WARNING: Fetching initial root from URL without providing its checksum is deprecated and will be disallowed in a future Cosign release. Please provide the initial root checksum via the --root-checksum argument. Root status: { "local": "/tekton/home/.sigstore/root", "remote": "http://tuf.tsf-tas.svc.cluster.local", "metadata": { "root.json": { "version": 1, "len": 4128, "expiration": "23 Apr 27 19:15 UTC", "error": "" }, "snapshot.json": { "version": 1, "len": 994, "expiration": "23 Apr 27 19:15 UTC", "error": "" }, "targets.json": { "version": 1, "len": 2071, "expiration": "23 Apr 27 19:15 UTC", "error": "" }, "timestamp.json": { "version": 1, "len": 995, "expiration": "23 Apr 27 19:15 UTC", "error": "" } }, "targets": [ "rekor.pub", "fulcio_v1.crt.pem", "trusted_root.json", "ctfe.pub" ] } + SNAPSHOT_PATH=/var/workdir/release/4066cbb0-b338-448f-ad82-2695b51c176d/snapshot_spec.json ++ jq '.components |length' /var/workdir/release/4066cbb0-b338-448f-ad82-2695b51c176d/snapshot_spec.json + COMPONENTS_LENGTH=1 + source memory-throttle.sh + log_memory_throttle_status 80 Memory throttle: enabled with 80% threshold, current usage: 8Mi/2Gi (0%) + RUNNING_JOBS='\j' + BURST_SIZE=5 + STABILIZATION_DELAY=2 + to_sign=() + declare -a to_sign + (( COMPONENTS_INDEX=0 )) + (( COMPONENTS_INDEX= 90 )) + spawn_count=1 + (( spawn_count % BURST_SIZE == 0 )) + read -r ENTRY + '[' --- = --- ']' + echo '... waiting for group to be signed ...' ... waiting for group to be signed ... + (( 1 > 0 )) + wait -n + check_and_sign quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp:latest quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a + local identity=quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp:latest + local reference=quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp + local digest=sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a ++ mktemp -d + DOCKER_CONFIG=/tmp/tmp.a5ULl9a8dv + export DOCKER_CONFIG + select-oci-auth quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp Using token for quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp + COSIGN_REKOR_ARGS=() + declare -a COSIGN_REKOR_ARGS ++ check_existing_signatures quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp:latest quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp@sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a ++ local identity=quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp:latest ++ local reference=quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp@sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a ++ local digest=sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a ++ COSIGN_REKOR_ARGS=() ++ declare -a COSIGN_REKOR_ARGS ++ COSIGN_REKOR_ARGS+=("--rekor-url=$REKOR_URL") ++ COSIGN_REKOR_ARGS+=("--certificate-identity=${CERTIFICATE_IDENTITY}" "--certificate-oidc-issuer=https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j") +++ run_cosign verify --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --certificate-identity=https://kubernetes.io/namespaces/default-managed-tenant-qxxdd/serviceaccounts/release-pipeline --certificate-oidc-issuer=https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp@sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a +++ attempt=0 +++ backoff1=2 +++ backoff2=3 +++ '[' 0 -gt 3 ']' +++ cosign verify --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --certificate-identity=https://kubernetes.io/namespaces/default-managed-tenant-qxxdd/serviceaccounts/release-pipeline --certificate-oidc-issuer=https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp@sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a Error: no matching signatures: none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/default-tenant/serviceaccounts/build-pipeline-tsf-demo-comp] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j error during command execution: no matching signatures: none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/default-tenant/serviceaccounts/build-pipeline-tsf-demo-comp] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j +++ sleep 3 +++ old_backoff1=2 +++ backoff1=3 +++ backoff2=5 +++ attempt=1 +++ '[' 1 -gt 3 ']' +++ cosign verify --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --certificate-identity=https://kubernetes.io/namespaces/default-managed-tenant-qxxdd/serviceaccounts/release-pipeline --certificate-oidc-issuer=https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp@sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a Error: no matching signatures: none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/default-tenant/serviceaccounts/build-pipeline-tsf-demo-comp] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j error during command execution: no matching signatures: none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/default-tenant/serviceaccounts/build-pipeline-tsf-demo-comp] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j +++ sleep 5 +++ old_backoff1=3 +++ backoff1=5 +++ backoff2=8 +++ attempt=2 +++ '[' 2 -gt 3 ']' +++ cosign verify --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --certificate-identity=https://kubernetes.io/namespaces/default-managed-tenant-qxxdd/serviceaccounts/release-pipeline --certificate-oidc-issuer=https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp@sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a Error: no matching signatures: none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/default-tenant/serviceaccounts/build-pipeline-tsf-demo-comp] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j error during command execution: no matching signatures: none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/default-tenant/serviceaccounts/build-pipeline-tsf-demo-comp] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j +++ sleep 8 +++ old_backoff1=5 +++ backoff1=8 +++ backoff2=13 +++ attempt=3 +++ '[' 3 -gt 3 ']' +++ cosign verify --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --certificate-identity=https://kubernetes.io/namespaces/default-managed-tenant-qxxdd/serviceaccounts/release-pipeline --certificate-oidc-issuer=https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp@sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a Error: no matching signatures: none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/default-tenant/serviceaccounts/build-pipeline-tsf-demo-comp] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j error during command execution: no matching signatures: none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/default-tenant/serviceaccounts/build-pipeline-tsf-demo-comp] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j none of the expected identities matched what was in the certificate, got subjects [https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller] with issuer https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j +++ sleep 13 +++ old_backoff1=8 +++ backoff1=13 +++ backoff2=21 +++ attempt=4 +++ '[' 4 -gt 3 ']' +++ '[' 4 -gt 3 ']' +++ echopid 'Max retries exceeded.' ++++ jobpid +++++ cut '-d ' -f4 ++++ pid=211 ++++ echo 211 +++ pid=211 +++ echo '211: Max retries exceeded.' +++ exit 1 ++ verify_output='211: Max retries exceeded.' +++ echo '211: Max retries exceeded.' +++ jq -j '[.[]|select(.critical.image."docker-manifest-digest"| contains("sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a"))|select(.critical.identity."docker-reference" == "quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp:latest")]|length' parse error: Expected string key before ':' at line 1, column 4 ++ found_signatures= ++ echo '' + found_signatures= + '[' -z '' ']' + found_signatures=0 + echopid 'FOUND SIGNATURES for quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp:latest sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a: 0' ++ jobpid +++ cut '-d ' -f4 ++ pid=217 ++ echo 217 + pid=217 + echo '217: FOUND SIGNATURES for quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp:latest sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a: 0' 217: FOUND SIGNATURES for quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp:latest sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a: 0 + COSIGN_REKOR_ARGS+=("-y" "--rekor-url=$REKOR_URL") + '[' 0 -eq 0 ']' + COSIGN_REKOR_ARGS+=("--identity-token" "$SIGSTORE_ID_TOKEN") + COSIGN_REKOR_ARGS+=("--fulcio-url" "$FULCIO_URL") + run_cosign -t 3m0s sign -y --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --identity-token /var/run/secrets/tokens/oidc-token --fulcio-url http://fulcio-server.tsf-tas.svc.cluster.local --sign-container-identity quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp:latest quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp@sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a + attempt=0 + backoff1=2 + backoff2=3 + '[' 0 -gt 3 ']' + cosign -t 3m0s sign -y --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --identity-token /var/run/secrets/tokens/oidc-token --fulcio-url http://fulcio-server.tsf-tas.svc.cluster.local --sign-container-identity quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp:latest quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp@sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a Generating ephemeral keys... Retrieving signed certificate... Successfully verified SCT... The sigstore service, hosted by sigstore a Series of LF Projects, LLC, is provided pursuant to the Hosted Project Tools Terms of Use, available at https://lfprojects.org/policies/hosted-project-tools-terms-of-use/. Note that if your submission includes personal data associated with this signed artifact, it will be part of an immutable record. This may include the email