{
    "apiVersion": "v1",
    "items": [
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=52",
                    "operator-sdk/primary-resource": "default-tenant/tsf-demo-app-20260415-231650-000-8a419f9-vm66n",
                    "operator-sdk/primary-resource-type": "Release.appstudio.redhat.com",
                    "pac.test.appstudio.openshift.io/branch": "base-miwkfv",
                    "pac.test.appstudio.openshift.io/cancel-in-progress": "false",
                    "pac.test.appstudio.openshift.io/check-run-id": "71552493202",
                    "pac.test.appstudio.openshift.io/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pac.test.appstudio.openshift.io/event-type": "push",
                    "pac.test.appstudio.openshift.io/git-auth-secret": "pac-gitauth-ojyaao",
                    "pac.test.appstudio.openshift.io/git-provider": "github",
                    "pac.test.appstudio.openshift.io/installation-id": "112348674",
                    "pac.test.appstudio.openshift.io/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-push-cttl8",
                    "pac.test.appstudio.openshift.io/max-keep-runs": "3",
                    "pac.test.appstudio.openshift.io/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-miwkfv\"",
                    "pac.test.appstudio.openshift.io/original-prname": "tsf-demo-comp-on-push",
                    "pac.test.appstudio.openshift.io/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pac.test.appstudio.openshift.io/repository": "tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/scm-reporting-plr-started": "true",
                    "pac.test.appstudio.openshift.io/sender": "rhtap-ci-tests-bot",
                    "pac.test.appstudio.openshift.io/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pac.test.appstudio.openshift.io/sha-title": "Merge pull request #181 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pac.test.appstudio.openshift.io/source-branch": "refs/heads/base-miwkfv",
                    "pac.test.appstudio.openshift.io/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pac.test.appstudio.openshift.io/state": "completed",
                    "pac.test.appstudio.openshift.io/url-org": "rhads-tsf-qe",
                    "pac.test.appstudio.openshift.io/url-repository": "testrepo",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-managed-tenant-syc5c/results/73a7398d-e21e-4159-adb1-64e80c630018/records/da5e6367-8974-4cdb-9d78-bbda1aca9ed7",
                    "results.tekton.dev/result": "default-managed-tenant-syc5c/results/73a7398d-e21e-4159-adb1-64e80c630018",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "release"
                },
                "creationTimestamp": "2026-04-15T23:27:14Z",
                "finalizers": [
                    "chains.tekton.dev",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "tekton-pipelines",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/service": "release",
                    "appstudio.openshift.io/snapshot": "tsf-demo-app-20260415-231650-000",
                    "pipelines.appstudio.openshift.io/type": "managed",
                    "release.appstudio.openshift.io/name": "tsf-demo-app-20260415-231650-000-8a419f9-vm66n",
                    "release.appstudio.openshift.io/namespace": "default-tenant",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "push-to-external-registry",
                    "tekton.dev/pipelineRun": "managed-25x6p",
                    "tekton.dev/pipelineRunUID": "73a7398d-e21e-4159-adb1-64e80c630018",
                    "tekton.dev/pipelineTask": "apply-mapping",
                    "tekton.dev/task": "apply-mapping"
                },
                "name": "managed-25x6p-apply-mapping",
                "namespace": "default-managed-tenant-syc5c",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "managed-25x6p",
                        "uid": "73a7398d-e21e-4159-adb1-64e80c630018"
                    }
                ],
                "resourceVersion": "42849",
                "uid": "da5e6367-8974-4cdb-9d78-bbda1aca9ed7"
            },
            "spec": {
                "params": [
                    {
                        "name": "failOnEmptyResult",
                        "value": "true"
                    },
                    {
                        "name": "dataPath",
                        "value": "73a7398d-e21e-4159-adb1-64e80c630018/data.json"
                    },
                    {
                        "name": "snapshotPath",
                        "value": "73a7398d-e21e-4159-adb1-64e80c630018/snapshot_spec.json"
                    },
                    {
                        "name": "ociStorage",
                        "value": "quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts"
                    },
                    {
                        "name": "sourceDataArtifact",
                        "value": "oci:quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts@sha256:99c20aac747b474333407302421c12b85da090e344c655e4c20a14acad05a2c8"
                    },
                    {
                        "name": "dataDir",
                        "value": "/var/workdir/release"
                    },
                    {
                        "name": "trustedArtifactsDebug",
                        "value": ""
                    },
                    {
                        "name": "taskGitUrl",
                        "value": "https://github.com/konflux-ci/release-service-catalog.git"
                    },
                    {
                        "name": "taskGitRevision",
                        "value": "development"
                    }
                ],
                "retries": 3,
                "serviceAccountName": "release-pipeline",
                "taskRef": {
                    "params": [
                        {
                            "name": "url",
                            "value": "https://github.com/konflux-ci/release-service-catalog.git"
                        },
                        {
                            "name": "revision",
                            "value": "development"
                        },
                        {
                            "name": "pathInRepo",
                            "value": "tasks/managed/apply-mapping/apply-mapping.yaml"
                        }
                    ],
                    "resolver": "git"
                },
                "timeout": "1h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:27:26Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:27:26Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "managed-25x6p-apply-mapping-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha1": "4f00b1a3062b53809bf42ca120e84d73cc199954"
                        },
                        "entryPoint": "tasks/managed/apply-mapping/apply-mapping.yaml",
                        "uri": "git+https://github.com/konflux-ci/release-service-catalog.git"
                    }
                },
                "results": [
                    {
                        "name": "mapped",
                        "type": "string",
                        "value": "true"
                    },
                    {
                        "name": "sourceDataArtifact",
                        "type": "string",
                        "value": "oci:quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts@sha256:10637a1d22053e337836c216e5952b45d7d95c17ec9c73f75ea92c4cf8f7b4fa"
                    }
                ],
                "startTime": "2026-04-15T23:27:14Z",
                "steps": [
                    {
                        "container": "step-use-trusted-artifact",
                        "imageID": "quay.io/konflux-ci/build-trusted-artifacts@sha256:27ddb820f0d30609dcb8de88219309edbced429896324e474f494470c2f003fb",
                        "name": "use-trusted-artifact",
                        "provenance": {
                            "refSource": {
                                "digest": {
                                    "sha1": "4f00b1a3062b53809bf42ca120e84d73cc199954"
                                },
                                "entryPoint": "stepactions/use-trusted-artifact/use-trusted-artifact.yaml",
                                "uri": "git+https://github.com/konflux-ci/release-service-catalog.git"
                            }
                        },
                        "terminated": {
                            "containerID": "cri-o://daa9a2d528f7fb30b626bd5950b286e443ca980ee3abf4bd40c6ac6de41591cc",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:27:21Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:27:21Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-create-trusted-artifact",
                        "imageID": "quay.io/konflux-ci/build-trusted-artifacts@sha256:27ddb820f0d30609dcb8de88219309edbced429896324e474f494470c2f003fb",
                        "name": "create-trusted-artifact",
                        "provenance": {
                            "refSource": {
                                "digest": {
                                    "sha1": "4f00b1a3062b53809bf42ca120e84d73cc199954"
                                },
                                "entryPoint": "stepactions/create-trusted-artifact/create-trusted-artifact.yaml",
                                "uri": "git+https://github.com/konflux-ci/release-service-catalog.git"
                            }
                        },
                        "terminated": {
                            "containerID": "cri-o://f9e530433b7044f5be4766047daaa15ca69010be09686662aa4e54a71397abd6",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:27:25Z",
                            "message": "[{\"key\":\"mapped\",\"value\":\"true\",\"type\":1},{\"key\":\"sourceDataArtifact\",\"value\":\"oci:quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts@sha256:10637a1d22053e337836c216e5952b45d7d95c17ec9c73f75ea92c4cf8f7b4fa\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:27:24Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-apply-mapping",
                        "imageID": "quay.io/konflux-ci/release-service-utils@sha256:5546fa78d3c88d7b6a2e8cff8902f7757f00541d0bbaf113b9f293133894afa3",
                        "name": "apply-mapping",
                        "terminated": {
                            "containerID": "cri-o://ebbec471d3a98a4f251f844daa8241d969e3e1983e9d2ed786e06f21962f0e99",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:27:23Z",
