CHAINS-GIT_URL",
                            "type": "string"
                        },
                        {
                            "description": "The precise commit SHA that was fetched by this Task. This result uses Chains type hinting to include in the provenance.",
                            "name": "CHAINS-GIT_COMMIT",
                            "type": "string"
                        },
                        {
                            "description": "The SHA of the commit after merging the target branch (if the param mergeTargetBranch is true).",
                            "name": "merged_sha",
                            "type": "string"
                        }
                    ],
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "HOME",
                                    "value": "$(params.userHome)"
                                },
                                {
                                    "name": "PARAM_URL",
                                    "value": "$(params.url)"
                                },
                                {
                                    "name": "PARAM_REVISION",
                                    "value": "ef9a55fab5ef515b87eb96a4ff9102565595f5f4"
                                },
                                {
                                    "name": "PARAM_REFSPEC",
                                    "value": "$(params.refspec)"
                                },
                                {
                                    "name": "PARAM_SUBMODULES",
                                    "value": "$(params.submodules)"
                                },
                                {
                                    "name": "PARAM_SUBMODULE_PATHS",
                                    "value": "$(params.submodulePaths)"
                                },
                                {
                                    "name": "PARAM_DEPTH",
                                    "value": "$(params.depth)"
                                },
                                {
                                    "name": "PARAM_SHORT_COMMIT_LENGTH",
                                    "value": "$(params.shortCommitLength)"
                                },
                                {
                                    "name": "PARAM_SSL_VERIFY",
                                    "value": "$(params.sslVerify)"
                                },
                                {
                                    "name": "PARAM_SUBDIRECTORY",
                                    "value": "$(params.subdirectory)"
                                },
                                {
                                    "name": "PARAM_DELETE_EXISTING",
                                    "value": "$(params.deleteExisting)"
                                },
                                {
                                    "name": "PARAM_HTTP_PROXY",
                                    "value": "$(params.httpProxy)"
                                },
                                {
                                    "name": "PARAM_HTTPS_PROXY",
                                    "value": "$(params.httpsProxy)"
                                },
                                {
                                    "name": "PARAM_NO_PROXY",
                                    "value": "$(params.noProxy)"
                                },
                                {
                                    "name": "PARAM_VERBOSE",
                                    "value": "$(params.verbose)"
                                },
                                {
                                    "name": "PARAM_SPARSE_CHECKOUT_DIRECTORIES",
                                    "value": "$(params.sparseCheckoutDirectories)"
                                },
                                {
                                    "name": "PARAM_USER_HOME",
                                    "value": "$(params.userHome)"
                                },
                                {
                                    "name": "PARAM_FETCH_TAGS",
                                    "value": "$(params.fetchTags)"
                                },
                                {
                                    "name": "PARAM_GIT_INIT_IMAGE",
                                    "value": "$(params.gitInitImage)"
                                },
                                {
                                    "name": "PARAM_MERGE_TARGET_BRANCH",
                                    "value": "$(params.mergeTargetBranch)"
                                },
                                {
                                    "name": "PARAM_TARGET_BRANCH",
                                    "value": "$(params.targetBranch)"
                                },
                                {
                                    "name": "PARAM_MERGE_SOURCE_REPO_URL",
                                    "value": "$(params.mergeSourceRepoUrl)"
                                },
                                {
                                    "name": "PARAM_MERGE_SOURCE_DEPTH",
                                    "value": "$(params.mergeSourceDepth)"
                                },
                                {
                                    "name": "WORKSPACE_OUTPUT_PATH",
                                    "value": "$(workspaces.output.path)"
                                },
                                {
                                    "name": "WORKSPACE_SSH_DIRECTORY_BOUND",
                                    "value": "$(workspaces.ssh-directory.bound)"
                                },
                                {
                                    "name": "WORKSPACE_SSH_DIRECTORY_PATH",
                                    "value": "$(workspaces.ssh-directory.path)"
                                },
                                {
                                    "name": "WORKSPACE_BASIC_AUTH_DIRECTORY_BOUND",
                                    "value": "$(workspaces.basic-auth.bound)"
                                },
                                {
                                    "name": "WORKSPACE_BASIC_AUTH_DIRECTORY_PATH",
                                    "value": "$(workspaces.basic-auth.path)"
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "clone",
                            "script": "#!/usr/bin/env sh\nset -eu\n\nif [ \"${PARAM_VERBOSE}\" = \"true\" ] ; then\n  set -x\nfi\n\nif [ -n \"${PARAM_GIT_INIT_IMAGE}\" ]; then\n  echo \"WARNING: provided deprecated gitInitImage parameter has no effect.\"\nfi\n\nif [ \"${WORKSPACE_BASIC_AUTH_DIRECTORY_BOUND}\" = \"true\" ] ; then\n  if [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.git-credentials\" ] \u0026\u0026 [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.gitconfig\" ]; then\n    cp \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.git-credentials\" \"${PARAM_USER_HOME}/.git-credentials\"\n    cp \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.gitconfig\" \"${PARAM_USER_HOME}/.gitconfig\"\n  # Compatibility with kubernetes.io/basic-auth secrets\n  elif [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/username\" ] \u0026\u0026 [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/password\" ]; then\n    HOSTNAME=$(echo $PARAM_URL | awk -F/ '{print $3}')\n    echo \"https://$(cat ${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/username):$(cat ${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/password)@$HOSTNAME\" \u003e \"${PARAM_USER_HOME}/.git-credentials\"\n    echo -e \"[credential \\\"https://$HOSTNAME\\\"]\\n  helper = store\" \u003e \"${PARAM_USER_HOME}/.gitconfig\"\n  else\n    echo \"Unknown basic-auth workspace format\"\n    exit 1\n  fi\n  chmod 400 \"${PARAM_USER_HOME}/.git-credentials\"\n  chmod 400 \"${PARAM_USER_HOME}/.gitconfig\"\nfi\n\n# Should be called after the gitconfig is copied from the repository secret\nca_bundle=/mnt/trusted-ca/ca-bundle.crt\nif [ -f \"$ca_bundle\" ]; then\n  echo \"INFO: Using mounted CA bundle: $ca_bundle\"\n  git config --global http.sslCAInfo \"$ca_bundle\"\nfi\n\nif [ \"${WORKSPACE_SSH_DIRECTORY_BOUND}\" = \"true\" ] ; then\n  cp -R \"${WORKSPACE_SSH_DIRECTORY_PATH}\" \"${PARAM_USER_HOME}\"/.ssh\n  chmod 700 \"${PARAM_USER_HOME}\"/.ssh\n  chmod -R 400 \"${PARAM_USER_HOME}\"/.ssh/*\nfi\n\nCHECKOUT_DIR=\"${WORKSPACE_OUTPUT_PATH}/${PARAM_SUBDIRECTORY}\"\n\ncleandir() {\n  # Delete any existing contents of the repo directory if it exists.\n  #\n  # We don't just \"rm -rf ${CHECKOUT_DIR}\" because ${CHECKOUT_DIR} might be \"/\"\n  # or the root of a mounted volume.\n  if [ -d \"${CHECKOUT_DIR}\" ] ; then\n    # Delete non-hidden files and directories\n    rm -rf \"${CHECKOUT_DIR:?}\"/*\n    # Delete files and directories starting with . but excluding ..\n    rm -rf \"${CHECKOUT_DIR}\"/.[!.]*\n    # Delete files and directories starting with .. plus any other character\n    rm -rf \"${CHECKOUT_DIR}\"/..?*\n  fi\n}\n\nif [ \"${PARAM_DELETE_EXISTING}\" = \"true\" ] ; then\n  cleandir\nfi\n\ntest -z \"${PARAM_HTTP_PROXY}\" || export HTTP_PROXY=\"${PARAM_HTTP_PROXY}\"\ntest -z \"${PARAM_HTTPS_PROXY}\" || export HTTPS_PROXY=\"${PARAM_HTTPS_PROXY}\"\ntest -z \"${PARAM_NO_PROXY}\" || export NO_PROXY=\"${PARAM_NO_PROXY}\"\n\n/ko-app/git-init \\\n  -url=\"${PARAM_URL}\" \\\n  -revision=\"${PARAM_REVISION}\" \\\n  -refspec=\"${PARAM_REFSPEC}\" \\\n  -path=\"${CHECKOUT_DIR}\" \\\n  -sslVerify=\"${PARAM_SSL_VERIFY}\" \\\n  -submodules=\"${PARAM_SUBMODULES}\" \\\n  -submodulePaths=\"${PARAM_SUBMODULE_PATHS}\" \\\n  -depth=\"${PARAM_DEPTH}\" \\\n  -sparseCheckoutDirectories=\"${PARAM_SPARSE_CHECKOUT_DIRECTORIES}\" \\\n  -retryMaxAttempts=10\ncd \"${CHECKOUT_DIR}\"\nRESULT_SHA=\"$(git rev-parse HEAD)\"\nRESULT_SHA_SHORT=\"$(git rev-parse --short=\"${PARAM_SHORT_COMMIT_LENGTH}\" HEAD)\"\nEXIT_CODE=\"$?\"\nif [ \"${EXIT_CODE}\" != 0 ] ; then\n  exit \"${EXIT_CODE}\"\nfi\nif [ \"${PARAM_MERGE_TARGET_BRANCH}\" = \"true\" ]; then\n  echo \"Merge option enabled. Attempting to merge target branch '${PARAM_TARGET_BRANCH}' into HEAD (${RESULT_SHA}).\"\n\n  if [ \"${PARAM_DEPTH}\" = \"1\" ]; then\n    echo \"WARNING: Shallow clone with depth=1 may cause merge conflicts due to insufficient commit history.\" \u003e\u00262\n  fi\n\n  if [ \"${PARAM_MERGE_SOURCE_DEPTH}\" = \"1\" ]; then\n    echo \"WARNING: Shallow fetch with mergeSourceDepth=1 may cause merge conflicts due to insufficient commit history.\" \u003e\u00262\n  fi\n\n  # Determine if merging from a different repository or the same one\n  if [ -n \"${PARAM_MERGE_SOURCE_REPO_URL}\" ]; then\n    # Normalize URLs for comparison (remove trailing slashes and .git suffix)\n    normalize_url() {\n      echo \"$1\" | sed -e 's#/$##' -e 's#\\.git$##'\n    }\n\n    NORMALIZED_ORIGIN_URL=$(normalize_url \"${PARAM_URL}\")\n    NORMALIZED_MERGE_URL=$(normalize_url \"${PARAM_MERGE_SOURCE_REPO_URL}\")\n\n    if [ \"${NORMALIZED_ORIGIN_URL}\" = \"${NORMALIZED_MERGE_URL}\" ]; then\n      echo \"Merge source URL is the same as origin. Using existing 'origin' remote.\"\n      MERGE_REMOTE=\"origin\"\n    else\n      echo \"Merging from different repository: ${PARAM_MERGE_SOURCE_REPO_URL}\"\n      echo \"Adding remote 'merge-source'...\"\n      git remote add merge-source \"${PARAM_MERGE_SOURCE_REPO_URL}\"\n      MERGE_REMOTE=\"merge-source\"\n    fi\n  else\n    echo \"Merging from the same repository (origin)\"\n    MERGE_REMOTE=\"origin\"\n  fi\n\n  echo \"Fetching target branch '${PARAM_TARGET_BRANCH}' from ${MERGE_REMOTE}...\"\n  if [ -n \"${PARAM_MERGE_SOURCE_DEPTH}\" ]; then\n    retry git fetch --depth=\"${PARAM_MERGE_SOURCE_DEPTH}\" ${MERGE_REMOTE} \"${PARAM_TARGET_BRANCH}\"\n  else\n    retry git fetch ${MERGE_REMOTE} \"${PARAM_TARGET_BRANCH}\"\n  fi\n  FETCH_EXIT_CODE=\"$?\"\n  if [ \"${FETCH_EXIT_CODE}\" != \"0\" ]; then\n    echo \"ERROR: Failed to fetch target branch '${PARAM_TARGET_BRANCH}' from ${MERGE_REMOTE}.\" \u003e\u00262\n    exit \"${FETCH_EXIT_CODE}\"\n  fi\n\n  echo \"Merging ${MERGE_REMOTE}/${PARAM_TARGET_BRANCH} into current HEAD...\"\n  git config --global user.email \"tekton-git-clone@tekton.dev\"\n  git config --global user.name \"Tekton Git Clone Task\"\n  git merge \"${MERGE_REMOTE}/${PARAM_TARGET_BRANCH}\" --no-commit --no-ff --allow-unrelated-histories\n  MERGE_CHECK_EXIT_CODE=\"$?\"\n  if [ \"${MERGE_CHECK_EXIT_CODE}\" != \"0\" ] ; then\n    echo \"ERROR: Merge conflict detected or merge failed before commit.\" \u003e\u00262\n    echo \"--- Git Status ---\"\n    git status\n    echo \"------------------\"\n    exit \"${MERGE_CHECK_EXIT_CODE}\"\n  else\n    # Check if there are changes that need to be merged, and if so, create a merge commit.\n    if git diff --staged --quiet; then\n      echo \"No diff was found, skipping merge...\" \u003e\u00262\n    else\n      echo \"Merge successful (no conflicts found), committing...\"\n      git commit -m \"Merge branch '${PARAM_TARGET_BRANCH}' from ${MERGE_REMOTE} into ${RESULT_SHA}\"\n      COMMIT_EXIT_CODE=\"$?\"\n      if [ \"${COMMIT_EXIT_CODE}\" != \"0\" ]; then\n        echo \"ERROR: Failed to commit merge.\" \u003e\u00262\n        exit \"${COMMIT_EXIT_CODE}\"\n      fi\n      MERGED_SHA=$(git rev-parse HEAD)\n      echo \"New HEAD after merge: ${MERGED_SHA}\"\n      echo \"${MERGED_SHA}\" \u003e \"$(results.merged_sha.path)\"\n    fi\n  fi\nelse\n  echo \"Merge option disabled. Using checked-out revision ${RESULT_SHA} directly.\"\nfi\nprintf \"%s\" \"${RESULT_SHA}\" \u003e \"$(results.commit.path)\"\nprintf \"%s\" \"${RESULT_SHA}\" \u003e \"$(results.CHAINS-GIT_COMMIT.path)\"\nprintf \"%s\" \"${RESULT_SHA_SHORT}\" \u003e \"$(results.short-commit.path)\"\nprintf \"%s\" \"${PARAM_URL}\" \u003e \"$(results.url.path)\"\nprintf \"%s\" \"${PARAM_URL}\" \u003e \"$(results.CHAINS-GIT_URL.path)\"\nprintf \"%s\" \"$(git log -1 --pretty=%ct)\" \u003e \"$(results.commit-timestamp.path)\"\n\nif [ \"${PARAM_FETCH_TAGS}\" = \"true\" ] ; then\n  echo \"Fetching tags\"\n  retry git fetch --tags\nfi\n",
                            "securityContext": {
                                "runAsUser": 0
                            },
                            "volumeMounts": [
                                {
                                    "mountPath": "/mnt/trusted-ca",
                                    "name": "trusted-ca",
                                    "readOnly": true
                                }
                            ]
                        },
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "PARAM_ENABLE_SYMLINK_CHECK",
                                    "value": "$(params.enableSymlinkCheck)"
                                },
                                {
                                    "name": "PARAM_SUBDIRECTORY",
                                    "value": "$(params.subdirectory)"
                                },
                                {
                                    "name": "WORKSPACE_OUTPUT_PATH",
                                    "value": "$(workspaces.output.path)"
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "symlink-check",
                            "script": "#!/usr/bin/env bash\nset -euo pipefail\n\nCHECKOUT_DIR=\"${WORKSPACE_OUTPUT_PATH}/${PARAM_SUBDIRECTORY}\"\ncheck_symlinks() {\n  FOUND_SYMLINK_POINTING_OUTSIDE_OF_REPO=false\n  while read -r symlink\n  do\n    target=$(readlink -m \"$symlink\")\n    if ! [[ \"$target\" =~ ^$CHECKOUT_DIR ]]; then\n      echo \"The cloned repository contains symlink pointing outside of the cloned repository: $symlink\"\n      FOUND_SYMLINK_POINTING_OUTSIDE_OF_REPO=true\n    fi\n  done \u003c \u003c(find $CHECKOUT_DIR -type l -print)\n  if [ \"$FOUND_SYMLINK_POINTING_OUTSIDE_OF_REPO\" = true ] ; then\n    return 1\n  fi\n}\n\nif [ \"${PARAM_ENABLE_SYMLINK_CHECK}\" = \"true\" ] ; then\n  echo \"Running symlink check\"\n  check_symlinks\nfi\n"
                        }
                    ],
                    "volumes": [
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "$(params.caTrustConfigMapKey)",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "$(params.caTrustConfigMapName)",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "The git repo will be cloned onto the volume backing this Workspace.",
                            "name": "output"
                        },
                        {
                            "description": "A .ssh directory with private key, known_hosts, config, etc. Copied to\nthe user's home before git commands are executed. Used to authenticate\nwith the git remote when performing the clone. Binding a Secret to this\nWorkspace is strongly recommended over other volume types.\n",
                            "name": "ssh-directory",
                            "optional": true
                        },
                        {
                            "description": "A Workspace containing a .gitconfig and .git-credentials file or username and password.\nThese will be copied to the user's home before any git commands are run. Any\nother files in this Workspace are ignored. It is strongly recommended\nto use ssh-directory over basic-auth whenever possible and to bind a\nSecret to this Workspace over other volume types.\n",
                            "name": "basic-auth",
                            "optional": true
                        }
                    ]
                },
                "timeout": "1h0m0s",
                "workspaces": [
                    {
                        "name": "output",
                        "persistentVolumeClaim": {
                            "claimName": "pvc-b52b665ade"
                        }
                    },
                    {
                        "name": "basic-auth",
                        "secret": {
                            "secretName": "pac-gitauth-mgzism"
                        }
                    }
                ]
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-28T15:58:08Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-28T15:58:08Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "e2e-tests-go-eciytfax-on-pu3802b225cd7cbff27eb73a3e1deca11a-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    }
                },
                "results": [
                    {
                        "name": "CHAINS-GIT_COMMIT",
                        "type": "string",
                        "value": "ef9a55fab5ef515b87eb96a4ff9102565595f5f4"
                    },
                    {
                        "name": "CHAINS-GIT_URL",
                        "type": "string",
                        "value": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax"
                    },
                    {
                        "name": "commit",
                        "type": "string",
                        "value": "ef9a55fab5ef515b87eb96a4ff9102565595f5f4"
                    },
                    {
                        "name": "commit-timestamp",
                        "type": "string",
                        "value": "1777391867"
                    },
                    {
                        "name": "short-commit",
                        "type": "string",
                        "value": "ef9a55f"
                    },
                    {
                        "name": "url",
                        "type": "string",
                        "value": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax"
                    }
                ],
                "startTime": "2026-04-28T15:57:53Z",
                "steps": [
                    {
                        "container": "step-clone",
                        "imageID": "quay.io/redhat-tssc/task-runner@sha256:db633cb62eb097a46ca9e3e0a54d21c8ebd444f81a074ce1f1afa61956185dbf",
                        "name": "clone",
                        "provenance": {},
                        "terminated": {
                            "containerID": "cri-o://1f1031a7ff9ccf5ca7c3eb8a9e1a5c0ab1cb4f905c97c1d6263c107b5da2defc",
                            "exitCode": 0,
                            "finishedAt": "2026-04-28T15:58:07Z",
                            "message": "[{\"key\":\"CHAINS-GIT_COMMIT\",\"value\":\"ef9a55fab5ef515b87eb96a4ff9102565595f5f4\",\"type\":1},{\"key\":\"CHAINS-GIT_URL\",\"value\":\"https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax\",\"type\":1},{\"key\":\"commit\",\"value\":\"ef9a55fab5ef515b87eb96a4ff9102565595f5f4\",\"type\":1},{\"key\":\"commit-timestamp\",\"value\":\"1777391867\",\"type\":1},{\"key\":\"short-commit\",\"value\":\"ef9a55f\",\"type\":1},{\"key\":\"url\",\"value\":\"https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-28T15:58:06Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-symlink-check",
                        "imageID": "quay.io/redhat-tssc/task-runner@sha256:db633cb62eb097a46ca9e3e0a54d21c8ebd444f81a074ce1f1afa61956185dbf",
                        "name": "symlink-check",
                        "provenance": {},
                        "terminated": {
                            "containerID": "cri-o://2ec473ed2739ee531e79728aefaffb43c30a5d78bb58880f276501eb6add5ad8",
                            "exitCode": 0,
                            "finishedAt": "2026-04-28T15:58:07Z",
                            "message": "[{\"key\":\"CHAINS-GIT_COMMIT\",\"value\":\"ef9a55fab5ef515b87eb96a4ff9102565595f5f4\",\"type\":1},{\"key\":\"CHAINS-GIT_URL\",\"value\":\"https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax\",\"type\":1},{\"key\":\"commit\",\"value\":\"ef9a55fab5ef515b87eb96a4ff9102565595f5f4\",\"type\":1},{\"key\":\"commit-timestamp\",\"value\":\"1777391867\",\"type\":1},{\"key\":\"short-commit\",\"value\":\"ef9a55f\",\"type\":1},{\"key\":\"url\",\"value\":\"https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-28T15:58:07Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "The git-clone Task will clone a repo from the provided url into the output Workspace. By default the repo will be cloned into the root of your Workspace.",
                    "params": [
                        {
                            "description": "Repository URL to clone from.",
                            "name": "url",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Revision to checkout. (branch, tag, sha, ref, etc...)",
                            "name": "revision",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Refspec to fetch before checking out revision.",
                            "name": "refspec",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Initialize and fetch git submodules.",
                            "name": "submodules",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Comma-separated list of specific submodule paths to initialize and fetch. Only submodules in the specified directories and their subdirectories will be fetched.\nEmpty string fetches all submodules. Parameter \"submodules\" must be set to \"true\" to make this parameter applicable.\n",
                            "name": "submodulePaths",
                            "type": "string"
                        },
                        {
                            "default": "1",
                            "description": "Perform a shallow clone, fetching only the most recent N commits.",
                            "name": "depth",
                            "type": "string"
                        },
                        {
                            "default": "7",
                            "description": "Length of short commit SHA",
                            "name": "shortCommitLength",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Set the `http.sslVerify` global git config. Setting this to `false` is not advised unless you are sure that you trust your git remote.",
                            "name": "sslVerify",
                            "type": "string"
                        },
                        {
                            "default": "source",
                            "description": "Subdirectory inside the `output` Workspace to clone the repo into.",
                            "name": "subdirectory",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Define the directory patterns to match or exclude when performing a sparse checkout.",
                            "name": "sparseCheckoutDirectories",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Clean out the contents of the destination directory if it already exists before cloning.",
                            "name": "deleteExisting",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "HTTP proxy server for non-SSL requests.",
                            "name": "httpProxy",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "HTTPS proxy server for SSL requests.",
                            "name": "httpsProxy",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Opt out of proxying HTTP/HTTPS requests.",
                            "name": "noProxy",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Log the commands that are executed during `git-clone`'s operation.",
                            "name": "verbose",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Deprecated. Has no effect. Will be removed in the future.",
                            "name": "gitInitImage",
                            "type": "string"
                        },
                        {
                            "default": "/tekton/home",
                            "description": "Absolute path to the user's home directory. Set this explicitly if you are running the image as a non-root user.\n",
                            "name": "userHome",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Check symlinks in the repo. If they're pointing outside of the repo, the build will fail.\n",
                            "name": "enableSymlinkCheck",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Fetch all tags for the repo.",
                            "name": "fetchTags",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from.",
                            "name": "caTrustConfigMapName",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data.",
                            "name": "caTrustConfigMapKey",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Set to \"true\" to merge the targetBranch into the checked-out revision.",
                            "name": "mergeTargetBranch",
                            "type": "string"
                        },
                        {
                            "default": "main",
                            "description": "The target branch to merge into the revision (if mergeTargetBranch is true).",
                            "name": "targetBranch",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "URL of the repository to fetch the target branch from when mergeTargetBranch is true.\nIf empty, uses the same repository (origin). This allows merging a branch from a different repository.\n",
                            "name": "mergeSourceRepoUrl",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Perform a shallow fetch of the target branch, fetching only the most recent N commits.\nIf empty, fetches the full history of the target branch.\n",
                            "name": "mergeSourceDepth",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "The precise commit SHA that was fetched by this Task.",
                            "name": "commit",
                            "type": "string"
                        },
                        {
                            "description": "The commit SHA that was fetched by this Task limited to params.shortCommitLength number of characters",
                            "name": "short-commit",
                            "type": "string"
                        },
                        {
                            "description": "The precise URL that was fetched by this Task.",
                            "name": "url",
                            "type": "string"
                        },
                        {
                            "description": "The commit timestamp of the checkout",
                            "name": "commit-timestamp",
                            "type": "string"
                        },
                        {
                            "description": "The precise URL that was fetched by this Task. This result uses Chains type hinting to include in the provenance.",
                            "name": "CHAINS-GIT_URL",
                            "type": "string"
                        },
                        {
                            "description": "The precise commit SHA that was fetched by this Task. This result uses Chains type hinting to include in the provenance.",
                            "name": "CHAINS-GIT_COMMIT",
                            "type": "string"
                        },
                        {
                            "description": "The SHA of the commit after merging the target branch (if the param mergeTargetBranch is true).",
                            "name": "merged_sha",
                            "type": "string"
                        }
                    ],
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "HOME",
                                    "value": "/tekton/home"
                                },
                                {
                                    "name": "PARAM_URL",
                                    "value": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax"
                                },
                                {
                                    "name": "PARAM_REVISION",
                                    "value": "ef9a55fab5ef515b87eb96a4ff9102565595f5f4"
                                },
                                {
                                    "name": "PARAM_REFSPEC"
                                },
                                {
                                    "name": "PARAM_SUBMODULES",
                                    "value": "true"
                                },
                                {
                                    "name": "PARAM_SUBMODULE_PATHS"
                                },
                                {
                                    "name": "PARAM_DEPTH",
                                    "value": "0"
                                },
                                {
                                    "name": "PARAM_SHORT_COMMIT_LENGTH",
                                    "value": "7"
                                },
                                {
                                    "name": "PARAM_SSL_VERIFY",
                                    "value": "true"
                                },
                                {
                                    "name": "PARAM_SUBDIRECTORY",
                                    "value": "source"
                                },
                                {
                                    "name": "PARAM_DELETE_EXISTING",