address associated with the account with which you authenticate your contractual Agreement. This information will be used for signing this artifact and will be stored in public transparency logs and cannot be removed later, and is subject to the Immutable Record notice at https://lfprojects.org/policies/hosted-project-tools-immutable-records/. By typing 'y', you attest that (1) you are not submitting the personal data of any other person; and (2) you understand and agree to the statement and the Agreement terms at the URLs listed above. tlog entry created with index: 92 Pushing signature to: quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp + break + '[' 0 -gt 3 ']' + (( 0 > 0 )) + spawn_count=0 + continue + read -r ENTRY + '[' 'quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a c56101a3debc2f6062c31e0206ba581253663421' = --- ']' ++ echo 'quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a c56101a3debc2f6062c31e0206ba581253663421' ++ cut '-d ' -f1 + INTERNAL_REF=quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp ++ echo 'quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a c56101a3debc2f6062c31e0206ba581253663421' ++ cut '-d ' -f2 + PUBLIC_REF=quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp ++ echo 'quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a c56101a3debc2f6062c31e0206ba581253663421' ++ cut '-d ' -f3 + DIGEST=sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a ++ echo 'quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a c56101a3debc2f6062c31e0206ba581253663421' ++ cut '-d ' -f4 + TAG=c56101a3debc2f6062c31e0206ba581253663421 + wait_for_memory 80 + (( 0 >= 90 )) + spawn_count=1 + (( spawn_count % BURST_SIZE == 0 )) + read -r ENTRY + '[' --- = --- ']' + echo '... waiting for group to be signed ...' ... waiting for group to be signed ... + (( 1 > 0 )) + wait -n + check_and_sign quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp:c56101a3debc2f6062c31e0206ba581253663421 quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a + local identity=quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp:c56101a3debc2f6062c31e0206ba581253663421 + local reference=quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp + local digest=sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a ++ mktemp -d + DOCKER_CONFIG=/tmp/tmp.ClOjbRrNQK + export DOCKER_CONFIG + select-oci-auth quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp Using token for quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp + COSIGN_REKOR_ARGS=() + declare -a COSIGN_REKOR_ARGS ++ check_existing_signatures quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp:c56101a3debc2f6062c31e0206ba581253663421 quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp@sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a ++ local identity=quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp:c56101a3debc2f6062c31e0206ba581253663421 ++ local reference=quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp@sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a ++ local digest=sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a ++ COSIGN_REKOR_ARGS=() ++ declare -a COSIGN_REKOR_ARGS ++ COSIGN_REKOR_ARGS+=("--rekor-url=$REKOR_URL") ++ COSIGN_REKOR_ARGS+=("--certificate-identity=${CERTIFICATE_IDENTITY}" "--certificate-oidc-issuer=https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j") +++ run_cosign verify --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --certificate-identity=https://kubernetes.io/namespaces/default-managed-tenant-qxxdd/serviceaccounts/release-pipeline --certificate-oidc-issuer=https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp@sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a +++ attempt=0 +++ backoff1=2 +++ backoff2=3 +++ '[' 0 -gt 3 ']' +++ cosign verify --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --certificate-identity=https://kubernetes.io/namespaces/default-managed-tenant-qxxdd/serviceaccounts/release-pipeline --certificate-oidc-issuer=https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp@sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a Verification for quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp@sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a -- The following checks were performed on each of these signatures: - The cosign claims were validated - Existence of the claims in the transparency log was verified offline - The code-signing certificate was verified using trusted certificate authority certificates +++ break +++ '[' 0 -gt 3 ']' ++ verify_output=' [{"critical":{"identity":{"docker-reference":"quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp:latest"},"image":{"docker-manifest-digest":"sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a"},"type":"cosign container image