                            "message": "[{\"key\":\"mapped\",\"value\":\"true\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:27:22Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Tekton task to apply a mapping to a Snapshot.\n\nThe purpose of this task is to merge a mapping with the components contained in a Snapshot.\nThe mapping is expected to be present in the data field of the ReleasePlanAdmission provided in\nthe `releasePlanAdmissionPath`. If the data field does not contain a `mapping` key, the original\nSnapshot is returned. If there is a `mapping` key, it is merged with the `components` key in the\nSnapshot based on component name.\n\nA `mapped` result is also returned from this task containing a simple true/false value that is\nmeant to inform whether a mapped Snapshot is being returned or the original one.\n\nThis task supports variable expansion in tag values from the mapping. The currently supported variables are:\n* \"{{ timestamp }}\" -\u003e The build-date label from the image in the format provided by timestampFormat or %s as the\n  default.\n  If the build-date label is not available, we use the Created field in the image metadata as a fallback.\n* \"{{ release_timestamp }}\" -\u003e The current time in the format provided by timestampFormat or %s as the default\n* \"{{ git_sha }}\" -\u003e The git sha that triggered the snapshot being processed\n* \"{{ git_short_sha }}\" -\u003e The git sha reduced to 7 characters\n* \"{{ digest_sha }}\" -\u003e The image digest of the respective component\n* \"{{ incrementer }}\" -\u003e Automatically finds the highest existing incremented tag in the\n  repository and generates the next sequential tag (e.g., if the highest tag is v1.0.0-2, it will generate v1.0.0-3)\n* \"{{ oci_version }}\" -\u003e The version from OCI image annotations (org.opencontainers.image.version), with fallback\n  to OCI image labels if not present in annotations (converts + to _ for tag compliance)\n\nYou can also expand image labels, e.g. \"{{ labels.mylabel }}\" -\u003e The value of image label \"mylabel\"",
                    "params": [
                        {
                            "description": "Path to the JSON string of the Snapshot spec in the config workspace to apply the mapping to",
                            "name": "snapshotPath",
                            "type": "string"
                        },
                        {
                            "description": "Path to the JSON string of the merged data to use in the data workspace",
                            "name": "dataPath",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Fail the task if the resulting snapshot contains 0 components",
                            "name": "failOnEmptyResult",
                            "type": "string"
                        },
                        {
                            "default": "empty",
                            "description": "The OCI repository where the Trusted Artifacts are stored",
                            "name": "ociStorage",
                            "type": "string"
                        },
                        {
                            "default": "1d",
                            "description": "Expiration date for the trusted artifacts created in the OCI repository. An empty string means the artifacts do not expire",
                            "name": "ociArtifactExpiresAfter",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Flag to enable debug logging in trusted artifacts. Set to a non-empty string to enable",
                            "name": "trustedArtifactsDebug",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "oras options to pass to Trusted Artifacts calls",
                            "name": "orasOptions",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Location of trusted artifacts to be used to populate data directory",
                            "name": "sourceDataArtifact",
                            "type": "string"
                        },
                        {
                            "default": "/var/workdir/release",
                            "description": "The location where data will be stored",
                            "name": "dataDir",
                            "type": "string"
                        },
                        {
                            "description": "The url to the git repo where the release-service-catalog tasks and stepactions to be used are stored",
                            "name": "taskGitUrl",
                            "type": "string"
                        },
                        {
                            "description": "The revision in the taskGitUrl repo to be used",
                            "name": "taskGitRevision",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from",
                            "name": "caTrustConfigMapName",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data",
                            "name": "caTrustConfigMapKey",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "When \"true\", for each repository the resolved {{ timestamp }} value is added to the list of\ntags after translation (deduplicated). Fails if timestamp is empty. Only pipelines referencing\nthe check-labels task should set this to \"true\"\n",
                            "name": "addImplicitTimestampTag",
                            "type": "string"
                        },
                        {
                            "default": "/etc/pki/tls/certs/ca-bundle.crt",
                            "description": "Path to CA certificate bundle for TLS verification with self-signed certificates",
                            "name": "caCertPath",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "A true/false value depicting whether or not the snapshot was mapped.",
                            "name": "mapped",
                            "type": "string"
                        },
                        {
                            "description": "Produced trusted data artifact",
                            "name": "sourceDataArtifact",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "IMAGE_EXPIRES_AFTER",
                                "value": "1d"
                            },
                            {
                                "name": "ORAS_OPTIONS"
                            },
                            {
                                "name": "DEBUG"
                            }
                        ],
                        "securityContext": {
                            "runAsUser": 1001
                        },
                        "volumeMounts": [
                            {
                                "mountPath": "/var/workdir",
                                "name": "workdir"
                            },
                            {
                                "mountPath": "/etc/pki/tls/certs/ca-bundle.crt",
                                "name": "trusted-ca",
                                "readOnly": true,
                                "subPath": "ca-bundle.crt"
                            },
                            {
                                "mountPath": "/etc/ssl/certs/ca-custom-bundle.crt",
                                "name": "trusted-ca",
                                "readOnly": true,
                                "subPath": "ca-bundle.crt"
                            }
                        ]
                    },
                    "steps": [
                        {
                            "args": [
                                "use",
                                "oci:quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts@sha256:99c20aac747b474333407302421c12b85da090e344c655e4c20a14acad05a2c8=/var/workdir/release"
                            ],
                            "computeResources": {
                                "limits": {
                                    "memory": "64Mi"
                                },
                                "requests": {
                                    "cpu": "30m",
                                    "memory": "64Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "HOME",
                                    "value": "/tekton/home"
                                },
                                {
                                    "name": "ORAS_OPTIONS"
                                },
                                {
                                    "name": "CA_FILE",
                                    "value": "/etc/pki/tls/certs/ca-bundle.crt"
                                }
                            ],
                            "image": "quay.io/konflux-ci/build-trusted-artifacts:653578444c73afc32b3a865fee9869a09f96c1a2",
                            "name": "use-trusted-artifact"
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "memory": "64Mi"
                                },
                                "requests": {
                                    "cpu": "1",
                                    "memory": "64Mi"
                                }
                            },
                            "image": "quay.io/konflux-ci/release-service-utils@sha256:5546fa78d3c88d7b6a2e8cff8902f7757f00541d0bbaf113b9f293133894afa3",
                            "name": "apply-mapping",