                                    "value": "true"
                                },
                                {
                                    "name": "PARAM_HTTP_PROXY"
                                },
                                {
                                    "name": "PARAM_HTTPS_PROXY"
                                },
                                {
                                    "name": "PARAM_NO_PROXY"
                                },
                                {
                                    "name": "PARAM_VERBOSE",
                                    "value": "false"
                                },
                                {
                                    "name": "PARAM_SPARSE_CHECKOUT_DIRECTORIES"
                                },
                                {
                                    "name": "PARAM_USER_HOME",
                                    "value": "/tekton/home"
                                },
                                {
                                    "name": "PARAM_FETCH_TAGS",
                                    "value": "false"
                                },
                                {
                                    "name": "PARAM_GIT_INIT_IMAGE"
                                },
                                {
                                    "name": "PARAM_MERGE_TARGET_BRANCH",
                                    "value": "false"
                                },
                                {
                                    "name": "PARAM_TARGET_BRANCH",
                                    "value": "main"
                                },
                                {
                                    "name": "PARAM_MERGE_SOURCE_REPO_URL"
                                },
                                {
                                    "name": "PARAM_MERGE_SOURCE_DEPTH"
                                },
                                {
                                    "name": "WORKSPACE_OUTPUT_PATH",
                                    "value": "/workspace/output"
                                },
                                {
                                    "name": "WORKSPACE_SSH_DIRECTORY_BOUND",
                                    "value": "false"
                                },
                                {
                                    "name": "WORKSPACE_SSH_DIRECTORY_PATH"
                                },
                                {
                                    "name": "WORKSPACE_BASIC_AUTH_DIRECTORY_BOUND",
                                    "value": "true"
                                },
                                {
                                    "name": "WORKSPACE_BASIC_AUTH_DIRECTORY_PATH",
                                    "value": "/workspace/basic-auth"
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "clone",
                            "script": "#!/usr/bin/env sh\nset -eu\n\nif [ \"${PARAM_VERBOSE}\" = \"true\" ] ; then\n  set -x\nfi\n\nif [ -n \"${PARAM_GIT_INIT_IMAGE}\" ]; then\n  echo \"WARNING: provided deprecated gitInitImage parameter has no effect.\"\nfi\n\nif [ \"${WORKSPACE_BASIC_AUTH_DIRECTORY_BOUND}\" = \"true\" ] ; then\n  if [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.git-credentials\" ] \u0026\u0026 [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.gitconfig\" ]; then\n    cp \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.git-credentials\" \"${PARAM_USER_HOME}/.git-credentials\"\n    cp \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.gitconfig\" \"${PARAM_USER_HOME}/.gitconfig\"\n  # Compatibility with kubernetes.io/basic-auth secrets\n  elif [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/username\" ] \u0026\u0026 [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/password\" ]; then\n    HOSTNAME=$(echo $PARAM_URL | awk -F/ '{print $3}')\n    echo \"https://$(cat ${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/username):$(cat ${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/password)@$HOSTNAME\" \u003e \"${PARAM_USER_HOME}/.git-credentials\"\n    echo -e \"[credential \\\"https://$HOSTNAME\\\"]\\n  helper = store\" \u003e \"${PARAM_USER_HOME}/.gitconfig\"\n  else\n    echo \"Unknown basic-auth workspace format\"\n    exit 1\n  fi\n  chmod 400 \"${PARAM_USER_HOME}/.git-credentials\"\n  chmod 400 \"${PARAM_USER_HOME}/.gitconfig\"\nfi\n\n# Should be called after the gitconfig is copied from the repository secret\nca_bundle=/mnt/trusted-ca/ca-bundle.crt\nif [ -f \"$ca_bundle\" ]; then\n  echo \"INFO: Using mounted CA bundle: $ca_bundle\"\n  git config --global http.sslCAInfo \"$ca_bundle\"\nfi\n\nif [ \"${WORKSPACE_SSH_DIRECTORY_BOUND}\" = \"true\" ] ; then\n  cp -R \"${WORKSPACE_SSH_DIRECTORY_PATH}\" \"${PARAM_USER_HOME}\"/.ssh\n  chmod 700 \"${PARAM_USER_HOME}\"/.ssh\n  chmod -R 400 \"${PARAM_USER_HOME}\"/.ssh/*\nfi\n\nCHECKOUT_DIR=\"${WORKSPACE_OUTPUT_PATH}/${PARAM_SUBDIRECTORY}\"\n\ncleandir() {\n  # Delete any existing contents of the repo directory if it exists.\n  #\n  # We don't just \"rm -rf ${CHECKOUT_DIR}\" because ${CHECKOUT_DIR} might be \"/\"\n  # or the root of a mounted volume.\n  if [ -d \"${CHECKOUT_DIR}\" ] ; then\n    # Delete non-hidden files and directories\n    rm -rf \"${CHECKOUT_DIR:?}\"/*\n    # Delete files and directories starting with . but excluding ..\n    rm -rf \"${CHECKOUT_DIR}\"/.[!.]*\n    # Delete files and directories starting with .. plus any other character\n    rm -rf \"${CHECKOUT_DIR}\"/..?*\n  fi\n}\n\nif [ \"${PARAM_DELETE_EXISTING}\" = \"true\" ] ; then\n  cleandir\nfi\n\ntest -z \"${PARAM_HTTP_PROXY}\" || export HTTP_PROXY=\"${PARAM_HTTP_PROXY}\"\ntest -z \"${PARAM_HTTPS_PROXY}\" || export HTTPS_PROXY=\"${PARAM_HTTPS_PROXY}\"\ntest -z \"${PARAM_NO_PROXY}\" || export NO_PROXY=\"${PARAM_NO_PROXY}\"\n\n/ko-app/git-init \\\n  -url=\"${PARAM_URL}\" \\\n  -revision=\"${PARAM_REVISION}\" \\\n  -refspec=\"${PARAM_REFSPEC}\" \\\n  -path=\"${CHECKOUT_DIR}\" \\\n  -sslVerify=\"${PARAM_SSL_VERIFY}\" \\\n  -submodules=\"${PARAM_SUBMODULES}\" \\\n  -submodulePaths=\"${PARAM_SUBMODULE_PATHS}\" \\\n  -depth=\"${PARAM_DEPTH}\" \\\n  -sparseCheckoutDirectories=\"${PARAM_SPARSE_CHECKOUT_DIRECTORIES}\" \\\n  -retryMaxAttempts=10\ncd \"${CHECKOUT_DIR}\"\nRESULT_SHA=\"$(git rev-parse HEAD)\"\nRESULT_SHA_SHORT=\"$(git rev-parse --short=\"${PARAM_SHORT_COMMIT_LENGTH}\" HEAD)\"\nEXIT_CODE=\"$?\"\nif [ \"${EXIT_CODE}\" != 0 ] ; then\n  exit \"${EXIT_CODE}\"\nfi\nif [ \"${PARAM_MERGE_TARGET_BRANCH}\" = \"true\" ]; then\n  echo \"Merge option enabled. Attempting to merge target branch '${PARAM_TARGET_BRANCH}' into HEAD (${RESULT_SHA}).\"\n\n  if [ \"${PARAM_DEPTH}\" = \"1\" ]; then\n    echo \"WARNING: Shallow clone with depth=1 may cause merge conflicts due to insufficient commit history.\" \u003e\u00262\n  fi\n\n  if [ \"${PARAM_MERGE_SOURCE_DEPTH}\" = \"1\" ]; then\n    echo \"WARNING: Shallow fetch with mergeSourceDepth=1 may cause merge conflicts due to insufficient commit history.\" \u003e\u00262\n  fi\n\n  # Determine if merging from a different repository or the same one\n  if [ -n \"${PARAM_MERGE_SOURCE_REPO_URL}\" ]; then\n    # Normalize URLs for comparison (remove trailing slashes and .git suffix)\n    normalize_url() {\n      echo \"$1\" | sed -e 's#/$##' -e 's#\\.git$##'\n    }\n\n    NORMALIZED_ORIGIN_URL=$(normalize_url \"${PARAM_URL}\")\n    NORMALIZED_MERGE_URL=$(normalize_url \"${PARAM_MERGE_SOURCE_REPO_URL}\")\n\n    if [ \"${NORMALIZED_ORIGIN_URL}\" = \"${NORMALIZED_MERGE_URL}\" ]; then\n      echo \"Merge source URL is the same as origin. Using existing 'origin' remote.\"\n      MERGE_REMOTE=\"origin\"\n    else\n      echo \"Merging from different repository: ${PARAM_MERGE_SOURCE_REPO_URL}\"\n      echo \"Adding remote 'merge-source'...\"\n      git remote add merge-source \"${PARAM_MERGE_SOURCE_REPO_URL}\"\n      MERGE_REMOTE=\"merge-source\"\n    fi\n  else\n    echo \"Merging from the same repository (origin)\"\n    MERGE_REMOTE=\"origin\"\n  fi\n\n  echo \"Fetching target branch '${PARAM_TARGET_BRANCH}' from ${MERGE_REMOTE}...\"\n  if [ -n \"${PARAM_MERGE_SOURCE_DEPTH}\" ]; then\n    retry git fetch --depth=\"${PARAM_MERGE_SOURCE_DEPTH}\" ${MERGE_REMOTE} \"${PARAM_TARGET_BRANCH}\"\n  else\n    retry git fetch ${MERGE_REMOTE} \"${PARAM_TARGET_BRANCH}\"\n  fi\n  FETCH_EXIT_CODE=\"$?\"\n  if [ \"${FETCH_EXIT_CODE}\" != \"0\" ]; then\n    echo \"ERROR: Failed to fetch target branch '${PARAM_TARGET_BRANCH}' from ${MERGE_REMOTE}.\" \u003e\u00262\n    exit \"${FETCH_EXIT_CODE}\"\n  fi\n\n  echo \"Merging ${MERGE_REMOTE}/${PARAM_TARGET_BRANCH} into current HEAD...\"\n  git config --global user.email \"tekton-git-clone@tekton.dev\"\n  git config --global user.name \"Tekton Git Clone Task\"\n  git merge \"${MERGE_REMOTE}/${PARAM_TARGET_BRANCH}\" --no-commit --no-ff --allow-unrelated-histories\n  MERGE_CHECK_EXIT_CODE=\"$?\"\n  if [ \"${MERGE_CHECK_EXIT_CODE}\" != \"0\" ] ; then\n    echo \"ERROR: Merge conflict detected or merge failed before commit.\" \u003e\u00262\n    echo \"--- Git Status ---\"\n    git status\n    echo \"------------------\"\n    exit \"${MERGE_CHECK_EXIT_CODE}\"\n  else\n    # Check if there are changes that need to be merged, and if so, create a merge commit.\n    if git diff --staged --quiet; then\n      echo \"No diff was found, skipping merge...\" \u003e\u00262\n    else\n      echo \"Merge successful (no conflicts found), committing...\"\n      git commit -m \"Merge branch '${PARAM_TARGET_BRANCH}' from ${MERGE_REMOTE} into ${RESULT_SHA}\"\n      COMMIT_EXIT_CODE=\"$?\"\n      if [ \"${COMMIT_EXIT_CODE}\" != \"0\" ]; then\n        echo \"ERROR: Failed to commit merge.\" \u003e\u00262\n        exit \"${COMMIT_EXIT_CODE}\"\n      fi\n      MERGED_SHA=$(git rev-parse HEAD)\n      echo \"New HEAD after merge: ${MERGED_SHA}\"\n      echo \"${MERGED_SHA}\" \u003e \"/tekton/results/merged_sha\"\n    fi\n  fi\nelse\n  echo \"Merge option disabled. Using checked-out revision ${RESULT_SHA} directly.\"\nfi\nprintf \"%s\" \"${RESULT_SHA}\" \u003e \"/tekton/results/commit\"\nprintf \"%s\" \"${RESULT_SHA}\" \u003e \"/tekton/results/CHAINS-GIT_COMMIT\"\nprintf \"%s\" \"${RESULT_SHA_SHORT}\" \u003e \"/tekton/results/short-commit\"\nprintf \"%s\" \"${PARAM_URL}\" \u003e \"/tekton/results/url\"\nprintf \"%s\" \"${PARAM_URL}\" \u003e \"/tekton/results/CHAINS-GIT_URL\"\nprintf \"%s\" \"$(git log -1 --pretty=%ct)\" \u003e \"/tekton/results/commit-timestamp\"\n\nif [ \"${PARAM_FETCH_TAGS}\" = \"true\" ] ; then\n  echo \"Fetching tags\"\n  retry git fetch --tags\nfi\n",
                            "securityContext": {
                                "runAsUser": 0
                            },
                            "volumeMounts": [
                                {
                                    "mountPath": "/mnt/trusted-ca",
                                    "name": "trusted-ca",
                                    "readOnly": true
                                }
                            ]
                        },
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "PARAM_ENABLE_SYMLINK_CHECK",
                                    "value": "true"
                                },
                                {
                                    "name": "PARAM_SUBDIRECTORY",
                                    "value": "source"
                                },
                                {
                                    "name": "WORKSPACE_OUTPUT_PATH",
                                    "value": "/workspace/output"
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "symlink-check",
                            "script": "#!/usr/bin/env bash\nset -euo pipefail\n\nCHECKOUT_DIR=\"${WORKSPACE_OUTPUT_PATH}/${PARAM_SUBDIRECTORY}\"\ncheck_symlinks() {\n  FOUND_SYMLINK_POINTING_OUTSIDE_OF_REPO=false\n  while read -r symlink\n  do\n    target=$(readlink -m \"$symlink\")\n    if ! [[ \"$target\" =~ ^$CHECKOUT_DIR ]]; then\n      echo \"The cloned repository contains symlink pointing outside of the cloned repository: $symlink\"\n      FOUND_SYMLINK_POINTING_OUTSIDE_OF_REPO=true\n    fi\n  done \u003c \u003c(find $CHECKOUT_DIR -type l -print)\n  if [ \"$FOUND_SYMLINK_POINTING_OUTSIDE_OF_REPO\" = true ] ; then\n    return 1\n  fi\n}\n\nif [ \"${PARAM_ENABLE_SYMLINK_CHECK}\" = \"true\" ] ; then\n  echo \"Running symlink check\"\n  check_symlinks\nfi\n"
                        }
                    ],
                    "volumes": [
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "The git repo will be cloned onto the volume backing this Workspace.",
                            "name": "output"
                        },
                        {
                            "description": "A .ssh directory with private key, known_hosts, config, etc. Copied to\nthe user's home before git commands are executed. Used to authenticate\nwith the git remote when performing the clone. Binding a Secret to this\nWorkspace is strongly recommended over other volume types.\n",
                            "name": "ssh-directory",
                            "optional": true
                        },
                        {
                            "description": "A Workspace containing a .gitconfig and .git-credentials file or username and password.\nThese will be copied to the user's home before any git commands are run. Any\nother files in this Workspace are ignored. It is strongly recommended\nto use ssh-directory over basic-auth whenever possible and to bind a\nSecret to this Workspace over other volume types.\n",
                            "name": "basic-auth",
                            "optional": true
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.redhat.com/build-type": "docker",
                    "build.appstudio.redhat.com/task-name": "scan-workload",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "https://rekor-server-tssc-tas.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/api/v1/log/entries?logIndex=7",
                    "pipeline.tekton.dev/affinity-assistant": "affinity-assistant-f53ad6fc68",
                    "pipeline.tekton.dev/release": "8910674cb953317a4373f33822024b9de8c5fa22",
                    "pipelinesascode.tekton.dev/branch": "main",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "Merge Request",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-mgzism",
                    "pipelinesascode.tekton.dev/git-provider": "gitlab",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/k8s/ns/tssc-app-ci/tekton.dev~v1~PipelineRun/e2e-tests-go-eciytfax-on-pull-request-mrdzj",
                    "pipelinesascode.tekton.dev/max-keep-runs": "2",
                    "pipelinesascode.tekton.dev/on-event": "[pull_request]",
                    "pipelinesascode.tekton.dev/on-target-branch": "[main]",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-on-pull-request",
                    "pipelinesascode.tekton.dev/pipeline": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/pipelines/docker-build-tssc.yaml",
                    "pipelinesascode.tekton.dev/pull-request": "1",
                    "pipelinesascode.tekton.dev/repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-repository",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-qe-test",
                    "pipelinesascode.tekton.dev/sha": "ef9a55fab5ef515b87eb96a4ff9102565595f5f4",
                    "pipelinesascode.tekton.dev/sha-title": "Test MR from TSSC e2e test",
                    "pipelinesascode.tekton.dev/sha-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax/-/commit/ef9a55fab5ef515b87eb96a4ff9102565595f5f4",
                    "pipelinesascode.tekton.dev/source-branch": "test-branch-1777391866587",
                    "pipelinesascode.tekton.dev/source-project-id": "81724388",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/target-project-id": "81724388",
                    "pipelinesascode.tekton.dev/task-0": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/init.yaml",
                    "pipelinesascode.tekton.dev/task-1": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/git-clone.yaml",
                    "pipelinesascode.tekton.dev/task-10": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/deploy-workload.yaml",
                    "pipelinesascode.tekton.dev/task-11": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/scan-workload.yaml",
                    "pipelinesascode.tekton.dev/task-12": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/summarize-workload.yaml",
                    "pipelinesascode.tekton.dev/task-13": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/show-workload-sbom.yaml",
                    "pipelinesascode.tekton.dev/task-14": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/deploy-workload-check.yaml",
                    "pipelinesascode.tekton.dev/task-2": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/buildah-rhtap.yaml",
                    "pipelinesascode.tekton.dev/task-3": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/acs-image-check.yaml",
                    "pipelinesascode.tekton.dev/task-4": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/acs-image-scan.yaml",
                    "pipelinesascode.tekton.dev/task-5": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/acs-deploy-check.yaml",
                    "pipelinesascode.tekton.dev/task-6": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/update-deployment.yaml",
                    "pipelinesascode.tekton.dev/task-7": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/show-sbom-rhdh.yaml",
                    "pipelinesascode.tekton.dev/task-8": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/summary.yaml",
                    "pipelinesascode.tekton.dev/task-9": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/build-workload.yaml",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "tssc-app-ci/results/cc51d2ff-0302-4b38-a87c-a1c40cccb31d/records/8157a48e-e235-46ee-a52d-9372825e39d8",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"e2e-tests-go-eciytfax\",\"commit\":\"ef9a55fab5ef515b87eb96a4ff9102565595f5f4\",\"eventType\":\"Merge Request\",\"pull_request-id\":1}",
                    "results.tekton.dev/result": "tssc-app-ci/results/cc51d2ff-0302-4b38-a87c-a1c40cccb31d",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "containers, tssc"
                },
                "creationTimestamp": "2026-04-28T15:59:42Z",
                "finalizers": [
                    "chains.tekton.dev/taskrun",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/part-of": "e2e-tests-go-eciytfax",
                    "app.kubernetes.io/version": "v0.39.5",
                    "argocd/app-name": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-id": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-namespace": "tssc-app",
                    "build.appstudio.redhat.com/build_type": "docker",
                    "janus-idp.io/tekton": "e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/event-type": "Merge_Request",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-on-pull-request",
                    "pipelinesascode.tekton.dev/pull-request": "1",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-repository",
                    "pipelinesascode.tekton.dev/sha": "ef9a55fab5ef515b87eb96a4ff9102565595f5f4",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "e2e-tests-go-eciytfax-on-pull-request-mrdzj",
                    "tekton.dev/pipelineRun": "e2e-tests-go-eciytfax-on-pull-request-mrdzj",
                    "tekton.dev/pipelineRunUID": "cc51d2ff-0302-4b38-a87c-a1c40cccb31d",
                    "tekton.dev/pipelineTask": "scan"
                },
                "name": "e2e-tests-go-eciytfax-on-pull-request-mrdzj-scan",
                "namespace": "tssc-app-ci",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "e2e-tests-go-eciytfax-on-pull-request-mrdzj",
                        "uid": "cc51d2ff-0302-4b38-a87c-a1c40cccb31d"
                    }
                ],
                "resourceVersion": "39390",
                "uid": "8157a48e-e235-46ee-a52d-9372825e39d8"
            },
            "spec": {
                "params": [
                    {
                        "name": "rox-secret-name",
                        "value": "rox-api-token"
                    },
                    {
                        "name": "IMAGE",
                        "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:on-pr-ef9a55fab5ef515b87eb96a4ff9102565595f5f4"
                    },
                    {
                        "name": "CONTEXT",
                        "value": "."
                    },
                    {
                        "name": "IMAGE_EXPIRES_AFTER",
                        "value": "5d"
                    },
                    {
                        "name": "COMMIT_SHA",
                        "value": "ef9a55fab5ef515b87eb96a4ff9102565595f5f4"
                    }
                ],
                "serviceAccountName": "pipeline",
                "taskSpec": {
                    "description": "Scan image built for vulnerabilities.",
                    "params": [
                        {
                            "description": "Reference of the image buildah will produce.",
                            "name": "IMAGE",
                            "type": "string"
                        },
                        {
                            "default": ".",
                            "description": "Path to the directory to use as context.",
                            "name": "CONTEXT",
                            "type": "string"
                        },
                        {
                            "default": "vfs",
                            "description": "Storage driver to configure for buildah",
                            "name": "STORAGE_DRIVER",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Summary of the roxctl scan",
                            "name": "SCAN_OUTPUT",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "CI_TYPE",
                                "value": "tekton"
                            },
                            {
                                "name": "STORAGE_DRIVER",
                                "value": "$(params.STORAGE_DRIVER)"
                            },
                            {
                                "name": "CONTEXT",
                                "value": "$(params.CONTEXT)"
                            },
                            {
                                "name": "IMAGE",
                                "value": "$(params.IMAGE)"
                            },
                            {
                                "name": "IMAGE_URL",
                                "value": "$(params.IMAGE)"
                            },
                            {
                                "name": "ROX_CENTRAL_ENDPOINT",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "rox-api-endpoint",
                                        "name": "$(params.rox-secret-name)"
                                    }
                                }
                            },
                            {
                                "name": "ROX_API_TOKEN",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "rox-api-token",
                                        "name": "$(params.rox-secret-name)"
                                    }
                                }
                            }
                        ],
                        "workingDir": "$(workspaces.source.path)/source"
                    },
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "STORAGE_DRIVER",
                                    "value": "$(params.STORAGE_DRIVER)"
                                },
                                {
                                    "name": "CONTEXT",
                                    "value": "$(params.CONTEXT)"
                                },
                                {
                                    "name": "IMAGE",
                                    "value": "$(params.IMAGE)"
                                },
                                {
                                    "name": "IMAGE_URL",
                                    "value": "$(params.IMAGE)"
                                },
                                {
                                    "name": "ROX_CENTRAL_ENDPOINT",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "rox-api-endpoint",
                                            "name": "$(params.rox-secret-name)"
                                        }
                                    }
                                },
                                {
                                    "name": "ROX_API_TOKEN",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "rox-api-token",
                                            "name": "$(params.rox-secret-name)"
                                        }
                                    }
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "scan",
                            "script": "echo \"running acs-image-check\"\n/workspace/source/tssc/acs-image-check.sh\necho \"running acs-image-scan\"\n/workspace/source/tssc/acs-image-scan.sh\ncat ./results/acs-image-scan/SCAN_OUTPUT \u003e $(results.SCAN_OUTPUT.path)\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/var/lib/containers",
                                    "name": "varlibcontainers"
                                },
                                {
                                    "mountPath": "/tmp/files",
                                    "name": "tmpfiles"
                                }
                            ],
                            "workingDir": "$(workspaces.source.path)/source"
                        }
                    ],
                    "volumes": [
                        {
                            "emptyDir": {},
                            "name": "varlibcontainers"
                        },
                        {
                            "emptyDir": {},
                            "name": "tmpfiles"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "Workspace containing the source code to build.",
                            "name": "source"
                        }
                    ]
                },
                "timeout": "1h0m0s",
                "workspaces": [
                    {
                        "name": "source",
                        "persistentVolumeClaim": {
                            "claimName": "pvc-b52b665ade"
                        }
                    }
                ]
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-28T15:59:50Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-28T15:59:50Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "e2e-tests-go-eciytfax-on-pull-request-mrdzj-scan-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    }
                },
                "results": [
                    {
                        "name": "SCAN_OUTPUT",
                        "type": "string",
                        "value": "{\"vulnerabilities\":{\"critical\":0,\"high\":4,\"medium\":7,\"low\":8}}\n"
                    }
                ],
                "startTime": "2026-04-28T15:59:42Z",
                "steps": [
                    {
                        "container": "step-scan",
                        "imageID": "quay.io/redhat-tssc/task-runner@sha256:db633cb62eb097a46ca9e3e0a54d21c8ebd444f81a074ce1f1afa61956185dbf",
                        "name": "scan",
                        "provenance": {},
                        "terminated": {
                            "containerID": "cri-o://dae8de493ebf22c7f08a4c83b924588fac8101d7761bcecfc17799b6c983fe8f",
                            "exitCode": 0,
                            "finishedAt": "2026-04-28T15:59:50Z",
                            "message": "[{\"key\":\"SCAN_OUTPUT\",\"value\":\"{\\\"vulnerabilities\\\":{\\\"critical\\\":0,\\\"high\\\":4,\\\"medium\\\":7,\\\"low\\\":8}}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-28T15:59:48Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Scan image built for vulnerabilities.",
                    "params": [
                        {
                            "description": "Reference of the image buildah will produce.",
                            "name": "IMAGE",
                            "type": "string"
                        },
                        {
                            "default": ".",
                            "description": "Path to the directory to use as context.",
                            "name": "CONTEXT",
                            "type": "string"
                        },
                        {
                            "default": "vfs",
                            "description": "Storage driver to configure for buildah",
                            "name": "STORAGE_DRIVER",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Summary of the roxctl scan",
                            "name": "SCAN_OUTPUT",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "CI_TYPE",
                                "value": "tekton"
                            },
                            {
                                "name": "STORAGE_DRIVER",
                                "value": "vfs"
                            },
                            {
                                "name": "CONTEXT",
                                "value": "."
                            },
                            {
                                "name": "IMAGE",
                                "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:on-pr-ef9a55fab5ef515b87eb96a4ff9102565595f5f4"
                            },
                            {
                                "name": "IMAGE_URL",
                                "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:on-pr-ef9a55fab5ef515b87eb96a4ff9102565595f5f4"
                            },
                            {
                                "name": "ROX_CENTRAL_ENDPOINT",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "rox-api-endpoint",
                                        "name": "rox-api-token"
                                    }
                                }
                            },
                            {
                                "name": "ROX_API_TOKEN",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "rox-api-token",
                                        "name": "rox-api-token"
                                    }
                                }
                            }
                        ],
                        "workingDir": "/workspace/source/source"
                    },
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "STORAGE_DRIVER",
                                    "value": "vfs"
                                },
                                {
                                    "name": "CONTEXT",
                                    "value": "."
