WARNING: Fetching initial root from URL without providing its checksum is deprecated and will be disallowed in a future Cosign release. Please provide the initial root checksum via the --root-checksum argument. Root status: { "local": "/tekton/home/.sigstore/root", "remote": "http://tuf.tsf-tas.svc.cluster.local", "metadata": { "root.json": { "version": 1, "len": 4128, "expiration": "23 Apr 27 09:21 UTC", "error": "" }, "snapshot.json": { "version": 1, "len": 994, "expiration": "23 Apr 27 09:21 UTC", "error": "" }, "targets.json": { "version": 1, "len": 2071, "expiration": "23 Apr 27 09:21 UTC", "error": "" }, "timestamp.json": { "version": 1, "len": 995, "expiration": "23 Apr 27 09:21 UTC", "error": "" } }, "targets": [ "fulcio_v1.crt.pem", "trusted_root.json", "ctfe.pub", "rekor.pub" ] } + SNAPSHOT_PATH=/var/workdir/release/1aaf80a4-abc1-43af-a69e-395217338016/snapshot_spec.json ++ jq '.components |length' /var/workdir/release/1aaf80a4-abc1-43af-a69e-395217338016/snapshot_spec.json + COMPONENTS_LENGTH=1 + source memory-throttle.sh + log_memory_throttle_status 80 Memory throttle: enabled with 80% threshold, current usage: 8Mi/2Gi (0%) + RUNNING_JOBS='\j' + BURST_SIZE=5 + STABILIZATION_DELAY=2 + to_sign=() + declare -a to_sign + (( COMPONENTS_INDEX=0 )) + (( COMPONENTS_INDEX= 90 )) + spawn_count=1 + (( spawn_count % BURST_SIZE == 0 )) + read -r ENTRY + '[' --- = --- ']' + echo '... waiting for group to be signed ...' ... waiting for group to be signed ... + (( 1 > 0 )) + wait -n + check_and_sign quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp:latest quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b + local identity=quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp:latest + local reference=quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp + local digest=sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b ++ mktemp -d + DOCKER_CONFIG=/tmp/tmp.TlwTWmYDl9 + export DOCKER_CONFIG + select-oci-auth quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp Using token for quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp + COSIGN_REKOR_ARGS=() + declare -a COSIGN_REKOR_ARGS ++ check_existing_signatures quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp:latest quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp@sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b ++ local identity=quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp:latest ++ local reference=quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp@sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b ++ local digest=sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b ++ COSIGN_REKOR_ARGS=() ++ declare -a COSIGN_REKOR_ARGS ++ COSIGN_REKOR_ARGS+=("--rekor-url=$REKOR_URL") ++ COSIGN_REKOR_ARGS+=("--certificate-identity=${CERTIFICATE_IDENTITY}" "--certificate-oidc-issuer=https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j") +++ run_cosign verify --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --certificate-identity=https://kubernetes.io/namespaces/default-managed-tenant-pm9c4/serviceaccounts/release-pipeline --certificate-oidc-issuer=https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp@sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b +++ attempt=0 +++ backoff1=2 +++ backoff2=3 +++ '[' 0 -gt 3 ']' +++ cosign verify --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --certificate-identity=https://kubernetes.io/namespaces/default-managed-tenant-pm9c4/serviceaccounts/release-pipeline --certificate-oidc-issuer=https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp@sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b Error: no matching signatures: none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/default-tenant/serviceaccounts/build-pipeline-tsf-demo-comp] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j error during command execution: no matching signatures: none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/default-tenant/serviceaccounts/build-pipeline-tsf-demo-comp] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j +++ sleep 3 +++ old_backoff1=2 +++ backoff1=3 +++ backoff2=5 +++ attempt=1 +++ '[' 1 -gt 3 ']' +++ cosign verify --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --certificate-identity=https://kubernetes.io/namespaces/default-managed-tenant-pm9c4/serviceaccounts/release-pipeline --certificate-oidc-issuer=https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp@sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b Error: no matching signatures: none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/default-tenant/serviceaccounts/build-pipeline-tsf-demo-comp] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j error during command execution: no matching signatures: none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/default-tenant/serviceaccounts/build-pipeline-tsf-demo-comp] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j +++ sleep 5 +++ old_backoff1=3 +++ backoff1=5 +++ backoff2=8 +++ attempt=2 +++ '[' 2 -gt 3 ']' +++ cosign verify --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --certificate-identity=https://kubernetes.io/namespaces/default-managed-tenant-pm9c4/serviceaccounts/release-pipeline --certificate-oidc-issuer=https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp@sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b Error: no matching signatures: none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/default-tenant/serviceaccounts/build-pipeline-tsf-demo-comp] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j error during command execution: no matching signatures: none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/default-tenant/serviceaccounts/build-pipeline-tsf-demo-comp] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j +++ sleep 8 +++ old_backoff1=5 +++ backoff1=8 +++ backoff2=13 +++ attempt=3 +++ '[' 3 -gt 3 ']' +++ cosign verify --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --certificate-identity=https://kubernetes.io/namespaces/default-managed-tenant-pm9c4/serviceaccounts/release-pipeline --certificate-oidc-issuer=https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp@sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b Error: no matching signatures: none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/default-tenant/serviceaccounts/build-pipeline-tsf-demo-comp] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j error during command execution: no matching signatures: none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/default-tenant/serviceaccounts/build-pipeline-tsf-demo-comp] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j +++ sleep 13 +++ old_backoff1=8 +++ backoff1=13 +++ backoff2=21 +++ attempt=4 +++ '[' 4 -gt 3 ']' +++ '[' 4 -gt 3 ']' +++ echopid 'Max retries exceeded.' ++++ jobpid +++++ cut '-d ' -f4 ++++ pid=215 ++++ echo 215 +++ pid=215 +++ echo '215: Max retries exceeded.' +++ exit 1 ++ verify_output='215: Max retries exceeded.' +++ echo '215: Max retries exceeded.' +++ jq -j '[.