                            "script": "#!/usr/bin/env bash\nset -euxo pipefail\n\nSNAPSHOT_SPEC_FILE=\"/var/workdir/release/73a7398d-e21e-4159-adb1-64e80c630018/snapshot_spec.json\"\nDATA_FILE=\"/var/workdir/release/73a7398d-e21e-4159-adb1-64e80c630018/data.json\"\nSNAPSHOT_SPEC_FILE_ORIG=\"${SNAPSHOT_SPEC_FILE}.orig\"\n\nif [ ! -f \"${SNAPSHOT_SPEC_FILE}\" ] ; then\n    echo \"No valid snapshot file was found.\"\n    exit 1\nfi\n\n# Copy the original Snapshot spec file before overriding\ncp \"${SNAPSHOT_SPEC_FILE}\" \"${SNAPSHOT_SPEC_FILE_ORIG}\"\n\nif [ ! -f \"${DATA_FILE}\" ] ; then\n    echo \"No data JSON file was found.\"\n    printf \"false\" | tee \"/tekton/results/mapped\"\n    exit 0\nfi\n\nMAPPING=$(jq '.mapping' \"${DATA_FILE}\")\n\nif [[ $MAPPING == \"null\" ]] ; then\n    echo \"Data file contains no mapping key.\"\n    printf \"false\" | tee \"/tekton/results/mapped\"\n    exit 0\nfi\n\n# Function to handle incrementer logic\nincrement_tag() {\n    local tag_template=\"$1\"\n    local repo=\"$2\"\n\n    # Use `skopeo list-tags` to fetch all tags from the repository\n    existing_tags=$(skopeo list-tags --retry-times 3 docker://\"${repo}\" | jq -r '.Tags[]')\n\n    # Remove `{{ incrementer }}` placeholder to get the version prefix for regex pattern\n    # shellcheck disable=SC2001\n    version_prefix=$(echo \"${tag_template}\" | sed 's/{{ incrementer }}//g')\n    # Match tags with 1–6 digit increments only. Ignore 7+ digit tags to avoid\n    # treating short commit SHAs as incrementer values\n    tag_pattern=\"^${version_prefix}[0-9]{1,6}$\"\n\n    # Extract the numeric part of existing tags and find the max increment\n    max_increment=$(echo \"${existing_tags}\" | { grep -E \"${tag_pattern}\" || true; } \\\n    | sed -E \"s/${version_prefix}//\" | sort -nr | head -n1)\n\n    # Calculate the next increment (default to 1 if max_increment is empty or unset)\n    # Use 10# to force decimal input preventing leading 0 from being treated as octal\n    increment=$((10#${max_increment:-0} + 1))\n\n    # Substitute `{{ incrementer }}` in the tag template with the calculated increment\n    tag=\"${tag_template//\\{\\{ incrementer \\}\\}/${increment}}\"\n\n    # Validate the final tag format to avoid malformed tags\n    if [[ ! \"${tag}\" =~ ^[a-zA-Z0-9._-]+$ ]]; then\n        echo \"Error: Invalid tag format after substitution: ${tag}\"\n        exit 1\n    fi\n\n    echo \"$tag\"  # Return the final tag\n}\n\n# Expected arguments are: [variable, substitute_map, labels_map]\nsubstitute() {\n    variable=$1\n    substitute_map=$2\n    labels_map=$3\n\n    result=\"\"\n    if [[ \"$variable\" == labels.* ]]; then\n        label=\"${variable#labels.}\"\n        result=\"$(jq -r --arg labelval \"$label\" '.[$labelval] // \"\"' \u003c\u003c\u003c \"${labels_map}\")\"\n    else\n        result=\"$(jq -r --arg variable \"$variable\" '.[$variable] // \"\"' \u003c\u003c\u003c \"${substitute_map}\")\"\n    fi\n    echo \"$result\"\n}\n\n# When addImplicitTimestampTag is true, append the resolved timestamp value to the\n# translated tag list (and deduplicate). Fails if timestamp is empty. Only used by\n# the rh-advisories pipeline.\nensure_implicit_timestamp_value() {\n    local tags_json=\"$1\"\n    local timestamp_val=\"$2\"\n    if [ \"false\" != \"true\" ]; then\n        echo \"$tags_json\"\n        return\n    fi\n    if [ -z \"$timestamp_val\" ]; then\n        echo \"Error: addImplicitTimestampTag is true but timestamp is empty (no build-date or Created).\" \u003e\u00262\n        exit 1\n    fi\n    echo \"$tags_json\" | jq -c --arg ts \"$timestamp_val\" '. + [$ts] | unique'\n}\n\n# Expected arguments are [tags, substitute_map, labels_map, repo]\n# The tags argument is a json array\ntranslate_tags () {\n    tags=$1\n    substitute_map=$2\n    labels_map=$3\n    repo=$4\n    if [ \"$tags\" = '' ] ; then\n        echo ''\n        return\n    fi\n\n    translated_tags='[]'\n    NUM_TAGS=\"$(jq 'length' \u003c\u003c\u003c \"${tags}\")\"\n    for ((i = 0; i \u003c NUM_TAGS; i++)); do\n        tag=\"$(jq -r --argjson i \"$i\" '.[$i]' \u003c\u003c\u003c \"${tags}\")\"\n\n        # Repeatedly translate {{}} references until none are left\n        while [[ $tag =~ \\{\\{\\ *([[:alnum:]_\\.-]+)\\ *\\}\\} ]]; do\n          # Extract the variable name (e.g., timestamp), trimming any surrounding spaces\n          var_name=\"${BASH_REMATCH[1]}\"\n\n          # Sanity check of the template variable name\n          if [[ ! \"$var_name\" =~ ^[a-zA-Z0-9._-]+$ ]]; then\n            echo \"Error: Invalid variable name in tag definition: $var_name\" \u003e\u00262\n            exit 1\n          fi\n\n          # Handle incrementer logic\n          if [[ \"$var_name\" == \"incrementer\" ]]; then\n              tag=$(increment_tag \"$tag\" \"$repo\")\n          else\n              replacement=$(substitute \"$var_name\" \"$substitute_map\" \"$labels_map\")\n              if [ -z \"$replacement\" ]; then\n                  echo Error: Substitution variable unknown or empty: \"$var_name\" \u003e\u00262\n                  exit 1\n              fi\n              # Shellcheck suggests ${var//find/replace}, but\n              # that won't work here - we need to match arbitrary amount of spaces\n              # shellcheck disable=SC2001\n              tag=\"$(sed \"s/{{ *$var_name *}}/$replacement/\" \u003c\u003c\u003c \"$tag\")\"\n          fi\n        done\n\n        # Sanity check of the resulting tag value\n        if [[ ! \"$tag\" =~ ^[a-zA-Z0-9._-]+$ ]]; then\n          echo \"Error: Invalid tag format: $tag\" \u003e\u00262\n          exit 1\n        fi\n\n        # Avoid duplicate tags - only add a tag if not already present\n        if [ \"$(jq -c --arg tag \"$tag\" 'index($tag)' \u003c\u003c\u003c \"$translated_tags\")\" = null ]\n        then\n          translated_tags=\"$(jq -c --arg tag \"$tag\" '. + [$tag]' \u003c\u003c\u003c \"$translated_tags\")\"\n        fi\n    done\n\n    echo \"$translated_tags\"\n}\n\nconvert_to_quay () { # Convert the registry.redhat.io URL to the quay.io format\n    local repository=$1\n    case \"$repository\" in\n        registry.redhat.io/*)\n            echo \"${repository/registry.redhat.io/quay.io/redhat-prod}\" \\\n                | sed 's|/|----|g; s|quay.io----redhat-prod----|quay.io/redhat-prod/|'\n            ;;\n        registry.stage.redhat.io/*)\n            echo \"${repository/registry.stage.redhat.io/quay.io/redhat-pending}\" \\\n                | sed 's|/|----|g; s|quay.io----redhat-pending----|quay.io/redhat-pending/|'\n            ;;\n        flatpaks.registry.redhat.io/*)\n            echo \"${repository/flatpaks.registry.redhat.io/quay.io/rh-flatpaks-prod}\" \\\n                | sed 's|/|----|g; s|quay.io----rh-flatpaks-prod----|quay.io/rh-flatpaks-prod/|'\n            ;;\n        flatpaks.registry.stage.redhat.io/*)\n            echo \"${repository/flatpaks.registry.stage.redhat.io/quay.io/rh-flatpaks-stage}\" \\\n                | sed 's|/|----|g; s|quay.io----rh-flatpaks-stage----|quay.io/rh-flatpaks-stage/|'\n            ;;\n        *)\n            echo \"$repository\"\n            ;;\n    esac\n}\n\n# This block is temporary to support both quay.io and registry.redhat.io\n# It should be removed once all repositories are migrated to registry.redhat.io\nconvert_to_registry () { # Convert the repository URL to the registry.redhat.io format\n    local repository=$1\n    case \"$repository\" in\n        quay.io/redhat-prod/*)\n            repository=\"${repository//quay.io\\/redhat-prod/registry.redhat.io}\"\n            repository=\"${repository//----//}\"\n            echo \"$repository\"\n            ;;\n        quay.io/redhat-pending/*)\n            repository=\"${repository//quay.io\\/redhat-pending/registry.stage.redhat.io}\"\n            repository=\"${repository//----//}\"\n            echo \"$repository\"\n            ;;\n        quay.io/rh-flatpaks-prod/*)\n            repository=\"${repository//quay.io\\/rh-flatpaks-prod/flatpaks.registry.redhat.io}\"\n            repository=\"${repository//----//}\"\n            echo \"$repository\"\n            ;;\n        quay.io/rh-flatpaks-stage/*)\n            repository=\"${repository//quay.io\\/rh-flatpaks-stage/flatpaks.registry.stage.redhat.io}\"\n            repository=\"${repository//----//}\"\n            echo \"$repository\"\n            ;;\n        registry.redhat.io/* | registry.stage.redhat.io/*)\n            # Return the original Red Hat registry paths\n            echo \"$repository\"\n            ;;\n        *)\n            # Return empty for unhandled formats\n            echo \"\"\n            ;;\n    esac\n}\n\nconvert_to_registry_access () { # Convert the repository URL to the registry.access.redhat.com format\n    local repository=$1\n    case \"$repository\" in\n        registry.redhat.io/*)\n            echo \"${repository/registry.redhat.io/registry.access.redhat.com}\"\n            ;;\n        registry.stage.redhat.io/*)\n            echo \"${repository/registry.stage.redhat.io/registry.access.stage.redhat.com}\"\n            ;;\n        *)\n            echo \"\"\n            ;;\n    esac\n}\n\n# Merge the mapping key contents in the data JSON file with the components key in the snapshot based\n# on component name. Save the output as a compact JSON in the mapped_snapshot.json file in the workspace\n{ echo -n \"$(cat \"${SNAPSHOT_SPEC_FILE_ORIG}\")\"; echo \"${MAPPING}\"; } | jq -c -s '\n  .[0] as $snapshot | .[0].components + .[1].components | group_by(.name) |\n  [.[] | select(length \u003e 1)] | map(reduce .[] as $x ({}; . * $x)) as $mergedComponents |\n  $snapshot | .components = $mergedComponents' \u003e \"${SNAPSHOT_SPEC_FILE}\"\n\nprintf \"true\" | tee \"/tekton/results/mapped\"\n\nif [ \"true\" = \"true\" ] \u0026\u0026 \\\n  [ \"$(jq '.components | length' \u003c \"${SNAPSHOT_SPEC_FILE}\")\" -eq 0 ]; then\n  echo \"ERROR: Resulting snapshot contains 0 components. This means that there were 0 components present in\"\n  echo \"both your Snapshot and your ReleasePlanAdmission mapping. Take a look at your component names and\"\n  echo \"make sure that all components you want to release from the snapshot are present in the\"\n  echo \"ReleasePlanAdmission (by the name field of the component).\"\n  echo \"Components in snapshot: $(jq -c '[.components[].name]' \"${SNAPSHOT_SPEC_FILE_ORIG}\")\"\n  echo \"Components in mapping: $(jq -c '[.components[].name]' \u003c\u003c\u003c \"${MAPPING}\")\"\n  exit 1\nfi\n\n# Expand the tags in the data file\ndefaultTags=$(jq '.defaults.tags // []' \u003c\u003c\u003c \"$MAPPING\")\ndefaultTimestampFormat=$(jq -r '.defaults.timestampFormat // \"%s\"' \u003c\u003c\u003c \"$MAPPING\")\ncurrentTimestamp=\"$(date \"+%Y%m%d %T\")\"\ndefaultCGWSettings=$(jq -c '.defaults.contentGateway // {}' \u003c\u003c\u003c \"$MAPPING\")\nNUM_MAPPED_COMPONENTS=$(jq '.components | length' \"${SNAPSHOT_SPEC_FILE}\")\nfor ((i = 0; i \u003c NUM_MAPPED_COMPONENTS; i++)) ; do\n    component=$(jq -c --argjson i \"$i\" '.components[$i]' \"${SNAPSHOT_SPEC_FILE}\")\n    componentTags=$(jq '.componentTags // []' \u003c\u003c\u003c \"$component\")\n    defaultComponentTags=$(jq -n --argjson defaults \"$defaultTags\" --argjson componentTags \\\n      \"$componentTags\" '$defaults? + $componentTags? | unique')\n\n    # images are required to use sha reference - check this\n    NAME=$(jq -r '.name' \u003c\u003c\u003c \"$component\")\n    IMAGE_REF=$(jq -r '.containerImage' \u003c\u003c\u003c \"$component\")\n    if ! [[ \"$IMAGE_REF\" =~ ^.