                                },
                                {
                                    "name": "IMAGE",
                                    "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:on-pr-ef9a55fab5ef515b87eb96a4ff9102565595f5f4"
                                },
                                {
                                    "name": "IMAGE_URL",
                                    "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:on-pr-ef9a55fab5ef515b87eb96a4ff9102565595f5f4"
                                },
                                {
                                    "name": "ROX_CENTRAL_ENDPOINT",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "rox-api-endpoint",
                                            "name": "rox-api-token"
                                        }
                                    }
                                },
                                {
                                    "name": "ROX_API_TOKEN",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "rox-api-token",
                                            "name": "rox-api-token"
                                        }
                                    }
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "scan",
                            "script": "echo \"running acs-image-check\"\n/workspace/source/tssc/acs-image-check.sh\necho \"running acs-image-scan\"\n/workspace/source/tssc/acs-image-scan.sh\ncat ./results/acs-image-scan/SCAN_OUTPUT \u003e /tekton/results/SCAN_OUTPUT\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/var/lib/containers",
                                    "name": "varlibcontainers"
                                },
                                {
                                    "mountPath": "/tmp/files",
                                    "name": "tmpfiles"
                                }
                            ],
                            "workingDir": "/workspace/source/source"
                        }
                    ],
                    "volumes": [
                        {
                            "emptyDir": {},
                            "name": "varlibcontainers"
                        },
                        {
                            "emptyDir": {},
                            "name": "tmpfiles"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "Workspace containing the source code to build.",
                            "name": "source"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.redhat.com/build-type": "docker",
                    "build.appstudio.redhat.com/task-name": "show-workload-sbom",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "https://rekor-server-tssc-tas.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/api/v1/log/entries?logIndex=9",
                    "pipeline.tekton.dev/affinity-assistant": "affinity-assistant-f53ad6fc68",
                    "pipeline.tekton.dev/release": "8910674cb953317a4373f33822024b9de8c5fa22",
                    "pipelinesascode.tekton.dev/branch": "main",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "Merge Request",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-mgzism",
                    "pipelinesascode.tekton.dev/git-provider": "gitlab",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/k8s/ns/tssc-app-ci/tekton.dev~v1~PipelineRun/e2e-tests-go-eciytfax-on-pull-request-mrdzj",
                    "pipelinesascode.tekton.dev/max-keep-runs": "2",
                    "pipelinesascode.tekton.dev/on-event": "[pull_request]",
                    "pipelinesascode.tekton.dev/on-target-branch": "[main]",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-on-pull-request",
                    "pipelinesascode.tekton.dev/pipeline": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/pipelines/docker-build-tssc.yaml",
                    "pipelinesascode.tekton.dev/pull-request": "1",
                    "pipelinesascode.tekton.dev/repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-repository",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-qe-test",
                    "pipelinesascode.tekton.dev/sha": "ef9a55fab5ef515b87eb96a4ff9102565595f5f4",
                    "pipelinesascode.tekton.dev/sha-title": "Test MR from TSSC e2e test",
                    "pipelinesascode.tekton.dev/sha-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax/-/commit/ef9a55fab5ef515b87eb96a4ff9102565595f5f4",
                    "pipelinesascode.tekton.dev/source-branch": "test-branch-1777391866587",
                    "pipelinesascode.tekton.dev/source-project-id": "81724388",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/target-project-id": "81724388",
                    "pipelinesascode.tekton.dev/task-0": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/init.yaml",
                    "pipelinesascode.tekton.dev/task-1": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/git-clone.yaml",
                    "pipelinesascode.tekton.dev/task-10": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/deploy-workload.yaml",
                    "pipelinesascode.tekton.dev/task-11": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/scan-workload.yaml",
                    "pipelinesascode.tekton.dev/task-12": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/summarize-workload.yaml",
                    "pipelinesascode.tekton.dev/task-13": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/show-workload-sbom.yaml",
                    "pipelinesascode.tekton.dev/task-14": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/deploy-workload-check.yaml",
                    "pipelinesascode.tekton.dev/task-2": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/buildah-rhtap.yaml",
                    "pipelinesascode.tekton.dev/task-3": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/acs-image-check.yaml",
                    "pipelinesascode.tekton.dev/task-4": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/acs-image-scan.yaml",
                    "pipelinesascode.tekton.dev/task-5": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/acs-deploy-check.yaml",
                    "pipelinesascode.tekton.dev/task-6": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/update-deployment.yaml",
                    "pipelinesascode.tekton.dev/task-7": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/show-sbom-rhdh.yaml",
                    "pipelinesascode.tekton.dev/task-8": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/summary.yaml",
                    "pipelinesascode.tekton.dev/task-9": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/build-workload.yaml",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "tssc-app-ci/results/cc51d2ff-0302-4b38-a87c-a1c40cccb31d/records/a4794e89-f052-4e36-a6b3-6fd1075da295",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"e2e-tests-go-eciytfax\",\"commit\":\"ef9a55fab5ef515b87eb96a4ff9102565595f5f4\",\"eventType\":\"Merge Request\",\"pull_request-id\":1}",
                    "results.tekton.dev/result": "tssc-app-ci/results/cc51d2ff-0302-4b38-a87c-a1c40cccb31d",
                    "results.tekton.dev/stored": "true",
                    "task.output.location": "results",
                    "task.results.format": "application/text",
                    "task.results.key": "LINK_TO_SBOM",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "containers, tssc"
                },
                "creationTimestamp": "2026-04-28T15:59:50Z",
                "finalizers": [
                    "chains.tekton.dev/taskrun",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/part-of": "e2e-tests-go-eciytfax",
                    "app.kubernetes.io/version": "v0.39.5",
                    "argocd/app-name": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-id": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-namespace": "tssc-app",
                    "build.appstudio.redhat.com/build_type": "docker",
                    "janus-idp.io/tekton": "e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/event-type": "Merge_Request",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-on-pull-request",
                    "pipelinesascode.tekton.dev/pull-request": "1",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-repository",
                    "pipelinesascode.tekton.dev/sha": "ef9a55fab5ef515b87eb96a4ff9102565595f5f4",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "e2e-tests-go-eciytfax-on-pull-request-mrdzj",
                    "tekton.dev/pipelineRun": "e2e-tests-go-eciytfax-on-pull-request-mrdzj",
                    "tekton.dev/pipelineRunUID": "cc51d2ff-0302-4b38-a87c-a1c40cccb31d",
                    "tekton.dev/pipelineTask": "show-sbom"
                },
                "name": "e2e-tests-go-eciytfax-on-pull-request-mrdzj-show-sbom",
                "namespace": "tssc-app-ci",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "e2e-tests-go-eciytfax-on-pull-request-mrdzj",
                        "uid": "cc51d2ff-0302-4b38-a87c-a1c40cccb31d"
                    }
                ],
                "resourceVersion": "39615",
                "uid": "a4794e89-f052-4e36-a6b3-6fd1075da295"
            },
            "spec": {
                "params": [
                    {
                        "name": "IMAGE",
                        "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:on-pr-ef9a55fab5ef515b87eb96a4ff9102565595f5f4"
                    },
                    {
                        "name": "CONTEXT",
                        "value": "."
                    },
                    {
                        "name": "IMAGE_EXPIRES_AFTER",
                        "value": "5d"
                    },
                    {
                        "name": "COMMIT_SHA",
                        "value": "ef9a55fab5ef515b87eb96a4ff9102565595f5f4"
                    }
                ],
                "serviceAccountName": "pipeline",
                "taskSpec": {
                    "description": "Show SBOM report for the built image.",
                    "params": [
                        {
                            "description": "Reference of the image buildah will produce.",
                            "name": "IMAGE",
                            "type": "string"
                        },
                        {
                            "default": ".",
                            "description": "Path to the directory to use as context.",
                            "name": "CONTEXT",
                            "type": "string"
                        },
                        {
                            "default": "vfs",
                            "description": "Storage driver to configure for buildah",
                            "name": "STORAGE_DRIVER",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Placeholder result meant to make RHDH identify this task as the producer of the SBOM logs.",
                            "name": "LINK_TO_SBOM",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "CI_TYPE",
                                "value": "tekton"
                            },
                            {
                                "name": "STORAGE_DRIVER",
                                "value": "$(params.STORAGE_DRIVER)"
                            },
                            {
                                "name": "CONTEXT",
                                "value": "$(params.CONTEXT)"
                            },
                            {
                                "name": "IMAGE",
                                "value": "$(params.IMAGE)"
                            },
                            {
                                "name": "IMAGE_URL",
                                "value": "$(params.IMAGE)"
                            }
                        ],
                        "workingDir": "$(workspaces.source.path)/source"
                    },
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "STORAGE_DRIVER",
                                    "value": "$(params.STORAGE_DRIVER)"
                                },
                                {
                                    "name": "CONTEXT",
                                    "value": "$(params.CONTEXT)"
                                },
                                {
                                    "name": "IMAGE",
                                    "value": "$(params.IMAGE)"
                                },
                                {
                                    "name": "IMAGE_URL",
                                    "value": "$(params.IMAGE)"
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "show-sbom",
                            "script": "echo \"running show-sbom-rhdh\"\n/workspace/source/tssc/show-sbom-rhdh.sh\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/var/lib/containers",
                                    "name": "varlibcontainers"
                                },
                                {
                                    "mountPath": "/tmp/files",
                                    "name": "tmpfiles"
                                }
                            ],
                            "workingDir": "$(workspaces.source.path)/source"
                        }
                    ],
                    "volumes": [
                        {
                            "emptyDir": {},
                            "name": "varlibcontainers"
                        },
                        {
                            "emptyDir": {},
                            "name": "tmpfiles"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "Workspace containing the source code to build.",
                            "name": "source"
                        }
                    ]
                },
                "timeout": "1h0m0s",
                "workspaces": [
                    {
                        "name": "source",
                        "persistentVolumeClaim": {
                            "claimName": "pvc-b52b665ade"
                        }
                    }
                ]
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-28T15:59:56Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-28T15:59:56Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "e2e-tests-go-eciytfax-on-pull-request-mrdzj-show-sbom-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    }
                },
                "startTime": "2026-04-28T15:59:50Z",
                "steps": [
                    {
                        "container": "step-show-sbom",
                        "imageID": "quay.io/redhat-tssc/task-runner@sha256:db633cb62eb097a46ca9e3e0a54d21c8ebd444f81a074ce1f1afa61956185dbf",
                        "name": "show-sbom",
                        "provenance": {},
                        "terminated": {
                            "containerID": "cri-o://c78891f9eb3f0225daa6b25437facc6a22308c4e68cde3e50de4c851c4ddf570",
                            "exitCode": 0,
                            "finishedAt": "2026-04-28T15:59:56Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-28T15:59:56Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Show SBOM report for the built image.",
                    "params": [
                        {
                            "description": "Reference of the image buildah will produce.",
                            "name": "IMAGE",
                            "type": "string"
                        },
                        {
                            "default": ".",
                            "description": "Path to the directory to use as context.",
                            "name": "CONTEXT",
                            "type": "string"
                        },
                        {
                            "default": "vfs",
                            "description": "Storage driver to configure for buildah",
                            "name": "STORAGE_DRIVER",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Placeholder result meant to make RHDH identify this task as the producer of the SBOM logs.",
                            "name": "LINK_TO_SBOM",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "CI_TYPE",
                                "value": "tekton"
                            },
                            {
                                "name": "STORAGE_DRIVER",
                                "value": "vfs"
                            },
                            {
                                "name": "CONTEXT",
                                "value": "."
                            },
                            {
                                "name": "IMAGE",
                                "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:on-pr-ef9a55fab5ef515b87eb96a4ff9102565595f5f4"
                            },
                            {
                                "name": "IMAGE_URL",
                                "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:on-pr-ef9a55fab5ef515b87eb96a4ff9102565595f5f4"
                            }
                        ],
                        "workingDir": "/workspace/source/source"
                    },
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "STORAGE_DRIVER",
                                    "value": "vfs"
                                },
                                {
                                    "name": "CONTEXT",
                                    "value": "."
                                },
                                {
                                    "name": "IMAGE",
                                    "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:on-pr-ef9a55fab5ef515b87eb96a4ff9102565595f5f4"
                                },
                                {
                                    "name": "IMAGE_URL",
                                    "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:on-pr-ef9a55fab5ef515b87eb96a4ff9102565595f5f4"
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "show-sbom",
                            "script": "echo \"running show-sbom-rhdh\"\n/workspace/source/tssc/show-sbom-rhdh.sh\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/var/lib/containers",
                                    "name": "varlibcontainers"
                                },
                                {
                                    "mountPath": "/tmp/files",
                                    "name": "tmpfiles"
                                }
                            ],
                            "workingDir": "/workspace/source/source"
                        }
                    ],
                    "volumes": [
                        {
                            "emptyDir": {},
                            "name": "varlibcontainers"
                        },
                        {
                            "emptyDir": {},
                            "name": "tmpfiles"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "Workspace containing the source code to build.",
                            "name": "source"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.redhat.com/build-type": "docker",
                    "build.appstudio.redhat.com/task-name": "summarize-workload",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "https://rekor-server-tssc-tas.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/api/v1/log/entries?logIndex=8",
                    "pipeline.tekton.dev/affinity-assistant": "affinity-assistant-f53ad6fc68",
                    "pipeline.tekton.dev/release": "8910674cb953317a4373f33822024b9de8c5fa22",
                    "pipelinesascode.tekton.dev/branch": "main",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "Merge Request",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-mgzism",
                    "pipelinesascode.tekton.dev/git-provider": "gitlab",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/k8s/ns/tssc-app-ci/tekton.dev~v1~PipelineRun/e2e-tests-go-eciytfax-on-pull-request-mrdzj",
                    "pipelinesascode.tekton.dev/max-keep-runs": "2",
                    "pipelinesascode.tekton.dev/on-event": "[pull_request]",
                    "pipelinesascode.tekton.dev/on-target-branch": "[main]",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-on-pull-request",
                    "pipelinesascode.tekton.dev/pipeline": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/pipelines/docker-build-tssc.yaml",
                    "pipelinesascode.tekton.dev/pull-request": "1",
                    "pipelinesascode.tekton.dev/repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-repository",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-qe-test",
                    "pipelinesascode.tekton.dev/sha": "ef9a55fab5ef515b87eb96a4ff9102565595f5f4",
                    "pipelinesascode.tekton.dev/sha-title": "Test MR from TSSC e2e test",
                    "pipelinesascode.tekton.dev/sha-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax/-/commit/ef9a55fab5ef515b87eb96a4ff9102565595f5f4",
                    "pipelinesascode.tekton.dev/source-branch": "test-branch-1777391866587",
                    "pipelinesascode.tekton.dev/source-project-id": "81724388",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/target-project-id": "81724388",
                    "pipelinesascode.tekton.dev/task-0": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/init.yaml",
                    "pipelinesascode.tekton.dev/task-1": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/git-clone.yaml",
                    "pipelinesascode.tekton.dev/task-10": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/deploy-workload.yaml",
                    "pipelinesascode.tekton.dev/task-11": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/scan-workload.yaml",
                    "pipelinesascode.tekton.dev/task-12": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/summarize-workload.yaml",
                    "pipelinesascode.tekton.dev/task-13": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/show-workload-sbom.yaml",
                    "pipelinesascode.tekton.dev/task-14": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/deploy-workload-check.yaml",
                    "pipelinesascode.tekton.dev/task-2": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/buildah-rhtap.yaml",
                    "pipelinesascode.tekton.dev/task-3": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/acs-image-check.yaml",
                    "pipelinesascode.tekton.dev/task-4": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/acs-image-scan.yaml",
                    "pipelinesascode.tekton.dev/task-5": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/acs-deploy-check.yaml",
                    "pipelinesascode.tekton.dev/task-6": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/update-deployment.yaml",
                    "pipelinesascode.tekton.dev/task-7": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/show-sbom-rhdh.yaml",
                    "pipelinesascode.tekton.dev/task-8": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/summary.yaml",
                    "pipelinesascode.tekton.dev/task-9": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/build-workload.yaml",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "tssc-app-ci/results/cc51d2ff-0302-4b38-a87c-a1c40cccb31d/records/fe325a49-6470-4778-a908-daa29295d50a",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"e2e-tests-go-eciytfax\",\"commit\":\"ef9a55fab5ef515b87eb96a4ff9102565595f5f4\",\"eventType\":\"Merge Request\",\"pull_request-id\":1}",
                    "results.tekton.dev/result": "tssc-app-ci/results/cc51d2ff-0302-4b38-a87c-a1c40cccb31d",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "containers, tssc"
                },
                "creationTimestamp": "2026-04-28T15:59:50Z",
                "finalizers": [
                    "chains.tekton.dev/taskrun",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/part-of": "e2e-tests-go-eciytfax",
                    "app.kubernetes.io/version": "v0.39.5",
                    "argocd/app-name": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-id": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-namespace": "tssc-app",
                    "build.appstudio.redhat.com/build_type": "docker",
                    "janus-idp.io/tekton": "e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/event-type": "Merge_Request",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-on-pull-request",
                    "pipelinesascode.tekton.dev/pull-request": "1",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-repository",
                    "pipelinesascode.tekton.dev/sha": "ef9a55fab5ef515b87eb96a4ff9102565595f5f4",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "e2e-tests-go-eciytfax-on-pull-request-mrdzj",
                    "tekton.dev/pipelineRun": "e2e-tests-go-eciytfax-on-pull-request-mrdzj",
                    "tekton.dev/pipelineRunUID": "cc51d2ff-0302-4b38-a87c-a1c40cccb31d",
                    "tekton.dev/pipelineTask": "summarize"
                },
                "name": "e2e-tests-go-eciytfax-on-pull-request-mrdzj-summarize",
                "namespace": "tssc-app-ci",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "e2e-tests-go-eciytfax-on-pull-request-mrdzj",
                        "uid": "cc51d2ff-0302-4b38-a87c-a1c40cccb31d"
                    }
                ],
                "resourceVersion": "39551",
                "uid": "fe325a49-6470-4778-a908-daa29295d50a"
            },
            "spec": {
                "params": [
                    {
                        "name": "IMAGE",
                        "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:on-pr-ef9a55fab5ef515b87eb96a4ff9102565595f5f4"
                    },
                    {
                        "name": "CONTEXT",
                        "value": "."
                    },
                    {
                        "name": "IMAGE_EXPIRES_AFTER",
                        "value": "5d"
                    },
                    {
                        "name": "COMMIT_SHA",
                        "value": "ef9a55fab5ef515b87eb96a4ff9102565595f5f4"
                    }
                ],
                "serviceAccountName": "pipeline",
                "taskSpec": {
                    "description": "Summarize all the steps in the build pipeline.",
                    "params": [
                        {
                            "description": "Reference of the image buildah will produce.",
                            "name": "IMAGE",
                            "type": "string"
                        },
                        {
                            "default": ".",
                            "description": "Path to the directory to use as context.",
                            "name": "CONTEXT",
                            "type": "string"
                        },
                        {
                            "default": "vfs",
                            "description": "Storage driver to configure for buildah",
                            "name": "STORAGE_DRIVER",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "CI_TYPE",
                                "value": "tekton"
                            },
                            {
                                "name": "STORAGE_DRIVER",
                                "value": "$(params.STORAGE_DRIVER)"
                            },
                            {
                                "name": "CONTEXT",
                                "value": "$(params.CONTEXT)"
                            },
                            {
                                "name": "IMAGE",
                                "value": "$(params.IMAGE)"
                            },
                            {
                                "name": "IMAGE_URL",
                                "value": "$(params.IMAGE)"
                            }
                        ],
                        "workingDir": "$(workspaces.source.path)/source"
                    },
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "STORAGE_DRIVER",
                                    "value": "$(params.STORAGE_DRIVER)"
                                },
                                {
                                    "name": "CONTEXT",
                                    "value": "$(params.CONTEXT)"
                                },
                                {
                                    "name": "IMAGE",
                                    "value": "$(params.IMAGE)"
                                },
                                {
                                    "name": "IMAGE_URL",
                                    "value": "$(params.IMAGE)"
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "summary",
                            "script": "echo \"running summary\"\n/workspace/source/tssc/summary.sh\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/var/lib/containers",
                                    "name": "varlibcontainers"
                                },
                                {
                                    "mountPath": "/tmp/files",
                                    "name": "tmpfiles"
                                }
                            ],
                            "workingDir": "$(workspaces.source.path)/source"
                        }
                    ],
                    "volumes": [
                        {
                            "emptyDir": {},
                            "name": "varlibcontainers"
                        },
                        {
                            "emptyDir": {},
                            "name": "tmpfiles"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "Workspace containing the source code to build.",
                            "name": "source"
                        }
                    ]
                },
                "timeout": "1h0m0s",
                "workspaces": [
                    {
                        "name": "source",
                        "persistentVolumeClaim": {
                            "claimName": "pvc-b52b665ade"
                        }
                    }
                ]
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-28T15:59:55Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-28T15:59:55Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "e2e-tests-go-eciytfax-on-pull-request-mrdzj-summarize-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    }
                },
                "startTime": "2026-04-28T15:59:50Z",
                "steps": [
                    {
                        "container": "step-summary",
                        "imageID": "quay.io/redhat-tssc/task-runner@sha256:db633cb62eb097a46ca9e3e0a54d21c8ebd444f81a074ce1f1afa61956185dbf",
                        "name": "summary",
                        "provenance": {},
                        "terminated": {
                            "containerID": "cri-o://37901cd999b4fb2a7bfd818af118917fc018ce6f6c47f82edd311ddac900d3c3",
                            "exitCode": 0,
                            "finishedAt": "2026-04-28T15:59:55Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-28T15:59:55Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Summarize all the steps in the build pipeline.",
                    "params": [
                        {
                            "description": "Reference of the image buildah will produce.",
                            "name": "IMAGE",
                            "type": "string"
                        },
                        {
                            "default": ".",
                            "description": "Path to the directory to use as context.",
                            "name": "CONTEXT",
                            "type": "string"
                        },
                        {
                            "default": "vfs",
                            "description": "Storage driver to configure for buildah",
                            "name": "STORAGE_DRIVER",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "CI_TYPE",
                                "value": "tekton"
                            },
                            {
                                "name": "STORAGE_DRIVER",
                                "value": "vfs"
                            },
                            {
                                "name": "CONTEXT",
                                "value": "."
                            },
                            {
                                "name": "IMAGE",
                                "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:on-pr-ef9a55fab5ef515b87eb96a4ff9102565595f5f4"
                            },
                            {
                                "name": "IMAGE_URL",
                                "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:on-pr-ef9a55fab5ef515b87eb96a4ff9102565595f5f4"
                            }
                        ],
                        "workingDir": "/workspace/source/source"
                    },
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "STORAGE_DRIVER",
                                    "value": "vfs"
                                },
                                {
                                    "name": "CONTEXT",
                                    "value": "."
                                },
                                {
                                    "name": "IMAGE",
                                    "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:on-pr-ef9a55fab5ef515b87eb96a4ff9102565595f5f4"
                                },
                                {
                                    "name": "IMAGE_URL",
                                    "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:on-pr-ef9a55fab5ef515b87eb96a4ff9102565595f5f4"
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "summary",
                            "script": "echo \"running summary\"\n/workspace/source/tssc/summary.sh\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/var/lib/containers",
                                    "name": "varlibcontainers"
                                },
                                {
                                    "mountPath": "/tmp/files",
                                    "name": "tmpfiles"
                                }
                            ],
                            "workingDir": "/workspace/source/source"
                        }
                    ],
                    "volumes": [
                        {
                            "emptyDir": {},
                            "name": "varlibcontainers"
                        },
                        {
                            "emptyDir": {},
                            "name": "tmpfiles"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "Workspace containing the source code to build.",
                            "name": "source"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.redhat.com/build-type": "docker",
                    "build.appstudio.redhat.com/task-name": "build-workload",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "https://rekor-server-tssc-tas.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/api/v1/log/entries?logIndex=21",
                    "pipeline.tekton.dev/affinity-assistant": "affinity-assistant-032ccb134c",
                    "pipeline.tekton.dev/release": "8910674cb953317a4373f33822024b9de8c5fa22",
                    "pipelinesascode.tekton.dev/branch": "refs/heads/main",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-tdupri",
                    "pipelinesascode.tekton.dev/git-provider": "gitlab",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/k8s/ns/tssc-app-ci/tekton.dev~v1~PipelineRun/e2e-tests-go-eciytfax-on-push-sgdp2",
                    "pipelinesascode.tekton.dev/max-keep-runs": "2",
                    "pipelinesascode.tekton.dev/on-event": "[push]",
                    "pipelinesascode.tekton.dev/on-target-branch": "[main]",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-on-push",
                    "pipelinesascode.tekton.dev/pipeline": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/pipelines/docker-build-tssc.yaml",
                    "pipelinesascode.tekton.dev/repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-repository",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-qe-test",
                    "pipelinesascode.tekton.dev/sha": "5a07e41d8b36e10e4387f9fd3fe9be02019d59fc",
                    "pipelinesascode.tekton.dev/sha-title": "Merge request #1",
                    "pipelinesascode.tekton.dev/sha-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax/-/commit/5a07e41d8b36e10e4387f9fd3fe9be02019d59fc",
                    "pipelinesascode.tekton.dev/source-branch": "refs/heads/main",
                    "pipelinesascode.tekton.dev/source-project-id": "81724388",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/target-project-id": "81724388",
                    "pipelinesascode.tekton.dev/task-0": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/init.yaml",
                    "pipelinesascode.tekton.dev/task-1": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/git-clone.yaml",
                    "pipelinesascode.tekton.dev/task-10": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/deploy-workload.yaml",
                    "pipelinesascode.tekton.dev/task-11": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/scan-workload.yaml",
                    "pipelinesascode.tekton.dev/task-12": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/summarize-workload.yaml",
                    "pipelinesascode.tekton.dev/task-13": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/show-workload-sbom.yaml",
                    "pipelinesascode.tekton.dev/task-14": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/deploy-workload-check.yaml",
                    "pipelinesascode.tekton.dev/task-2": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/buildah-rhtap.yaml",
                    "pipelinesascode.tekton.dev/task-3": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/acs-image-check.yaml",
                    "pipelinesascode.tekton.dev/task-4": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/acs-image-scan.yaml",
                    "pipelinesascode.tekton.dev/task-5": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/acs-deploy-check.yaml",
                    "pipelinesascode.tekton.dev/task-6": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/update-deployment.yaml",
                    "pipelinesascode.tekton.dev/task-7": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/show-sbom-rhdh.yaml",
                    "pipelinesascode.tekton.dev/task-8": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/summary.yaml",
                    "pipelinesascode.tekton.dev/task-9": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/build-workload.yaml",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "tssc-app-ci/results/5e2f2a93-43b0-4e8e-94a5-d699ca6d955f/records/1944ffcd-1a44-4a79-9fa9-12d3b219a82a",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"e2e-tests-go-eciytfax\",\"commit\":\"5a07e41d8b36e10e4387f9fd3fe9be02019d59fc\",\"eventType\":\"push\"}",
                    "results.tekton.dev/result": "tssc-app-ci/results/5e2f2a93-43b0-4e8e-94a5-d699ca6d955f",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "containers, tssc"
                },
                "creationTimestamp": "2026-04-28T16:00:42Z",
                "finalizers": [
                    "chains.tekton.dev/taskrun",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/part-of": "e2e-tests-go-eciytfax",
                    "app.kubernetes.io/version": "v0.39.5",
                    "argocd/app-name": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-id": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-namespace": "tssc-app",
                    "build.appstudio.redhat.com/build_type": "docker",
                    "janus-idp.io/tekton": "e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-on-push",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-repository",
                    "pipelinesascode.tekton.dev/sha": "5a07e41d8b36e10e4387f9fd3fe9be02019d59fc",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "e2e-tests-go-eciytfax-on-push-sgdp2",
                    "tekton.dev/pipelineRun": "e2e-tests-go-eciytfax-on-push-sgdp2",
                    "tekton.dev/pipelineRunUID": "5e2f2a93-43b0-4e8e-94a5-d699ca6d955f",
                    "tekton.dev/pipelineTask": "build"
                },
                "name": "e2e-tests-go-eciytfax-on-push-sgdp2-build",
                "namespace": "tssc-app-ci",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "e2e-tests-go-eciytfax-on-push-sgdp2",
                        "uid": "5e2f2a93-43b0-4e8e-94a5-d699ca6d955f"
                    }
                ],
                "resourceVersion": "41672",
                "uid": "1944ffcd-1a44-4a79-9fa9-12d3b219a82a"
            },
            "spec": {
                "params": [
                    {
                        "name": "rox-secret-name",
                        "value": "rox-api-token"
                    },
                    {
                        "name": "gitops-secret-name",
                        "value": "gitlab-auth-secret"
                    },
                    {
                        "name": "cosign-public-secret-name",
                        "value": "cosign-pub"
                    },
                    {
                        "name": "tpa_secret_name",
                        "value": "tpa-secret"
                    },
                    {
                        "name": "IMAGE",
                        "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                    },
                    {
                        "name": "DOCKERFILE",
                        "value": "docker/Dockerfile"
                    },
                    {
                        "name": "CONTEXT",
                        "value": "."