[]|select(.critical.image."docker-manifest-digest"| contains("sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b"))|select(.critical.identity."docker-reference" == "quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp:latest")]|length' parse error: Expected string key before ':' at line 1, column 4 ++ found_signatures= ++ echo '' + found_signatures= + '[' -z '' ']' + found_signatures=0 + echopid 'FOUND SIGNATURES for quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp:latest sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b: 0' ++ jobpid +++ cut '-d ' -f4 ++ pid=221 ++ echo 221 + pid=221 + echo '221: FOUND SIGNATURES for quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp:latest sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b: 0' 221: FOUND SIGNATURES for quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp:latest sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b: 0 + COSIGN_REKOR_ARGS+=("-y" "--rekor-url=$REKOR_URL") + '[' 0 -eq 0 ']' + COSIGN_REKOR_ARGS+=("--identity-token" "$SIGSTORE_ID_TOKEN") + COSIGN_REKOR_ARGS+=("--fulcio-url" "$FULCIO_URL") + run_cosign -t 3m0s sign -y --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --identity-token /var/run/secrets/tokens/oidc-token --fulcio-url http://fulcio-server.tsf-tas.svc.cluster.local --sign-container-identity quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp:latest quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp@sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b + attempt=0 + backoff1=2 + backoff2=3 + '[' 0 -gt 3 ']' + cosign -t 3m0s sign -y --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --identity-token /var/run/secrets/tokens/oidc-token --fulcio-url http://fulcio-server.tsf-tas.svc.cluster.local --sign-container-identity quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp:latest quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp@sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b Generating ephemeral keys... Retrieving signed certificate... Successfully verified SCT... The sigstore service, hosted by sigstore a Series of LF Projects, LLC, is provided pursuant to the Hosted Project Tools Terms of Use, available at https://lfprojects.org/policies/hosted-project-tools-terms-of-use/. Note that if your submission includes personal data associated with this signed artifact, it will be part of an immutable record. This may include the email address associated with the account with which you authenticate your contractual Agreement. This information will be used for signing this artifact and will be stored in public transparency logs and cannot be removed later, and is subject to the Immutable Record notice at https://lfprojects.org/policies/hosted-project-tools-immutable-records/. By typing 'y', you attest that (1) you are not submitting the personal data of any other person; and (2) you understand and agree to the statement and the Agreement terms at the URLs listed above. tlog entry created with index: 57 Pushing signature to: quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp + break + '[' 0 -gt 3 ']' + (( 0 > 0 )) + spawn_count=0 + continue + read -r ENTRY + '[' 'quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b 4696c69e5553d4beb56ee857748e27a9a92218f2' = --- ']' ++ echo 'quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b 