+@sha256:[0-9a-f]+$ ]] ; then\n      echo \"Component ${NAME} contains an invalid containerImage value. sha reference is required: ${IMAGE_REF}\"\n      exit 1\n    fi\n\n    git_sha=$(jq -r '.source.git.revision' \u003c\u003c\u003c \"$component\") # this sets the value to \"null\" if it doesn't exist\n    build_sha=${IMAGE_REF##*:}\n    passedTimestampFormat=$(jq -r --arg default \"$defaultTimestampFormat\" \\\n      '.timestampFormat // $default' \u003c\u003c\u003c \"$component\")\n    release_timestamp=\"$(date -d \"$currentTimestamp\" \"+$passedTimestampFormat\")\"\n    arch_json=\"$(get-image-architectures \"${IMAGE_REF}\")\"\n    # The build-date label and Created values are not the same per architecture, but we don't support separate\n    # tags per arch. So, we just use the first digest listed.\n    arch=\"$(jq -rs 'map(.platform.architecture) | .[0]' \u003c\u003c\u003c \"$arch_json\")\"\n    os=\"$(jq -rs 'map(.platform.os) | .[0]' \u003c\u003c\u003c \"$arch_json\")\"\n\n    # Get first digest from architecture info to construct image reference\n    first_digest=\"$(jq -rs '.[0].digest' \u003c\u003c\u003c \"$arch_json\")\"\n\n    # Construct image reference with the first architecture's digest for annotations\n    image_with_digest=\"${IMAGE_REF%@*}@${first_digest}\"\n\n    # Get raw manifest to extract annotations (works for all image types)\n    raw_manifest=\"$(skopeo inspect --retry-times 3 --no-tags --raw docker://\"${image_with_digest}\" | jq -c)\"\n    annotations=\"$(jq -c '.annotations // {}' \u003c\u003c\u003c \"$raw_manifest\")\"\n\n    # Get config.mediaType from raw manifest to determine if this is a standard container image\n    config_media_type=\"$(jq -r '.config.mediaType // \"\"' \u003c\u003c\u003c \"$raw_manifest\")\"\n\n    # Get image metadata for labels, env, build_date\n    # Only standard container images support skopeo inspect without --raw\n    # Standard config types are:\n    #   - application/vnd.oci.image.config.v1+json (OCI images)\n    #   - application/vnd.docker.container.image.v1+json (Docker images)\n    # All other artifacts (Helm charts, ML models, empty configs, etc.) don't have\n    # labels/env and would fail with skopeo inspect\n    if [[ \"$config_media_type\" == \"application/vnd.oci.image.config.v1+json\" ]] || \\\n       [[ \"$config_media_type\" == \"application/vnd.docker.container.image.v1+json\" ]]; then\n        # Standard container images - use standard skopeo inspect\n        image_metadata=\"$(skopeo inspect --retry-times 3 --no-tags \\\n          --override-os \"${os}\" --override-arch \"${arch}\" docker://\"${IMAGE_REF}\" | jq -c)\"\n        # For timestamp, use Labels.build-date and fallback to Created\n        build_date=\"$(jq -r '.Labels.\"build-date\" // .Created // \"\"' \u003c\u003c\u003c \"$image_metadata\")\"\n        env_variables=\"$(jq -c '.Env // []' \u003c\u003c\u003c \"${image_metadata}\")\"\n        labels=\"$(jq -c '.Labels // {}' \u003c\u003c\u003c \"${image_metadata}\")\"\n    else\n        # Non-standard artifacts (Helm charts, ML models, etc.) don't support\n        # standard skopeo inspect - get build_date from annotations if available\n        build_date=\"$(jq -r '.[\"org.opencontainers.image.created\"] // \"\"' \u003c\u003c\u003c \"$annotations\")\"\n        env_variables=\"[]\"\n        labels=\"{}\"\n    fi\n\n    # Get oci_version_raw from annotations, fallback to labels\n    oci_version_raw=\"$(jq -r '.[\"org.opencontainers.image.version\"] // \"\"' \u003c\u003c\u003c \"$annotations\")\"\n    if [ -z \"$oci_version_raw\" ]; then\n      oci_version_raw=\"$(jq -r '.[\"org.opencontainers.image.version\"] // \"\"' \u003c\u003c\u003c \"$labels\")\"\n    fi\n\n    # Add image env_variables metadata to component\n    if [ \"$(jq 'length' \u003c\u003c\u003c \"$env_variables\")\" -ne 0 ] ; then\n      env_file=$(mktemp)\n      echo \"$env_variables\" \u003e \"$env_file\"\n      jq --argjson i \"$i\" --slurpfile env \"$env_file\" \\\n        '.components[$i].metadata = (.components[$i].metadata // {}) * {env_variables: $env[0]}' \\\n        \"${SNAPSHOT_SPEC_FILE}\" \u003e /tmp/temp \u0026\u0026 mv /tmp/temp \"${SNAPSHOT_SPEC_FILE}\"\n    fi\n\n    # Add image annotations metadata to component\n    if [ \"$(jq 'length' \u003c\u003c\u003c \"$annotations\")\" -ne 0 ] ; then\n      annotations_file=$(mktemp)\n      # Convert annotations from {key: value} to [{name: key, value: value}]\n      jq -c 'if . then to_entries | map({name: .key, value: .value}) else [] end' \\\n       \u003c\u003c\u003c \"$annotations\" \u003e \"$annotations_file\"\n      jq --argjson i \"$i\" --slurpfile annotations \"$annotations_file\" \\\n        '.components[$i].metadata = (.components[$i].metadata // {}) * {annotations: $annotations[0]}' \\\n        \"${SNAPSHOT_SPEC_FILE}\" \u003e /tmp/temp \u0026\u0026 mv /tmp/temp \"${SNAPSHOT_SPEC_FILE}\"\n    fi\n\n    # Add image labels metadata to component\n    if [ \"$(jq 'length' \u003c\u003c\u003c \"$labels\")\" -ne 0 ] ; then\n      labels_file=$(mktemp)\n      # Convert labels from {key: value} to [{name: key, value: value}]\n      jq -c 'if . then to_entries | map({name: .key, value: .value}) else [] end' \\\n       \u003c\u003c\u003c \"$labels\" \u003e \"$labels_file\"\n      jq --argjson i \"$i\" --slurpfile labels \"$labels_file\" \\\n        '.components[$i].metadata = (.components[$i].metadata // {}) * {labels: $labels[0]}' \\\n        \"${SNAPSHOT_SPEC_FILE}\" \u003e /tmp/temp \u0026\u0026 mv /tmp/temp \"${SNAPSHOT_SPEC_FILE}\"\n    fi\n\n    # Add media type to component\n    if [ -n \"$config_media_type\" ]; then\n      jq --argjson i \"$i\" --arg media_type \"$config_media_type\" \\\n        '.components[$i].metadata = (.components[$i].metadata // {}) * {media_type: $media_type}' \\\n        \"${SNAPSHOT_SPEC_FILE}\" \u003e /tmp/temp \u0026\u0026 mv /tmp/temp \"${SNAPSHOT_SPEC_FILE}\"\n    fi\n\n    # Transform version to OCI tag format: replace + with _ (convention for OCI compliance)\n    # Set default value if empty (common for regular container images without OCI annotations)\n    oci_version=\"${oci_version_raw//+/_}\"\n    oci_version=\"${oci_version:-unknown}\"\n\n    if [ \"${build_date}\" = \"\" ] ; then\n      timestamp=\"\"\n    else\n      timestamp=\"$(date -d \"${build_date}\" \"+$passedTimestampFormat\")\"\n    fi\n\n    substitute_map=\"$(jq -n -c \\\n      --arg timestamp \"${timestamp}\" \\\n      --arg release_timestamp \"${release_timestamp}\" \\\n      --arg git_sha \"${git_sha}\" \\\n      --arg git_short_sha \"${git_sha:0:7}\" \\\n      --arg digest_sha \"${build_sha}\" \\\n      --arg oci_version \"${oci_version}\" \\\n      '$ARGS.named')\"\n\n    # Also substitute filename values in the staged section of components\n    STAGED_FILES=$(jq '.staged.files | length' \u003c\u003c\u003c \"$component\")\n    for ((j = 0; j \u003c STAGED_FILES; j++)) ; do\n        file=$(jq -c --argjson j \"$j\" '.staged.files[$j]' \u003c\u003c\u003c \"$component\")\n        filenameArrayPreSubstitution=$(jq '.filename' \u003c\u003c\u003c \"$file\" | jq -cs)\n        # {{ incrementer }} is not supported in staged.files values, so we just pass\n        # \"\" as the repo argument\n        subbedFilename=$(translate_tags \"${filenameArrayPreSubstitution}\" \\\n          \"${substitute_map}\" \"${labels}\" \"\"| jq -r '.[0]')\n        jq --argjson i \"$i\" --argjson j \"$j\" --arg filename \"$subbedFilename\" \\\n          '.components[$i].staged.files[$j].filename = $filename' \"${SNAPSHOT_SPEC_FILE}\" \u003e /tmp/temp \\\n          \u0026\u0026 mv /tmp/temp \"${SNAPSHOT_SPEC_FILE}\"\n    done\n\n    # apply defaults for contentGateway\n    componentCGWSettings=$(jq -c '.contentGateway // {}' \u003c\u003c\u003c \"$component\")\n    updatedComponentCGWSettings=$(merge-json \"$defaultCGWSettings\" \"$componentCGWSettings\")\n    componentCGWSettingsSize=$(jq '. | length' \u003c\u003c\u003c \"${updatedComponentCGWSettings}\")\n\n    if [ \"${componentCGWSettingsSize}\" -gt \"0\" ]; then\n      jq --argjson i \"$i\" --argjson componentCGWSettings \"$updatedComponentCGWSettings\" \\\n      '.components[$i].contentGateway = $componentCGWSettings' \\\n      \"${SNAPSHOT_SPEC_FILE}\" \u003e /tmp/temp \u0026\u0026 mv /tmp/temp \"${SNAPSHOT_SPEC_FILE}\"\n    fi\n\n    # *** Temporary code to maintain backwards compatibility and set .repositories[0] to .repository ***\n    if [[ $(jq 'has(\"repository\")' \u003c\u003c\u003c \"$component\") == \"true\" ]] ; then\n      repository=$(jq -r '.repository' \u003c\u003c\u003c \"$component\")\n      echo \"Processing component: $NAME\"\n      echo \"Original repository: $repository\"\n\n      imageTags=$(jq '.tags // []' \u003c\u003c\u003c \"$component\")\n      oldAllTagsPreSubstitution=$(jq -n --argjson defaults \"$defaultComponentTags\" --argjson imageTags \\\n        \"$imageTags\" '$defaults? + $imageTags? | unique')\n      oldTags=$(translate_tags \"${oldAllTagsPreSubstitution}\" \"${substitute_map}\" \"${labels}\" \"${repository}\")\n      oldTags=$(ensure_implicit_timestamp_value \"${oldTags}\" \"${timestamp}\")\n      if [ \"$(jq 'length' \u003c\u003c\u003c \"$oldTags\")\" -gt 0 ] ; then\n        jq --argjson i \"$i\" --argjson updatedTags \"$oldTags\" '.components[$i].tags = $updatedTags' \\\n          \"${SNAPSHOT_SPEC_FILE}\" \u003e /tmp/temp \u0026\u0026 mv /tmp/temp \"${SNAPSHOT_SPEC_FILE}\"\n      fi\n\n      if [[ \"$repository\" == quay.io/redhat-prod/* || \"$repository\" == quay.io/redhat-pending/* ]]; then\n          repository=$(convert_to_registry \"$repository\")\n      fi\n\n      if [[ \"$repository\" == registry.redhat.io/* || \"$repository\" == registry.stage.redhat.io/* ]]; then\n        rh_registry_repo=$repository\n        registry_access_repo=$(convert_to_registry_access \"$repository\")\n        repository=$(convert_to_quay \"$repository\")\n\n        jq --argjson i \"$i\" \\\n          --arg repository \"$repository\" \\\n          --arg rh_registry_repo \"$rh_registry_repo\" \\\n          --arg registry_access_repo \"$registry_access_repo\" \\\n          '(.components[$i].repository = $repository) |\n              .components[$i][\"rh-registry-repo\"] = $rh_registry_repo |\n              .components[$i][\"registry-access-repo\"] = $registry_access_repo' \\\n        \"${SNAPSHOT_SPEC_FILE}\" \u003e /tmp/temp \u0026\u0026 mv /tmp/temp \"${SNAPSHOT_SPEC_FILE}\"\n\n        if [[ $(jq 'has(\"repositories\")' \u003c\u003c\u003c \"$component\") == \"false\" ]] ; then\n          jq --argjson i \"$i\" --arg rh_registry_repo \"$rh_registry_repo\" \\\n            --arg registry_access_repo \"$registry_access_repo\" \\\n              '.components[$i].repositories[0][\"rh-registry-repo\"] = $rh_registry_repo |\n              .components[$i].repositories[0][\"registry-access-repo\"] = $registry_access_repo' \\\n            \"${SNAPSHOT_SPEC_FILE}\" \u003e /tmp/temp \u0026\u0026 mv /tmp/temp \"${SNAPSHOT_SPEC_FILE}\"\n        fi\n      fi\n      if [[ $(jq 'has(\"repositories\")' \u003c\u003c\u003c \"$component\") == \"false\" ]] ; then\n        jq --argjson i \"$i\" --arg url \"$repository\" \\\n          --argjson tags \"$oldTags\" \\\n          '.components[$i].repositories[0].url = $url |\n            .components[$i].repositories[0][\"tags\"] = $tags' \\\n          \"${SNAPSHOT_SPEC_FILE}\" \u003e /tmp/temp \u0026\u0026 mv /tmp/temp \"${SNAPSHOT_SPEC_FILE}\"\n      fi\n    fi\n    # *** End of temporary code ***\n\n    NUM_REPOSITORIES=$(jq '.repositories | length' \u003c\u003c\u003c \"$component\")\n    for ((j = 0; j \u003c NUM_REPOSITORIES; j++)) ; do\n        repository=$(jq -c --argjson j \"$j\" '.repositories[$j]' \u003c\u003c\u003c \"$component\")\n        repoTags=$(jq '.tags // []' \u003c\u003c\u003c \"$repository\")\n        url=$(jq -r '.url' \u003c\u003c\u003c \"$repository\")\n        echo \"Processing component: $NAME, repository: $url\"\n\n        allTagsPreSubstitution=$(jq -n --argjson defaults \"$defaultComponentTags\" --argjson repoTags \\\n          \"$repoTags\" '$defaults? + $repoTags? | unique')\n        tags=$(translate_tags \"${allTagsPreSubstitution}\" \"${substitute_map}\" \"${labels}\" \"${url}\")\n        tags=$(ensure_implicit_timestamp_value \"${tags}\" \"${timestamp}\")\n        if [ \"$(jq 'length' \u003c\u003c\u003c \"$tags\")\" -gt 0 ] ; then\n          jq --argjson i \"$i\" --argjson j \"$j\" --argjson updatedTags \"$tags\" \\\n            '.components[$i].repositories[$j].tags = $updatedTags' \"${SNAPSHOT_SPEC_FILE}\" \u003e /tmp/temp \\\n            \u0026\u0026 mv /tmp/temp \"${SNAPSHOT_SPEC_FILE}\"\n        fi\n\n        # This block is temporary to support both quay.io and registry.redhat.io\n        # It should be removed once all repositories are migrated to registry.redhat.io\n        if [[ \"$url\" == quay.io/redhat-prod/* ||\n          \"$url\" == quay.io/redhat-pending/* ||\n          \"$url\" == quay.io/rh-flatpaks-prod/* ||\n          \"$url\" == quay.io/rh-flatpaks-stage/* ]]; then\n            url=$(convert_to_registry \"$url\")\n        fi\n\n        # Convert to registry and quay format\n        if [[ \"$url\" == registry.redhat.io/* ||\n          \"$url\" == registry.stage.redhat.io/* ||\n          \"$url\" == flatpaks.registry.redhat.io/* ||\n          \"$url\" == flatpaks.registry.stage.redhat.io/* ]]; then\n          rh_registry_repo=$url\n          registry_access_repo=$(convert_to_registry_access \"$url\")\n          url=$(convert_to_quay \"$url\")\n\n          jq --argjson i \"$i\" \\\n            --argjson j \"$j\" \\\n            --arg url \"$url\" \\\n            --arg rh_registry_repo \"$rh_registry_repo\" \\\n            --arg registry_access_repo \"$registry_access_repo\" \\\n            '.components[$i].repositories[$j].url = $url |\n                .components[$i].repositories[$j][\"rh-registry-repo\"] = $rh_registry_repo |\n                .components[$i].repositories[$j][\"registry-access-repo\"] = $registry_access_repo' \\\n          \"${SNAPSHOT_SPEC_FILE}\" \u003e /tmp/temp \u0026\u0026 mv /tmp/temp \"${SNAPSHOT_SPEC_FILE}\"\n        fi\n    done\ndone\n"
                        },
                        {
                            "args": [
                                "create",
                                "--store",
                                "quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts",
                                "/tekton/results/sourceDataArtifact=/var/workdir/release"
                            ],
                            "computeResources": {
                                "limits": {
                                    "memory": "128Mi"
                                },
                                "requests": {
                                    "cpu": "250m",
                                    "memory": "128Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "HOME",
                                    "value": "/tekton/home"
                                },
                                {
                                    "name": "ORAS_OPTIONS"
                                },
                                {
                                    "name": "CA_FILE",
                                    "value": "/etc/pki/tls/certs/ca-bundle.crt"
                                }
                            ],
                            "image": "quay.io/konflux-ci/build-trusted-artifacts:653578444c73afc32b3a865fee9869a09f96c1a2",
                            "name": "create-trusted-artifact"
                        }
                    ],
                    "volumes": [
                        {
                            "emptyDir": {},
                            "name": "workdir"
                        },
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=50",
                    "operator-sdk/primary-resource": "default-tenant/tsf-demo-app-20260415-231650-000-8a419f9-vm66n",
                    "operator-sdk/primary-resource-type": "Release.appstudio.redhat.com",
                    "pac.test.appstudio.openshift.io/branch": "base-miwkfv",
                    "pac.test.appstudio.openshift.io/cancel-in-progress": "false",
                    "pac.test.appstudio.openshift.io/check-run-id": "71552493202",
                    "pac.test.appstudio.openshift.io/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pac.test.appstudio.openshift.io/event-type": "push",
                    "pac.test.appstudio.openshift.io/git-auth-secret": "pac-gitauth-ojyaao",
                    "pac.test.appstudio.openshift.io/git-provider": "github",
                    "pac.test.appstudio.openshift.io/installation-id": "112348674",
                    "pac.test.appstudio.openshift.io/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-push-cttl8",
                    "pac.test.appstudio.openshift.io/max-keep-runs": "3",
                    "pac.test.appstudio.openshift.io/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-miwkfv\"",
                    "pac.test.appstudio.openshift.io/original-prname": "tsf-demo-comp-on-push",
                    "pac.test.appstudio.openshift.io/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pac.test.appstudio.openshift.io/repository": "tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/scm-reporting-plr-started": "true",
                    "pac.test.appstudio.openshift.io/sender": "rhtap-ci-tests-bot",
                    "pac.test.appstudio.openshift.io/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pac.test.appstudio.openshift.io/sha-title": "Merge pull request #181 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pac.test.appstudio.openshift.io/source-branch": "refs/heads/base-miwkfv",
                    "pac.test.appstudio.openshift.io/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pac.test.appstudio.openshift.io/state": "completed",
                    "pac.test.appstudio.openshift.io/url-org": "rhads-tsf-qe",
                    "pac.test.appstudio.openshift.io/url-repository": "testrepo",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-managed-tenant-syc5c/results/73a7398d-e21e-4159-adb1-64e80c630018/records/0ff88b20-8512-4fe5-944f-165a656fc987",
                    "results.tekton.dev/result": "default-managed-tenant-syc5c/results/73a7398d-e21e-4159-adb1-64e80c630018",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "release"
                },
                "creationTimestamp": "2026-04-15T23:26:56Z",
                "finalizers": [
                    "chains.tekton.dev",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "tekton-pipelines",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/service": "release",
                    "appstudio.openshift.io/snapshot": "tsf-demo-app-20260415-231650-000",
                    "pipelines.appstudio.openshift.io/type": "managed",
                    "release.appstudio.openshift.io/name": "tsf-demo-app-20260415-231650-000-8a419f9-vm66n",
                    "release.appstudio.openshift.io/namespace": "default-tenant",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "push-to-external-registry",
                    "tekton.dev/pipelineRun": "managed-25x6p",
                    "tekton.dev/pipelineRunUID": "73a7398d-e21e-4159-adb1-64e80c630018",
                    "tekton.dev/pipelineTask": "check-data-keys",
                    "tekton.dev/task": "check-data-keys"
                },
                "name": "managed-25x6p-check-data-keys",
                "namespace": "default-managed-tenant-syc5c",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "managed-25x6p",
                        "uid": "73a7398d-e21e-4159-adb1-64e80c630018"
                    }
                ],
                "resourceVersion": "42696",
                "uid": "0ff88b20-8512-4fe5-944f-165a656fc987"
            },
            "spec": {
                "params": [
                    {
                        "name": "dataPath",
                        "value": "73a7398d-e21e-4159-adb1-64e80c630018/data.json"
                    },
                    {
                        "name": "schema",
                        "value": "https://github.com/konflux-ci/release-service-catalog.git/raw/development/schema/dataKeys.json"
                    },
                    {
                        "name": "systems",
                        "value": "[\n  {\"systemName\": \"mapping\", \"dynamic\": false}\n]\n"
                    },
                    {
                        "name": "ociStorage",
                        "value": "quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts"
                    },
                    {
                        "name": "sourceDataArtifact",
                        "value": "oci:quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts@sha256:2b2a184ca76db29ad1e0173934515414433ee35e7ce2e30c83fa080d97f997a4"
                    },
                    {
                        "name": "dataDir",
                        "value": "/var/workdir/release"
                    },
                    {
                        "name": "trustedArtifactsDebug",
                        "value": ""
                    },
                    {
                        "name": "taskGitUrl",
                        "value": "https://github.com/konflux-ci/release-service-catalog.git"
                    },
                    {
                        "name": "taskGitRevision",
                        "value": "development"
                    }
                ],
                "serviceAccountName": "release-pipeline",