                    },
                    {
                        "name": "IMAGE_EXPIRES_AFTER",
                        "value": "5d"
                    },
                    {
                        "name": "COMMIT_SHA",
                        "value": "5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                    },
                    {
                        "name": "BUILD_ARGS",
                        "value": []
                    },
                    {
                        "name": "BUILD_ARGS_FILE",
                        "value": ""
                    }
                ],
                "serviceAccountName": "pipeline",
                "taskSpec": {
                    "description": "Builds source code into a container image and pushes the image into container registry using buildah tool.\nIn addition it generates a SBOM file, injects the SBOM file into final container image and pushes the SBOM file as separate image using cosign tool.",
                    "params": [
                        {
                            "description": "Reference of the image buildah will produce.",
                            "name": "IMAGE",
                            "type": "string"
                        },
                        {
                            "default": "./Dockerfile",
                            "description": "Path to the Dockerfile to build.",
                            "name": "DOCKERFILE",
                            "type": "string"
                        },
                        {
                            "default": ".",
                            "description": "Path to the directory to use as context.",
                            "name": "CONTEXT",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Verify the TLS on the registry endpoint (for push/pull to a non-TLS registry)",
                            "name": "TLSVERIFY",
                            "type": "string"
                        },
                        {
                            "default": [],
                            "description": "Array of --build-arg values (\"arg=value\" strings)",
                            "name": "BUILD_ARGS",
                            "type": "array"
                        },
                        {
                            "default": "",
                            "description": "Path to a file with build arguments, see https://www.mankier.com/1/buildah-build#--build-arg-file",
                            "name": "BUILD_ARGS_FILE",
                            "type": "string"
                        },
                        {
                            "default": "vfs",
                            "description": "Storage driver to configure for buildah",
                            "name": "STORAGE_DRIVER",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Digest of the image just built",
                            "name": "IMAGE_DIGEST",
                            "type": "string"
                        },
                        {
                            "description": "Image repository and tag where the built image was pushed",
                            "name": "IMAGE_URL",
                            "type": "string"
                        },
                        {
                            "description": "Digests of the base images used for build",
                            "name": "BASE_IMAGES_DIGESTS",
                            "type": "string"
                        },
                        {
                            "description": "Link to the SBOM layer pushed to the registry as part of an OCI artifact.",
                            "name": "SBOM_BLOB_URL",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "CI_TYPE",
                                "value": "tekton"
                            },
                            {
                                "name": "STORAGE_DRIVER",
                                "value": "$(params.STORAGE_DRIVER)"
                            },
                            {
                                "name": "CONTEXT",
                                "value": "$(params.CONTEXT)"
                            },
                            {
                                "name": "DOCKERFILE",
                                "value": "$(params.DOCKERFILE)"
                            },
                            {
                                "name": "IMAGE",
                                "value": "$(params.IMAGE)"
                            },
                            {
                                "name": "IMAGE_URL",
                                "value": "$(params.IMAGE)"
                            },
                            {
                                "name": "TLSVERIFY",
                                "value": "$(params.TLSVERIFY)"
                            },
                            {
                                "name": "BUILD_ARGS_FILE",
                                "value": "$(params.BUILD_ARGS_FILE)"
                            },
                            {
                                "name": "_BUILDAH_STARTED_IN_USERNS"
                            },
                            {
                                "name": "BUILDAH_ISOLATION",
                                "value": "chroot"
                            },
                            {
                                "name": "COSIGN_SECRET_PASSWORD",
                                "value": "dummy"
                            },
                            {
                                "name": "COSIGN_SECRET_KEY",
                                "value": "dummy"
                            },
                            {
                                "name": "ROX_CENTRAL_ENDPOINT",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "rox-api-endpoint",
                                        "name": "$(params.rox-secret-name)"
                                    }
                                }
                            },
                            {
                                "name": "TRUSTIFICATION_SUPPORTED_CYCLONEDX_VERSION",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "supported_cyclonedx_version",
                                        "name": "$(params.tpa_secret_name)"
                                    }
                                }
                            },
                            {
                                "name": "ROX_API_TOKEN",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "rox-api-token",
                                        "name": "$(params.rox-secret-name)"
                                    }
                                }
                            },
                            {
                                "name": "GITOPS_AUTH_PASSWORD",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "password",
                                        "name": "$(params.gitops-secret-name)"
                                    }
                                }
                            },
                            {
                                "name": "GITOPS_AUTH_USERNAME",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "username",
                                        "name": "$(params.gitops-secret-name)"
                                    }
                                }
                            },
                            {
                                "name": "COSIGN_PUBLIC_KEY",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "cosign.pub",
                                        "name": "$(params.cosign-public-secret-name)"
                                    }
                                }
                            }
                        ],
                        "workingDir": "$(workspaces.source.path)/source"
                    },
                    "steps": [
                        {
                            "args": [
                                "$(params.BUILD_ARGS[*])"
                            ],
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "STORAGE_DRIVER",
                                    "value": "$(params.STORAGE_DRIVER)"
                                },
                                {
                                    "name": "CONTEXT",
                                    "value": "$(params.CONTEXT)"
                                },
                                {
                                    "name": "DOCKERFILE",
                                    "value": "$(params.DOCKERFILE)"
                                },
                                {
                                    "name": "IMAGE",
                                    "value": "$(params.IMAGE)"
                                },
                                {
                                    "name": "IMAGE_URL",
                                    "value": "$(params.IMAGE)"
                                },
                                {
                                    "name": "TLSVERIFY",
                                    "value": "$(params.TLSVERIFY)"
                                },
                                {
                                    "name": "BUILD_ARGS_FILE",
                                    "value": "$(params.BUILD_ARGS_FILE)"
                                },
                                {
                                    "name": "_BUILDAH_STARTED_IN_USERNS"
                                },
                                {
                                    "name": "BUILDAH_ISOLATION",
                                    "value": "chroot"
                                },
                                {
                                    "name": "COSIGN_SECRET_PASSWORD",
                                    "value": "dummy"
                                },
                                {
                                    "name": "COSIGN_SECRET_KEY",
                                    "value": "dummy"
                                },
                                {
                                    "name": "ROX_CENTRAL_ENDPOINT",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "rox-api-endpoint",
                                            "name": "$(params.rox-secret-name)"
                                        }
                                    }
                                },
                                {
                                    "name": "TRUSTIFICATION_SUPPORTED_CYCLONEDX_VERSION",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "supported_cyclonedx_version",
                                            "name": "$(params.tpa_secret_name)"
                                        }
                                    }
                                },
                                {
                                    "name": "ROX_API_TOKEN",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "rox-api-token",
                                            "name": "$(params.rox-secret-name)"
                                        }
                                    }
                                },
                                {
                                    "name": "GITOPS_AUTH_PASSWORD",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "password",
                                            "name": "$(params.gitops-secret-name)"
                                        }
                                    }
                                },
                                {
                                    "name": "GITOPS_AUTH_USERNAME",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "username",
                                            "name": "$(params.gitops-secret-name)"
                                        }
                                    }
                                },
                                {
                                    "name": "COSIGN_PUBLIC_KEY",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "cosign.pub",
                                            "name": "$(params.cosign-public-secret-name)"
                                        }
                                    }
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "init",
                            "script": "# Sync scripts to the writable workspace\ncp -rf /work/tssc/ /workspace/source/\n# Append the dummy function to common.sh\nprintf '\\nfunction registry-login() {\\n  echo \"--- Registry Auth Bypass Active ---\"\\n  return 0\\n}\\n' \u003e\u003e /workspace/source/tssc/common.sh\necho \"Successfully patched /workspace/source/tssc/common.sh\"\necho \"running init\"\npwd\nls -la\n/workspace/source/tssc/init.sh\n",
                            "securityContext": {
                                "capabilities": {
                                    "add": [
                                        "SETFCAP"
                                    ]
                                }
                            },
                            "volumeMounts": [
                                {
                                    "mountPath": "/var/lib/containers",
                                    "name": "varlibcontainers"
                                },
                                {
                                    "mountPath": "/tmp/files",
                                    "name": "tmpfiles"
                                }
                            ],
                            "workingDir": "$(workspaces.source.path)/source"
                        },
                        {
                            "args": [
                                "$(params.BUILD_ARGS[*])"
                            ],
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "STORAGE_DRIVER",
                                    "value": "$(params.STORAGE_DRIVER)"
                                },
                                {
                                    "name": "CONTEXT",
                                    "value": "$(params.CONTEXT)"
                                },
                                {
                                    "name": "DOCKERFILE",
                                    "value": "$(params.DOCKERFILE)"
                                },
                                {
                                    "name": "IMAGE",
                                    "value": "$(params.IMAGE)"
                                },
                                {
                                    "name": "IMAGE_URL",
                                    "value": "$(params.IMAGE)"
                                },
                                {
                                    "name": "TLSVERIFY",
                                    "value": "$(params.TLSVERIFY)"
                                },
                                {
                                    "name": "BUILD_ARGS_FILE",
                                    "value": "$(params.BUILD_ARGS_FILE)"
                                },
                                {
                                    "name": "_BUILDAH_STARTED_IN_USERNS"
                                },
                                {
                                    "name": "BUILDAH_ISOLATION",
                                    "value": "chroot"
                                },
                                {
                                    "name": "COSIGN_SECRET_PASSWORD",
                                    "value": "dummy"
                                },
                                {
                                    "name": "COSIGN_SECRET_KEY",
                                    "value": "dummy"
                                },
                                {
                                    "name": "ROX_CENTRAL_ENDPOINT",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "rox-api-endpoint",
                                            "name": "$(params.rox-secret-name)"
                                        }
                                    }
                                },
                                {
                                    "name": "TRUSTIFICATION_SUPPORTED_CYCLONEDX_VERSION",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "supported_cyclonedx_version",
                                            "name": "$(params.tpa_secret_name)"
                                        }
                                    }
                                },
                                {
                                    "name": "ROX_API_TOKEN",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "rox-api-token",
                                            "name": "$(params.rox-secret-name)"
                                        }
                                    }
                                },
                                {
                                    "name": "GITOPS_AUTH_PASSWORD",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "password",
                                            "name": "$(params.gitops-secret-name)"
                                        }
                                    }
                                },
                                {
                                    "name": "GITOPS_AUTH_USERNAME",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "username",
                                            "name": "$(params.gitops-secret-name)"
                                        }
                                    }
                                },
                                {
                                    "name": "COSIGN_PUBLIC_KEY",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "cosign.pub",
                                            "name": "$(params.cosign-public-secret-name)"
                                        }
                                    }
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "build",
                            "script": "echo \"running buildah-tssc\"\n/workspace/source/tssc/buildah-tssc.sh\ncat ./results/buildah-tssc/BASE_IMAGES_DIGESTS \u003e $(results.BASE_IMAGES_DIGESTS.path)\ncat ./results/buildah-tssc/IMAGE_DIGEST \u003e $(results.IMAGE_DIGEST.path)\ncat ./results/buildah-tssc/IMAGE_URL \u003e $(results.IMAGE_URL.path)\ncat ./results/buildah-tssc/SBOM_BLOB_URL \u003e $(results.SBOM_BLOB_URL.path)\n",
                            "securityContext": {
                                "capabilities": {
                                    "add": [
                                        "SETFCAP"
                                    ]
                                }
                            },
                            "volumeMounts": [
                                {
                                    "mountPath": "/var/lib/containers",
                                    "name": "varlibcontainers"
                                },
                                {
                                    "mountPath": "/tmp/files",
                                    "name": "tmpfiles"
                                }
                            ],
                            "workingDir": "$(workspaces.source.path)/source"
                        }
                    ],
                    "volumes": [
                        {
                            "emptyDir": {},
                            "name": "varlibcontainers"
                        },
                        {
                            "emptyDir": {},
                            "name": "tmpfiles"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "Workspace containing the source code to build.",
                            "name": "source"
                        }
                    ]
                },
                "timeout": "1h0m0s",
                "workspaces": [
                    {
                        "name": "source",
                        "persistentVolumeClaim": {
                            "claimName": "pvc-8dabd9baba"
                        }
                    }
                ]
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-28T16:01:59Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-28T16:01:59Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "e2e-tests-go-eciytfax-on-push-sgdp2-build-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    }
                },
                "results": [
                    {
                        "name": "BASE_IMAGES_DIGESTS",
                        "type": "string",
                        "value": "registry.access.redhat.com/ubi9/ubi-micro:latest@sha256:2173487b3b72b1a7b11edc908e9bbf1726f9df46a4f78fd6d19a2bab0a701f38\nregistry.access.redhat.com/ubi9/go-toolset:9.7-1773088126@sha256:6da1160c0e8da15b585560ac6ef7b0179f17686aeaaa477ead6427daf8948fea\n"
                    },
                    {
                        "name": "IMAGE_DIGEST",
                        "type": "string",
                        "value": "sha256:b163db3b74bf9dc1fe9d1997cc9204f2e20de810d540b3892b3e2ba3c3dde4ea"
                    },
                    {
                        "name": "IMAGE_URL",
                        "type": "string",
                        "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                    },
                    {
                        "name": "SBOM_BLOB_URL",
                        "type": "string",
                        "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax@sha256:9d18352a6de0508f57cebf3e8b69f1314cc0e9fd84715148f5f25e0e2b42b70b"
                    }
                ],
                "startTime": "2026-04-28T16:00:42Z",
                "steps": [
                    {
                        "container": "step-init",
                        "imageID": "quay.io/redhat-tssc/task-runner@sha256:db633cb62eb097a46ca9e3e0a54d21c8ebd444f81a074ce1f1afa61956185dbf",
                        "name": "init",
                        "provenance": {},
                        "terminated": {
                            "containerID": "cri-o://5ae6d9674a8b4815c46dc9ebd088e3a439bf1787049b6c46415fdf7409554282",
                            "exitCode": 0,
                            "finishedAt": "2026-04-28T16:00:48Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-28T16:00:48Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-build",
                        "imageID": "quay.io/redhat-tssc/task-runner@sha256:db633cb62eb097a46ca9e3e0a54d21c8ebd444f81a074ce1f1afa61956185dbf",
                        "name": "build",
                        "provenance": {},
                        "terminated": {
                            "containerID": "cri-o://b4893b89b3cf5926dd67e3a1156956bf572bcbdd7a31818fc9569270e747f7cb",
                            "exitCode": 0,
                            "finishedAt": "2026-04-28T16:01:58Z",
                            "message": "[{\"key\":\"BASE_IMAGES_DIGESTS\",\"value\":\"registry.access.redhat.com/ubi9/ubi-micro:latest@sha256:2173487b3b72b1a7b11edc908e9bbf1726f9df46a4f78fd6d19a2bab0a701f38\\nregistry.access.redhat.com/ubi9/go-toolset:9.7-1773088126@sha256:6da1160c0e8da15b585560ac6ef7b0179f17686aeaaa477ead6427daf8948fea\\n\",\"type\":1},{\"key\":\"IMAGE_DIGEST\",\"value\":\"sha256:b163db3b74bf9dc1fe9d1997cc9204f2e20de810d540b3892b3e2ba3c3dde4ea\",\"type\":1},{\"key\":\"IMAGE_URL\",\"value\":\"nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc\",\"type\":1},{\"key\":\"SBOM_BLOB_URL\",\"value\":\"nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax@sha256:9d18352a6de0508f57cebf3e8b69f1314cc0e9fd84715148f5f25e0e2b42b70b\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-28T16:00:48Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Builds source code into a container image and pushes the image into container registry using buildah tool.\nIn addition it generates a SBOM file, injects the SBOM file into final container image and pushes the SBOM file as separate image using cosign tool.",
                    "params": [
                        {
                            "description": "Reference of the image buildah will produce.",
                            "name": "IMAGE",
                            "type": "string"
                        },
                        {
                            "default": "./Dockerfile",
                            "description": "Path to the Dockerfile to build.",
                            "name": "DOCKERFILE",
                            "type": "string"
                        },
                        {
                            "default": ".",
                            "description": "Path to the directory to use as context.",
                            "name": "CONTEXT",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Verify the TLS on the registry endpoint (for push/pull to a non-TLS registry)",
                            "name": "TLSVERIFY",
                            "type": "string"
                        },
                        {
                            "default": [],
                            "description": "Array of --build-arg values (\"arg=value\" strings)",
                            "name": "BUILD_ARGS",
                            "type": "array"
                        },
                        {
                            "default": "",
                            "description": "Path to a file with build arguments, see https://www.mankier.com/1/buildah-build#--build-arg-file",
                            "name": "BUILD_ARGS_FILE",
                            "type": "string"
                        },
                        {
                            "default": "vfs",
                            "description": "Storage driver to configure for buildah",
                            "name": "STORAGE_DRIVER",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Digest of the image just built",
                            "name": "IMAGE_DIGEST",
                            "type": "string"
                        },
                        {
                            "description": "Image repository and tag where the built image was pushed",
                            "name": "IMAGE_URL",
                            "type": "string"
                        },
                        {
                            "description": "Digests of the base images used for build",
                            "name": "BASE_IMAGES_DIGESTS",
                            "type": "string"
                        },
                        {
                            "description": "Link to the SBOM layer pushed to the registry as part of an OCI artifact.",
                            "name": "SBOM_BLOB_URL",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "CI_TYPE",
                                "value": "tekton"
                            },
                            {
                                "name": "STORAGE_DRIVER",
                                "value": "vfs"
                            },
                            {
                                "name": "CONTEXT",
                                "value": "."
                            },
                            {
                                "name": "DOCKERFILE",
                                "value": "docker/Dockerfile"
                            },
                            {
                                "name": "IMAGE",
                                "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                            },
                            {
                                "name": "IMAGE_URL",
                                "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                            },
                            {
                                "name": "TLSVERIFY",
                                "value": "true"
                            },
                            {
                                "name": "BUILD_ARGS_FILE"
                            },
                            {
                                "name": "_BUILDAH_STARTED_IN_USERNS"
                            },
                            {
                                "name": "BUILDAH_ISOLATION",
                                "value": "chroot"
                            },
                            {
                                "name": "COSIGN_SECRET_PASSWORD",
                                "value": "dummy"
                            },
                            {
                                "name": "COSIGN_SECRET_KEY",
                                "value": "dummy"
                            },
                            {
                                "name": "ROX_CENTRAL_ENDPOINT",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "rox-api-endpoint",
                                        "name": "rox-api-token"
                                    }
                                }
                            },
                            {
                                "name": "TRUSTIFICATION_SUPPORTED_CYCLONEDX_VERSION",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "supported_cyclonedx_version",
                                        "name": "tpa-secret"
                                    }
                                }
                            },
                            {
                                "name": "ROX_API_TOKEN",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "rox-api-token",
                                        "name": "rox-api-token"
                                    }
                                }
                            },
                            {
                                "name": "GITOPS_AUTH_PASSWORD",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "password",
                                        "name": "gitlab-auth-secret"
                                    }
                                }
                            },
                            {
                                "name": "GITOPS_AUTH_USERNAME",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "username",
                                        "name": "gitlab-auth-secret"
                                    }
                                }
                            },
                            {
                                "name": "COSIGN_PUBLIC_KEY",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "cosign.pub",
                                        "name": "cosign-pub"
                                    }
                                }
                            }
                        ],
                        "workingDir": "/workspace/source/source"
                    },
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "STORAGE_DRIVER",
                                    "value": "vfs"
                                },
                                {
                                    "name": "CONTEXT",
                                    "value": "."
                                },
                                {
                                    "name": "DOCKERFILE",
                                    "value": "docker/Dockerfile"
                                },
                                {
                                    "name": "IMAGE",
                                    "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                                },
                                {
                                    "name": "IMAGE_URL",
                                    "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                                },
                                {
                                    "name": "TLSVERIFY",
                                    "value": "true"
                                },
                                {
                                    "name": "BUILD_ARGS_FILE"
                                },
                                {
                                    "name": "_BUILDAH_STARTED_IN_USERNS"
                                },
                                {
                                    "name": "BUILDAH_ISOLATION",
                                    "value": "chroot"
                                },
                                {
                                    "name": "COSIGN_SECRET_PASSWORD",
                                    "value": "dummy"
                                },
                                {
                                    "name": "COSIGN_SECRET_KEY",
                                    "value": "dummy"
                                },
                                {
                                    "name": "ROX_CENTRAL_ENDPOINT",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "rox-api-endpoint",
                                            "name": "rox-api-token"
                                        }
                                    }
                                },
                                {
                                    "name": "TRUSTIFICATION_SUPPORTED_CYCLONEDX_VERSION",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "supported_cyclonedx_version",
                                            "name": "tpa-secret"
                                        }
                                    }
                                },
                                {
                                    "name": "ROX_API_TOKEN",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "rox-api-token",
                                            "name": "rox-api-token"
                                        }
                                    }
                                },
                                {
                                    "name": "GITOPS_AUTH_PASSWORD",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "password",
                                            "name": "gitlab-auth-secret"
                                        }
                                    }
                                },
                                {
                                    "name": "GITOPS_AUTH_USERNAME",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "username",
                                            "name": "gitlab-auth-secret"
                                        }
                                    }
                                },
                                {
                                    "name": "COSIGN_PUBLIC_KEY",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "cosign.pub",
                                            "name": "cosign-pub"
                                        }
                                    }
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "init",
                            "script": "# Sync scripts to the writable workspace\ncp -rf /work/tssc/ /workspace/source/\n# Append the dummy function to common.sh\nprintf '\\nfunction registry-login() {\\n  echo \"--- Registry Auth Bypass Active ---\"\\n  return 0\\n}\\n' \u003e\u003e /workspace/source/tssc/common.sh\necho \"Successfully patched /workspace/source/tssc/common.sh\"\necho \"running init\"\npwd\nls -la\n/workspace/source/tssc/init.sh\n",
                            "securityContext": {
                                "capabilities": {
                                    "add": [
                                        "SETFCAP"
                                    ]
                                }
                            },
                            "volumeMounts": [
                                {
                                    "mountPath": "/var/lib/containers",
                                    "name": "varlibcontainers"
                                },
                                {
                                    "mountPath": "/tmp/files",
                                    "name": "tmpfiles"
                                }
                            ],
                            "workingDir": "/workspace/source/source"
                        },
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "STORAGE_DRIVER",
                                    "value": "vfs"
                                },
                                {
                                    "name": "CONTEXT",
                                    "value": "."