signature"},"optional":{"1.3.6.1.4.1.57264.1.1":"https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j","Bundle":{"SignedEntryTimestamp":"MEUCIG5x8QQHPrag8IVdix5yWsVEiFegcCg2SWQsI2GJX4HkAiEA8PLVdW5fwv7qwtQdj98eCJNtinKl6GfmpTdA9vCapM4=","Payload":{"body":"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","integratedTime":1777059354,"logIndex":92,"logID":"ad9fa1f0d2164ad544ad7c24af76c05bbaaa595acd808a908686367e470a673a"}},"Issuer":"https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j","Subject":"https://kubernetes.io/namespaces/default-managed-tenant-qxxdd/serviceaccounts/release-pipeline"}}]' +++ echo ' [{"critical":{"identity":{"docker-reference":"quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp:latest"},"image":{"docker-manifest-digest":"sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a"},"type":"cosign container image signature"},"optional":{"1.3.6.1.4.1.57264.1.1":"https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j","Bundle":{"SignedEntryTimestamp":"MEUCIG5x8QQHPrag8IVdix5yWsVEiFegcCg2SWQsI2GJX4HkAiEA8PLVdW5fwv7qwtQdj98eCJNtinKl6GfmpTdA9vCapM4=","Payload":{"body":"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","integratedTime":1777059354,"logIndex":92,"logID":"ad9fa1f0d2164ad544ad7c24af76c05bbaaa595acd808a908686367e470a673a"}},"Issuer":"https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j","Subject":"https://kubernetes.io/namespaces/default-managed-tenant-qxxdd/serviceaccounts/release-pipeline"}}]' +++ jq -j '[.[]|select(.critical.image."docker-manifest-digest"| contains("sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a"))|select(.critical.identity."docker-reference" == "quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp:c56101a3debc2f6062c31e0206ba581253663421")]|length' ++ found_signatures=0 ++ echo 0 + found_signatures=0 + '[' -z 0 ']' + echopid 'FOUND SIGNATURES for quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp:c56101a3debc2f6062c31e0206ba581253663421 sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a: 0' ++ jobpid +++ cut '-d ' -f4 ++ pid=309 ++ echo 309 + pid=309 + echo '309: FOUND SIGNATURES for quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp:c56101a3debc2f6062c31e0206ba581253663421 sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a: 0' 309: FOUND SIGNATURES for quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp:c56101a3debc2f6062c31e0206ba581253663421 sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a: 0 + COSIGN_REKOR_ARGS+=("-y" "--rekor-url=$REKOR_URL") + '[' 0 -eq 0 ']' + COSIGN_REKOR_ARGS+=("--identity-token" "$SIGSTORE_ID_TOKEN") + COSIGN_REKOR_ARGS+=("--fulcio-url" "$FULCIO_URL") + run_cosign -t 3m0s sign -y --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --identity-token /var/run/secrets/tokens/oidc-token --fulcio-url http://fulcio-server.tsf-tas.svc.cluster.local --sign-container-identity quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp:c56101a3debc2f6062c31e0206ba581253663421 quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp@sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a + attempt=0 + backoff1=2 + backoff2=3 + '[' 0 -gt 3 ']' + cosign -t 3m0s sign -y --rekor-url=http://rekor-server.tsf-tas.svc.cluster.local --identity-token /var/run/secrets/tokens/oidc-token --fulcio-url http://fulcio-server.tsf-tas.svc.cluster.local --sign-container-identity quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp:c56101a3debc2f6062c31e0206ba581253663421 quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp@sha256:b0c134b509bd174d4825d113350d30f03a4a1875ecdf450321f3329a4d83549a Generating ephemeral keys... Retrieving signed certificate... Successfully verified SCT... The sigstore service, hosted by sigstore a Series of LF Projects, LLC, is provided pursuant to the Hosted Project Tools Terms of Use, available at https://lfprojects.org/policies/hosted-project-tools-terms-of-use/. Note that if your submission includes personal data associated with this signed artifact, it will be part of an immutable record. This may include the email address associated with the account with which you authenticate your contractual Agreement. This information will be used for signing this artifact and will be stored in public transparency logs and cannot be removed later, and is subject to the Immutable Record notice at https://lfprojects.org/policies/hosted-project-tools-immutable-records/. By typing 'y', you attest that (1) you are not submitting the personal data of any other person; and (2) you understand and agree to the statement and the Agreement terms at the URLs listed above. tlog entry created with index: 93 Pushing signature to: quay.io/rhtap_qe/default-managed-tenant-qxxdd/default-managed-tenant-qxxdd-273c51/tsf-demo-comp + break + '[' 0 -gt 3 ']' + (( 0 > 0 )) + spawn_count=0 + continue + read -r ENTRY + '[' true '!=' true ']' done + echo done