4696c69e5553d4beb56ee857748e27a9a92218f2' ++ cut '-d ' -f1 + INTERNAL_REF=quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp ++ echo 'quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b 4696c69e5553d4beb56ee857748e27a9a92218f2' ++ cut '-d ' -f2 + PUBLIC_REF=quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp ++ echo 'quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b 4696c69e5553d4beb56ee857748e27a9a92218f2' ++ cut '-d ' -f3 + DIGEST=sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b ++ echo 'quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b 4696c69e5553d4beb56ee857748e27a9a92218f2' ++ cut '-d ' -f4 + TAG=4696c69e5553d4beb56ee857748e27a9a92218f2 + wait_for_memory 80 + (( 0 >= 90 )) + spawn_count=1 + (( spawn_count % BURST_SIZE == 0 )) + read -r ENTRY + '[' --- = --- ']' + echo '... waiting for group to be signed ...' ... waiting for group to be signed ... + (( 1 > 0 )) + wait -n + check_and_sign quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp:4696c69e5553d4beb56ee857748e27a9a92218f2 quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b + local identity=quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp:4696c69e5553d4beb56ee857748e27a9a92218f2 + local reference=quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp + local digest=sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b ++ mktemp -d + DOCKER_CONFIG=/tmp/tmp.3BZHm7Z97V + export DOCKER_CONFIG + select-oci-auth quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp Using token for quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp + COSIGN_REKOR_ARGS=() + declare -a COSIGN_REKOR_ARGS ++ check_existing_signatures quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp:4696c69e5553d4beb56ee857748e27a9a92218f2 quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp@sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b ++ local identity=quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp:4696c69e5553d4beb56ee857748e27a9a92218f2 ++ local reference=quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp@sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b ++ local digest=sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b ++ COSIGN_REKOR_ARGS=() ++ declare -a COSIGN_REKOR_ARGS ++ COSIGN_REKOR_ARGS+=("--rekor-url=$REKOR_URL") ++ COSIGN_REKOR_ARGS+=("--certificate-identity=${CERTIFICATE_IDENTITY}" "--certificate-oidc-issuer=https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j") +++ run_cosign verify --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --certificate-identity=https://kubernetes.io/namespaces/default-managed-tenant-pm9c4/serviceaccounts/release-pipeline --certificate-oidc-issuer=https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp@sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b +++ attempt=0 +++ backoff1=2 +++ backoff2=3 +++ '[' 0 -gt 3 ']' +++ cosign verify --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --certificate-identity=https://kubernetes.io/namespaces/default-managed-tenant-pm9c4/serviceaccounts/release-pipeline --certificate-oidc-issuer=https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp@sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b Verification for quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp@sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b -- The following checks were performed on each of these signatures: - The cosign claims were validated - Existence of the claims in the