                                },
                                {
                                    "name": "DOCKERFILE",
                                    "value": "docker/Dockerfile"
                                },
                                {
                                    "name": "IMAGE",
                                    "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                                },
                                {
                                    "name": "IMAGE_URL",
                                    "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                                },
                                {
                                    "name": "TLSVERIFY",
                                    "value": "true"
                                },
                                {
                                    "name": "BUILD_ARGS_FILE"
                                },
                                {
                                    "name": "_BUILDAH_STARTED_IN_USERNS"
                                },
                                {
                                    "name": "BUILDAH_ISOLATION",
                                    "value": "chroot"
                                },
                                {
                                    "name": "COSIGN_SECRET_PASSWORD",
                                    "value": "dummy"
                                },
                                {
                                    "name": "COSIGN_SECRET_KEY",
                                    "value": "dummy"
                                },
                                {
                                    "name": "ROX_CENTRAL_ENDPOINT",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "rox-api-endpoint",
                                            "name": "rox-api-token"
                                        }
                                    }
                                },
                                {
                                    "name": "TRUSTIFICATION_SUPPORTED_CYCLONEDX_VERSION",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "supported_cyclonedx_version",
                                            "name": "tpa-secret"
                                        }
                                    }
                                },
                                {
                                    "name": "ROX_API_TOKEN",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "rox-api-token",
                                            "name": "rox-api-token"
                                        }
                                    }
                                },
                                {
                                    "name": "GITOPS_AUTH_PASSWORD",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "password",
                                            "name": "gitlab-auth-secret"
                                        }
                                    }
                                },
                                {
                                    "name": "GITOPS_AUTH_USERNAME",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "username",
                                            "name": "gitlab-auth-secret"
                                        }
                                    }
                                },
                                {
                                    "name": "COSIGN_PUBLIC_KEY",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "cosign.pub",
                                            "name": "cosign-pub"
                                        }
                                    }
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "build",
                            "script": "echo \"running buildah-tssc\"\n/workspace/source/tssc/buildah-tssc.sh\ncat ./results/buildah-tssc/BASE_IMAGES_DIGESTS \u003e /tekton/results/BASE_IMAGES_DIGESTS\ncat ./results/buildah-tssc/IMAGE_DIGEST \u003e /tekton/results/IMAGE_DIGEST\ncat ./results/buildah-tssc/IMAGE_URL \u003e /tekton/results/IMAGE_URL\ncat ./results/buildah-tssc/SBOM_BLOB_URL \u003e /tekton/results/SBOM_BLOB_URL\n",
                            "securityContext": {
                                "capabilities": {
                                    "add": [
                                        "SETFCAP"
                                    ]
                                }
                            },
                            "volumeMounts": [
                                {
                                    "mountPath": "/var/lib/containers",
                                    "name": "varlibcontainers"
                                },
                                {
                                    "mountPath": "/tmp/files",
                                    "name": "tmpfiles"
                                }
                            ],
                            "workingDir": "/workspace/source/source"
                        }
                    ],
                    "volumes": [
                        {
                            "emptyDir": {},
                            "name": "varlibcontainers"
                        },
                        {
                            "emptyDir": {},
                            "name": "tmpfiles"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "Workspace containing the source code to build.",
                            "name": "source"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "https://rekor-server-tssc-tas.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/api/v1/log/entries?logIndex=17",
                    "pipeline.tekton.dev/affinity-assistant": "affinity-assistant-032ccb134c",
                    "pipeline.tekton.dev/release": "8910674cb953317a4373f33822024b9de8c5fa22",
                    "pipelinesascode.tekton.dev/branch": "refs/heads/main",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-tdupri",
                    "pipelinesascode.tekton.dev/git-provider": "gitlab",
                    "pipelinesascode.tekton.dev/max-keep-runs": "2",
                    "pipelinesascode.tekton.dev/on-event": "[push]",
                    "pipelinesascode.tekton.dev/on-target-branch": "[main]",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-on-push",
                    "pipelinesascode.tekton.dev/pipeline": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/pipelines/docker-build-tssc.yaml",
                    "pipelinesascode.tekton.dev/repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-repository",
                    "pipelinesascode.tekton.dev/sender": "rhtap-qe-test",
                    "pipelinesascode.tekton.dev/sha": "5a07e41d8b36e10e4387f9fd3fe9be02019d59fc",
                    "pipelinesascode.tekton.dev/sha-title": "Merge request #1",
                    "pipelinesascode.tekton.dev/sha-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax/-/commit/5a07e41d8b36e10e4387f9fd3fe9be02019d59fc",
                    "pipelinesascode.tekton.dev/source-branch": "refs/heads/main",
                    "pipelinesascode.tekton.dev/source-project-id": "81724388",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/target-project-id": "81724388",
                    "pipelinesascode.tekton.dev/task-0": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/init.yaml",
                    "pipelinesascode.tekton.dev/task-1": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/git-clone.yaml",
                    "pipelinesascode.tekton.dev/task-10": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/deploy-workload.yaml",
                    "pipelinesascode.tekton.dev/task-11": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/scan-workload.yaml",
                    "pipelinesascode.tekton.dev/task-12": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/summarize-workload.yaml",
                    "pipelinesascode.tekton.dev/task-13": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/show-workload-sbom.yaml",
                    "pipelinesascode.tekton.dev/task-14": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/deploy-workload-check.yaml",
                    "pipelinesascode.tekton.dev/task-2": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/buildah-rhtap.yaml",
                    "pipelinesascode.tekton.dev/task-3": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/acs-image-check.yaml",
                    "pipelinesascode.tekton.dev/task-4": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/acs-image-scan.yaml",
                    "pipelinesascode.tekton.dev/task-5": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/acs-deploy-check.yaml",
                    "pipelinesascode.tekton.dev/task-6": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/update-deployment.yaml",
                    "pipelinesascode.tekton.dev/task-7": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/show-sbom-rhdh.yaml",
                    "pipelinesascode.tekton.dev/task-8": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/summary.yaml",
                    "pipelinesascode.tekton.dev/task-9": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/build-workload.yaml",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "tssc-app-ci/results/5e2f2a93-43b0-4e8e-94a5-d699ca6d955f/records/4b52e1e6-164c-40c4-bfe4-2d6f55b66472",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"e2e-tests-go-eciytfax\",\"commit\":\"5a07e41d8b36e10e4387f9fd3fe9be02019d59fc\",\"eventType\":\"push\"}",
                    "results.tekton.dev/result": "tssc-app-ci/results/5e2f2a93-43b0-4e8e-94a5-d699ca6d955f",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/categories": "Git",
                    "tekton.dev/displayName": "git clone",
                    "tekton.dev/pipelines.minVersion": "0.21.0",
                    "tekton.dev/platforms": "linux/amd64,linux/s390x,linux/ppc64le,linux/arm64",
                    "tekton.dev/tags": "git"
                },
                "creationTimestamp": "2026-04-28T16:00:29Z",
                "finalizers": [
                    "chains.tekton.dev/taskrun",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/part-of": "e2e-tests-go-eciytfax",
                    "app.kubernetes.io/version": "v0.39.5",
                    "argocd/app-name": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-id": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-namespace": "tssc-app",
                    "janus-idp.io/tekton": "e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-on-push",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-repository",
                    "pipelinesascode.tekton.dev/sha": "5a07e41d8b36e10e4387f9fd3fe9be02019d59fc",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "e2e-tests-go-eciytfax-on-push-sgdp2",
                    "tekton.dev/pipelineRun": "e2e-tests-go-eciytfax-on-push-sgdp2",
                    "tekton.dev/pipelineRunUID": "5e2f2a93-43b0-4e8e-94a5-d699ca6d955f",
                    "tekton.dev/pipelineTask": "clone-repository"
                },
                "name": "e2e-tests-go-eciytfax-on-push-sgdp2-clone-repository",
                "namespace": "tssc-app-ci",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "e2e-tests-go-eciytfax-on-push-sgdp2",
                        "uid": "5e2f2a93-43b0-4e8e-94a5-d699ca6d955f"
                    }
                ],
                "resourceVersion": "40359",
                "uid": "4b52e1e6-164c-40c4-bfe4-2d6f55b66472"
            },
            "spec": {
                "params": [
                    {
                        "name": "url",
                        "value": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax"
                    },
                    {
                        "name": "revision",
                        "value": "5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                    },
                    {
                        "name": "depth",
                        "value": "0"
                    }
                ],
                "serviceAccountName": "pipeline",
                "taskSpec": {
                    "description": "The git-clone Task will clone a repo from the provided url into the output Workspace. By default the repo will be cloned into the root of your Workspace.",
                    "params": [
                        {
                            "description": "Repository URL to clone from.",
                            "name": "url",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Revision to checkout. (branch, tag, sha, ref, etc...)",
                            "name": "revision",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Refspec to fetch before checking out revision.",
                            "name": "refspec",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Initialize and fetch git submodules.",
                            "name": "submodules",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Comma-separated list of specific submodule paths to initialize and fetch. Only submodules in the specified directories and their subdirectories will be fetched.\nEmpty string fetches all submodules. Parameter \"submodules\" must be set to \"true\" to make this parameter applicable.\n",
                            "name": "submodulePaths",
                            "type": "string"
                        },
                        {
                            "default": "1",
                            "description": "Perform a shallow clone, fetching only the most recent N commits.",
                            "name": "depth",
                            "type": "string"
                        },
                        {
                            "default": "7",
                            "description": "Length of short commit SHA",
                            "name": "shortCommitLength",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Set the `http.sslVerify` global git config. Setting this to `false` is not advised unless you are sure that you trust your git remote.",
                            "name": "sslVerify",
                            "type": "string"
                        },
                        {
                            "default": "source",
                            "description": "Subdirectory inside the `output` Workspace to clone the repo into.",
                            "name": "subdirectory",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Define the directory patterns to match or exclude when performing a sparse checkout.",
                            "name": "sparseCheckoutDirectories",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Clean out the contents of the destination directory if it already exists before cloning.",
                            "name": "deleteExisting",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "HTTP proxy server for non-SSL requests.",
                            "name": "httpProxy",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "HTTPS proxy server for SSL requests.",
                            "name": "httpsProxy",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Opt out of proxying HTTP/HTTPS requests.",
                            "name": "noProxy",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Log the commands that are executed during `git-clone`'s operation.",
                            "name": "verbose",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Deprecated. Has no effect. Will be removed in the future.",
                            "name": "gitInitImage",
                            "type": "string"
                        },
                        {
                            "default": "/tekton/home",
                            "description": "Absolute path to the user's home directory. Set this explicitly if you are running the image as a non-root user.\n",
                            "name": "userHome",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Check symlinks in the repo. If they're pointing outside of the repo, the build will fail.\n",
                            "name": "enableSymlinkCheck",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Fetch all tags for the repo.",
                            "name": "fetchTags",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from.",
                            "name": "caTrustConfigMapName",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data.",
                            "name": "caTrustConfigMapKey",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Set to \"true\" to merge the targetBranch into the checked-out revision.",
                            "name": "mergeTargetBranch",
                            "type": "string"
                        },
                        {
                            "default": "main",
                            "description": "The target branch to merge into the revision (if mergeTargetBranch is true).",
                            "name": "targetBranch",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "URL of the repository to fetch the target branch from when mergeTargetBranch is true.\nIf empty, uses the same repository (origin). This allows merging a branch from a different repository.\n",
                            "name": "mergeSourceRepoUrl",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Perform a shallow fetch of the target branch, fetching only the most recent N commits.\nIf empty, fetches the full history of the target branch.\n",
                            "name": "mergeSourceDepth",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "The precise commit SHA that was fetched by this Task.",
                            "name": "commit",
                            "type": "string"
                        },
                        {
                            "description": "The commit SHA that was fetched by this Task limited to params.shortCommitLength number of characters",
                            "name": "short-commit",
                            "type": "string"
                        },
                        {
                            "description": "The precise URL that was fetched by this Task.",
                            "name": "url",
                            "type": "string"
                        },
                        {
                            "description": "The commit timestamp of the checkout",
                            "name": "commit-timestamp",
                            "type": "string"
                        },
                        {
                            "description": "The precise URL that was fetched by this Task. This result uses Chains type hinting to include in the provenance.",
                            "name": "CHAINS-GIT_URL",
                            "type": "string"
                        },
                        {
                            "description": "The precise commit SHA that was fetched by this Task. This result uses Chains type hinting to include in the provenance.",
                            "name": "CHAINS-GIT_COMMIT",
                            "type": "string"
                        },
                        {
                            "description": "The SHA of the commit after merging the target branch (if the param mergeTargetBranch is true).",
                            "name": "merged_sha",
                            "type": "string"
                        }
                    ],
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "HOME",
                                    "value": "$(params.userHome)"
                                },
                                {
                                    "name": "PARAM_URL",
                                    "value": "$(params.url)"
                                },
                                {
                                    "name": "PARAM_REVISION",
                                    "value": "5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                                },
                                {
                                    "name": "PARAM_REFSPEC",
                                    "value": "$(params.refspec)"
                                },
                                {
                                    "name": "PARAM_SUBMODULES",
                                    "value": "$(params.submodules)"
                                },
                                {
                                    "name": "PARAM_SUBMODULE_PATHS",
                                    "value": "$(params.submodulePaths)"
                                },
                                {
                                    "name": "PARAM_DEPTH",
                                    "value": "$(params.depth)"
                                },
                                {
                                    "name": "PARAM_SHORT_COMMIT_LENGTH",
                                    "value": "$(params.shortCommitLength)"
                                },
                                {
                                    "name": "PARAM_SSL_VERIFY",
                                    "value": "$(params.sslVerify)"
                                },
                                {
                                    "name": "PARAM_SUBDIRECTORY",
                                    "value": "$(params.subdirectory)"
                                },
                                {
                                    "name": "PARAM_DELETE_EXISTING",
                                    "value": "$(params.deleteExisting)"
                                },
                                {
                                    "name": "PARAM_HTTP_PROXY",
                                    "value": "$(params.httpProxy)"
                                },
                                {
                                    "name": "PARAM_HTTPS_PROXY",
                                    "value": "$(params.httpsProxy)"
                                },
                                {
                                    "name": "PARAM_NO_PROXY",
                                    "value": "$(params.noProxy)"
                                },
                                {
                                    "name": "PARAM_VERBOSE",
                                    "value": "$(params.verbose)"
                                },
                                {
                                    "name": "PARAM_SPARSE_CHECKOUT_DIRECTORIES",
                                    "value": "$(params.sparseCheckoutDirectories)"
                                },
                                {
                                    "name": "PARAM_USER_HOME",
                                    "value": "$(params.userHome)"
                                },
                                {
                                    "name": "PARAM_FETCH_TAGS",
                                    "value": "$(params.fetchTags)"
                                },
                                {
                                    "name": "PARAM_GIT_INIT_IMAGE",
                                    "value": "$(params.gitInitImage)"
                                },
                                {
                                    "name": "PARAM_MERGE_TARGET_BRANCH",
                                    "value": "$(params.mergeTargetBranch)"
                                },
                                {
                                    "name": "PARAM_TARGET_BRANCH",
                                    "value": "$(params.targetBranch)"
                                },
                                {
                                    "name": "PARAM_MERGE_SOURCE_REPO_URL",
                                    "value": "$(params.mergeSourceRepoUrl)"
                                },
                                {
                                    "name": "PARAM_MERGE_SOURCE_DEPTH",
                                    "value": "$(params.mergeSourceDepth)"
                                },
                                {
                                    "name": "WORKSPACE_OUTPUT_PATH",
                                    "value": "$(workspaces.output.path)"
                                },
                                {
                                    "name": "WORKSPACE_SSH_DIRECTORY_BOUND",
                                    "value": "$(workspaces.ssh-directory.bound)"
                                },
                                {
                                    "name": "WORKSPACE_SSH_DIRECTORY_PATH",
                                    "value": "$(workspaces.ssh-directory.path)"
                                },
                                {
                                    "name": "WORKSPACE_BASIC_AUTH_DIRECTORY_BOUND",
                                    "value": "$(workspaces.basic-auth.bound)"
                                },
                                {
                                    "name": "WORKSPACE_BASIC_AUTH_DIRECTORY_PATH",
                                    "value": "$(workspaces.basic-auth.path)"
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "clone",
                            "script": "#!/usr/bin/env sh\nset -eu\n\nif [ \"${PARAM_VERBOSE}\" = \"true\" ] ; then\n  set -x\nfi\n\nif [ -n \"${PARAM_GIT_INIT_IMAGE}\" ]; then\n  echo \"WARNING: provided deprecated gitInitImage parameter has no effect.\"\nfi\n\nif [ \"${WORKSPACE_BASIC_AUTH_DIRECTORY_BOUND}\" = \"true\" ] ; then\n  if [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.git-credentials\" ] \u0026\u0026 [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.gitconfig\" ]; then\n    cp \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.git-credentials\" \"${PARAM_USER_HOME}/.git-credentials\"\n    cp \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.gitconfig\" \"${PARAM_USER_HOME}/.gitconfig\"\n  # Compatibility with kubernetes.io/basic-auth secrets\n  elif [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/username\" ] \u0026\u0026 [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/password\" ]; then\n    HOSTNAME=$(echo $PARAM_URL | awk -F/ '{print $3}')\n    echo \"https://$(cat ${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/username):$(cat ${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/password)@$HOSTNAME\" \u003e \"${PARAM_USER_HOME}/.git-credentials\"\n    echo -e \"[credential \\\"https://$HOSTNAME\\\"]\\n  helper = store\" \u003e \"${PARAM_USER_HOME}/.gitconfig\"\n  else\n    echo \"Unknown basic-auth workspace format\"\n    exit 1\n  fi\n  chmod 400 \"${PARAM_USER_HOME}/.git-credentials\"\n  chmod 400 \"${PARAM_USER_HOME}/.gitconfig\"\nfi\n\n# Should be called after the gitconfig is copied from the repository secret\nca_bundle=/mnt/trusted-ca/ca-bundle.crt\nif [ -f \"$ca_bundle\" ]; then\n  echo \"INFO: Using mounted CA bundle: $ca_bundle\"\n  git config --global http.sslCAInfo \"$ca_bundle\"\nfi\n\nif [ \"${WORKSPACE_SSH_DIRECTORY_BOUND}\" = \"true\" ] ; then\n  cp -R \"${WORKSPACE_SSH_DIRECTORY_PATH}\" \"${PARAM_USER_HOME}\"/.ssh\n  chmod 700 \"${PARAM_USER_HOME}\"/.ssh\n  chmod -R 400 \"${PARAM_USER_HOME}\"/.ssh/*\nfi\n\nCHECKOUT_DIR=\"${WORKSPACE_OUTPUT_PATH}/${PARAM_SUBDIRECTORY}\"\n\ncleandir() {\n  # Delete any existing contents of the repo directory if it exists.\n  #\n  # We don't just \"rm -rf ${CHECKOUT_DIR}\" because ${CHECKOUT_DIR} might be \"/\"\n  # or the root of a mounted volume.\n  if [ -d \"${CHECKOUT_DIR}\" ] ; then\n    # Delete non-hidden files and directories\n    rm -rf \"${CHECKOUT_DIR:?}\"/*\n    # Delete files and directories starting with . but excluding ..\n    rm -rf \"${CHECKOUT_DIR}\"/.[!.]*\n    # Delete files and directories starting with .. plus any other character\n    rm -rf \"${CHECKOUT_DIR}\"/..?*\n  fi\n}\n\nif [ \"${PARAM_DELETE_EXISTING}\" = \"true\" ] ; then\n  cleandir\nfi\n\ntest -z \"${PARAM_HTTP_PROXY}\" || export HTTP_PROXY=\"${PARAM_HTTP_PROXY}\"\ntest -z \"${PARAM_HTTPS_PROXY}\" || export HTTPS_PROXY=\"${PARAM_HTTPS_PROXY}\"\ntest -z \"${PARAM_NO_PROXY}\" || export NO_PROXY=\"${PARAM_NO_PROXY}\"\n\n/ko-app/git-init \\\n  -url=\"${PARAM_URL}\" \\\n  -revision=\"${PARAM_REVISION}\" \\\n  -refspec=\"${PARAM_REFSPEC}\" \\\n  -path=\"${CHECKOUT_DIR}\" \\\n  -sslVerify=\"${PARAM_SSL_VERIFY}\" \\\n  -submodules=\"${PARAM_SUBMODULES}\" \\\n  -submodulePaths=\"${PARAM_SUBMODULE_PATHS}\" \\\n  -depth=\"${PARAM_DEPTH}\" \\\n  -sparseCheckoutDirectories=\"${PARAM_SPARSE_CHECKOUT_DIRECTORIES}\" \\\n  -retryMaxAttempts=10\ncd \"${CHECKOUT_DIR}\"\nRESULT_SHA=\"$(git rev-parse HEAD)\"\nRESULT_SHA_SHORT=\"$(git rev-parse --short=\"${PARAM_SHORT_COMMIT_LENGTH}\" HEAD)\"\nEXIT_CODE=\"$?\"\nif [ \"${EXIT_CODE}\" != 0 ] ; then\n  exit \"${EXIT_CODE}\"\nfi\nif [ \"${PARAM_MERGE_TARGET_BRANCH}\" = \"true\" ]; then\n  echo \"Merge option enabled. Attempting to merge target branch '${PARAM_TARGET_BRANCH}' into HEAD (${RESULT_SHA}).\"\n\n  if [ \"${PARAM_DEPTH}\" = \"1\" ]; then\n    echo \"WARNING: Shallow clone with depth=1 may cause merge conflicts due to insufficient commit history.\" \u003e\u00262\n  fi\n\n  if [ \"${PARAM_MERGE_SOURCE_DEPTH}\" = \"1\" ]; then\n    echo \"WARNING: Shallow fetch with mergeSourceDepth=1 may cause merge conflicts due to insufficient commit history.\" \u003e\u00262\n  fi\n\n  # Determine if merging from a different repository or the same one\n  if [ -n \"${PARAM_MERGE_SOURCE_REPO_URL}\" ]; then\n    # Normalize URLs for comparison (remove trailing slashes and .git suffix)\n    normalize_url() {\n      echo \"$1\" | sed -e 's#/$##' -e 's#\\.git$##'\n    }\n\n    NORMALIZED_ORIGIN_URL=$(normalize_url \"${PARAM_URL}\")\n    NORMALIZED_MERGE_URL=$(normalize_url \"${PARAM_MERGE_SOURCE_REPO_URL}\")\n\n    if [ \"${NORMALIZED_ORIGIN_URL}\" = \"${NORMALIZED_MERGE_URL}\" ]; then\n      echo \"Merge source URL is the same as origin. Using existing 'origin' remote.\"\n      MERGE_REMOTE=\"origin\"\n    else\n      echo \"Merging from different repository: ${PARAM_MERGE_SOURCE_REPO_URL}\"\n      echo \"Adding remote 'merge-source'...\"\n      git remote add merge-source \"${PARAM_MERGE_SOURCE_REPO_URL}\"\n      MERGE_REMOTE=\"merge-source\"\n    fi\n  else\n    echo \"Merging from the same repository (origin)\"\n    MERGE_REMOTE=\"origin\"\n  fi\n\n  echo \"Fetching target branch '${PARAM_TARGET_BRANCH}' from ${MERGE_REMOTE}...\"\n  if [ -n \"${PARAM_MERGE_SOURCE_DEPTH}\" ]; then\n    retry git fetch --depth=\"${PARAM_MERGE_SOURCE_DEPTH}\" ${MERGE_REMOTE} \"${PARAM_TARGET_BRANCH}\"\n  else\n    retry git fetch ${MERGE_REMOTE} \"${PARAM_TARGET_BRANCH}\"\n  fi\n  FETCH_EXIT_CODE=\"$?\"\n  if [ \"${FETCH_EXIT_CODE}\" != \"0\" ]; then\n    echo \"ERROR: Failed to fetch target branch '${PARAM_TARGET_BRANCH}' from ${MERGE_REMOTE}.\" \u003e\u00262\n    exit \"${FETCH_EXIT_CODE}\"\n  fi\n\n  echo \"Merging ${MERGE_REMOTE}/${PARAM_TARGET_BRANCH} into current HEAD...\"\n  git config --global user.email \"tekton-git-clone@tekton.dev\"\n  git config --global user.name \"Tekton Git Clone Task\"\n  git merge \"${MERGE_REMOTE}/${PARAM_TARGET_BRANCH}\" --no-commit --no-ff --allow-unrelated-histories\n  MERGE_CHECK_EXIT_CODE=\"$?\"\n  if [ \"${MERGE_CHECK_EXIT_CODE}\" != \"0\" ] ; then\n    echo \"ERROR: Merge conflict detected or merge failed before commit.\" \u003e\u00262\n    echo \"--- Git Status ---\"\n    git status\n    echo \"------------------\"\n    exit \"${MERGE_CHECK_EXIT_CODE}\"\n  else\n    # Check if there are changes that need to be merged, and if so, create a merge commit.\n    if git diff --staged --quiet; then\n      echo \"No diff was found, skipping merge...\" \u003e\u00262\n    else\n      echo \"Merge successful (no conflicts found), committing...\"\n      git commit -m \"Merge branch '${PARAM_TARGET_BRANCH}' from ${MERGE_REMOTE} into ${RESULT_SHA}\"\n      COMMIT_EXIT_CODE=\"$?\"\n      if [ \"${COMMIT_EXIT_CODE}\" != \"0\" ]; then\n        echo \"ERROR: Failed to commit merge.\" \u003e\u00262\n        exit \"${COMMIT_EXIT_CODE}\"\n      fi\n      MERGED_SHA=$(git rev-parse HEAD)\n      echo \"New HEAD after merge: ${MERGED_SHA}\"\n      echo \"${MERGED_SHA}\" \u003e \"$(results.merged_sha.path)\"\n    fi\n  fi\nelse\n  echo \"Merge option disabled. Using checked-out revision ${RESULT_SHA} directly.\"\nfi\nprintf \"%s\" \"${RESULT_SHA}\" \u003e \"$(results.commit.path)\"\nprintf \"%s\" \"${RESULT_SHA}\" \u003e \"$(results.CHAINS-GIT_COMMIT.path)\"\nprintf \"%s\" \"${RESULT_SHA_SHORT}\" \u003e \"$(results.short-commit.path)\"\nprintf \"%s\" \"${PARAM_URL}\" \u003e \"$(results.url.path)\"\nprintf \"%s\" \"${PARAM_URL}\" \u003e \"$(results.CHAINS-GIT_URL.path)\"\nprintf \"%s\" \"$(git log -1 --pretty=%ct)\" \u003e \"$(results.commit-timestamp.path)\"\n\nif [ \"${PARAM_FETCH_TAGS}\" = \"true\" ] ; then\n  echo \"Fetching tags\"\n  retry git fetch --tags\nfi\n",
                            "securityContext": {
                                "runAsUser": 0
                            },
                            "volumeMounts": [
                                {
                                    "mountPath": "/mnt/trusted-ca",
                                    "name": "trusted-ca",
                                    "readOnly": true
                                }
                            ]
                        },
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "PARAM_ENABLE_SYMLINK_CHECK",
                                    "value": "$(params.enableSymlinkCheck)"
                                },
                                {
                                    "name": "PARAM_SUBDIRECTORY",
                                    "value": "$(params.subdirectory)"
                                },
                                {
                                    "name": "WORKSPACE_OUTPUT_PATH",
                                    "value": "$(workspaces.output.path)"
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "symlink-check",
                            "script": "#!/usr/bin/env bash\nset -euo pipefail\n\nCHECKOUT_DIR=\"${WORKSPACE_OUTPUT_PATH}/${PARAM_SUBDIRECTORY}\"\ncheck_symlinks() {\n  FOUND_SYMLINK_POINTING_OUTSIDE_OF_REPO=false\n  while read -r symlink\n  do\n    target=$(readlink -m \"$symlink\")\n    if ! [[ \"$target\" =~ ^$CHECKOUT_DIR ]]; then\n      echo \"The cloned repository contains symlink pointing outside of the cloned repository: $symlink\"\n      FOUND_SYMLINK_POINTING_OUTSIDE_OF_REPO=true\n    fi\n  done \u003c \u003c(find $CHECKOUT_DIR -type l -print)\n  if [ \"$FOUND_SYMLINK_POINTING_OUTSIDE_OF_REPO\" = true ] ; then\n    return 1\n  fi\n}\n\nif [ \"${PARAM_ENABLE_SYMLINK_CHECK}\" = \"true\" ] ; then\n  echo \"Running symlink check\"\n  check_symlinks\nfi\n"
                        }
                    ],
                    "volumes": [
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "$(params.caTrustConfigMapKey)",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "$(params.caTrustConfigMapName)",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "The git repo will be cloned onto the volume backing this Workspace.",
