WARNING: Fetching initial root from URL without providing its checksum is deprecated and will be disallowed in a future Cosign release. Please provide the initial root checksum via the --root-checksum argument. Root status: { "local": "/tekton/home/.sigstore/root", "remote": "http://tuf.tsf-tas.svc.cluster.local", "metadata": { "root.json": { "version": 1, "len": 4128, "expiration": "23 Apr 27 07:25 UTC", "error": "" }, "snapshot.json": { "version": 1, "len": 994, "expiration": "23 Apr 27 07:25 UTC", "error": "" }, "targets.json": { "version": 1, "len": 2071, "expiration": "23 Apr 27 07:25 UTC", "error": "" }, "timestamp.json": { "version": 1, "len": 995, "expiration": "23 Apr 27 07:25 UTC", "error": "" } }, "targets": [ "rekor.pub", "fulcio_v1.crt.pem", "trusted_root.json", "ctfe.pub" ] } + SNAPSHOT_PATH=/var/workdir/release/1ede9c64-9269-4e75-ad41-1300ba889fc5/snapshot_spec.json ++ jq '.components |length' /var/workdir/release/1ede9c64-9269-4e75-ad41-1300ba889fc5/snapshot_spec.json + COMPONENTS_LENGTH=1 + source memory-throttle.sh + log_memory_throttle_status 80 Memory throttle: enabled with 80% threshold, current usage: 8Mi/2Gi (0%) + RUNNING_JOBS='\j' + BURST_SIZE=5 + STABILIZATION_DELAY=2 + to_sign=() + declare -a to_sign + (( COMPONENTS_INDEX=0 )) + (( COMPONENTS_INDEX= 90 )) + spawn_count=1 + (( spawn_count % BURST_SIZE == 0 )) + read -r ENTRY + '[' --- = --- ']' + echo '... waiting for group to be signed ...' ... waiting for group to be signed ... + (( 1 > 0 )) + check_and_sign quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp:latest quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd + wait -n + local identity=quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp:latest + local reference=quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp + local digest=sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd ++ mktemp -d + DOCKER_CONFIG=/tmp/tmp.VWi2EoxrVu + export DOCKER_CONFIG + select-oci-auth quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp Using token for quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp + COSIGN_REKOR_ARGS=() + declare -a COSIGN_REKOR_ARGS ++ check_existing_signatures quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp:latest quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp@sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd ++ local identity=quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp:latest ++ local reference=quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp@sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd ++ local digest=sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd ++ COSIGN_REKOR_ARGS=() ++ declare -a COSIGN_REKOR_ARGS ++ COSIGN_REKOR_ARGS+=("--rekor-url=$REKOR_URL") ++ COSIGN_REKOR_ARGS+=("--certificate-identity=${CERTIFICATE_IDENTITY}" "--certificate-oidc-issuer=https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j") +++ run_cosign verify --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --certificate-identity=https://kubernetes.io/namespaces/default-managed-tenant-p47gb/serviceaccounts/release-pipeline --certificate-oidc-issuer=https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp@sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd +++ attempt=0 +++ backoff1=2 +++ backoff2=3 +++ '[' 0 -gt 3 ']' +++ cosign verify --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --certificate-identity=https://kubernetes.io/namespaces/default-managed-tenant-p47gb/serviceaccounts/release-pipeline --certificate-oidc-issuer=https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp@sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd Error: no matching signatures: none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/default-tenant/serviceaccounts/build-pipeline-tsf-demo-comp] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j error during command execution: no matching signatures: none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/default-tenant/serviceaccounts/build-pipeline-tsf-demo-comp] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j +++ sleep 3 +++ old_backoff1=2 +++ backoff1=3 +++ backoff2=5 +++ attempt=1 +++ '[' 1 -gt 3 ']' +++ cosign verify --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --certificate-identity=https://kubernetes.io/namespaces/default-managed-tenant-p47gb/serviceaccounts/release-pipeline --certificate-oidc-issuer=https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp@sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd Error: no matching signatures: none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/default-tenant/serviceaccounts/build-pipeline-tsf-demo-comp] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j error during command execution: no matching signatures: none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/default-tenant/serviceaccounts/build-pipeline-tsf-demo-comp] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j +++ sleep 5 +++ old_backoff1=3 +++ backoff1=5 +++ backoff2=8 +++ attempt=2 +++ '[' 2 -gt 3 ']' +++ cosign verify --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --certificate-identity=https://kubernetes.io/namespaces/default-managed-tenant-p47gb/serviceaccounts/release-pipeline --certificate-oidc-issuer=https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp@sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd Error: no matching signatures: none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/default-tenant/serviceaccounts/build-pipeline-tsf-demo-comp] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j error during command execution: no matching signatures: none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/default-tenant/serviceaccounts/build-pipeline-tsf-demo-comp] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j +++ sleep 8 +++ old_backoff1=5 +++ backoff1=8 +++ backoff2=13 +++ attempt=3 +++ '[' 3 -gt 3 ']' +++ cosign verify --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --certificate-identity=https://kubernetes.io/namespaces/default-managed-tenant-p47gb/serviceaccounts/release-pipeline --certificate-oidc-issuer=https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp@sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd Error: no matching signatures: none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/default-tenant/serviceaccounts/build-pipeline-tsf-demo-comp] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j error during command execution: no matching signatures: none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/default-tenant/serviceaccounts/build-pipeline-tsf-demo-comp] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j +++ sleep 13 +++ old_backoff1=8 +++ backoff1=13 +++ backoff2=21 +++ attempt=4 +++ '[' 4 -gt 3 ']' +++ '[' 4 -gt 3 ']' +++ echopid 'Max retries exceeded.' ++++ jobpid +++++ cut '-d ' -f4 ++++ pid=215 ++++ echo 215 +++ pid=215 +++ echo '215: Max retries exceeded.' +++ exit 1 ++ verify_output='215: Max retries exceeded.' +++ echo '215: Max retries exceeded.' +++ jq -j '[.[]|select(.critical.image."docker-manifest-digest"| contains("sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd"))|select(.critical.identity."docker-reference" == "quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp:latest")]|length' parse error: Expected string key before ':' at line 1, column 4 ++ found_signatures= ++ echo '' + found_signatures= + '[' -z '' ']' + found_signatures=0 + echopid 'FOUND SIGNATURES for quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp:latest sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd: 0' ++ jobpid +++ cut '-d ' -f4 ++ pid=221 ++ echo 221 + pid=221 + echo '221: FOUND SIGNATURES for quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp:latest sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd: 0' 221: FOUND SIGNATURES for quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp:latest sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd: 0 + COSIGN_REKOR_ARGS+=("-y" "--rekor-url=$REKOR_URL") + '[' 0 -eq 0 ']' + COSIGN_REKOR_ARGS+=("--identity-token" "$SIGSTORE_ID_TOKEN") + COSIGN_REKOR_ARGS+=("--fulcio-url" "$FULCIO_URL") + run_cosign -t 3m0s sign -y --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --identity-token /var/run/secrets/tokens/oidc-token --fulcio-url http://fulcio-server.tsf-tas.svc.cluster.local --sign-container-identity quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp:latest quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp@sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd + attempt=0 + backoff1=2 + backoff2=3 + '[' 0 -gt 3 ']' + cosign -t 3m0s sign -y --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --identity-token /var/run/secrets/tokens/oidc-token --fulcio-url http://fulcio-server.tsf-tas.svc.cluster.local --sign-container-identity quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp:latest quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp@sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd Generating ephemeral keys... Retrieving signed certificate... Successfully verified SCT... The sigstore service, hosted by sigstore a Series of LF Projects, LLC, is provided pursuant to the Hosted Project Tools Terms of Use, available at https://lfprojects.org/policies/hosted-project-tools-terms-of-use/. Note that if your submission includes personal data associated with this signed artifact, it will be part of an immutable record. This may include the email address associated with the account with which you authenticate your contractual Agreement. This information will be used for signing this artifact and will be stored in public transparency logs and cannot be removed later, and is subject to the Immutable Record notice at https://lfprojects.org/policies/hosted-project-tools-immutable-records/. By typing 'y', you attest that (1) you are not submitting the personal data of any other person; and (2) you understand and agree to the statement and the Agreement terms at the URLs listed above. tlog entry created with index: 59 Pushing signature to: quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp + break + '[' 0 -gt 3 ']' + (( 0 > 0 )) + spawn_count=0 + continue + read -r ENTRY + '[' 'quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd 5f0838507251d833df91ef169fe5c63e3c62ea0f' = --- ']' ++ echo 'quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd 5f0838507251d833df91ef169fe5c63e3c62ea0f' ++ cut '-d ' -f1 + INTERNAL_REF=quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp ++ echo 'quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd 5f0838507251d833df91ef169fe5c63e3c62ea0f' ++ cut '-d ' -f2 + PUBLIC_REF=quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp ++ echo 'quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd 5f0838507251d833df91ef169fe5c63e3c62ea0f' ++ cut '-d ' -f3 + DIGEST=sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd ++ echo 'quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd 5f0838507251d833df91ef169fe5c63e3c62ea0f' ++ cut '-d ' -f4 + TAG=5f0838507251d833df91ef169fe5c63e3c62ea0f + wait_for_memory 80 + (( 0 >= 90 )) + spawn_count=1 + (( spawn_count % BURST_SIZE == 0 )) + read -r ENTRY + '[' --- = --- ']' + echo '... waiting for group to be signed ...' ... waiting for group to be signed ... + check_and_sign quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp:5f0838507251d833df91ef169fe5c63e3c62ea0f quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd + (( 1 > 0 )) + wait -n + local identity=quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp:5f0838507251d833df91ef169fe5c63e3c62ea0f + local reference=quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp + local digest=sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd ++ mktemp -d + DOCKER_CONFIG=/tmp/tmp.fyEPLDcvim + export DOCKER_CONFIG + select-oci-auth quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp Using token for quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp + COSIGN_REKOR_ARGS=() + declare -a COSIGN_REKOR_ARGS ++ check_existing_signatures quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp:5f0838507251d833df91ef169fe5c63e3c62ea0f quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp@sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd ++ local identity=quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp:5f0838507251d833df91ef169fe5c63e3c62ea0f ++ local reference=quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp@sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd ++ local digest=sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd ++ COSIGN_REKOR_ARGS=() ++ declare -a COSIGN_REKOR_ARGS ++ COSIGN_REKOR_ARGS+=("--rekor-url=$REKOR_URL") ++ COSIGN_REKOR_ARGS+=("--certificate-identity=${CERTIFICATE_IDENTITY}" "--certificate-oidc-issuer=https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j") +++ run_cosign verify --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --certificate-identity=https://kubernetes.io/namespaces/default-managed-tenant-p47gb/serviceaccounts/release-pipeline --certificate-oidc-issuer=https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp@sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd +++ attempt=0 +++ backoff1=2 +++ backoff2=3 +++ '[' 0 -gt 3 ']' +++ cosign verify --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --certificate-identity=https://kubernetes.io/namespaces/default-managed-tenant-p47gb/serviceaccounts/release-pipeline --certificate-oidc-issuer=https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp@sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd Verification for quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp@sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd -- The following checks were performed on each of these signatures: - The cosign claims were validated - Existence of the claims in the transparency log was verified offline - The code-signing certificate was verified using trusted certificate authority certificates +++ break +++ '[' 0 -gt 3 ']' ++ verify_output=' [{"critical":{"identity":{"docker-reference":"quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp:latest"},"image":{"docker-manifest-digest":"sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd"},"type":"cosign container image signature"},"optional":{"1.3.6.1.4.1.57264.1.1":"https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j","Bundle":{"SignedEntryTimestamp":"MEYCIQCSmyYMQEvHfO9pMzhx6rVJcnjok2cFxloaCVM8ioAb1gIhALTKVL+AUg1UxWlDsvA8/5NoQ7akVMpcABgFiGrLs2Wt","Payload":{"body":"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","integratedTime":1777017306,"logIndex":59,"logID":"aa287ebf97b30f459106f48d1503f66c02cbf7f4557aea64c08c7a9ccdd1f602"}},"Issuer":"https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j","Subject":"https://kubernetes.io/namespaces/default-managed-tenant-p47gb/serviceaccounts/release-pipeline"}}]' +++ echo ' [{"critical":{"identity":{"docker-reference":"quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp:latest"},"image":{"docker-manifest-digest":"sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd"},"type":"cosign container image signature"},"optional":{"1.3.6.1.4.1.57264.1.1":"https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j","Bundle":{"SignedEntryTimestamp":"MEYCIQCSmyYMQEvHfO9pMzhx6rVJcnjok2cFxloaCVM8ioAb1gIhALTKVL+AUg1UxWlDsvA8/5NoQ7akVMpcABgFiGrLs2Wt","Payload":{"body":"eyJhcGlWZXJzaW9uIjoiMC4wLjEiLCJraW5kIjoiaGFzaGVkcmVrb3JkIiwic3BlYyI6eyJkYXRhIjp7Imhhc2giOnsiYWxnb3JpdGhtIjoic2hhMjU2IiwidmFsdWUiOiIxYmIyNWZiNzMzMGFlMjQzOWM3NDJiZWNmNzRkNzEyMzljNWJkOGQwYzVlMDNmMTY5MGIyYzE0OTA4M2ZiNmYyIn19LCJzaWduYXR1cmUiOnsiY29udGVudCI6Ik1FUUNJRHF1TDFOUUYrSUM3QVVoUWhMZGI5MzZYNWJTQjFhYUFQUXFzczN0QWl2WkFpQW1OejkwN1ZhMUhUYXFOT3lTZ2VWOEV1YldzMldUdmE5QWZxZ0QwT1hrR2c9PSIsInB1YmxpY0tleSI6eyJjb250ZW50IjoiTFMwdExTMUNSVWRKVGlCRFJWSlVTVVpKUTBGVVJTMHRMUzB0Q2sxSlNVUlhSRU5EUVhRMlowRjNTVUpCWjBsVllsWkllSGRCYW5WUUsxQlFRM3BKU3pSQ2RsUlJSREE1WWt4amQwTm5XVWxMYjFwSmVtb3dSVUYzVFhjS1MwUkZUVTFCYjBkQk1WVkZRMmhOUkZaR1RrZE5VbWQzUm1kWlJGWlJVVVJGZHpsdFpGZDRhbUZYT0hWaFJ6bDZaRWMxYUdKWFZYZElhR05PVFdwWmR3cE9SRWt3VFVSak1VNVVRVEpYYUdOT1RXcFpkMDVFU1RCTlJHZDNUbFJCTWxkcVFVRk5SbXQzUlhkWlNFdHZXa2w2YWpCRFFWRlpTVXR2V2tsNmFqQkVDa0ZSWTBSUlowRkZMM1UzTTJOUVR6TkhiM1J5VUM5Wk9HZE5TVXRoT0VaaFIyZFhiemszZFVGYVpWcEpSRFF2Ym5GSVUxUkxVbEJ1U0Rod05EVk5NV2dLYlVoME1uRndhMFZVSzFWMWRVWklUbVJNV2xGYWExWkRSMnRUU2tkTFQwTkJaM2QzWjJkSlNVMUJORWRCTVZWa1JIZEZRaTkzVVVWQmQwbElaMFJCVkFwQ1owNVdTRk5WUlVSRVFVdENaMmR5UW1kRlJrSlJZMFJCZWtGa1FtZE9Wa2hSTkVWR1oxRlZkV1ZSWlZKSWVqQTRhemhrVGtnek9HZGxXbVoxUWtSV0NtazRUWGRJZDFsRVZsSXdha0pDWjNkR2IwRlZLMjloYzJ4VFNDOVJTbk5zYUhsc1ozSlRZVk56UldRM09VaGpkMkpCV1VSV1VqQlNRVkZJTDBKSFNYY0tXVWxhWldGSVVqQmpTRTAyVEhrNWNtUlhTbXhqYlRWc1pFZFdla3h0YkhaTU1qVm9ZbGRXZW1OSFJtcGFXRTEyV2tkV2JWbFlWbk5rUXpGMFdWYzFhQXBhTWxaclRGaFNiR0p0Um5Wa1F6RjNUa1JrYmxscE9YcGFXRW95WVZkT2JGbFhUbXBpTTFaMVpFaE5kbU50Vm5OYVYwWjZXbE14ZDJGWVFteGlSMngxQ2xwVVFsSkNaMjl5UW1kRlJVRlpUeTlOUVVWQ1FrVk9iMlJJVW5kamVtOTJUREk1Y0ZwSFRYVmlNMEY0VEcwNWQxcFhOWHBoUjJ4dFpFZEdkMk5JVFhVS1dUSTVkRXg2U25Ga1NFNXVXVlJPY0UxdFZqQmliWGN5VDFSa2MwNHlTbkpPVjJ0NFlUSXhhV0pVVW1oUFZGWnhUVVpOUjBOcGMwZEJVVkZDWnpjNGR3cEJVV2RGVWxGNFJHRklVakJqU0UwMlRIazVkbUZYVW1wTWJUbDNUVk0xZG1OSFZuVmpNbWh3V201U2FHTklRbnBNYlU1MllsTTRlV0Z1VW5wYU1rVjZDbUZVU214a1J6VnpUbXByTTJKRVpHbGhlbFp3VFZkMGRGbHRNREJaVkdzeFlXcERRbWxuV1V0TGQxbENRa0ZJVjJWUlNVVkJaMUk0UWtodlFXVkJRaklLUVVWWWQzUnJkalpLT1dsQ1JWUXZZbkIxVldGYWNHOU1XRUZOTkRoNFVsZG9ka0ZZV1dOV1VtaHRWMGRCUVVGQ2JtSTFPRkJZVFVGQlFWRkVRVVZqZHdwU1VVbG5Ua1ZpVEdWdVJUUjBWSE5zU1VkUVlqUjZkMDlLY1VOT1p6Rm1VR1ZZZG1OMlZXbHRPVU42VDBGUlkwTkpVVU13YlZBM1MwWjVhMkpzWkVFdkNtbDFSM2hKTmxsWVdTdHVOMjA0TkdSVmNtOTRVM0l2VUc5WmJ6WmFSRUZMUW1kbmNXaHJhazlRVVZGRVFYZE9iMEZFUW14QmFrVkJPVGgxVDNOck4zb0tURFZrZVVrelVHWk5MMnMxUzJWVEx6WkhlRXcwY0dwUVdXUnJXV2hvY2pOdVVqaGFaVloxVEdOME5HNXRXVTA0VUVSaGRIcEJVbmRCYWtGeU5qbEpPUXBJZEdWUFNFcFNZM293VmxaM1ZEaENhVkpEYjFsRlYweEhZVWRrTjNwUk9EZHBTM1ZETm5aNmJGUTJWMk4xU0ZOclptOXRaV3BaZFhsSVRUMEtMUzB0TFMxRlRrUWdRMFZTVkVsR1NVTkJWRVV0TFMwdExRbz0ifX19fQ==","integratedTime":1777017306,"logIndex":59,"logID":"aa287ebf97b30f459106f48d1503f66c02cbf7f4557aea64c08c7a9ccdd1f602"}},"Issuer":"https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j","Subject":"https://kubernetes.io/namespaces/default-managed-tenant-p47gb/serviceaccounts/release-pipeline"}}]' +++ jq -j '[.[]|select(.critical.image."docker-manifest-digest"| contains("sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd"))|select(.critical.identity."docker-reference" == "quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp:5f0838507251d833df91ef169fe5c63e3c62ea0f")]|length' ++ found_signatures=0 ++ echo 0 + found_signatures=0 + '[' -z 0 ']' + echopid 'FOUND SIGNATURES for quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp:5f0838507251d833df91ef169fe5c63e3c62ea0f sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd: 0' ++ jobpid +++ cut '-d ' -f4 ++ pid=313 ++ echo 313 + pid=313 + echo '313: FOUND SIGNATURES for quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp:5f0838507251d833df91ef169fe5c63e3c62ea0f sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd: 0' 313: FOUND SIGNATURES for quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp:5f0838507251d833df91ef169fe5c63e3c62ea0f sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd: 0 + COSIGN_REKOR_ARGS+=("-y" "--rekor-url=$REKOR_URL") + '[' 0 -eq 0 ']' + COSIGN_REKOR_ARGS+=("--identity-token" "$SIGSTORE_ID_TOKEN") + COSIGN_REKOR_ARGS+=("--fulcio-url" "$FULCIO_URL") + run_cosign -t 3m0s sign -y --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --identity-token /var/run/secrets/tokens/oidc-token --fulcio-url http://fulcio-server.tsf-tas.svc.cluster.local --sign-container-identity quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp:5f0838507251d833df91ef169fe5c63e3c62ea0f quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp@sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd + attempt=0 + backoff1=2 + backoff2=3 + '[' 0 -gt 3 ']' + cosign -t 3m0s sign -y --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --identity-token /var/run/secrets/tokens/oidc-token --fulcio-url http://fulcio-server.tsf-tas.svc.cluster.local --sign-container-identity quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp:5f0838507251d833df91ef169fe5c63e3c62ea0f quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp@sha256:93c7717d393ce5f0b08b1c69c5f3483e0b46670b89fbe697282f26f0b63c10bd Generating ephemeral keys... Retrieving signed certificate... Successfully verified SCT... The sigstore service, hosted by sigstore a Series of LF Projects, LLC, is provided pursuant to the Hosted Project Tools Terms of Use, available at https://lfprojects.org/policies/hosted-project-tools-terms-of-use/. Note that if your submission includes personal data associated with this signed artifact, it will be part of an immutable record. This may include the email address associated with the account with which you authenticate your contractual Agreement. This information will be used for signing this artifact and will be stored in public transparency logs and cannot be removed later, and is subject to the Immutable Record notice at https://lfprojects.org/policies/hosted-project-tools-immutable-records/. By typing 'y', you attest that (1) you are not submitting the personal data of any other person; and (2) you understand and agree to the statement and the Agreement terms at the URLs listed above. tlog entry created with index: 60 Pushing signature to: quay.io/rhtap_qe/default-managed-tenant-p47gb/default-managed-tenant-p47gb-f82d93/tsf-demo-comp + break + '[' 0 -gt 3 ']' + (( 0 > 0 )) + spawn_count=0 + continue + read -r ENTRY + '[' true '!=' true ']' + echo done done