transparency log was verified offline - The code-signing certificate was verified using trusted certificate authority certificates +++ break +++ '[' 0 -gt 3 ']' ++ verify_output=' [{"critical":{"identity":{"docker-reference":"quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp:latest"},"image":{"docker-manifest-digest":"sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b"},"type":"cosign container image signature"},"optional":{"1.3.6.1.4.1.57264.1.1":"https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j","Bundle":{"SignedEntryTimestamp":"MEUCIQCfjKfF9YTuGbEsFras0GfKmfkaZ7kYtPQqDeprbIVe/AIgUTWs3Qdp078eclO/u4B4m2/BQz1XlVNegyH5qG5E9uw=","Payload":{"body":"eyJhcGlWZXJzaW9uIjoiMC4wLjEiLCJraW5kIjoiaGFzaGVkcmVrb3JkIiwic3BlYyI6eyJkYXRhIjp7Imhhc2giOnsiYWxnb3JpdGhtIjoic2hhMjU2IiwidmFsdWUiOiI1Njg5ODVmNWUyOGE1YTA1ZmNkMzc3NjZiZjFmNDJmYjYyYTRhZDZiYWFmMzY0NDMyYTM5MzJhYjE4MjM3ZTViIn19LCJzaWduYXR1cmUiOnsiY29udGVudCI6Ik1FWUNJUUR2bGV4dTBHTFk1NnkxZVV4bmZoU0JYOGN4S0RvZTFnbWpCOXo0WUtseWRBSWhBSnJrSXArUVRpSGlIdFNWb2R4SnNGTnFvd2VrUE02N0RYbTFPUjJteDEvYyIsInB1YmxpY0tleSI6eyJjb250ZW50IjoiTFMwdExTMUNSVWRKVGlCRFJWSlVTVVpKUTBGVVJTMHRMUzB0Q2sxSlNVUlhWRU5EUVhRclowRjNTVUpCWjBsVldHOW5lV2QzV2paQmRqaEViMjVUVVROa1VURlZhR3htY1hZd2QwTm5XVWxMYjFwSmVtb3dSVUYzVFhjS1MwUkZUVTFCYjBkQk1WVkZRMmhOUkZaR1RrZE5VbWQzUm1kWlJGWlJVVVJGZHpsdFpGZDRhbUZYT0hWaFJ6bDZaRWMxYUdKWFZYZElhR05PVFdwWmR3cE9SRWt3VFVSck1VMUVSWHBYYUdOT1RXcFpkMDVFU1RCTlZFRjNUVVJGZWxkcVFVRk5SbXQzUlhkWlNFdHZXa2w2YWpCRFFWRlpTVXR2V2tsNmFqQkVDa0ZSWTBSUlowRkZTWGxVVkVzMFVYWndiSEIzVGxwNmVEQmphM1J5YmpocE1TdEplVGxJVEhkSFVUaDNRV1JLT0hadWEycHpLM2RZTml0c1duVkljVW9LUjJGMGJIbG9LMVZvWlZwU1VubENTU3RyWnpCMGRrUlVNR3A0T1hJMlQwTkJaekIzWjJkSlNrMUJORWRCTVZWa1JIZEZRaTkzVVVWQmQwbElaMFJCVkFwQ1owNVdTRk5WUlVSRVFVdENaMmR5UW1kRlJrSlJZMFJCZWtGa1FtZE9Wa2hSTkVWR1oxRlZXbkkxU1N0dk5Ga3JkbkZ4YkhWUGIyZHJVVzlLT0RWUENraERkM2RJZDFsRVZsSXdha0pDWjNkR2IwRlZZa1ZTTVdVdlZVNXNTamR3VWpRMWVFRkdiSFpyT0VJM2N6ZzBkMkpCV1VSV1VqQlNRVkZJTDBKSFNYY0tXVWxhWldGSVVqQmpTRTAyVEhrNWNtUlhTbXhqYlRWc1pFZFdla3h0YkhaTU1qVm9ZbGRXZW1OSFJtcGFXRTEyV2tkV2JWbFlWbk5rUXpGMFdWYzFhQXBhTWxaclRGaFNiR0p0Um5Wa1F6RjNZbFJzYWs1RE9YcGFXRW95WVZkT2JGbFhUbXBpTTFaMVpFaE5kbU50Vm5OYVYwWjZXbE14ZDJGWVFteGlSMngxQ2xwVVFsSkNaMjl5UW1kRlJVRlpUeTlOUVVWQ1FrVk9iMlJJVW5kamVtOTJUREk1Y0ZwSFRYVmlNMEY0VEcwNWQxcFhOWHBoUjJ4dFpFZEdkMk5JVFhVS1dUSTVkRXg2U25Ga1NFNXVXVlJPY0UxdFZqQmliWGN5VDFSa2MwNHlTbkpPVjJ0NFlUSXhhV0pVVW1oUFZGWnhUVVpOUjBOcGMwZEJVVkZDWnpjNGR3cEJVV2RGVWxGNFJHRklVakJqU0UwMlRIazVkbUZYVW1wTWJUbDNUVk0xZG1OSFZuVmpNbWh3V201U2FHTklRbnBNYlU1MllsTTRlV0Z1VW5wYU1rVjZDbUZVU214a1J6VnpUbXByTTJKRVpHbGhlbFp3VFZkMGRGbHRNREJaVkdzeFlXcERRbWwzV1V0TGQxbENRa0ZJVjJWUlNVVkJaMUk1UWtoelFXVlJRak1LUVU1V1dsY3pRVVpDVWtnMlNWVmtaMXBPU0dKSGNWSnVUVEJMVWtZd05VRXhSRXBZVW1acmMxWktZMVZCUVVGQ2JtSTNiRzlKWjBGQlFWRkVRVVZuZHdwU1owbG9RVXBsYTJ4NmREWm9ORXBsTWtoNVJrYzJjRGt3WlRGcmVsQnRSV0V6WkhCWWJHRlhhbkF4TVhOUFNWUkJhVVZCYzNCV2EzRnpUVXRSUkZKTUNrMUpNamhJVjFadlUwRlVSRFEyUm5KWFlWWnZWSEp2T1hWd05FMVllbU4zUTJkWlNVdHZXa2w2YWpCRlFYZE5SR0ZCUVhkYVVVbDNZbUkzUTNOd1drTUthalpRVUZoamRrdGFaelptY1c4eGMwbHVNVU13WXpSMmFYTk5hbm9yVlRSdmVGZHZVblJZUzNneE4wMURNazQxT1hObFVFOHpZa3RCYWtWQmVGRnBhd3A2YWt0WVdtMDJObEEzV1dSelpWVmljakpxU0RSUk9FSTROV2RyVURSV1JteE5Wak4yVTI1bmVHMDFiMVpSTlc4NWRuUkRWSFJKVFM5R2JqVUtMUzB0TFMxRlRrUWdRMFZTVkVsR1NVTkJWRVV0TFMwdExRbz0ifX19fQ==","integratedTime":1777024213,"logIndex":57,"logID":"5283853dddf1eee7714117e44e6c35222336343dd6d32bfc7eb2be52b0bfc32f"}},"Issuer":"https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j","Subject":"https://kubernetes.io/namespaces/default-managed-tenant-pm9c4/serviceaccounts/release-pipeline"}}]' +++ echo ' [{"critical":{"identity":{"docker-reference":"quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp:latest"},"image":{"docker-manifest-digest":"sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b"},"type":"cosign container image signature"},"optional":{"1.3.6.1.4.1.57264.1.1":"https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j","Bundle":{"SignedEntryTimestamp":"MEUCIQCfjKfF9YTuGbEsFras0GfKmfkaZ7kYtPQqDeprbIVe/AIgUTWs3Qdp078eclO/u4B4m2/BQz1XlVNegyH5qG5E9uw=","Payload":{"body":"eyJhcGlWZXJzaW9uIjoiMC4wLjEiLCJraW5kIjoiaGFzaGVkcmVrb3JkIiwic3BlYyI6eyJkYXRhIjp7Imhhc2giOnsiYWxnb3JpdGhtIjoic2hhMjU2IiwidmFsdWUiOiI1Njg5ODVmNWUyOGE1YTA1ZmNkMzc3NjZiZjFmNDJmYjYyYTRhZDZiYWFmMzY0NDMyYTM5MzJhYjE4MjM3ZTViIn19LCJzaWduYXR1cmUiOnsiY29udGVudCI6Ik1FWUNJUUR2bGV4dTBHTFk1NnkxZVV4bmZoU0JYOGN4S0RvZTFnbWpCOXo0WUtseWRBSWhBSnJrSXArUVRpSGlIdFNWb2R4SnNGTnFvd2VrUE02N0RYbTFPUjJteDEvYyIsInB1YmxpY0tleSI6eyJjb250ZW50IjoiTFMwdExTMUNSVWRKVGlCRFJWSlVTVVpKUTBGVVJTMHRMUzB0Q2sxSlNVUlhWRU5EUVhRclowRjNTVUpCWjBsVldHOW5lV2QzV2paQmRqaEViMjVUVVROa1VURlZhR3htY1hZd2QwTm5XVWxMYjFwSmVtb3dSVUYzVFhjS1MwUkZUVTFCYjBkQk1WVkZRMmhOUkZaR1RrZE5VbWQzUm1kWlJGWlJVVVJGZHpsdFpGZDRhbUZYT0hWaFJ6bDZaRWMxYUdKWFZYZElhR05PVFdwWmR3cE9SRWt3VFVSck1VMUVSWHBYYUdOT1RXcFpkMDVFU1RCTlZFRjNUVVJGZWxkcVFVRk5SbXQzUlhkWlNFdHZXa2w2YWpCRFFWRlpTVXR2V2tsNmFqQkVDa0ZSWTBSUlowRkZTWGxVVkVzMFVYWndiSEIzVGxwNmVEQmphM1J5YmpocE1TdEplVGxJVEhkSFVUaDNRV1JLT0hadWEycHpLM2RZTml0c1duVkljVW9LUjJGMGJIbG9LMVZvWlZwU1VubENTU3RyWnpCMGRrUlVNR3A0T1hJMlQwTkJaekIzWjJkSlNrMUJORWRCTVZWa1JIZEZRaTkzVVVWQmQwbElaMFJCVkFwQ1owNVdTRk5WUlVSRVFVdENaMmR5UW1kRlJrSlJZMFJCZWtGa1FtZE9Wa2hSTkVWR1oxRlZXbkkxU1N0dk5Ga3JkbkZ4YkhWUGIyZHJVVzlLT0RWUENraERkM2RJZDFsRVZsSXdha0pDWjNkR2IwRlZZa1ZTTVdVdlZVNXNTamR3VWpRMWVFRkdiSFpyT0VJM2N6ZzBkMkpCV1VSV1VqQlNRVkZJTDBKSFNYY0tXVWxhWldGSVVqQmpTRTAyVEhrNWNtUlhTbXhqYlRWc1pFZFdla3h0YkhaTU1qVm9ZbGRXZW1OSFJtcGFXRTEyV2tkV2JWbFlWbk5rUXpGMFdWYzFhQXBhTWxaclRGaFNiR0p0Um5Wa1F6RjNZbFJzYWs1RE9YcGFXRW95WVZkT2JGbFhUbXBpTTFaMVpFaE5kbU50Vm5OYVYwWjZXbE14ZDJGWVFteGlSMngxQ2xwVVFsSkNaMjl5UW1kRlJVRlpUeTlOUVVWQ1FrVk9iMlJJVW5kamVtOTJUREk1Y0ZwSFRYVmlNMEY0VEcwNWQxcFhOWHBoUjJ4dFpFZEdkMk5JVFhVS1dUSTVkRXg2U25Ga1NFNXVXVlJPY0UxdFZqQmliWGN5VDFSa2MwNHlTbkpPVjJ0NFlUSXhhV0pVVW1oUFZGWnhUVVpOUjBOcGMwZEJVVkZDWnpjNGR3cEJVV2RGVWxGNFJHRklVakJqU0UwMlRIazVkbUZYVW1wTWJUbDNUVk0xZG1OSFZuVmpNbWh3V201U2FHTklRbnBNYlU1MllsTTRlV0Z1VW5wYU1rVjZDbUZVU214a1J6VnpUbXByTTJKRVpHbGhlbFp3VFZkMGRGbHRNREJaVkdzeFlXcERRbWwzV1V0TGQxbENRa0ZJVjJWUlNVVkJaMUk1UWtoelFXVlJRak1LUVU1V1dsY3pRVVpDVWtnMlNWVmtaMXBPU0dKSGNWSnVUVEJMVWtZd05VRXhSRXBZVW1acmMxWktZMVZCUVVGQ2JtSTNiRzlKWjBGQlFWRkVRVVZuZHdwU1owbG9RVXBsYTJ4NmREWm9ORXBsTWtoNVJrYzJjRGt3WlRGcmVsQnRSV0V6WkhCWWJHRlhhbkF4TVhOUFNWUkJhVVZCYzNCV2EzRnpUVXRSUkZKTUNrMUpNamhJVjFadlUwRlVSRFEyUm5KWFlWWnZWSEp2T1hWd05FMVllbU4zUTJkWlNVdHZXa2w2YWpCRlFYZE5SR0ZCUVhkYVVVbDNZbUkzUTNOd1drTUthalpRVUZoamRrdGFaelptY1c4eGMwbHVNVU13WXpSMmFYTk5hbm9yVlRSdmVGZHZVblJZUzNneE4wMURNazQxT1hObFVFOHpZa3RCYWtWQmVGRnBhd3A2YWt0WVdtMDJObEEzV1dSelpWVmljakpxU0RSUk9FSTROV2RyVURSV1JteE5Wak4yVTI1bmVHMDFiMVpSTlc4NWRuUkRWSFJKVFM5R2JqVUtMUzB0TFMxRlRrUWdRMFZTVkVsR1NVTkJWRVV0TFMwdExRbz0ifX19fQ==","integratedTime":1777024213,"logIndex":57,"logID":"5283853dddf1eee7714117e44e6c35222336343dd6d32bfc7eb2be52b0bfc32f"}},"Issuer":"https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j","Subject":"https://kubernetes.io/namespaces/default-managed-tenant-pm9c4/serviceaccounts/release-pipeline"}}]' +++ jq -j '[.