                            "name": "output"
                        },
                        {
                            "description": "A .ssh directory with private key, known_hosts, config, etc. Copied to\nthe user's home before git commands are executed. Used to authenticate\nwith the git remote when performing the clone. Binding a Secret to this\nWorkspace is strongly recommended over other volume types.\n",
                            "name": "ssh-directory",
                            "optional": true
                        },
                        {
                            "description": "A Workspace containing a .gitconfig and .git-credentials file or username and password.\nThese will be copied to the user's home before any git commands are run. Any\nother files in this Workspace are ignored. It is strongly recommended\nto use ssh-directory over basic-auth whenever possible and to bind a\nSecret to this Workspace over other volume types.\n",
                            "name": "basic-auth",
                            "optional": true
                        }
                    ]
                },
                "timeout": "1h0m0s",
                "workspaces": [
                    {
                        "name": "output",
                        "persistentVolumeClaim": {
                            "claimName": "pvc-8dabd9baba"
                        }
                    },
                    {
                        "name": "basic-auth",
                        "secret": {
                            "secretName": "pac-gitauth-tdupri"
                        }
                    }
                ]
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-28T16:00:41Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-28T16:00:41Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "e2e-tests-go-eciytfax-on-push-sgdp2-clone-repository-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    }
                },
                "results": [
                    {
                        "name": "CHAINS-GIT_COMMIT",
                        "type": "string",
                        "value": "5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                    },
                    {
                        "name": "CHAINS-GIT_URL",
                        "type": "string",
                        "value": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax"
                    },
                    {
                        "name": "commit",
                        "type": "string",
                        "value": "5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                    },
                    {
                        "name": "commit-timestamp",
                        "type": "string",
                        "value": "1777392026"
                    },
                    {
                        "name": "short-commit",
                        "type": "string",
                        "value": "5a07e41"
                    },
                    {
                        "name": "url",
                        "type": "string",
                        "value": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax"
                    }
                ],
                "startTime": "2026-04-28T16:00:31Z",
                "steps": [
                    {
                        "container": "step-clone",
                        "imageID": "quay.io/redhat-tssc/task-runner@sha256:db633cb62eb097a46ca9e3e0a54d21c8ebd444f81a074ce1f1afa61956185dbf",
                        "name": "clone",
                        "provenance": {},
                        "terminated": {
                            "containerID": "cri-o://75f5d0e6e6903ab02f7fac1ffb231b248fa19458e06adb85493617347438dbbd",
                            "exitCode": 0,
                            "finishedAt": "2026-04-28T16:00:41Z",
                            "message": "[{\"key\":\"CHAINS-GIT_COMMIT\",\"value\":\"5a07e41d8b36e10e4387f9fd3fe9be02019d59fc\",\"type\":1},{\"key\":\"CHAINS-GIT_URL\",\"value\":\"https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax\",\"type\":1},{\"key\":\"commit\",\"value\":\"5a07e41d8b36e10e4387f9fd3fe9be02019d59fc\",\"type\":1},{\"key\":\"commit-timestamp\",\"value\":\"1777392026\",\"type\":1},{\"key\":\"short-commit\",\"value\":\"5a07e41\",\"type\":1},{\"key\":\"url\",\"value\":\"https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-28T16:00:40Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-symlink-check",
                        "imageID": "quay.io/redhat-tssc/task-runner@sha256:db633cb62eb097a46ca9e3e0a54d21c8ebd444f81a074ce1f1afa61956185dbf",
                        "name": "symlink-check",
                        "provenance": {},
                        "terminated": {
                            "containerID": "cri-o://df66e138e59a455ffb58ac78a69e11d3e7ff15d279463fba94d8c43493d64842",
                            "exitCode": 0,
                            "finishedAt": "2026-04-28T16:00:41Z",
                            "message": "[{\"key\":\"CHAINS-GIT_COMMIT\",\"value\":\"5a07e41d8b36e10e4387f9fd3fe9be02019d59fc\",\"type\":1},{\"key\":\"CHAINS-GIT_URL\",\"value\":\"https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax\",\"type\":1},{\"key\":\"commit\",\"value\":\"5a07e41d8b36e10e4387f9fd3fe9be02019d59fc\",\"type\":1},{\"key\":\"commit-timestamp\",\"value\":\"1777392026\",\"type\":1},{\"key\":\"short-commit\",\"value\":\"5a07e41\",\"type\":1},{\"key\":\"url\",\"value\":\"https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-28T16:00:41Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "The git-clone Task will clone a repo from the provided url into the output Workspace. By default the repo will be cloned into the root of your Workspace.",
                    "params": [
                        {
                            "description": "Repository URL to clone from.",
                            "name": "url",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Revision to checkout. (branch, tag, sha, ref, etc...)",
                            "name": "revision",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Refspec to fetch before checking out revision.",
                            "name": "refspec",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Initialize and fetch git submodules.",
                            "name": "submodules",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Comma-separated list of specific submodule paths to initialize and fetch. Only submodules in the specified directories and their subdirectories will be fetched.\nEmpty string fetches all submodules. Parameter \"submodules\" must be set to \"true\" to make this parameter applicable.\n",
                            "name": "submodulePaths",
                            "type": "string"
                        },
                        {
                            "default": "1",
                            "description": "Perform a shallow clone, fetching only the most recent N commits.",
                            "name": "depth",
                            "type": "string"
                        },
                        {
                            "default": "7",
                            "description": "Length of short commit SHA",
                            "name": "shortCommitLength",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Set the `http.sslVerify` global git config. Setting this to `false` is not advised unless you are sure that you trust your git remote.",
                            "name": "sslVerify",
                            "type": "string"
                        },
                        {
                            "default": "source",
                            "description": "Subdirectory inside the `output` Workspace to clone the repo into.",
                            "name": "subdirectory",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Define the directory patterns to match or exclude when performing a sparse checkout.",
                            "name": "sparseCheckoutDirectories",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Clean out the contents of the destination directory if it already exists before cloning.",
                            "name": "deleteExisting",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "HTTP proxy server for non-SSL requests.",
                            "name": "httpProxy",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "HTTPS proxy server for SSL requests.",
                            "name": "httpsProxy",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Opt out of proxying HTTP/HTTPS requests.",
                            "name": "noProxy",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Log the commands that are executed during `git-clone`'s operation.",
                            "name": "verbose",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Deprecated. Has no effect. Will be removed in the future.",
                            "name": "gitInitImage",
                            "type": "string"
                        },
                        {
                            "default": "/tekton/home",
                            "description": "Absolute path to the user's home directory. Set this explicitly if you are running the image as a non-root user.\n",
                            "name": "userHome",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Check symlinks in the repo. If they're pointing outside of the repo, the build will fail.\n",
                            "name": "enableSymlinkCheck",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Fetch all tags for the repo.",
                            "name": "fetchTags",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from.",
                            "name": "caTrustConfigMapName",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data.",
                            "name": "caTrustConfigMapKey",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Set to \"true\" to merge the targetBranch into the checked-out revision.",
                            "name": "mergeTargetBranch",
                            "type": "string"
                        },
                        {
                            "default": "main",
                            "description": "The target branch to merge into the revision (if mergeTargetBranch is true).",
                            "name": "targetBranch",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "URL of the repository to fetch the target branch from when mergeTargetBranch is true.\nIf empty, uses the same repository (origin). This allows merging a branch from a different repository.\n",
                            "name": "mergeSourceRepoUrl",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Perform a shallow fetch of the target branch, fetching only the most recent N commits.\nIf empty, fetches the full history of the target branch.\n",
                            "name": "mergeSourceDepth",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "The precise commit SHA that was fetched by this Task.",
                            "name": "commit",
                            "type": "string"
                        },
                        {
                            "description": "The commit SHA that was fetched by this Task limited to params.shortCommitLength number of characters",
                            "name": "short-commit",
                            "type": "string"
                        },
                        {
                            "description": "The precise URL that was fetched by this Task.",
                            "name": "url",
                            "type": "string"
                        },
                        {
                            "description": "The commit timestamp of the checkout",
                            "name": "commit-timestamp",
                            "type": "string"
                        },
                        {
                            "description": "The precise URL that was fetched by this Task. This result uses Chains type hinting to include in the provenance.",
                            "name": "CHAINS-GIT_URL",
                            "type": "string"
                        },
                        {
                            "description": "The precise commit SHA that was fetched by this Task. This result uses Chains type hinting to include in the provenance.",
                            "name": "CHAINS-GIT_COMMIT",
                            "type": "string"
                        },
                        {
                            "description": "The SHA of the commit after merging the target branch (if the param mergeTargetBranch is true).",
                            "name": "merged_sha",
                            "type": "string"
                        }
                    ],
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "HOME",
                                    "value": "/tekton/home"
                                },
                                {
                                    "name": "PARAM_URL",
                                    "value": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax"
                                },
                                {
                                    "name": "PARAM_REVISION",
                                    "value": "5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                                },
                                {
                                    "name": "PARAM_REFSPEC"
                                },
                                {
                                    "name": "PARAM_SUBMODULES",
                                    "value": "true"
                                },
                                {
                                    "name": "PARAM_SUBMODULE_PATHS"
                                },
                                {
                                    "name": "PARAM_DEPTH",
                                    "value": "0"
                                },
                                {
                                    "name": "PARAM_SHORT_COMMIT_LENGTH",
                                    "value": "7"
                                },
                                {
                                    "name": "PARAM_SSL_VERIFY",
                                    "value": "true"
                                },
                                {
                                    "name": "PARAM_SUBDIRECTORY",
                                    "value": "source"
                                },
                                {
                                    "name": "PARAM_DELETE_EXISTING",
                                    "value": "true"
                                },
                                {
                                    "name": "PARAM_HTTP_PROXY"
                                },
                                {
                                    "name": "PARAM_HTTPS_PROXY"
                                },
                                {
                                    "name": "PARAM_NO_PROXY"
                                },
                                {
                                    "name": "PARAM_VERBOSE",
                                    "value": "false"
                                },
                                {
                                    "name": "PARAM_SPARSE_CHECKOUT_DIRECTORIES"
                                },
                                {
                                    "name": "PARAM_USER_HOME",
                                    "value": "/tekton/home"
                                },
                                {
                                    "name": "PARAM_FETCH_TAGS",
                                    "value": "false"
                                },
                                {
                                    "name": "PARAM_GIT_INIT_IMAGE"
                                },
                                {
                                    "name": "PARAM_MERGE_TARGET_BRANCH",
                                    "value": "false"
                                },
                                {
                                    "name": "PARAM_TARGET_BRANCH",
                                    "value": "main"
                                },
                                {
                                    "name": "PARAM_MERGE_SOURCE_REPO_URL"
                                },
                                {
                                    "name": "PARAM_MERGE_SOURCE_DEPTH"
                                },
                                {
                                    "name": "WORKSPACE_OUTPUT_PATH",
                                    "value": "/workspace/output"
                                },
                                {
                                    "name": "WORKSPACE_SSH_DIRECTORY_BOUND",
                                    "value": "false"
                                },
                                {
                                    "name": "WORKSPACE_SSH_DIRECTORY_PATH"
                                },
                                {
                                    "name": "WORKSPACE_BASIC_AUTH_DIRECTORY_BOUND",
                                    "value": "true"
                                },
                                {
                                    "name": "WORKSPACE_BASIC_AUTH_DIRECTORY_PATH",
                                    "value": "/workspace/basic-auth"
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "clone",
                            "script": "#!/usr/bin/env sh\nset -eu\n\nif [ \"${PARAM_VERBOSE}\" = \"true\" ] ; then\n  set -x\nfi\n\nif [ -n \"${PARAM_GIT_INIT_IMAGE}\" ]; then\n  echo \"WARNING: provided deprecated gitInitImage parameter has no effect.\"\nfi\n\nif [ \"${WORKSPACE_BASIC_AUTH_DIRECTORY_BOUND}\" = \"true\" ] ; then\n  if [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.git-credentials\" ] \u0026\u0026 [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.gitconfig\" ]; then\n    cp \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.git-credentials\" \"${PARAM_USER_HOME}/.git-credentials\"\n    cp \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.gitconfig\" \"${PARAM_USER_HOME}/.gitconfig\"\n  # Compatibility with kubernetes.io/basic-auth secrets\n  elif [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/username\" ] \u0026\u0026 [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/password\" ]; then\n    HOSTNAME=$(echo $PARAM_URL | awk -F/ '{print $3}')\n    echo \"https://$(cat ${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/username):$(cat ${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/password)@$HOSTNAME\" \u003e \"${PARAM_USER_HOME}/.git-credentials\"\n    echo -e \"[credential \\\"https://$HOSTNAME\\\"]\\n  helper = store\" \u003e \"${PARAM_USER_HOME}/.gitconfig\"\n  else\n    echo \"Unknown basic-auth workspace format\"\n    exit 1\n  fi\n  chmod 400 \"${PARAM_USER_HOME}/.git-credentials\"\n  chmod 400 \"${PARAM_USER_HOME}/.gitconfig\"\nfi\n\n# Should be called after the gitconfig is copied from the repository secret\nca_bundle=/mnt/trusted-ca/ca-bundle.crt\nif [ -f \"$ca_bundle\" ]; then\n  echo \"INFO: Using mounted CA bundle: $ca_bundle\"\n  git config --global http.sslCAInfo \"$ca_bundle\"\nfi\n\nif [ \"${WORKSPACE_SSH_DIRECTORY_BOUND}\" = \"true\" ] ; then\n  cp -R \"${WORKSPACE_SSH_DIRECTORY_PATH}\" \"${PARAM_USER_HOME}\"/.ssh\n  chmod 700 \"${PARAM_USER_HOME}\"/.ssh\n  chmod -R 400 \"${PARAM_USER_HOME}\"/.ssh/*\nfi\n\nCHECKOUT_DIR=\"${WORKSPACE_OUTPUT_PATH}/${PARAM_SUBDIRECTORY}\"\n\ncleandir() {\n  # Delete any existing contents of the repo directory if it exists.\n  #\n  # We don't just \"rm -rf ${CHECKOUT_DIR}\" because ${CHECKOUT_DIR} might be \"/\"\n  # or the root of a mounted volume.\n  if [ -d \"${CHECKOUT_DIR}\" ] ; then\n    # Delete non-hidden files and directories\n    rm -rf \"${CHECKOUT_DIR:?}\"/*\n    # Delete files and directories starting with . but excluding ..\n    rm -rf \"${CHECKOUT_DIR}\"/.[!.]*\n    # Delete files and directories starting with .. plus any other character\n    rm -rf \"${CHECKOUT_DIR}\"/..?*\n  fi\n}\n\nif [ \"${PARAM_DELETE_EXISTING}\" = \"true\" ] ; then\n  cleandir\nfi\n\ntest -z \"${PARAM_HTTP_PROXY}\" || export HTTP_PROXY=\"${PARAM_HTTP_PROXY}\"\ntest -z \"${PARAM_HTTPS_PROXY}\" || export HTTPS_PROXY=\"${PARAM_HTTPS_PROXY}\"\ntest -z \"${PARAM_NO_PROXY}\" || export NO_PROXY=\"${PARAM_NO_PROXY}\"\n\n/ko-app/git-init \\\n  -url=\"${PARAM_URL}\" \\\n  -revision=\"${PARAM_REVISION}\" \\\n  -refspec=\"${PARAM_REFSPEC}\" \\\n  -path=\"${CHECKOUT_DIR}\" \\\n  -sslVerify=\"${PARAM_SSL_VERIFY}\" \\\n  -submodules=\"${PARAM_SUBMODULES}\" \\\n  -submodulePaths=\"${PARAM_SUBMODULE_PATHS}\" \\\n  -depth=\"${PARAM_DEPTH}\" \\\n  -sparseCheckoutDirectories=\"${PARAM_SPARSE_CHECKOUT_DIRECTORIES}\" \\\n  -retryMaxAttempts=10\ncd \"${CHECKOUT_DIR}\"\nRESULT_SHA=\"$(git rev-parse HEAD)\"\nRESULT_SHA_SHORT=\"$(git rev-parse --short=\"${PARAM_SHORT_COMMIT_LENGTH}\" HEAD)\"\nEXIT_CODE=\"$?\"\nif [ \"${EXIT_CODE}\" != 0 ] ; then\n  exit \"${EXIT_CODE}\"\nfi\nif [ \"${PARAM_MERGE_TARGET_BRANCH}\" = \"true\" ]; then\n  echo \"Merge option enabled. Attempting to merge target branch '${PARAM_TARGET_BRANCH}' into HEAD (${RESULT_SHA}).\"\n\n  if [ \"${PARAM_DEPTH}\" = \"1\" ]; then\n    echo \"WARNING: Shallow clone with depth=1 may cause merge conflicts due to insufficient commit history.\" \u003e\u00262\n  fi\n\n  if [ \"${PARAM_MERGE_SOURCE_DEPTH}\" = \"1\" ]; then\n    echo \"WARNING: Shallow fetch with mergeSourceDepth=1 may cause merge conflicts due to insufficient commit history.\" \u003e\u00262\n  fi\n\n  # Determine if merging from a different repository or the same one\n  if [ -n \"${PARAM_MERGE_SOURCE_REPO_URL}\" ]; then\n    # Normalize URLs for comparison (remove trailing slashes and .git suffix)\n    normalize_url() {\n      echo \"$1\" | sed -e 's#/$##' -e 's#\\.git$##'\n    }\n\n    NORMALIZED_ORIGIN_URL=$(normalize_url \"${PARAM_URL}\")\n    NORMALIZED_MERGE_URL=$(normalize_url \"${PARAM_MERGE_SOURCE_REPO_URL}\")\n\n    if [ \"${NORMALIZED_ORIGIN_URL}\" = \"${NORMALIZED_MERGE_URL}\" ]; then\n      echo \"Merge source URL is the same as origin. Using existing 'origin' remote.\"\n      MERGE_REMOTE=\"origin\"\n    else\n      echo \"Merging from different repository: ${PARAM_MERGE_SOURCE_REPO_URL}\"\n      echo \"Adding remote 'merge-source'...\"\n      git remote add merge-source \"${PARAM_MERGE_SOURCE_REPO_URL}\"\n      MERGE_REMOTE=\"merge-source\"\n    fi\n  else\n    echo \"Merging from the same repository (origin)\"\n    MERGE_REMOTE=\"origin\"\n  fi\n\n  echo \"Fetching target branch '${PARAM_TARGET_BRANCH}' from ${MERGE_REMOTE}...\"\n  if [ -n \"${PARAM_MERGE_SOURCE_DEPTH}\" ]; then\n    retry git fetch --depth=\"${PARAM_MERGE_SOURCE_DEPTH}\" ${MERGE_REMOTE} \"${PARAM_TARGET_BRANCH}\"\n  else\n    retry git fetch ${MERGE_REMOTE} \"${PARAM_TARGET_BRANCH}\"\n  fi\n  FETCH_EXIT_CODE=\"$?\"\n  if [ \"${FETCH_EXIT_CODE}\" != \"0\" ]; then\n    echo \"ERROR: Failed to fetch target branch '${PARAM_TARGET_BRANCH}' from ${MERGE_REMOTE}.\" \u003e\u00262\n    exit \"${FETCH_EXIT_CODE}\"\n  fi\n\n  echo \"Merging ${MERGE_REMOTE}/${PARAM_TARGET_BRANCH} into current HEAD...\"\n  git config --global user.email \"tekton-git-clone@tekton.dev\"\n  git config --global user.name \"Tekton Git Clone Task\"\n  git merge \"${MERGE_REMOTE}/${PARAM_TARGET_BRANCH}\" --no-commit --no-ff --allow-unrelated-histories\n  MERGE_CHECK_EXIT_CODE=\"$?\"\n  if [ \"${MERGE_CHECK_EXIT_CODE}\" != \"0\" ] ; then\n    echo \"ERROR: Merge conflict detected or merge failed before commit.\" \u003e\u00262\n    echo \"--- Git Status ---\"\n    git status\n    echo \"------------------\"\n    exit \"${MERGE_CHECK_EXIT_CODE}\"\n  else\n    # Check if there are changes that need to be merged, and if so, create a merge commit.\n    if git diff --staged --quiet; then\n      echo \"No diff was found, skipping merge...\" \u003e\u00262\n    else\n      echo \"Merge successful (no conflicts found), committing...\"\n      git commit -m \"Merge branch '${PARAM_TARGET_BRANCH}' from ${MERGE_REMOTE} into ${RESULT_SHA}\"\n      COMMIT_EXIT_CODE=\"$?\"\n      if [ \"${COMMIT_EXIT_CODE}\" != \"0\" ]; then\n        echo \"ERROR: Failed to commit merge.\" \u003e\u00262\n        exit \"${COMMIT_EXIT_CODE}\"\n      fi\n      MERGED_SHA=$(git rev-parse HEAD)\n      echo \"New HEAD after merge: ${MERGED_SHA}\"\n      echo \"${MERGED_SHA}\" \u003e \"/tekton/results/merged_sha\"\n    fi\n  fi\nelse\n  echo \"Merge option disabled. Using checked-out revision ${RESULT_SHA} directly.\"\nfi\nprintf \"%s\" \"${RESULT_SHA}\" \u003e \"/tekton/results/commit\"\nprintf \"%s\" \"${RESULT_SHA}\" \u003e \"/tekton/results/CHAINS-GIT_COMMIT\"\nprintf \"%s\" \"${RESULT_SHA_SHORT}\" \u003e \"/tekton/results/short-commit\"\nprintf \"%s\" \"${PARAM_URL}\" \u003e \"/tekton/results/url\"\nprintf \"%s\" \"${PARAM_URL}\" \u003e \"/tekton/results/CHAINS-GIT_URL\"\nprintf \"%s\" \"$(git log -1 --pretty=%ct)\" \u003e \"/tekton/results/commit-timestamp\"\n\nif [ \"${PARAM_FETCH_TAGS}\" = \"true\" ] ; then\n  echo \"Fetching tags\"\n  retry git fetch --tags\nfi\n",
                            "securityContext": {
                                "runAsUser": 0
                            },
                            "volumeMounts": [
                                {
                                    "mountPath": "/mnt/trusted-ca",
                                    "name": "trusted-ca",
                                    "readOnly": true
                                }
                            ]
                        },
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "PARAM_ENABLE_SYMLINK_CHECK",
                                    "value": "true"
                                },
                                {
                                    "name": "PARAM_SUBDIRECTORY",
                                    "value": "source"
                                },
                                {
                                    "name": "WORKSPACE_OUTPUT_PATH",
                                    "value": "/workspace/output"
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "symlink-check",
                            "script": "#!/usr/bin/env bash\nset -euo pipefail\n\nCHECKOUT_DIR=\"${WORKSPACE_OUTPUT_PATH}/${PARAM_SUBDIRECTORY}\"\ncheck_symlinks() {\n  FOUND_SYMLINK_POINTING_OUTSIDE_OF_REPO=false\n  while read -r symlink\n  do\n    target=$(readlink -m \"$symlink\")\n    if ! [[ \"$target\" =~ ^$CHECKOUT_DIR ]]; then\n      echo \"The cloned repository contains symlink pointing outside of the cloned repository: $symlink\"\n      FOUND_SYMLINK_POINTING_OUTSIDE_OF_REPO=true\n    fi\n  done \u003c \u003c(find $CHECKOUT_DIR -type l -print)\n  if [ \"$FOUND_SYMLINK_POINTING_OUTSIDE_OF_REPO\" = true ] ; then\n    return 1\n  fi\n}\n\nif [ \"${PARAM_ENABLE_SYMLINK_CHECK}\" = \"true\" ] ; then\n  echo \"Running symlink check\"\n  check_symlinks\nfi\n"
                        }
                    ],
                    "volumes": [
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "The git repo will be cloned onto the volume backing this Workspace.",
                            "name": "output"
                        },
                        {
                            "description": "A .ssh directory with private key, known_hosts, config, etc. Copied to\nthe user's home before git commands are executed. Used to authenticate\nwith the git remote when performing the clone. Binding a Secret to this\nWorkspace is strongly recommended over other volume types.\n",
                            "name": "ssh-directory",
                            "optional": true
                        },
                        {
                            "description": "A Workspace containing a .gitconfig and .git-credentials file or username and password.\nThese will be copied to the user's home before any git commands are run. Any\nother files in this Workspace are ignored. It is strongly recommended\nto use ssh-directory over basic-auth whenever possible and to bind a\nSecret to this Workspace over other volume types.\n",
                            "name": "basic-auth",
                            "optional": true
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.redhat.com/build-type": "docker",
                    "build.appstudio.redhat.com/task-name": "deploy-workload",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "https://rekor-server-tssc-tas.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/api/v1/log/entries?logIndex=23",
                    "pipeline.tekton.dev/affinity-assistant": "affinity-assistant-032ccb134c",
                    "pipeline.tekton.dev/release": "8910674cb953317a4373f33822024b9de8c5fa22",
                    "pipelinesascode.tekton.dev/branch": "refs/heads/main",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-tdupri",
                    "pipelinesascode.tekton.dev/git-provider": "gitlab",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/k8s/ns/tssc-app-ci/tekton.dev~v1~PipelineRun/e2e-tests-go-eciytfax-on-push-sgdp2",
                    "pipelinesascode.tekton.dev/max-keep-runs": "2",
                    "pipelinesascode.tekton.dev/on-event": "[push]",
                    "pipelinesascode.tekton.dev/on-target-branch": "[main]",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-on-push",
                    "pipelinesascode.tekton.dev/pipeline": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/pipelines/docker-build-tssc.yaml",
                    "pipelinesascode.tekton.dev/repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-repository",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-qe-test",
                    "pipelinesascode.tekton.dev/sha": "5a07e41d8b36e10e4387f9fd3fe9be02019d59fc",
                    "pipelinesascode.tekton.dev/sha-title": "Merge request #1",
                    "pipelinesascode.tekton.dev/sha-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax/-/commit/5a07e41d8b36e10e4387f9fd3fe9be02019d59fc",
                    "pipelinesascode.tekton.dev/source-branch": "refs/heads/main",
                    "pipelinesascode.tekton.dev/source-project-id": "81724388",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/target-project-id": "81724388",
                    "pipelinesascode.tekton.dev/task-0": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/init.yaml",
                    "pipelinesascode.tekton.dev/task-1": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/git-clone.yaml",
                    "pipelinesascode.tekton.dev/task-10": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/deploy-workload.yaml",
                    "pipelinesascode.tekton.dev/task-11": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/scan-workload.yaml",
                    "pipelinesascode.tekton.dev/task-12": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/summarize-workload.yaml",
                    "pipelinesascode.tekton.dev/task-13": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/show-workload-sbom.yaml",
                    "pipelinesascode.tekton.dev/task-14": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/deploy-workload-check.yaml",
                    "pipelinesascode.tekton.dev/task-2": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/buildah-rhtap.yaml",
                    "pipelinesascode.tekton.dev/task-3": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/acs-image-check.yaml",
                    "pipelinesascode.tekton.dev/task-4": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/acs-image-scan.yaml",
                    "pipelinesascode.tekton.dev/task-5": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/acs-deploy-check.yaml",
                    "pipelinesascode.tekton.dev/task-6": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/update-deployment.yaml",
                    "pipelinesascode.tekton.dev/task-7": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/show-sbom-rhdh.yaml",
                    "pipelinesascode.tekton.dev/task-8": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/summary.yaml",
                    "pipelinesascode.tekton.dev/task-9": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/build-workload.yaml",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "tssc-app-ci/results/5e2f2a93-43b0-4e8e-94a5-d699ca6d955f/records/4fe38c40-a4b3-4bc2-8d55-a4aa6bace260",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"e2e-tests-go-eciytfax\",\"commit\":\"5a07e41d8b36e10e4387f9fd3fe9be02019d59fc\",\"eventType\":\"push\"}",
                    "results.tekton.dev/result": "tssc-app-ci/results/5e2f2a93-43b0-4e8e-94a5-d699ca6d955f",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "containers, tssc"
                },
                "creationTimestamp": "2026-04-28T16:01:59Z",
                "finalizers": [
                    "chains.tekton.dev/taskrun",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/part-of": "e2e-tests-go-eciytfax",
                    "app.kubernetes.io/version": "v0.39.5",
                    "argocd/app-name": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-id": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-namespace": "tssc-app",
                    "build.appstudio.redhat.com/build_type": "docker",
                    "janus-idp.io/tekton": "e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-on-push",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-repository",
                    "pipelinesascode.tekton.dev/sha": "5a07e41d8b36e10e4387f9fd3fe9be02019d59fc",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "e2e-tests-go-eciytfax-on-push-sgdp2",
                    "tekton.dev/pipelineRun": "e2e-tests-go-eciytfax-on-push-sgdp2",
                    "tekton.dev/pipelineRunUID": "5e2f2a93-43b0-4e8e-94a5-d699ca6d955f",
                    "tekton.dev/pipelineTask": "deploy"
                },
                "name": "e2e-tests-go-eciytfax-on-push-sgdp2-deploy",
                "namespace": "tssc-app-ci",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "e2e-tests-go-eciytfax-on-push-sgdp2",
                        "uid": "5e2f2a93-43b0-4e8e-94a5-d699ca6d955f"
                    }
                ],
                "resourceVersion": "42063",
                "uid": "4fe38c40-a4b3-4bc2-8d55-a4aa6bace260"
            },
            "spec": {
                "params": [
                    {
                        "name": "gitops-secret-name",
                        "value": "gitlab-auth-secret"
                    },
                    {
                        "name": "IMAGE",
                        "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                    },
                    {
                        "name": "CONTEXT",
                        "value": "."