                "taskRef": {
                    "params": [
                        {
                            "name": "url",
                            "value": "https://github.com/konflux-ci/release-service-catalog.git"
                        },
                        {
                            "name": "revision",
                            "value": "development"
                        },
                        {
                            "name": "pathInRepo",
                            "value": "tasks/managed/check-data-keys/check-data-keys.yaml"
                        }
                    ],
                    "resolver": "git"
                },
                "timeout": "1h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:27:10Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:27:10Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "managed-25x6p-check-data-keys-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha1": "4f00b1a3062b53809bf42ca120e84d73cc199954"
                        },
                        "entryPoint": "tasks/managed/check-data-keys/check-data-keys.yaml",
                        "uri": "git+https://github.com/konflux-ci/release-service-catalog.git"
                    }
                },
                "results": [
                    {
                        "name": "sourceDataArtifact",
                        "type": "string",
                        "value": "oci:quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts@sha256:f225e04bf3853cb8d1799987bb5a9a2a3d41bf6e80bd6f990480a83cb93f6b22"
                    }
                ],
                "startTime": "2026-04-15T23:26:56Z",
                "steps": [
                    {
                        "container": "step-use-trusted-artifact",
                        "imageID": "quay.io/konflux-ci/build-trusted-artifacts@sha256:27ddb820f0d30609dcb8de88219309edbced429896324e474f494470c2f003fb",
                        "name": "use-trusted-artifact",
                        "provenance": {
                            "refSource": {
                                "digest": {
                                    "sha1": "4f00b1a3062b53809bf42ca120e84d73cc199954"
                                },
                                "entryPoint": "stepactions/use-trusted-artifact/use-trusted-artifact.yaml",
                                "uri": "git+https://github.com/konflux-ci/release-service-catalog.git"
                            }
                        },
                        "terminated": {
                            "containerID": "cri-o://68d69abfd5334ab922c3c5f2534e9defe79853f7866026b33fa0684e5c9c9650",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:27:04Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:27:04Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-create-trusted-artifact",
                        "imageID": "quay.io/konflux-ci/build-trusted-artifacts@sha256:27ddb820f0d30609dcb8de88219309edbced429896324e474f494470c2f003fb",
                        "name": "create-trusted-artifact",
                        "provenance": {
                            "refSource": {
                                "digest": {
                                    "sha1": "4f00b1a3062b53809bf42ca120e84d73cc199954"
                                },
                                "entryPoint": "stepactions/create-trusted-artifact/create-trusted-artifact.yaml",
                                "uri": "git+https://github.com/konflux-ci/release-service-catalog.git"
                            }
                        },
                        "terminated": {
                            "containerID": "cri-o://057de494c36653038ea3b110faea42a440667611719ef3b61050ed94ac7a5d7b",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:27:08Z",
                            "message": "[{\"key\":\"sourceDataArtifact\",\"value\":\"oci:quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts@sha256:f225e04bf3853cb8d1799987bb5a9a2a3d41bf6e80bd6f990480a83cb93f6b22\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:27:06Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-check-data-keys",
                        "imageID": "quay.io/konflux-ci/release-service-utils@sha256:5546fa78d3c88d7b6a2e8cff8902f7757f00541d0bbaf113b9f293133894afa3",
                        "name": "check-data-keys",
                        "terminated": {
                            "containerID": "cri-o://a7b917f58698fe933cd5a5277c4f35a4ce666c1dcf015b604270449fea33cbc7",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:27:06Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:27:05Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Tekton task that validates data keys against a schema to ensure that all required keys for a system(s) are present\nand correctly formatted. The system(s) passed into the `systems` parameter become required.\nThe schema validation also applies to all data passed into the `dataPath` parameter,\nmeaning all the data keys must be allowed and formatted correctly.\n\nFor example, if `releaseNotes` is passed as a system and the data file does not have all the required\nreleaseNotes keys, the schema will give validation errors, and the task will fail.\n\nThe validation schema is defined in `schema/dataKeys.json` in this repository.",
                    "params": [
                        {
                            "description": "Path to the JSON string of the merged data to use",
                            "name": "dataPath",
                            "type": "string"
                        },
                        {
                            "default": "https://raw.githubusercontent.com/konflux-ci/release-service-catalog/refs/heads/development/schema/dataKeys.json",
                            "description": "URL to the JSON schema file to validate the data against",
                            "name": "schema",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "The systems to check that all data keys are present for",
                            "name": "systems",
                            "type": "string"
                        },
                        {
                            "default": "empty",
                            "description": "The OCI repository where the Trusted Artifacts are stored",
                            "name": "ociStorage",
                            "type": "string"
                        },
                        {
                            "default": "1d",
                            "description": "Expiration date for the trusted artifacts created in the OCI repository. An empty string means the artifacts do not expire",
                            "name": "ociArtifactExpiresAfter",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Flag to enable debug logging in trusted artifacts. Set to a non-empty string to enable",
                            "name": "trustedArtifactsDebug",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "oras options to pass to Trusted Artifacts calls",
                            "name": "orasOptions",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Location of trusted artifacts to be used to populate data directory",
                            "name": "sourceDataArtifact",
                            "type": "string"
                        },
                        {
                            "default": "/var/workdir/release",
                            "description": "The location where data will be stored",
                            "name": "dataDir",
                            "type": "string"
                        },
                        {
                            "description": "The url to the git repo where the release-service-catalog tasks and stepactions to be used are stored",
                            "name": "taskGitUrl",
                            "type": "string"
                        },
                        {
                            "description": "The revision in the taskGitUrl repo to be used",
                            "name": "taskGitRevision",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from",
                            "name": "caTrustConfigMapName",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data",
                            "name": "caTrustConfigMapKey",
                            "type": "string"
                        },
                        {
                            "default": "/etc/pki/tls/certs/ca-bundle.crt",
                            "description": "Path to CA certificate bundle for TLS verification with self-signed certificates",
                            "name": "caCertPath",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Produced trusted data artifact",
                            "name": "sourceDataArtifact",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "IMAGE_EXPIRES_AFTER",
                                "value": "1d"
                            },
                            {
                                "name": "ORAS_OPTIONS"
                            },
                            {
                                "name": "DEBUG"
                            }
                        ],
                        "securityContext": {
                            "runAsUser": 1001
                        },
                        "volumeMounts": [
                            {
                                "mountPath": "/var/workdir",
                                "name": "workdir"
                            },
                            {
                                "mountPath": "/etc/pki/tls/certs/ca-bundle.crt",
                                "name": "trusted-ca",
                                "readOnly": true,
                                "subPath": "ca-bundle.crt"
                            },
                            {
                                "mountPath": "/etc/ssl/certs/ca-custom-bundle.crt",
                                "name": "trusted-ca",
                                "readOnly": true,
                                "subPath": "ca-bundle.crt"
                            }
                        ]
                    },
                    "steps": [
                        {
                            "args": [
                                "use",
                                "oci:quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts@sha256:2b2a184ca76db29ad1e0173934515414433ee35e7ce2e30c83fa080d97f997a4=/var/workdir/release"
                            ],