[]|select(.critical.image."docker-manifest-digest"| contains("sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b"))|select(.critical.identity."docker-reference" == "quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp:4696c69e5553d4beb56ee857748e27a9a92218f2")]|length' ++ found_signatures=0 ++ echo 0 + found_signatures=0 + '[' -z 0 ']' + echopid 'FOUND SIGNATURES for quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp:4696c69e5553d4beb56ee857748e27a9a92218f2 sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b: 0' ++ jobpid +++ cut '-d ' -f4 ++ pid=312 ++ echo 312 + pid=312 + echo '312: FOUND SIGNATURES for quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp:4696c69e5553d4beb56ee857748e27a9a92218f2 sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b: 0' 312: FOUND SIGNATURES for quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp:4696c69e5553d4beb56ee857748e27a9a92218f2 sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b: 0 + COSIGN_REKOR_ARGS+=("-y" "--rekor-url=$REKOR_URL") + '[' 0 -eq 0 ']' + COSIGN_REKOR_ARGS+=("--identity-token" "$SIGSTORE_ID_TOKEN") + COSIGN_REKOR_ARGS+=("--fulcio-url" "$FULCIO_URL") + run_cosign -t 3m0s sign -y --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --identity-token /var/run/secrets/tokens/oidc-token --fulcio-url http://fulcio-server.tsf-tas.svc.cluster.local --sign-container-identity quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp:4696c69e5553d4beb56ee857748e27a9a92218f2 quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp@sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b + attempt=0 + backoff1=2 + backoff2=3 + '[' 0 -gt 3 ']' + cosign -t 3m0s sign -y --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --identity-token /var/run/secrets/tokens/oidc-token --fulcio-url http://fulcio-server.tsf-tas.svc.cluster.local --sign-container-identity quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp:4696c69e5553d4beb56ee857748e27a9a92218f2 quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp@sha256:9e39265fb940b712cc079cd80d738f3c32d8de21f3504bb76dc799fb912bbf1b Generating ephemeral keys... Retrieving signed certificate... Successfully verified SCT... The sigstore service, hosted by sigstore a Series of LF Projects, LLC, is provided pursuant to the Hosted Project Tools Terms of Use, available at https://lfprojects.org/policies/hosted-project-tools-terms-of-use/. Note that if your submission includes personal data associated with this signed artifact, it will be part of an immutable record. This may include the email address associated with the account with which you authenticate your contractual Agreement. This information will be used for signing this artifact and will be stored in public transparency logs and cannot be removed later, and is subject to the Immutable Record notice at https://lfprojects.org/policies/hosted-project-tools-immutable-records/. By typing 'y', you attest that (1) you are not submitting the personal data of any other person; and (2) you understand and agree to the statement and the Agreement terms at the URLs listed above. tlog entry created with index: 59 Pushing signature to: quay.io/rhtap_qe/default-managed-tenant-pm9c4/default-managed-tenant-pm9c4-1e5ea0/tsf-demo-comp + break + '[' 0 -gt 3 ']' + (( 0 > 0 )) + spawn_count=0 + continue + read -r ENTRY + '[' true '!=' true ']' + echo done done