WARNING: Fetching initial root from URL without providing its checksum is deprecated and will be disallowed in a future Cosign release. Please provide the initial root checksum via the --root-checksum argument. Root status: { "local": "/tekton/home/.sigstore/root", "remote": "http://tuf.tsf-tas.svc.cluster.local", "metadata": { "root.json": { "version": 1, "len": 4128, "expiration": "24 Apr 27 08:20 UTC", "error": "" }, "snapshot.json": { "version": 1, "len": 994, "expiration": "24 Apr 27 08:20 UTC", "error": "" }, "targets.json": { "version": 1, "len": 2071, "expiration": "24 Apr 27 08:20 UTC", "error": "" }, "timestamp.json": { "version": 1, "len": 995, "expiration": "24 Apr 27 08:20 UTC", "error": "" } }, "targets": [ "fulcio_v1.crt.pem", "trusted_root.json", "ctfe.pub", "rekor.pub" ] } + SNAPSHOT_PATH=/var/workdir/release/8103f421-b908-4d9c-8645-746f0f08377c/snapshot_spec.json ++ jq '.components |length' /var/workdir/release/8103f421-b908-4d9c-8645-746f0f08377c/snapshot_spec.json + COMPONENTS_LENGTH=1 + source memory-throttle.sh + log_memory_throttle_status 80 Memory throttle: enabled with 80% threshold, current usage: 8Mi/2Gi (0%) + RUNNING_JOBS='\j' + BURST_SIZE=5 + STABILIZATION_DELAY=2 + to_sign=() + declare -a to_sign + (( COMPONENTS_INDEX=0 )) + (( COMPONENTS_INDEX= 90 )) + spawn_count=1 + (( spawn_count % BURST_SIZE == 0 )) + read -r ENTRY + '[' --- = --- ']' + echo '... waiting for group to be signed ...' ... waiting for group to be signed ... + check_and_sign quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp:latest quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4 + (( 1 > 0 )) + wait -n + local identity=quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp:latest + local reference=quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp + local digest=sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4 ++ mktemp -d + DOCKER_CONFIG=/tmp/tmp.gMfD3YfVof + export DOCKER_CONFIG + select-oci-auth quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp Using token for quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp + COSIGN_REKOR_ARGS=() + declare -a COSIGN_REKOR_ARGS ++ check_existing_signatures quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp:latest quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp@sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4 sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4 ++ local identity=quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp:latest ++ local reference=quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp@sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4 ++ local digest=sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4 ++ COSIGN_REKOR_ARGS=() ++ declare -a COSIGN_REKOR_ARGS ++ COSIGN_REKOR_ARGS+=("--rekor-url=$REKOR_URL") ++ COSIGN_REKOR_ARGS+=("--certificate-identity=${CERTIFICATE_IDENTITY}" "--certificate-oidc-issuer=https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j") +++ run_cosign verify --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --certificate-identity=https://kubernetes.io/namespaces/default-managed-tenant-a3545/serviceaccounts/release-pipeline --certificate-oidc-issuer=https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp@sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4 +++ attempt=0 +++ backoff1=2 +++ backoff2=3 +++ '[' 0 -gt 3 ']' +++ cosign verify --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --certificate-identity=https://kubernetes.io/namespaces/default-managed-tenant-a3545/serviceaccounts/release-pipeline --certificate-oidc-issuer=https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp@sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4 Error: no matching signatures: none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/default-tenant/serviceaccounts/build-pipeline-tsf-demo-comp] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j error during command execution: no matching signatures: none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/default-tenant/serviceaccounts/build-pipeline-tsf-demo-comp] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j +++ sleep 3 +++ old_backoff1=2 +++ backoff1=3 +++ backoff2=5 +++ attempt=1 +++ '[' 1 -gt 3 ']' +++ cosign verify --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --certificate-identity=https://kubernetes.io/namespaces/default-managed-tenant-a3545/serviceaccounts/release-pipeline --certificate-oidc-issuer=https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp@sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4 Error: no matching signatures: none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/default-tenant/serviceaccounts/build-pipeline-tsf-demo-comp] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j error during command execution: no matching signatures: none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/default-tenant/serviceaccounts/build-pipeline-tsf-demo-comp] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j +++ sleep 5 +++ old_backoff1=3 +++ backoff1=5 +++ backoff2=8 +++ attempt=2 +++ '[' 2 -gt 3 ']' +++ cosign verify --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --certificate-identity=https://kubernetes.io/namespaces/default-managed-tenant-a3545/serviceaccounts/release-pipeline --certificate-oidc-issuer=https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp@sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4 Error: no matching signatures: none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/default-tenant/serviceaccounts/build-pipeline-tsf-demo-comp] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j error during command execution: no matching signatures: none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/default-tenant/serviceaccounts/build-pipeline-tsf-demo-comp] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j +++ sleep 8 +++ old_backoff1=5 +++ backoff1=8 +++ backoff2=13 +++ attempt=3 +++ '[' 3 -gt 3 ']' +++ cosign verify --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --certificate-identity=https://kubernetes.io/namespaces/default-managed-tenant-a3545/serviceaccounts/release-pipeline --certificate-oidc-issuer=https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp@sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4 Error: no matching signatures: none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/default-tenant/serviceaccounts/build-pipeline-tsf-demo-comp] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j error during command execution: no matching signatures: none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/default-tenant/serviceaccounts/build-pipeline-tsf-demo-comp] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j +++ sleep 13 +++ old_backoff1=8 +++ backoff1=13 +++ backoff2=21 +++ attempt=4 +++ '[' 4 -gt 3 ']' +++ '[' 4 -gt 3 ']' +++ echopid 'Max retries exceeded.' ++++ jobpid +++++ cut '-d ' -f4 ++++ pid=213 ++++ echo 213 +++ pid=213 +++ echo '213: Max retries exceeded.' +++ exit 1 ++ verify_output='213: Max retries exceeded.' +++ echo '213: Max retries exceeded.' +++ jq -j '[.[]|select(.critical.image."docker-manifest-digest"| contains("sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4"))|select(.critical.identity."docker-reference" == "quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp:latest")]|length' parse error: Expected string key before ':' at line 1, column 4 ++ found_signatures= ++ echo '' + found_signatures= + '[' -z '' ']' + found_signatures=0 + echopid 'FOUND SIGNATURES for quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp:latest sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4: 0' ++ jobpid +++ cut '-d ' -f4 ++ pid=219 ++ echo 219 + pid=219 + echo '219: FOUND SIGNATURES for quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp:latest sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4: 0' 219: FOUND SIGNATURES for quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp:latest sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4: 0 + COSIGN_REKOR_ARGS+=("-y" "--rekor-url=$REKOR_URL") + '[' 0 -eq 0 ']' + COSIGN_REKOR_ARGS+=("--identity-token" "$SIGSTORE_ID_TOKEN") + COSIGN_REKOR_ARGS+=("--fulcio-url" "$FULCIO_URL") + run_cosign -t 3m0s sign -y --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --identity-token /var/run/secrets/tokens/oidc-token --fulcio-url http://fulcio-server.tsf-tas.svc.cluster.local --sign-container-identity quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp:latest quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp@sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4 + attempt=0 + backoff1=2 + backoff2=3 + '[' 0 -gt 3 ']' + cosign -t 3m0s sign -y --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --identity-token /var/run/secrets/tokens/oidc-token --fulcio-url http://fulcio-server.tsf-tas.svc.cluster.local --sign-container-identity quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp:latest quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp@sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4 Generating ephemeral keys... Retrieving signed certificate... Successfully verified SCT... The sigstore service, hosted by sigstore a Series of LF Projects, LLC, is provided pursuant to the Hosted Project Tools Terms of Use, available at https://lfprojects.org/policies/hosted-project-tools-terms-of-use/. Note that if your submission includes personal data associated with this signed artifact, it will be part of an immutable record. This may include the email address associated with the account with which you authenticate your contractual Agreement. This information will be used for signing this artifact and will be stored in public transparency logs and cannot be removed later, and is subject to the Immutable Record notice at https://lfprojects.org/policies/hosted-project-tools-immutable-records/. By typing 'y', you attest that (1) you are not submitting the personal data of any other person; and (2) you understand and agree to the statement and the Agreement terms at the URLs listed above. tlog entry created with index: 52 Pushing signature to: quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp + break + '[' 0 -gt 3 ']' + (( 0 > 0 )) + spawn_count=0 + continue + read -r ENTRY + '[' 'quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4 d8a3550152b3d095b9f67197858a8425267e1d43' = --- ']' ++ echo 'quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4 d8a3550152b3d095b9f67197858a8425267e1d43' ++ cut '-d ' -f1 + INTERNAL_REF=quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp ++ echo 'quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4 d8a3550152b3d095b9f67197858a8425267e1d43' ++ cut '-d ' -f2 + PUBLIC_REF=quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp ++ echo 'quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4 d8a3550152b3d095b9f67197858a8425267e1d43' ++ cut '-d ' -f3 + DIGEST=sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4 ++ echo 'quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4 d8a3550152b3d095b9f67197858a8425267e1d43' ++ cut '-d ' -f4 + TAG=d8a3550152b3d095b9f67197858a8425267e1d43 + wait_for_memory 80 + (( 0 >= 90 )) + spawn_count=1 + (( spawn_count % BURST_SIZE == 0 )) + read -r ENTRY + '[' --- = --- ']' + echo '... waiting for group to be signed ...' ... waiting for group to be signed ... + check_and_sign quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp:d8a3550152b3d095b9f67197858a8425267e1d43 quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4 + (( 1 > 0 )) + wait -n + local identity=quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp:d8a3550152b3d095b9f67197858a8425267e1d43 + local reference=quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp + local digest=sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4 ++ mktemp -d + DOCKER_CONFIG=/tmp/tmp.hFeCLi0iEu + export DOCKER_CONFIG + select-oci-auth quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp Using token for quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp + COSIGN_REKOR_ARGS=() + declare -a COSIGN_REKOR_ARGS ++ check_existing_signatures quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp:d8a3550152b3d095b9f67197858a8425267e1d43 quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp@sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4 sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4 ++ local identity=quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp:d8a3550152b3d095b9f67197858a8425267e1d43 ++ local reference=quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp@sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4 ++ local digest=sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4 ++ COSIGN_REKOR_ARGS=() ++ declare -a COSIGN_REKOR_ARGS ++ COSIGN_REKOR_ARGS+=("--rekor-url=$REKOR_URL") ++ COSIGN_REKOR_ARGS+=("--certificate-identity=${CERTIFICATE_IDENTITY}" "--certificate-oidc-issuer=https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j") +++ run_cosign verify --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --certificate-identity=https://kubernetes.io/namespaces/default-managed-tenant-a3545/serviceaccounts/release-pipeline --certificate-oidc-issuer=https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp@sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4 +++ attempt=0 +++ backoff1=2 +++ backoff2=3 +++ '[' 0 -gt 3 ']' +++ cosign verify --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --certificate-identity=https://kubernetes.io/namespaces/default-managed-tenant-a3545/serviceaccounts/release-pipeline --certificate-oidc-issuer=https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp@sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4 Verification for quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp@sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4 -- The following checks were performed on each of these signatures: - The cosign claims were validated - Existence of the claims in the transparency log was verified offline - The code-signing certificate was verified using trusted certificate authority certificates +++ break +++ '[' 0 -gt 3 ']' ++ verify_output=' [{"critical":{"identity":{"docker-reference":"quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp:latest"},"image":{"docker-manifest-digest":"sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4"},"type":"cosign container image signature"},"optional":{"1.3.6.1.4.1.57264.1.1":"https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j","Bundle":{"SignedEntryTimestamp":"MEUCIFeobaAIAEMAdsWAijC5521H1k+e66WSFdF5xzBLGZFLAiEA6jO1gLLdERuX1YeoJ0evv8lr92k2qIIUPKqKKTLuJVs=","Payload":{"body":"eyJhcGlWZXJzaW9uIjoiMC4wLjEiLCJraW5kIjoiaGFzaGVkcmVrb3JkIiwic3BlYyI6eyJkYXRhIjp7Imhhc2giOnsiYWxnb3JpdGhtIjoic2hhMjU2IiwidmFsdWUiOiI4YTk5NmFkNWRkMmNjMjQ4ZTYyNzEwNjdjZmFhMzg3ZDlhNTQxZTEwZTc1YWMzNjRkMTI0ZjhmZjQ1OWU5NWEwIn19LCJzaWduYXR1cmUiOnsiY29udGVudCI6Ik1FWUNJUUNodDdkd0hLOW92TnI2eFFNbyt5aGIyNGdVNEVNT1Jydk44dGd4dWRaOHRBSWhBTkxQa3ZLN2U5OWVKc2FGVFhCQ3ROb3dJcDBqbXhtQk92emg0QkZwQ1dmMyIsInB1YmxpY0tleSI6eyJjb250ZW50IjoiTFMwdExTMUNSVWRKVGlCRFJWSlVTVVpKUTBGVVJTMHRMUzB0Q2sxSlNVUlhWRU5EUVhRclowRjNTVUpCWjBsVlNXaHRZbk0wWkdsNlEwcGlaMWQxVlcwcmMxSldaamcwUlZCbmQwTm5XVWxMYjFwSmVtb3dSVUYzVFhjS1MwUkZUVTFCYjBkQk1WVkZRMmhOUkZaR1RrZE5VbWQzUm1kWlJGWlJVVVJGZHpsdFpGZDRhbUZYT0hWaFJ6bDZaRWMxYUdKWFZYZElhR05PVFdwWmR3cE9SRWt4VFVSbk1FNTZTWGxYYUdOT1RXcFpkMDVFU1RGTlJHY3hUbnBKZVZkcVFVRk5SbXQzUlhkWlNFdHZXa2w2YWpCRFFWRlpTVXR2V2tsNmFqQkVDa0ZSWTBSUlowRkZSMmxGTlV0VVIyaERWbGM0YlZZd1lVbzNaSFUyWnpsb2RrSmllR1V2Tm1GVWVEVXZSM2hZZVhSQlJHYzJRVGhYUkhaTmVIaHVXRFlLZVdOR2RGVmFWSEJ5UVdKV1JFUkxXRzh6TnpsSGNrdFBUbE5SWjFkTFQwTkJaekIzWjJkSlNrMUJORWRCTVZWa1JIZEZRaTkzVVVWQmQwbElaMFJCVkFwQ1owNVdTRk5WUlVSRVFVdENaMmR5UW1kRlJrSlJZMFJCZWtGa1FtZE9Wa2hSTkVWR1oxRlZOSG92SzNkMlpWTjNibkUwTjBVd2JqUkNOR0pJVUd0cUNubDBTWGRJZDFsRVZsSXdha0pDWjNkR2IwRlZVRFZKVUVOYU5WUnVkR2RoYVRWNVpFTnJTRlpDZGtRMUwwNXpkMkpCV1VSV1VqQlNRVkZJTDBKSFNYY0tXVWxhWldGSVVqQmpTRTAyVEhrNWNtUlhTbXhqYlRWc1pFZFdla3h0YkhaTU1qVm9ZbGRXZW1OSFJtcGFXRTEyV2tkV2JWbFlWbk5rUXpGMFdWYzFhQXBhTWxaclRGaFNiR0p0Um5Wa1F6Rm9UWHBWTUU1VE9YcGFXRW95WVZkT2JGbFhUbXBpTTFaMVpFaE5kbU50Vm5OYVYwWjZXbE14ZDJGWVFteGlSMngxQ2xwVVFsSkNaMjl5UW1kRlJVRlpUeTlOUVVWQ1FrVk9iMlJJVW5kamVtOTJUREk1Y0ZwSFRYVmlNMEY0VEcwNWQxcFhOWHBoUjJ4dFpFZEdkMk5JVFhVS1dUSTVkRXg2U25Ga1NFNXVXVlJPY0UxdFZqQmliWGN5VDFSa2MwNHlTbkpPVjJ0NFlUSXhhV0pVVW1oUFZGWnhUVVpOUjBOcGMwZEJVVkZDWnpjNGR3cEJVV2RGVWxGNFJHRklVakJqU0UwMlRIazVkbUZYVW1wTWJUbDNUVk0xZG1OSFZuVmpNbWh3V201U2FHTklRbnBNYlU1MllsTTRlV0Z1VW5wYU1rVjZDbUZVU214a1J6VnpUbXByTTJKRVpHbGhlbFp3VFZkMGRGbHRNREJaVkdzeFlXcERRbWwzV1V0TGQxbENRa0ZJVjJWUlNVVkJaMUk1UWtoelFXVlJRak1LUVVNM2IyVkRhVVJTVlhkcWJtZFlhak16YXpsbmVuVnJTbWN2WlZoeVF6QlpiRUp1UTBOMlpsQlJUVzlCUVVGQ2JtTlFVMk41YjBGQlFWRkVRVVZuZHdwU1owbG9RVkJNY0hSS1JtRTJjR2MzUzI1U2FFVnZjVVpoVUhwMlpEUjBha3huYjFWdVptNWtNbXBpVHpGaldXZEJhVVZCTkU1WlpEQkVLekZJWkdGa0NqaDViRkJQVUVvMlRtVkpTbnB2SzJaS2VIZzBWR2hWVFhrdk16UTRSM04zUTJkWlNVdHZXa2w2YWpCRlFYZE5SR0ZCUVhkYVVVbDRRVWt5TUZsT01Hc0tRVnBqUVZaeFRXVTBjRFpuWW1Nd2Iza3Jhekp1TDJzMWJHSXJObkJPVldkblFYRkljV2hxT1dsWk16RnRWa3d2VHpOQlJXcHZOME5EUVVsM1dYRmxhQXBsY3psbVVGb3JXRkYwWmxKMlVUazFTblZpZDBGMldFMVFkR2ROY1RGNVVrbzJhRThyVUcxdlQzSnVLMVZpZFhaTGNISkxXWGRwY25Kc2NYZ0tMUzB0TFMxRlRrUWdRMFZTVkVsR1NVTkJWRVV0TFMwdExRbz0ifX19fQ==","integratedTime":1777106842,"logIndex":52,"logID":"6ae376f956e29546f971862a42f42c47fc436e9e58814c8ce698073e07d62fb9"}},"Issuer":"https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j","Subject":"https://kubernetes.io/namespaces/default-managed-tenant-a3545/serviceaccounts/release-pipeline"}}]' +++ echo ' [{"critical":{"identity":{"docker-reference":"quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp:latest"},"image":{"docker-manifest-digest":"sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4"},"type":"cosign container image signature"},"optional":{"1.3.6.1.4.1.57264.1.1":"https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j","Bundle":{"SignedEntryTimestamp":"MEUCIFeobaAIAEMAdsWAijC5521H1k+e66WSFdF5xzBLGZFLAiEA6jO1gLLdERuX1YeoJ0evv8lr92k2qIIUPKqKKTLuJVs=","Payload":{"body":"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","integratedTime":1777106842,"logIndex":52,"logID":"6ae376f956e29546f971862a42f42c47fc436e9e58814c8ce698073e07d62fb9"}},"Issuer":"https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j","Subject":"https://kubernetes.io/namespaces/default-managed-tenant-a3545/serviceaccounts/release-pipeline"}}]' +++ jq -j '[.[]|select(.critical.image."docker-manifest-digest"| contains("sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4"))|select(.critical.identity."docker-reference" == "quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp:d8a3550152b3d095b9f67197858a8425267e1d43")]|length' ++ found_signatures=0 ++ echo 0 + found_signatures=0 + '[' -z 0 ']' + echopid 'FOUND SIGNATURES for quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp:d8a3550152b3d095b9f67197858a8425267e1d43 sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4: 0' ++ jobpid +++ cut '-d ' -f4 ++ pid=310 ++ echo 310 + pid=310 + echo '310: FOUND SIGNATURES for quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp:d8a3550152b3d095b9f67197858a8425267e1d43 sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4: 0' 310: FOUND SIGNATURES for quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp:d8a3550152b3d095b9f67197858a8425267e1d43 sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4: 0 + COSIGN_REKOR_ARGS+=("-y" "--rekor-url=$REKOR_URL") + '[' 0 -eq 0 ']' + COSIGN_REKOR_ARGS+=("--identity-token" "$SIGSTORE_ID_TOKEN") + COSIGN_REKOR_ARGS+=("--fulcio-url" "$FULCIO_URL") + run_cosign -t 3m0s sign -y --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --identity-token /var/run/secrets/tokens/oidc-token --fulcio-url http://fulcio-server.tsf-tas.svc.cluster.local --sign-container-identity quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp:d8a3550152b3d095b9f67197858a8425267e1d43 quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp@sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4 + attempt=0 + backoff1=2 + backoff2=3 + '[' 0 -gt 3 ']' + cosign -t 3m0s sign -y --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --identity-token /var/run/secrets/tokens/oidc-token --fulcio-url http://fulcio-server.tsf-tas.svc.cluster.local --sign-container-identity quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp:d8a3550152b3d095b9f67197858a8425267e1d43 quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp@sha256:3f8e53065d7357c6e2a060b87e122a6072dcc7ba9d3c67dffe309e3fddb8c8a4 Generating ephemeral keys... Retrieving signed certificate... Successfully verified SCT... The sigstore service, hosted by sigstore a Series of LF Projects, LLC, is provided pursuant to the Hosted Project Tools Terms of Use, available at https://lfprojects.org/policies/hosted-project-tools-terms-of-use/. Note that if your submission includes personal data associated with this signed artifact, it will be part of an immutable record. This may include the email address associated with the account with which you authenticate your contractual Agreement. This information will be used for signing this artifact and will be stored in public transparency logs and cannot be removed later, and is subject to the Immutable Record notice at https://lfprojects.org/policies/hosted-project-tools-immutable-records/. By typing 'y', you attest that (1) you are not submitting the personal data of any other person; and (2) you understand and agree to the statement and the Agreement terms at the URLs listed above. tlog entry created with index: 53 Pushing signature to: quay.io/rhtap_qe/default-managed-tenant-a3545/default-managed-tenant-a3545-1c5b95/tsf-demo-comp + break + '[' 0 -gt 3 ']' + (( 0 > 0 )) + spawn_count=0 + continue + read -r ENTRY + '[' true '!=' true ']' + echo done done