                            "computeResources": {
                                "limits": {
                                    "memory": "64Mi"
                                },
                                "requests": {
                                    "cpu": "30m",
                                    "memory": "64Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "HOME",
                                    "value": "/tekton/home"
                                },
                                {
                                    "name": "ORAS_OPTIONS"
                                },
                                {
                                    "name": "CA_FILE",
                                    "value": "/etc/pki/tls/certs/ca-bundle.crt"
                                }
                            ],
                            "image": "quay.io/konflux-ci/build-trusted-artifacts:653578444c73afc32b3a865fee9869a09f96c1a2",
                            "name": "use-trusted-artifact"
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "memory": "64Mi"
                                },
                                "requests": {
                                    "cpu": "10m",
                                    "memory": "64Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "SCHEMA_FILE",
                                    "value": "https://github.com/konflux-ci/release-service-catalog.git/raw/development/schema/dataKeys.json"
                                }
                            ],
                            "image": "quay.io/konflux-ci/release-service-utils@sha256:5546fa78d3c88d7b6a2e8cff8902f7757f00541d0bbaf113b9f293133894afa3",
                            "name": "check-data-keys",
                            "script": "#!/usr/bin/env bash\nset -ex\n\nif [ ! -f \"/var/workdir/release/73a7398d-e21e-4159-adb1-64e80c630018/data.json\" ] ; then\n    echo \"No data JSON was provided.\"\n    exit 1\nfi\n\nschema=\"${SCHEMA_FILE/\\.git\\///}\"\nif ! curl -sL --fail-with-body \"$schema\" -o /tmp/schema ; then\n    echo \"Failed to download schema file: $schema\"\n    exit 1\nfi\n\n# We want this to output the json without expansion\n# shellcheck disable=SC2016\njq --argjson systems '[\n  {\"systemName\": \"mapping\", \"dynamic\": false}\n]\n' '.systems += $systems' \\\n    \"/var/workdir/release/73a7398d-e21e-4159-adb1-64e80c630018/data.json\" \u003e \"/tmp/systems\"\nmv \"/tmp/systems\" \"/var/workdir/release/73a7398d-e21e-4159-adb1-64e80c630018/data.json\"\n\ncheck-jsonschema --output-format=text --schemafile \"/tmp/schema\"  \"/var/workdir/release/73a7398d-e21e-4159-adb1-64e80c630018/data.json\"\n"
                        },
                        {
                            "args": [
                                "create",
                                "--store",
                                "quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts",
                                "/tekton/results/sourceDataArtifact=/var/workdir/release"
                            ],
                            "computeResources": {
                                "limits": {
                                    "memory": "128Mi"
                                },
                                "requests": {
                                    "cpu": "250m",
                                    "memory": "128Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "HOME",
                                    "value": "/tekton/home"
                                },
                                {
                                    "name": "ORAS_OPTIONS"
                                },
                                {
                                    "name": "CA_FILE",
                                    "value": "/etc/pki/tls/certs/ca-bundle.crt"
                                }
                            ],
                            "image": "quay.io/konflux-ci/build-trusted-artifacts:653578444c73afc32b3a865fee9869a09f96c1a2",
                            "name": "create-trusted-artifact"
                        }
                    ],
                    "volumes": [
                        {
                            "emptyDir": {},
                            "name": "workdir"
                        },
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=46",
                    "operator-sdk/primary-resource": "default-tenant/tsf-demo-app-20260415-231650-000-8a419f9-vm66n",
                    "operator-sdk/primary-resource-type": "Release.appstudio.redhat.com",
                    "pac.test.appstudio.openshift.io/branch": "base-miwkfv",
                    "pac.test.appstudio.openshift.io/cancel-in-progress": "false",
                    "pac.test.appstudio.openshift.io/check-run-id": "71552493202",
                    "pac.test.appstudio.openshift.io/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pac.test.appstudio.openshift.io/event-type": "push",
                    "pac.test.appstudio.openshift.io/git-auth-secret": "pac-gitauth-ojyaao",
                    "pac.test.appstudio.openshift.io/git-provider": "github",
                    "pac.test.appstudio.openshift.io/installation-id": "112348674",
                    "pac.test.appstudio.openshift.io/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-push-cttl8",
                    "pac.test.appstudio.openshift.io/max-keep-runs": "3",
                    "pac.test.appstudio.openshift.io/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-miwkfv\"",
                    "pac.test.appstudio.openshift.io/original-prname": "tsf-demo-comp-on-push",
                    "pac.test.appstudio.openshift.io/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pac.test.appstudio.openshift.io/repository": "tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/scm-reporting-plr-started": "true",
                    "pac.test.appstudio.openshift.io/sender": "rhtap-ci-tests-bot",
                    "pac.test.appstudio.openshift.io/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pac.test.appstudio.openshift.io/sha-title": "Merge pull request #181 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pac.test.appstudio.openshift.io/source-branch": "refs/heads/base-miwkfv",
                    "pac.test.appstudio.openshift.io/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pac.test.appstudio.openshift.io/state": "completed",
                    "pac.test.appstudio.openshift.io/url-org": "rhads-tsf-qe",
                    "pac.test.appstudio.openshift.io/url-repository": "testrepo",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-managed-tenant-syc5c/results/73a7398d-e21e-4159-adb1-64e80c630018/records/2e969491-4ff7-476c-a8a7-e84dd4a662ee",
                    "results.tekton.dev/result": "default-managed-tenant-syc5c/results/73a7398d-e21e-4159-adb1-64e80c630018",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "release"
                },
                "creationTimestamp": "2026-04-15T23:26:29Z",
                "finalizers": [
                    "results.tekton.dev/taskrun",
                    "chains.tekton.dev"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "tekton-pipelines",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/service": "release",
                    "appstudio.openshift.io/snapshot": "tsf-demo-app-20260415-231650-000",
                    "pipelines.appstudio.openshift.io/type": "managed",
                    "release.appstudio.openshift.io/name": "tsf-demo-app-20260415-231650-000-8a419f9-vm66n",
                    "release.appstudio.openshift.io/namespace": "default-tenant",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "push-to-external-registry",
                    "tekton.dev/pipelineRun": "managed-25x6p",
                    "tekton.dev/pipelineRunUID": "73a7398d-e21e-4159-adb1-64e80c630018",
                    "tekton.dev/pipelineTask": "collect-data",
                    "tekton.dev/task": "collect-data"
                },
                "name": "managed-25x6p-collect-data",
                "namespace": "default-managed-tenant-syc5c",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "managed-25x6p",
                        "uid": "73a7398d-e21e-4159-adb1-64e80c630018"
                    }
                ],
                "resourceVersion": "42098",
                "uid": "2e969491-4ff7-476c-a8a7-e84dd4a662ee"
            },
            "spec": {
                "params": [
                    {
                        "name": "release",
                        "value": "default-tenant/tsf-demo-app-20260415-231650-000-8a419f9-vm66n"
                    },
                    {
                        "name": "releasePlan",
                        "value": "default-tenant/tsf-release"
                    },
                    {
                        "name": "releasePlanAdmission",
                        "value": "default-managed-tenant-syc5c/tsf-release"
                    },
                    {
                        "name": "releaseServiceConfig",
                        "value": "release-service/release-service-config"
                    },
                    {
                        "name": "snapshot",
                        "value": "default-tenant/tsf-demo-app-20260415-231650-000"
                    },
                    {
                        "name": "subdirectory",
                        "value": "73a7398d-e21e-4159-adb1-64e80c630018"
                    },
                    {
                        "name": "ociStorage",
                        "value": "quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts"
                    },
                    {
                        "name": "dataDir",
                        "value": "/var/workdir/release"
                    },
                    {
                        "name": "trustedArtifactsDebug",
                        "value": ""
                    },
                    {
                        "name": "taskGitUrl",
                        "value": "https://github.com/konflux-ci/release-service-catalog.git"
                    },
                    {
                        "name": "taskGitRevision",
                        "value": "development"
                    }
                ],
                "serviceAccountName": "release-pipeline",
                "taskRef": {
                    "params": [
                        {
                            "name": "url",
                            "value": "https://github.com/konflux-ci/release-service-catalog.git"
                        },