                    },
                    {
                        "name": "IMAGE_EXPIRES_AFTER",
                        "value": "5d"
                    },
                    {
                        "name": "COMMIT_SHA",
                        "value": "5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                    }
                ],
                "serviceAccountName": "pipeline",
                "taskSpec": {
                    "description": "Deploy built image to development environment.",
                    "params": [
                        {
                            "description": "Reference of the image buildah will produce.",
                            "name": "IMAGE",
                            "type": "string"
                        },
                        {
                            "default": ".",
                            "description": "Path to the directory to use as context.",
                            "name": "CONTEXT",
                            "type": "string"
                        },
                        {
                            "default": "vfs",
                            "description": "Storage driver to configure for buildah",
                            "name": "STORAGE_DRIVER",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "CI_TYPE",
                                "value": "tekton"
                            },
                            {
                                "name": "STORAGE_DRIVER",
                                "value": "$(params.STORAGE_DRIVER)"
                            },
                            {
                                "name": "CONTEXT",
                                "value": "$(params.CONTEXT)"
                            },
                            {
                                "name": "IMAGE",
                                "value": "$(params.IMAGE)"
                            },
                            {
                                "name": "IMAGE_URL",
                                "value": "$(params.IMAGE)"
                            },
                            {
                                "name": "GITOPS_AUTH_PASSWORD",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "password",
                                        "name": "$(params.gitops-secret-name)"
                                    }
                                }
                            },
                            {
                                "name": "GITOPS_AUTH_USERNAME",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "username",
                                        "name": "$(params.gitops-secret-name)"
                                    }
                                }
                            }
                        ],
                        "workingDir": "$(workspaces.source.path)/source"
                    },
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "STORAGE_DRIVER",
                                    "value": "$(params.STORAGE_DRIVER)"
                                },
                                {
                                    "name": "CONTEXT",
                                    "value": "$(params.CONTEXT)"
                                },
                                {
                                    "name": "IMAGE",
                                    "value": "$(params.IMAGE)"
                                },
                                {
                                    "name": "IMAGE_URL",
                                    "value": "$(params.IMAGE)"
                                },
                                {
                                    "name": "GITOPS_AUTH_PASSWORD",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "password",
                                            "name": "$(params.gitops-secret-name)"
                                        }
                                    }
                                },
                                {
                                    "name": "GITOPS_AUTH_USERNAME",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "username",
                                            "name": "$(params.gitops-secret-name)"
                                        }
                                    }
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "deploy",
                            "script": "echo \"running update-deployment\"\n/workspace/source/tssc/update-deployment.sh\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/var/lib/containers",
                                    "name": "varlibcontainers"
                                },
                                {
                                    "mountPath": "/tmp/files",
                                    "name": "tmpfiles"
                                }
                            ],
                            "workingDir": "$(workspaces.source.path)/source"
                        }
                    ],
                    "volumes": [
                        {
                            "emptyDir": {},
                            "name": "varlibcontainers"
                        },
                        {
                            "emptyDir": {},
                            "name": "tmpfiles"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "Workspace containing the source code to build.",
                            "name": "source"
                        }
                    ]
                },
                "timeout": "1h0m0s",
                "workspaces": [
                    {
                        "name": "source",
                        "persistentVolumeClaim": {
                            "claimName": "pvc-8dabd9baba"
                        }
                    }
                ]
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-28T16:02:09Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-28T16:02:09Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "e2e-tests-go-eciytfax-on-push-sgdp2-deploy-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    }
                },
                "startTime": "2026-04-28T16:01:59Z",
                "steps": [
                    {
                        "container": "step-deploy",
                        "imageID": "quay.io/redhat-tssc/task-runner@sha256:db633cb62eb097a46ca9e3e0a54d21c8ebd444f81a074ce1f1afa61956185dbf",
                        "name": "deploy",
                        "provenance": {},
                        "terminated": {
                            "containerID": "cri-o://879ca68fa15790ffc7bbd071006291080a667b6e1d3dfff4834931534fe49713",
                            "exitCode": 0,
                            "finishedAt": "2026-04-28T16:02:08Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-28T16:02:05Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Deploy built image to development environment.",
                    "params": [
                        {
                            "description": "Reference of the image buildah will produce.",
                            "name": "IMAGE",
                            "type": "string"
                        },
                        {
                            "default": ".",
                            "description": "Path to the directory to use as context.",
                            "name": "CONTEXT",
                            "type": "string"
                        },
                        {
                            "default": "vfs",
                            "description": "Storage driver to configure for buildah",
                            "name": "STORAGE_DRIVER",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "CI_TYPE",
                                "value": "tekton"
                            },
                            {
                                "name": "STORAGE_DRIVER",
                                "value": "vfs"
                            },
                            {
                                "name": "CONTEXT",
                                "value": "."
                            },
                            {
                                "name": "IMAGE",
                                "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                            },
                            {
                                "name": "IMAGE_URL",
                                "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                            },
                            {
                                "name": "GITOPS_AUTH_PASSWORD",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "password",
                                        "name": "gitlab-auth-secret"
                                    }
                                }
                            },
                            {
                                "name": "GITOPS_AUTH_USERNAME",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "username",
                                        "name": "gitlab-auth-secret"
                                    }
                                }
                            }
                        ],
                        "workingDir": "/workspace/source/source"
                    },
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "STORAGE_DRIVER",
                                    "value": "vfs"
                                },
                                {
                                    "name": "CONTEXT",
                                    "value": "."
                                },
                                {
                                    "name": "IMAGE",
                                    "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                                },
                                {
                                    "name": "IMAGE_URL",
                                    "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                                },
                                {
                                    "name": "GITOPS_AUTH_PASSWORD",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "password",
                                            "name": "gitlab-auth-secret"
                                        }
                                    }
                                },
                                {
                                    "name": "GITOPS_AUTH_USERNAME",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "username",
                                            "name": "gitlab-auth-secret"
                                        }
                                    }
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "deploy",
                            "script": "echo \"running update-deployment\"\n/workspace/source/tssc/update-deployment.sh\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/var/lib/containers",
                                    "name": "varlibcontainers"
                                },
                                {
                                    "mountPath": "/tmp/files",
                                    "name": "tmpfiles"
                                }
                            ],
                            "workingDir": "/workspace/source/source"
                        }
                    ],
                    "volumes": [
                        {
                            "emptyDir": {},
                            "name": "varlibcontainers"
                        },
                        {
                            "emptyDir": {},
                            "name": "tmpfiles"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "Workspace containing the source code to build.",
                            "name": "source"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.redhat.com/build-type": "docker",
                    "build.appstudio.redhat.com/task-name": "deploy-workload-check",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "https://rekor-server-tssc-tas.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/api/v1/log/entries?logIndex=26",
                    "pipeline.tekton.dev/affinity-assistant": "affinity-assistant-032ccb134c",
                    "pipeline.tekton.dev/release": "8910674cb953317a4373f33822024b9de8c5fa22",
                    "pipelinesascode.tekton.dev/branch": "refs/heads/main",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-tdupri",
                    "pipelinesascode.tekton.dev/git-provider": "gitlab",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/k8s/ns/tssc-app-ci/tekton.dev~v1~PipelineRun/e2e-tests-go-eciytfax-on-push-sgdp2",
                    "pipelinesascode.tekton.dev/max-keep-runs": "2",
                    "pipelinesascode.tekton.dev/on-event": "[push]",
                    "pipelinesascode.tekton.dev/on-target-branch": "[main]",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-on-push",
                    "pipelinesascode.tekton.dev/pipeline": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/pipelines/docker-build-tssc.yaml",
                    "pipelinesascode.tekton.dev/repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-repository",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-qe-test",
                    "pipelinesascode.tekton.dev/sha": "5a07e41d8b36e10e4387f9fd3fe9be02019d59fc",
                    "pipelinesascode.tekton.dev/sha-title": "Merge request #1",
                    "pipelinesascode.tekton.dev/sha-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax/-/commit/5a07e41d8b36e10e4387f9fd3fe9be02019d59fc",
                    "pipelinesascode.tekton.dev/source-branch": "refs/heads/main",
                    "pipelinesascode.tekton.dev/source-project-id": "81724388",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/target-project-id": "81724388",
                    "pipelinesascode.tekton.dev/task-0": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/init.yaml",
                    "pipelinesascode.tekton.dev/task-1": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/git-clone.yaml",
                    "pipelinesascode.tekton.dev/task-10": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/deploy-workload.yaml",
                    "pipelinesascode.tekton.dev/task-11": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/scan-workload.yaml",
                    "pipelinesascode.tekton.dev/task-12": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/summarize-workload.yaml",
                    "pipelinesascode.tekton.dev/task-13": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/show-workload-sbom.yaml",
                    "pipelinesascode.tekton.dev/task-14": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/deploy-workload-check.yaml",
                    "pipelinesascode.tekton.dev/task-2": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/buildah-rhtap.yaml",
                    "pipelinesascode.tekton.dev/task-3": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/acs-image-check.yaml",
                    "pipelinesascode.tekton.dev/task-4": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/acs-image-scan.yaml",
                    "pipelinesascode.tekton.dev/task-5": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/acs-deploy-check.yaml",
                    "pipelinesascode.tekton.dev/task-6": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/update-deployment.yaml",
                    "pipelinesascode.tekton.dev/task-7": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/show-sbom-rhdh.yaml",
                    "pipelinesascode.tekton.dev/task-8": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/summary.yaml",
                    "pipelinesascode.tekton.dev/task-9": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/build-workload.yaml",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "tssc-app-ci/results/5e2f2a93-43b0-4e8e-94a5-d699ca6d955f/records/be06251b-07e9-40db-a014-c257abb0f15b",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"e2e-tests-go-eciytfax\",\"commit\":\"5a07e41d8b36e10e4387f9fd3fe9be02019d59fc\",\"eventType\":\"push\"}",
                    "results.tekton.dev/result": "tssc-app-ci/results/5e2f2a93-43b0-4e8e-94a5-d699ca6d955f",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "containers, tssc"
                },
                "creationTimestamp": "2026-04-28T16:02:09Z",
                "finalizers": [
                    "chains.tekton.dev/taskrun",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/part-of": "e2e-tests-go-eciytfax",
                    "app.kubernetes.io/version": "v0.39.5",
                    "argocd/app-name": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-id": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-namespace": "tssc-app",
                    "build.appstudio.redhat.com/build_type": "docker",
                    "janus-idp.io/tekton": "e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-on-push",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-repository",
                    "pipelinesascode.tekton.dev/sha": "5a07e41d8b36e10e4387f9fd3fe9be02019d59fc",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "e2e-tests-go-eciytfax-on-push-sgdp2",
                    "tekton.dev/pipelineRun": "e2e-tests-go-eciytfax-on-push-sgdp2",
                    "tekton.dev/pipelineRunUID": "5e2f2a93-43b0-4e8e-94a5-d699ca6d955f",
                    "tekton.dev/pipelineTask": "deployment-check"
                },
                "name": "e2e-tests-go-eciytfax-on-push-sgdp2-deployment-check",
                "namespace": "tssc-app-ci",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "e2e-tests-go-eciytfax-on-push-sgdp2",
                        "uid": "5e2f2a93-43b0-4e8e-94a5-d699ca6d955f"
                    }
                ],
                "resourceVersion": "42312",
                "uid": "be06251b-07e9-40db-a014-c257abb0f15b"
            },
            "spec": {
                "params": [
                    {
                        "name": "rox-secret-name",
                        "value": "rox-api-token"
                    },
                    {
                        "name": "gitops-secret-name",
                        "value": "gitlab-auth-secret"
                    },
                    {
                        "name": "IMAGE",
                        "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                    },
                    {
                        "name": "CONTEXT",
                        "value": "."
                    },
                    {
                        "name": "IMAGE_EXPIRES_AFTER",
                        "value": "5d"
                    },
                    {
                        "name": "COMMIT_SHA",
                        "value": "5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                    }
                ],
                "serviceAccountName": "pipeline",
                "taskSpec": {
                    "description": "Scan image built for vulnerabilities.",
                    "params": [
                        {
                            "description": "Reference of the image buildah will produce.",
                            "name": "IMAGE",
                            "type": "string"
                        },
                        {
                            "default": ".",
                            "description": "Path to the directory to use as context.",
                            "name": "CONTEXT",
                            "type": "string"
                        },
                        {
                            "default": "vfs",
                            "description": "Storage driver to configure for buildah",
                            "name": "STORAGE_DRIVER",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Summary of the roxctl scan",
                            "name": "SCAN_OUTPUT",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "CI_TYPE",
                                "value": "tekton"
                            },
                            {
                                "name": "STORAGE_DRIVER",
                                "value": "$(params.STORAGE_DRIVER)"
                            },
                            {
                                "name": "CONTEXT",
                                "value": "$(params.CONTEXT)"
                            },
                            {
                                "name": "IMAGE",
                                "value": "$(params.IMAGE)"
                            },
                            {
                                "name": "IMAGE_URL",
                                "value": "$(params.IMAGE)"
                            },
                            {
                                "name": "ROX_CENTRAL_ENDPOINT",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "rox-api-endpoint",
                                        "name": "$(params.rox-secret-name)"
                                    }
                                }
                            },
                            {
                                "name": "ROX_API_TOKEN",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "rox-api-token",
                                        "name": "$(params.rox-secret-name)"
                                    }
                                }
                            },
                            {
                                "name": "GITOPS_AUTH_PASSWORD",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "password",
                                        "name": "$(params.gitops-secret-name)"
                                    }
                                }
                            },
                            {
                                "name": "GITOPS_AUTH_USERNAME",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "username",
                                        "name": "$(params.gitops-secret-name)"
                                    }
                                }
                            }
                        ],
                        "workingDir": "$(workspaces.source.path)/source"
                    },
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "STORAGE_DRIVER",
                                    "value": "$(params.STORAGE_DRIVER)"
                                },
                                {
                                    "name": "CONTEXT",
                                    "value": "$(params.CONTEXT)"
                                },
                                {
                                    "name": "IMAGE",
                                    "value": "$(params.IMAGE)"
                                },
                                {
                                    "name": "IMAGE_URL",
                                    "value": "$(params.IMAGE)"
                                },
                                {
                                    "name": "ROX_CENTRAL_ENDPOINT",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "rox-api-endpoint",
                                            "name": "$(params.rox-secret-name)"
                                        }
                                    }
                                },
                                {
                                    "name": "ROX_API_TOKEN",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "rox-api-token",
                                            "name": "$(params.rox-secret-name)"
                                        }
                                    }
                                },
                                {
                                    "name": "GITOPS_AUTH_PASSWORD",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "password",
                                            "name": "$(params.gitops-secret-name)"
                                        }
                                    }
                                },
                                {
                                    "name": "GITOPS_AUTH_USERNAME",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "username",
                                            "name": "$(params.gitops-secret-name)"
                                        }
                                    }
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "deploy-check",
                            "script": "echo \"running acs-deploy-check\"\n/workspace/source/tssc/acs-deploy-check.sh\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/var/lib/containers",
                                    "name": "varlibcontainers"
                                },
                                {
                                    "mountPath": "/tmp/files",
                                    "name": "tmpfiles"
                                }
                            ],
                            "workingDir": "$(workspaces.source.path)/source"
                        }
                    ],
                    "volumes": [
                        {
                            "emptyDir": {},
                            "name": "varlibcontainers"
                        },
                        {
                            "emptyDir": {},
                            "name": "tmpfiles"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "Workspace containing the source code to build.",
                            "name": "source"
                        }
                    ]
                },
                "timeout": "1h0m0s",
                "workspaces": [
                    {
                        "name": "source",
                        "persistentVolumeClaim": {
                            "claimName": "pvc-8dabd9baba"
                        }
                    }
                ]
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-28T16:02:17Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-28T16:02:17Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "e2e-tests-go-eciytfax-on-push-sgdp2-deployment-check-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    }
                },
                "startTime": "2026-04-28T16:02:09Z",
                "steps": [
                    {
                        "container": "step-deploy-check",
                        "imageID": "quay.io/redhat-tssc/task-runner@sha256:db633cb62eb097a46ca9e3e0a54d21c8ebd444f81a074ce1f1afa61956185dbf",
                        "name": "deploy-check",
                        "provenance": {},
                        "terminated": {
                            "containerID": "cri-o://f007c34eee9b9e580e6845718d97a68cffff955c4067478f2f36eba93d093641",
                            "exitCode": 0,
                            "finishedAt": "2026-04-28T16:02:16Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-28T16:02:14Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Scan image built for vulnerabilities.",
                    "params": [
                        {
                            "description": "Reference of the image buildah will produce.",
                            "name": "IMAGE",
                            "type": "string"
                        },
                        {
                            "default": ".",
                            "description": "Path to the directory to use as context.",
                            "name": "CONTEXT",
                            "type": "string"
                        },
                        {
                            "default": "vfs",
                            "description": "Storage driver to configure for buildah",
                            "name": "STORAGE_DRIVER",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Summary of the roxctl scan",
                            "name": "SCAN_OUTPUT",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "CI_TYPE",
                                "value": "tekton"
                            },
                            {
                                "name": "STORAGE_DRIVER",
                                "value": "vfs"
                            },
                            {
                                "name": "CONTEXT",
                                "value": "."
                            },
                            {
                                "name": "IMAGE",
                                "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                            },
                            {
                                "name": "IMAGE_URL",
                                "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                            },
                            {
                                "name": "ROX_CENTRAL_ENDPOINT",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "rox-api-endpoint",
                                        "name": "rox-api-token"
                                    }
                                }
                            },
                            {
                                "name": "ROX_API_TOKEN",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "rox-api-token",
                                        "name": "rox-api-token"
                                    }
                                }
                            },
                            {
                                "name": "GITOPS_AUTH_PASSWORD",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "password",
                                        "name": "gitlab-auth-secret"
                                    }
                                }
                            },
                            {
                                "name": "GITOPS_AUTH_USERNAME",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "username",
                                        "name": "gitlab-auth-secret"
                                    }
                                }
                            }
                        ],
                        "workingDir": "/workspace/source/source"
                    },
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "STORAGE_DRIVER",
                                    "value": "vfs"
                                },
                                {
                                    "name": "CONTEXT",
                                    "value": "."
                                },
                                {
                                    "name": "IMAGE",
                                    "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                                },
                                {
                                    "name": "IMAGE_URL",
                                    "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                                },
                                {
                                    "name": "ROX_CENTRAL_ENDPOINT",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "rox-api-endpoint",
                                            "name": "rox-api-token"
                                        }
                                    }
                                },
                                {
                                    "name": "ROX_API_TOKEN",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "rox-api-token",
                                            "name": "rox-api-token"
                                        }
                                    }
                                },
                                {
                                    "name": "GITOPS_AUTH_PASSWORD",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "password",
                                            "name": "gitlab-auth-secret"
                                        }
                                    }
                                },
                                {
                                    "name": "GITOPS_AUTH_USERNAME",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "username",
                                            "name": "gitlab-auth-secret"
                                        }
                                    }
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "deploy-check",
                            "script": "echo \"running acs-deploy-check\"\n/workspace/source/tssc/acs-deploy-check.sh\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/var/lib/containers",
                                    "name": "varlibcontainers"
                                },
                                {
                                    "mountPath": "/tmp/files",
                                    "name": "tmpfiles"
                                }
                            ],
                            "workingDir": "/workspace/source/source"
                        }
                    ],
                    "volumes": [
                        {
                            "emptyDir": {},
                            "name": "varlibcontainers"
                        },
                        {
                            "emptyDir": {},
                            "name": "tmpfiles"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "Workspace containing the source code to build.",
                            "name": "source"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.redhat.com/build-type": "docker",
                    "build.appstudio.redhat.com/task-name": "scan-workload",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "https://rekor-server-tssc-tas.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/api/v1/log/entries?logIndex=22",
                    "pipeline.tekton.dev/affinity-assistant": "affinity-assistant-032ccb134c",
                    "pipeline.tekton.dev/release": "8910674cb953317a4373f33822024b9de8c5fa22",
                    "pipelinesascode.tekton.dev/branch": "refs/heads/main",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-tdupri",
                    "pipelinesascode.tekton.dev/git-provider": "gitlab",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/k8s/ns/tssc-app-ci/tekton.dev~v1~PipelineRun/e2e-tests-go-eciytfax-on-push-sgdp2",
                    "pipelinesascode.tekton.dev/max-keep-runs": "2",
                    "pipelinesascode.tekton.dev/on-event": "[push]",
                    "pipelinesascode.tekton.dev/on-target-branch": "[main]",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-on-push",
                    "pipelinesascode.tekton.dev/pipeline": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/pipelines/docker-build-tssc.yaml",
                    "pipelinesascode.tekton.dev/repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-repository",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-qe-test",
                    "pipelinesascode.tekton.dev/sha": "5a07e41d8b36e10e4387f9fd3fe9be02019d59fc",
                    "pipelinesascode.tekton.dev/sha-title": "Merge request #1",
                    "pipelinesascode.tekton.dev/sha-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax/-/commit/5a07e41d8b36e10e4387f9fd3fe9be02019d59fc",
                    "pipelinesascode.tekton.dev/source-branch": "refs/heads/main",
                    "pipelinesascode.tekton.dev/source-project-id": "81724388",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/target-project-id": "81724388",
                    "pipelinesascode.tekton.dev/task-0": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/init.yaml",
                    "pipelinesascode.tekton.dev/task-1": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/git-clone.yaml",
                    "pipelinesascode.tekton.dev/task-10": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/deploy-workload.yaml",
                    "pipelinesascode.tekton.dev/task-11": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/scan-workload.yaml",
                    "pipelinesascode.tekton.dev/task-12": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/summarize-workload.yaml",
                    "pipelinesascode.tekton.dev/task-13": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/show-workload-sbom.yaml",
                    "pipelinesascode.tekton.dev/task-14": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/deploy-workload-check.yaml",
                    "pipelinesascode.tekton.dev/task-2": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/buildah-rhtap.yaml",
                    "pipelinesascode.tekton.dev/task-3": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/acs-image-check.yaml",
                    "pipelinesascode.tekton.dev/task-4": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/acs-image-scan.yaml",
                    "pipelinesascode.tekton.dev/task-5": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/acs-deploy-check.yaml",
                    "pipelinesascode.tekton.dev/task-6": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/update-deployment.yaml",
                    "pipelinesascode.tekton.dev/task-7": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/show-sbom-rhdh.yaml",
                    "pipelinesascode.tekton.dev/task-8": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/summary.yaml",
                    "pipelinesascode.tekton.dev/task-9": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/build-workload.yaml",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "tssc-app-ci/results/5e2f2a93-43b0-4e8e-94a5-d699ca6d955f/records/fa24a82d-fd00-4e2b-bf01-ecc416631fa4",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"e2e-tests-go-eciytfax\",\"commit\":\"5a07e41d8b36e10e4387f9fd3fe9be02019d59fc\",\"eventType\":\"push\"}",
                    "results.tekton.dev/result": "tssc-app-ci/results/5e2f2a93-43b0-4e8e-94a5-d699ca6d955f",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "containers, tssc"
                },
                "creationTimestamp": "2026-04-28T16:01:59Z",
                "finalizers": [
                    "chains.tekton.dev/taskrun",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/part-of": "e2e-tests-go-eciytfax",
                    "app.kubernetes.io/version": "v0.39.5",
                    "argocd/app-name": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-id": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-namespace": "tssc-app",
                    "build.appstudio.redhat.com/build_type": "docker",
                    "janus-idp.io/tekton": "e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-on-push",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-repository",
                    "pipelinesascode.tekton.dev/sha": "5a07e41d8b36e10e4387f9fd3fe9be02019d59fc",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "e2e-tests-go-eciytfax-on-push-sgdp2",
                    "tekton.dev/pipelineRun": "e2e-tests-go-eciytfax-on-push-sgdp2",
                    "tekton.dev/pipelineRunUID": "5e2f2a93-43b0-4e8e-94a5-d699ca6d955f",
                    "tekton.dev/pipelineTask": "scan"
                },
                "name": "e2e-tests-go-eciytfax-on-push-sgdp2-scan",
                "namespace": "tssc-app-ci",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "e2e-tests-go-eciytfax-on-push-sgdp2",
                        "uid": "5e2f2a93-43b0-4e8e-94a5-d699ca6d955f"
                    }
                ],
                "resourceVersion": "42016",
                "uid": "fa24a82d-fd00-4e2b-bf01-ecc416631fa4"
            },
            "spec": {
                "params": [
                    {
                        "name": "rox-secret-name",
                        "value": "rox-api-token"
                    },
                    {
                        "name": "IMAGE",
                        "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                    },
                    {
                        "name": "CONTEXT",
                        "value": "."
                    },
                    {
                        "name": "IMAGE_EXPIRES_AFTER",
                        "value": "5d"
                    },
                    {
                        "name": "COMMIT_SHA",
                        "value": "5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                    }
                ],
                "serviceAccountName": "pipeline",
                "taskSpec": {
                    "description": "Scan image built for vulnerabilities.",
                    "params": [
                        {
                            "description": "Reference of the image buildah will produce.",
                            "name": "IMAGE",
                            "type": "string"
                        },
                        {
                            "default": ".",
                            "description": "Path to the directory to use as context.",
                            "name": "CONTEXT",
                            "type": "string"
                        },
                        {
                            "default": "vfs",
                            "description": "Storage driver to configure for buildah",
                            "name": "STORAGE_DRIVER",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Summary of the roxctl scan",
                            "name": "SCAN_OUTPUT",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "CI_TYPE",
                                "value": "tekton"
                            },
                            {
                                "name": "STORAGE_DRIVER",
                                "value": "$(params.STORAGE_DRIVER)"
                            },
                            {
                                "name": "CONTEXT",
                                "value": "$(params.CONTEXT)"
                            },
                            {
                                "name": "IMAGE",
                                "value": "$(params.IMAGE)"
                            },
                            {
                                "name": "IMAGE_URL",
                                "value": "$(params.IMAGE)"
                            },
                            {
                                "name": "ROX_CENTRAL_ENDPOINT",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "rox-api-endpoint",
                                        "name": "$(params.rox-secret-name)"
                                    }
                                }
                            },
                            {
                                "name": "ROX_API_TOKEN",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "rox-api-token",
                                        "name": "$(params.rox-secret-name)"
                                    }
                                }
                            }
                        ],
                        "workingDir": "$(workspaces.source.path)/source"
                    },
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "STORAGE_DRIVER",
                                    "value": "$(params.STORAGE_DRIVER)"
                                },
                                {
                                    "name": "CONTEXT",
                                    "value": "$(params.CONTEXT)"
                                },
                                {
                                    "name": "IMAGE",
                                    "value": "$(params.IMAGE)"
                                },
                                {
                                    "name": "IMAGE_URL",
                                    "value": "$(params.IMAGE)"
                                },
                                {
                                    "name": "ROX_CENTRAL_ENDPOINT",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "rox-api-endpoint",
                                            "name": "$(params.rox-secret-name)"
                                        }
                                    }
                                },
                                {
                                    "name": "ROX_API_TOKEN",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "rox-api-token",
                                            "name": "$(params.rox-secret-name)"
                                        }
                                    }
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "scan",
                            "script": "echo \"running acs-image-check\"\n/workspace/source/tssc/acs-image-check.sh\necho \"running acs-image-scan\"\n/workspace/source/tssc/acs-image-scan.sh\ncat ./results/acs-image-scan/SCAN_OUTPUT \u003e $(results.SCAN_OUTPUT.path)\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/var/lib/containers",
                                    "name": "varlibcontainers"
                                },
                                {
                                    "mountPath": "/tmp/files",
                                    "name": "tmpfiles"
                                }
                            ],
                            "workingDir": "$(workspaces.source.path)/source"
                        }
                    ],
                    "volumes": [
                        {
                            "emptyDir": {},
                            "name": "varlibcontainers"
                        },
                        {
                            "emptyDir": {},
                            "name": "tmpfiles"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "Workspace containing the source code to build.",
                            "name": "source"
                        }
                    ]
                },
                "timeout": "1h0m0s",
                "workspaces": [
                    {
                        "name": "source",
                        "persistentVolumeClaim": {
                            "claimName": "pvc-8dabd9baba"
                        }
                    }
                ]
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-28T16:02:08Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-28T16:02:08Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "e2e-tests-go-eciytfax-on-push-sgdp2-scan-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    }
                },
                "results": [
                    {
                        "name": "SCAN_OUTPUT",
                        "type": "string",
                        "value": "{\"vulnerabilities\":{\"critical\":0,\"high\":4,\"medium\":7,\"low\":8}}\n"
                    }
                ],
                "startTime": "2026-04-28T16:01:59Z",
                "steps": [
                    {
                        "container": "step-scan",
                        "imageID": "quay.io/redhat-tssc/task-runner@sha256:db633cb62eb097a46ca9e3e0a54d21c8ebd444f81a074ce1f1afa61956185dbf",
                        "name": "scan",
                        "provenance": {},
                        "terminated": {
                            "containerID": "cri-o://cde02a2fc2a554c4a00128f6abd9816217aaeabe2bc4596ca17902bc9682caee",
                            "exitCode": 0,
                            "finishedAt": "2026-04-28T16:02:08Z",
                            "message": "[{\"key\":\"SCAN_OUTPUT\",\"value\":\"{\\\"vulnerabilities\\\":{\\\"critical\\\":0,\\\"high\\\":4,\\\"medium\\\":7,\\\"low\\\":8}}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-28T16:02:04Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Scan image built for vulnerabilities.",
                    "params": [
                        {
                            "description": "Reference of the image buildah will produce.",
                            "name": "IMAGE",
                            "type": "string"
                        },
                        {
                            "default": ".",
                            "description": "Path to the directory to use as context.",
                            "name": "CONTEXT",
                            "type": "string"
                        },
                        {
                            "default": "vfs",
                            "description": "Storage driver to configure for buildah",
                            "name": "STORAGE_DRIVER",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Summary of the roxctl scan",
                            "name": "SCAN_OUTPUT",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "CI_TYPE",
                                "value": "tekton"
                            },
                            {
                                "name": "STORAGE_DRIVER",
                                "value": "vfs"
                            },
                            {
                                "name": "CONTEXT",
                                "value": "."
                            },
                            {
                                "name": "IMAGE",
                                "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                            },
                            {
                                "name": "IMAGE_URL",
                                "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                            },
                            {
                                "name": "ROX_CENTRAL_ENDPOINT",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "rox-api-endpoint",
                                        "name": "rox-api-token"
                                    }
                                }
                            },
                            {
                                "name": "ROX_API_TOKEN",
                                "valueFrom": {
                                    "secretKeyRef": {
                                        "key": "rox-api-token",
                                        "name": "rox-api-token"
                                    }
                                }
                            }
                        ],
                        "workingDir": "/workspace/source/source"
                    },
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "STORAGE_DRIVER",
                                    "value": "vfs"
                                },
                                {
                                    "name": "CONTEXT",
                                    "value": "."
                                },
                                {
                                    "name": "IMAGE",
                                    "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                                },
                                {
                                    "name": "IMAGE_URL",
                                    "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                                },
                                {
                                    "name": "ROX_CENTRAL_ENDPOINT",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "rox-api-endpoint",
                                            "name": "rox-api-token"
                                        }
                                    }
                                },
                                {
                                    "name": "ROX_API_TOKEN",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "rox-api-token",
                                            "name": "rox-api-token"
                                        }
                                    }
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "scan",
                            "script": "echo \"running acs-image-check\"\n/workspace/source/tssc/acs-image-check.sh\necho \"running acs-image-scan\"\n/workspace/source/tssc/acs-image-scan.sh\ncat ./results/acs-image-scan/SCAN_OUTPUT \u003e /tekton/results/SCAN_OUTPUT\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/var/lib/containers",
                                    "name": "varlibcontainers"
                                },
                                {
                                    "mountPath": "/tmp/files",
                                    "name": "tmpfiles"
                                }
                            ],
                            "workingDir": "/workspace/source/source"
                        }
                    ],
                    "volumes": [
                        {
                            "emptyDir": {},
                            "name": "varlibcontainers"
                        },
                        {
                            "emptyDir": {},
                            "name": "tmpfiles"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "Workspace containing the source code to build.",
                            "name": "source"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.redhat.com/build-type": "docker",
                    "build.appstudio.redhat.com/task-name": "show-workload-sbom",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "https://rekor-server-tssc-tas.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/api/v1/log/entries?logIndex=25",
                    "pipeline.tekton.dev/affinity-assistant": "affinity-assistant-032ccb134c",
                    "pipeline.tekton.dev/release": "8910674cb953317a4373f33822024b9de8c5fa22",
                    "pipelinesascode.tekton.dev/branch": "refs/heads/main",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-tdupri",
                    "pipelinesascode.tekton.dev/git-provider": "gitlab",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/k8s/ns/tssc-app-ci/tekton.dev~v1~PipelineRun/e2e-tests-go-eciytfax-on-push-sgdp2",
                    "pipelinesascode.tekton.dev/max-keep-runs": "2",
                    "pipelinesascode.tekton.dev/on-event": "[push]",
                    "pipelinesascode.tekton.dev/on-target-branch": "[main]",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-on-push",
                    "pipelinesascode.tekton.dev/pipeline": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/pipelines/docker-build-tssc.yaml",
                    "pipelinesascode.tekton.dev/repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-repository",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-qe-test",
                    "pipelinesascode.tekton.dev/sha": "5a07e41d8b36e10e4387f9fd3fe9be02019d59fc",
                    "pipelinesascode.tekton.dev/sha-title": "Merge request #1",
                    "pipelinesascode.tekton.dev/sha-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax/-/commit/5a07e41d8b36e10e4387f9fd3fe9be02019d59fc",
                    "pipelinesascode.tekton.dev/source-branch": "refs/heads/main",
                    "pipelinesascode.tekton.dev/source-project-id": "81724388",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/target-project-id": "81724388",
                    "pipelinesascode.tekton.dev/task-0": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/init.yaml",
                    "pipelinesascode.tekton.dev/task-1": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/git-clone.yaml",
                    "pipelinesascode.tekton.dev/task-10": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/deploy-workload.yaml",
                    "pipelinesascode.tekton.dev/task-11": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/scan-workload.yaml",
                    "pipelinesascode.tekton.dev/task-12": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/summarize-workload.yaml",
                    "pipelinesascode.tekton.dev/task-13": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/show-workload-sbom.yaml",
                    "pipelinesascode.tekton.dev/task-14": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/deploy-workload-check.yaml",
                    "pipelinesascode.tekton.dev/task-2": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/buildah-rhtap.yaml",
                    "pipelinesascode.tekton.dev/task-3": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/acs-image-check.yaml",
                    "pipelinesascode.tekton.dev/task-4": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/acs-image-scan.yaml",
                    "pipelinesascode.tekton.dev/task-5": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/acs-deploy-check.yaml",
                    "pipelinesascode.tekton.dev/task-6": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/update-deployment.yaml",
                    "pipelinesascode.tekton.dev/task-7": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/show-sbom-rhdh.yaml",
                    "pipelinesascode.tekton.dev/task-8": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/summary.yaml",
                    "pipelinesascode.tekton.dev/task-9": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/build-workload.yaml",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "tssc-app-ci/results/5e2f2a93-43b0-4e8e-94a5-d699ca6d955f/records/1a5bdfec-ae8b-4a76-8a05-819827163f17",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"e2e-tests-go-eciytfax\",\"commit\":\"5a07e41d8b36e10e4387f9fd3fe9be02019d59fc\",\"eventType\":\"push\"}",
                    "results.tekton.dev/result": "tssc-app-ci/results/5e2f2a93-43b0-4e8e-94a5-d699ca6d955f",
                    "results.tekton.dev/stored": "true",
                    "task.output.location": "results",
                    "task.results.format": "application/text",
                    "task.results.key": "LINK_TO_SBOM",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "containers, tssc"
                },
                "creationTimestamp": "2026-04-28T16:02:09Z",
                "finalizers": [
                    "chains.tekton.dev/taskrun",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/part-of": "e2e-tests-go-eciytfax",
                    "app.kubernetes.io/version": "v0.39.5",
                    "argocd/app-name": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-id": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-namespace": "tssc-app",
                    "build.appstudio.redhat.com/build_type": "docker",
                    "janus-idp.io/tekton": "e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-on-push",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-repository",
                    "pipelinesascode.tekton.dev/sha": "5a07e41d8b36e10e4387f9fd3fe9be02019d59fc",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "e2e-tests-go-eciytfax-on-push-sgdp2",
                    "tekton.dev/pipelineRun": "e2e-tests-go-eciytfax-on-push-sgdp2",
                    "tekton.dev/pipelineRunUID": "5e2f2a93-43b0-4e8e-94a5-d699ca6d955f",
                    "tekton.dev/pipelineTask": "show-sbom"
                },
                "name": "e2e-tests-go-eciytfax-on-push-sgdp2-show-sbom",
                "namespace": "tssc-app-ci",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "e2e-tests-go-eciytfax-on-push-sgdp2",
                        "uid": "5e2f2a93-43b0-4e8e-94a5-d699ca6d955f"
                    }
                ],
                "resourceVersion": "42256",
                "uid": "1a5bdfec-ae8b-4a76-8a05-819827163f17"
            },
            "spec": {
                "params": [
                    {
                        "name": "IMAGE",
                        "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                    },
                    {
                        "name": "CONTEXT",
                        "value": "."
                    },
                    {
                        "name": "IMAGE_EXPIRES_AFTER",
                        "value": "5d"
                    },
                    {
                        "name": "COMMIT_SHA",
                        "value": "5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                    }
                ],
                "serviceAccountName": "pipeline",
                "taskSpec": {
                    "description": "Show SBOM report for the built image.",
                    "params": [
                        {
                            "description": "Reference of the image buildah will produce.",
                            "name": "IMAGE",
                            "type": "string"
                        },
                        {
                            "default": ".",
                            "description": "Path to the directory to use as context.",
                            "name": "CONTEXT",
                            "type": "string"
                        },
                        {
                            "default": "vfs",
                            "description": "Storage driver to configure for buildah",
                            "name": "STORAGE_DRIVER",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Placeholder result meant to make RHDH identify this task as the producer of the SBOM logs.",
                            "name": "LINK_TO_SBOM",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "CI_TYPE",
                                "value": "tekton"
                            },
                            {
                                "name": "STORAGE_DRIVER",
                                "value": "$(params.STORAGE_DRIVER)"
                            },
                            {
                                "name": "CONTEXT",
                                "value": "$(params.CONTEXT)"
                            },
                            {
                                "name": "IMAGE",
                                "value": "$(params.IMAGE)"
                            },
                            {
                                "name": "IMAGE_URL",
                                "value": "$(params.IMAGE)"
                            }
                        ],
                        "workingDir": "$(workspaces.source.path)/source"
                    },
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "STORAGE_DRIVER",
                                    "value": "$(params.STORAGE_DRIVER)"
                                },
                                {
                                    "name": "CONTEXT",
                                    "value": "$(params.CONTEXT)"
                                },
                                {
                                    "name": "IMAGE",
                                    "value": "$(params.IMAGE)"
                                },
                                {
                                    "name": "IMAGE_URL",
                                    "value": "$(params.IMAGE)"
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "show-sbom",
                            "script": "echo \"running show-sbom-rhdh\"\n/workspace/source/tssc/show-sbom-rhdh.sh\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/var/lib/containers",
                                    "name": "varlibcontainers"
                                },
                                {
                                    "mountPath": "/tmp/files",
                                    "name": "tmpfiles"
                                }
                            ],
                            "workingDir": "$(workspaces.source.path)/source"
                        }
                    ],
                    "volumes": [
                        {
                            "emptyDir": {},
                            "name": "varlibcontainers"
                        },
                        {
                            "emptyDir": {},
                            "name": "tmpfiles"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "Workspace containing the source code to build.",
                            "name": "source"
                        }
                    ]
                },
                "timeout": "1h0m0s",
                "workspaces": [
                    {
                        "name": "source",
                        "persistentVolumeClaim": {
                            "claimName": "pvc-8dabd9baba"
                        }
                    }
                ]
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-28T16:02:16Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-28T16:02:16Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "e2e-tests-go-eciytfax-on-push-sgdp2-show-sbom-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    }
                },
                "startTime": "2026-04-28T16:02:09Z",
                "steps": [
                    {
                        "container": "step-show-sbom",
                        "imageID": "quay.io/redhat-tssc/task-runner@sha256:db633cb62eb097a46ca9e3e0a54d21c8ebd444f81a074ce1f1afa61956185dbf",
                        "name": "show-sbom",
                        "provenance": {},
                        "terminated": {
                            "containerID": "cri-o://63309d987916eb6385ad1efaeebfe1a2085fd023ba095a2da1a26b7ea6359b00",
                            "exitCode": 0,
                            "finishedAt": "2026-04-28T16:02:16Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-28T16:02:16Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Show SBOM report for the built image.",
                    "params": [
                        {
                            "description": "Reference of the image buildah will produce.",
                            "name": "IMAGE",
                            "type": "string"
                        },
                        {
                            "default": ".",
                            "description": "Path to the directory to use as context.",
                            "name": "CONTEXT",
                            "type": "string"
                        },
                        {
                            "default": "vfs",
                            "description": "Storage driver to configure for buildah",
                            "name": "STORAGE_DRIVER",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Placeholder result meant to make RHDH identify this task as the producer of the SBOM logs.",
                            "name": "LINK_TO_SBOM",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "CI_TYPE",
                                "value": "tekton"
                            },
                            {
                                "name": "STORAGE_DRIVER",
                                "value": "vfs"
                            },
                            {
                                "name": "CONTEXT",
                                "value": "."
                            },
                            {
                                "name": "IMAGE",
                                "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                            },
                            {
                                "name": "IMAGE_URL",
                                "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                            }
                        ],
                        "workingDir": "/workspace/source/source"
                    },
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "STORAGE_DRIVER",
                                    "value": "vfs"
                                },
                                {
                                    "name": "CONTEXT",
                                    "value": "."
                                },
                                {
                                    "name": "IMAGE",
                                    "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                                },
                                {
                                    "name": "IMAGE_URL",
                                    "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "show-sbom",
                            "script": "echo \"running show-sbom-rhdh\"\n/workspace/source/tssc/show-sbom-rhdh.sh\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/var/lib/containers",
                                    "name": "varlibcontainers"
                                },
                                {
                                    "mountPath": "/tmp/files",
                                    "name": "tmpfiles"
                                }
                            ],
                            "workingDir": "/workspace/source/source"
                        }
                    ],
                    "volumes": [
                        {
                            "emptyDir": {},
                            "name": "varlibcontainers"
                        },
                        {
                            "emptyDir": {},
                            "name": "tmpfiles"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "Workspace containing the source code to build.",
                            "name": "source"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.redhat.com/build-type": "docker",
                    "build.appstudio.redhat.com/task-name": "summarize-workload",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "https://rekor-server-tssc-tas.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/api/v1/log/entries?logIndex=24",
                    "pipeline.tekton.dev/affinity-assistant": "affinity-assistant-032ccb134c",
                    "pipeline.tekton.dev/release": "8910674cb953317a4373f33822024b9de8c5fa22",
                    "pipelinesascode.tekton.dev/branch": "refs/heads/main",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-tdupri",
                    "pipelinesascode.tekton.dev/git-provider": "gitlab",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-9f4608944c.l4c0.p3.openshiftapps.com/k8s/ns/tssc-app-ci/tekton.dev~v1~PipelineRun/e2e-tests-go-eciytfax-on-push-sgdp2",
                    "pipelinesascode.tekton.dev/max-keep-runs": "2",
                    "pipelinesascode.tekton.dev/on-event": "[push]",
                    "pipelinesascode.tekton.dev/on-target-branch": "[main]",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-on-push",
                    "pipelinesascode.tekton.dev/pipeline": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/pipelines/docker-build-tssc.yaml",
                    "pipelinesascode.tekton.dev/repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-repository",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-qe-test",
                    "pipelinesascode.tekton.dev/sha": "5a07e41d8b36e10e4387f9fd3fe9be02019d59fc",
                    "pipelinesascode.tekton.dev/sha-title": "Merge request #1",
                    "pipelinesascode.tekton.dev/sha-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax/-/commit/5a07e41d8b36e10e4387f9fd3fe9be02019d59fc",
                    "pipelinesascode.tekton.dev/source-branch": "refs/heads/main",
                    "pipelinesascode.tekton.dev/source-project-id": "81724388",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://gitlab.com/rhtap-qe/e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/target-project-id": "81724388",
                    "pipelinesascode.tekton.dev/task-0": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/init.yaml",
                    "pipelinesascode.tekton.dev/task-1": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/git-clone.yaml",
                    "pipelinesascode.tekton.dev/task-10": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/deploy-workload.yaml",
                    "pipelinesascode.tekton.dev/task-11": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/scan-workload.yaml",
                    "pipelinesascode.tekton.dev/task-12": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/summarize-workload.yaml",
                    "pipelinesascode.tekton.dev/task-13": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/show-workload-sbom.yaml",
                    "pipelinesascode.tekton.dev/task-14": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/deploy-workload-check.yaml",
                    "pipelinesascode.tekton.dev/task-2": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/buildah-rhtap.yaml",
                    "pipelinesascode.tekton.dev/task-3": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/acs-image-check.yaml",
                    "pipelinesascode.tekton.dev/task-4": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/acs-image-scan.yaml",
                    "pipelinesascode.tekton.dev/task-5": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/acs-deploy-check.yaml",
                    "pipelinesascode.tekton.dev/task-6": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/update-deployment.yaml",
                    "pipelinesascode.tekton.dev/task-7": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/show-sbom-rhdh.yaml",
                    "pipelinesascode.tekton.dev/task-8": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/summary.yaml",
                    "pipelinesascode.tekton.dev/task-9": "https://raw.githubusercontent.com/redhat-appstudio/tssc-dev-multi-ci/release-v1.9.x/samples/tekton/pac/tasks/build-workload.yaml",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "tssc-app-ci/results/5e2f2a93-43b0-4e8e-94a5-d699ca6d955f/records/931c1ed0-66be-4367-93df-3f56e89306e8",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"e2e-tests-go-eciytfax\",\"commit\":\"5a07e41d8b36e10e4387f9fd3fe9be02019d59fc\",\"eventType\":\"push\"}",
                    "results.tekton.dev/result": "tssc-app-ci/results/5e2f2a93-43b0-4e8e-94a5-d699ca6d955f",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "containers, tssc"
                },
                "creationTimestamp": "2026-04-28T16:02:09Z",
                "finalizers": [
                    "chains.tekton.dev/taskrun",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/part-of": "e2e-tests-go-eciytfax",
                    "app.kubernetes.io/version": "v0.39.5",
                    "argocd/app-name": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-id": "e2e-tests-go-eciytfax",
                    "backstage.io/kubernetes-namespace": "tssc-app",
                    "build.appstudio.redhat.com/build_type": "docker",
                    "janus-idp.io/tekton": "e2e-tests-go-eciytfax",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/original-prname": "e2e-tests-go-eciytfax-on-push",
                    "pipelinesascode.tekton.dev/repository": "e2e-tests-go-eciytfax-repository",
                    "pipelinesascode.tekton.dev/sha": "5a07e41d8b36e10e4387f9fd3fe9be02019d59fc",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhtap-qe",
                    "pipelinesascode.tekton.dev/url-repository": "e2e-tests-go-eciytfax",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "e2e-tests-go-eciytfax-on-push-sgdp2",
                    "tekton.dev/pipelineRun": "e2e-tests-go-eciytfax-on-push-sgdp2",
                    "tekton.dev/pipelineRunUID": "5e2f2a93-43b0-4e8e-94a5-d699ca6d955f",
                    "tekton.dev/pipelineTask": "summarize"
                },
                "name": "e2e-tests-go-eciytfax-on-push-sgdp2-summarize",
                "namespace": "tssc-app-ci",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "e2e-tests-go-eciytfax-on-push-sgdp2",
                        "uid": "5e2f2a93-43b0-4e8e-94a5-d699ca6d955f"
                    }
                ],
                "resourceVersion": "42293",
                "uid": "931c1ed0-66be-4367-93df-3f56e89306e8"
            },
            "spec": {
                "params": [
                    {
                        "name": "IMAGE",
                        "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                    },
                    {
                        "name": "CONTEXT",
                        "value": "."
                    },
                    {
                        "name": "IMAGE_EXPIRES_AFTER",
                        "value": "5d"
                    },
                    {
                        "name": "COMMIT_SHA",
                        "value": "5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                    }
                ],
                "serviceAccountName": "pipeline",
                "taskSpec": {
                    "description": "Summarize all the steps in the build pipeline.",
                    "params": [
                        {
                            "description": "Reference of the image buildah will produce.",
                            "name": "IMAGE",
                            "type": "string"
                        },
                        {
                            "default": ".",
                            "description": "Path to the directory to use as context.",
                            "name": "CONTEXT",
                            "type": "string"
                        },
                        {
                            "default": "vfs",
                            "description": "Storage driver to configure for buildah",
                            "name": "STORAGE_DRIVER",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "CI_TYPE",
                                "value": "tekton"
                            },
                            {
                                "name": "STORAGE_DRIVER",
                                "value": "$(params.STORAGE_DRIVER)"
                            },
                            {
                                "name": "CONTEXT",
                                "value": "$(params.CONTEXT)"
                            },
                            {
                                "name": "IMAGE",
                                "value": "$(params.IMAGE)"
                            },
                            {
                                "name": "IMAGE_URL",
                                "value": "$(params.IMAGE)"
                            }
                        ],
                        "workingDir": "$(workspaces.source.path)/source"
                    },
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "STORAGE_DRIVER",
                                    "value": "$(params.STORAGE_DRIVER)"
                                },
                                {
                                    "name": "CONTEXT",
                                    "value": "$(params.CONTEXT)"
                                },
                                {
                                    "name": "IMAGE",
                                    "value": "$(params.IMAGE)"
                                },
                                {
                                    "name": "IMAGE_URL",
                                    "value": "$(params.IMAGE)"
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "summary",
                            "script": "echo \"running summary\"\n/workspace/source/tssc/summary.sh\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/var/lib/containers",
                                    "name": "varlibcontainers"
                                },
                                {
                                    "mountPath": "/tmp/files",
                                    "name": "tmpfiles"
                                }
                            ],
                            "workingDir": "$(workspaces.source.path)/source"
                        }
                    ],
                    "volumes": [
                        {
                            "emptyDir": {},
                            "name": "varlibcontainers"
                        },
                        {
                            "emptyDir": {},
                            "name": "tmpfiles"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "Workspace containing the source code to build.",
                            "name": "source"
                        }
                    ]
                },
                "timeout": "1h0m0s",
                "workspaces": [
                    {
                        "name": "source",
                        "persistentVolumeClaim": {
                            "claimName": "pvc-8dabd9baba"
                        }
                    }
                ]
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-28T16:02:16Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-28T16:02:16Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "e2e-tests-go-eciytfax-on-push-sgdp2-summarize-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    }
                },
                "startTime": "2026-04-28T16:02:09Z",
                "steps": [
                    {
                        "container": "step-summary",
                        "imageID": "quay.io/redhat-tssc/task-runner@sha256:db633cb62eb097a46ca9e3e0a54d21c8ebd444f81a074ce1f1afa61956185dbf",
                        "name": "summary",
                        "provenance": {},
                        "terminated": {
                            "containerID": "cri-o://4677f105a137276d6a36e435591fe9c61948fad96bfecdcbab3a05a71ad9acdb",
                            "exitCode": 0,
                            "finishedAt": "2026-04-28T16:02:16Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-28T16:02:15Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Summarize all the steps in the build pipeline.",
                    "params": [
                        {
                            "description": "Reference of the image buildah will produce.",
                            "name": "IMAGE",
                            "type": "string"
                        },
                        {
                            "default": ".",
                            "description": "Path to the directory to use as context.",
                            "name": "CONTEXT",
                            "type": "string"
                        },
                        {
                            "default": "vfs",
                            "description": "Storage driver to configure for buildah",
                            "name": "STORAGE_DRIVER",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "CI_TYPE",
                                "value": "tekton"
                            },
                            {
                                "name": "STORAGE_DRIVER",
                                "value": "vfs"
                            },
                            {
                                "name": "CONTEXT",
                                "value": "."
                            },
                            {
                                "name": "IMAGE",
                                "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                            },
                            {
                                "name": "IMAGE_URL",
                                "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                            }
                        ],
                        "workingDir": "/workspace/source/source"
                    },
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "CI_TYPE",
                                    "value": "tekton"
                                },
                                {
                                    "name": "STORAGE_DRIVER",
                                    "value": "vfs"
                                },
                                {
                                    "name": "CONTEXT",
                                    "value": "."
                                },
                                {
                                    "name": "IMAGE",
                                    "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                                },
                                {
                                    "name": "IMAGE_URL",
                                    "value": "nexus-docker-nexus.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com/rhtap/e2e-tests-go-eciytfax:5a07e41d8b36e10e4387f9fd3fe9be02019d59fc"
                                }
                            ],
                            "image": "quay.io/redhat-tssc/task-runner:1.9",
                            "imagePullPolicy": "Always",
                            "name": "summary",
                            "script": "echo \"running summary\"\n/workspace/source/tssc/summary.sh\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/var/lib/containers",
                                    "name": "varlibcontainers"
                                },
                                {
                                    "mountPath": "/tmp/files",
                                    "name": "tmpfiles"
                                }
                            ],
                            "workingDir": "/workspace/source/source"
                        }
                    ],
                    "volumes": [
                        {
                            "emptyDir": {},
                            "name": "varlibcontainers"
                        },
                        {
                            "emptyDir": {},
                            "name": "tmpfiles"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "Workspace containing the source code to build.",
                            "name": "source"
                        }
                    ]
                }
            }
        }
    ],
    "kind": "List",
    "metadata": {
        "resourceVersion": ""
    }
}