                        {
                            "name": "revision",
                            "value": "development"
                        },
                        {
                            "name": "pathInRepo",
                            "value": "tasks/managed/collect-data/collect-data.yaml"
                        }
                    ],
                    "resolver": "git"
                },
                "timeout": "1h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:26:55Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:26:55Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "managed-25x6p-collect-data-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha1": "4f00b1a3062b53809bf42ca120e84d73cc199954"
                        },
                        "entryPoint": "tasks/managed/collect-data/collect-data.yaml",
                        "uri": "git+https://github.com/konflux-ci/release-service-catalog.git"
                    }
                },
                "results": [
                    {
                        "name": "data",
                        "type": "string",
                        "value": "73a7398d-e21e-4159-adb1-64e80c630018/data.json"
                    },
                    {
                        "name": "release",
                        "type": "string",
                        "value": "73a7398d-e21e-4159-adb1-64e80c630018/release.json"
                    },
                    {
                        "name": "releasePipelineMetadata",
                        "type": "string",
                        "value": "{\"org\":\"konflux-ci\",\"repo\":\"release-service-catalog\",\"revision\":\"development\",\"pathinrepo\":\"pipelines/managed/push-to-external-registry/push-to-external-registry.yaml\",\"sha\":\"4f00b1a3062b53809bf42ca120e84d73cc199954\"}\n"
                    },
                    {
                        "name": "releasePlan",
                        "type": "string",
                        "value": "73a7398d-e21e-4159-adb1-64e80c630018/release_plan.json"
                    },
                    {
                        "name": "releasePlanAdmission",
                        "type": "string",
                        "value": "73a7398d-e21e-4159-adb1-64e80c630018/release_plan_admission.json"
                    },
                    {
                        "name": "releaseServiceConfig",
                        "type": "string",
                        "value": "73a7398d-e21e-4159-adb1-64e80c630018/release_service_config.json"
                    },
                    {
                        "name": "resultsDir",
                        "type": "string",
                        "value": "73a7398d-e21e-4159-adb1-64e80c630018/results"
                    },
                    {
                        "name": "singleComponentMode",
                        "type": "string",
                        "value": "false"
                    },
                    {
                        "name": "snapshotBuildId",
                        "type": "string",
                        "value": "tsf-demo-comp-on-push-cttl8"
                    },
                    {
                        "name": "snapshotName",
                        "type": "string",
                        "value": "tsf-demo-app-20260415-231650-000"
                    },
                    {
                        "name": "snapshotNamespace",
                        "type": "string",
                        "value": "default-tenant"
                    },
                    {
                        "name": "snapshotSpec",
                        "type": "string",
                        "value": "73a7398d-e21e-4159-adb1-64e80c630018/snapshot_spec.json"
                    },
                    {
                        "name": "subdirectory",
                        "type": "string",
                        "value": "73a7398d-e21e-4159-adb1-64e80c630018"
                    },
                    {
                        "name": "sourceDataArtifact",
                        "type": "string",
                        "value": "oci:quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts@sha256:2b2a184ca76db29ad1e0173934515414433ee35e7ce2e30c83fa080d97f997a4"
                    }
                ],
                "startTime": "2026-04-15T23:26:29Z",
                "steps": [
                    {
                        "container": "step-create-trusted-artifact",
                        "imageID": "quay.io/konflux-ci/build-trusted-artifacts@sha256:27ddb820f0d30609dcb8de88219309edbced429896324e474f494470c2f003fb",
                        "name": "create-trusted-artifact",
                        "provenance": {
                            "refSource": {
                                "digest": {
                                    "sha1": "4f00b1a3062b53809bf42ca120e84d73cc199954"
                                },
                                "entryPoint": "stepactions/create-trusted-artifact/create-trusted-artifact.yaml",
                                "uri": "git+https://github.com/konflux-ci/release-service-catalog.git"
                            }
                        },
                        "terminated": {
                            "containerID": "cri-o://d94e1722bea18a7bceb0bff244ba66bc1112ffd7d197881c2ca238faf7182658",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:26:54Z",
                            "message": "[{\"key\":\"data\",\"value\":\"73a7398d-e21e-4159-adb1-64e80c630018/data.json\",\"type\":1},{\"key\":\"release\",\"value\":\"73a7398d-e21e-4159-adb1-64e80c630018/release.json\",\"type\":1},{\"key\":\"releasePipelineMetadata\",\"value\":\"{\\\"org\\\":\\\"konflux-ci\\\",\\\"repo\\\":\\\"release-service-catalog\\\",\\\"revision\\\":\\\"development\\\",\\\"pathinrepo\\\":\\\"pipelines/managed/push-to-external-registry/push-to-external-registry.yaml\\\",\\\"sha\\\":\\\"4f00b1a3062b53809bf42ca120e84d73cc199954\\\"}\\n\",\"type\":1},{\"key\":\"releasePlan\",\"value\":\"73a7398d-e21e-4159-adb1-64e80c630018/release_plan.json\",\"type\":1},{\"key\":\"releasePlanAdmission\",\"value\":\"73a7398d-e21e-4159-adb1-64e80c630018/release_plan_admission.json\",\"type\":1},{\"key\":\"releaseServiceConfig\",\"value\":\"73a7398d-e21e-4159-adb1-64e80c630018/release_service_config.json\",\"type\":1},{\"key\":\"resultsDir\",\"value\":\"73a7398d-e21e-4159-adb1-64e80c630018/results\",\"type\":1},{\"key\":\"singleComponentMode\",\"value\":\"false\",\"type\":1},{\"key\":\"snapshotBuildId\",\"value\":\"tsf-demo-comp-on-push-cttl8\",\"type\":1},{\"key\":\"snapshotName\",\"value\":\"tsf-demo-app-20260415-231650-000\",\"type\":1},{\"key\":\"snapshotNamespace\",\"value\":\"default-tenant\",\"type\":1},{\"key\":\"snapshotSpec\",\"value\":\"73a7398d-e21e-4159-adb1-64e80c630018/snapshot_spec.json\",\"type\":1},{\"key\":\"sourceDataArtifact\",\"value\":\"oci:quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts@sha256:2b2a184ca76db29ad1e0173934515414433ee35e7ce2e30c83fa080d97f997a4\",\"type\":1},{\"key\":\"subdirectory\",\"value\":\"73a7398d-e21e-4159-adb1-64e80c630018\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:26:52Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-collect-data",
                        "imageID": "quay.io/konflux-ci/release-service-utils@sha256:5546fa78d3c88d7b6a2e8cff8902f7757f00541d0bbaf113b9f293133894afa3",
                        "name": "collect-data",
                        "terminated": {
                            "containerID": "cri-o://20090e8f0c73cd842ce3c87cf985ad78646d82defdaa642112584fc2df9217e2",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:26:51Z",
                            "message": "[{\"key\":\"data\",\"value\":\"73a7398d-e21e-4159-adb1-64e80c630018/data.json\",\"type\":1},{\"key\":\"release\",\"value\":\"73a7398d-e21e-4159-adb1-64e80c630018/release.json\",\"type\":1},{\"key\":\"releasePipelineMetadata\",\"value\":\"{\\\"org\\\":\\\"konflux-ci\\\",\\\"repo\\\":\\\"release-service-catalog\\\",\\\"revision\\\":\\\"development\\\",\\\"pathinrepo\\\":\\\"pipelines/managed/push-to-external-registry/push-to-external-registry.yaml\\\",\\\"sha\\\":\\\"4f00b1a3062b53809bf42ca120e84d73cc199954\\\"}\\n\",\"type\":1},{\"key\":\"releasePlan\",\"value\":\"73a7398d-e21e-4159-adb1-64e80c630018/release_plan.json\",\"type\":1},{\"key\":\"releasePlanAdmission\",\"value\":\"73a7398d-e21e-4159-adb1-64e80c630018/release_plan_admission.json\",\"type\":1},{\"key\":\"releaseServiceConfig\",\"value\":\"73a7398d-e21e-4159-adb1-64e80c630018/release_service_config.json\",\"type\":1},{\"key\":\"resultsDir\",\"value\":\"73a7398d-e21e-4159-adb1-64e80c630018/results\",\"type\":1},{\"key\":\"singleComponentMode\",\"value\":\"false\",\"type\":1},{\"key\":\"snapshotBuildId\",\"value\":\"tsf-demo-comp-on-push-cttl8\",\"type\":1},{\"key\":\"snapshotName\",\"value\":\"tsf-demo-app-20260415-231650-000\",\"type\":1},{\"key\":\"snapshotNamespace\",\"value\":\"default-tenant\",\"type\":1},{\"key\":\"snapshotSpec\",\"value\":\"73a7398d-e21e-4159-adb1-64e80c630018/snapshot_spec.json\",\"type\":1},{\"key\":\"subdirectory\",\"value\":\"73a7398d-e21e-4159-adb1-64e80c630018\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:26:50Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-check-data-key-sources",
                        "imageID": "quay.io/konflux-ci/release-service-utils@sha256:5546fa78d3c88d7b6a2e8cff8902f7757f00541d0bbaf113b9f293133894afa3",
                        "name": "check-data-key-sources",
                        "terminated": {
                            "containerID": "cri-o://531ccfddef8f30663cab640478f00b92daee23ae27679b338044cebdaf3ae48c",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:26:51Z",
                            "message": "[{\"key\":\"data\",\"value\":\"73a7398d-e21e-4159-adb1-64e80c630018/data.json\",\"type\":1},{\"key\":\"release\",\"value\":\"73a7398d-e21e-4159-adb1-64e80c630018/release.json\",\"type\":1},{\"key\":\"releasePipelineMetadata\",\"value\":\"{\\\"org\\\":\\\"konflux-ci\\\",\\\"repo\\\":\\\"release-service-catalog\\\",\\\"revision\\\":\\\"development\\\",\\\"pathinrepo\\\":\\\"pipelines/managed/push-to-external-registry/push-to-external-registry.yaml\\\",\\\"sha\\\":\\\"4f00b1a3062b53809bf42ca120e84d73cc199954\\\"}\\n\",\"type\":1},{\"key\":\"releasePlan\",\"value\":\"73a7398d-e21e-4159-adb1-64e80c630018/release_plan.json\",\"type\":1},{\"key\":\"releasePlanAdmission\",\"value\":\"73a7398d-e21e-4159-adb1-64e80c630018/release_plan_admission.json\",\"type\":1},{\"key\":\"releaseServiceConfig\",\"value\":\"73a7398d-e21e-4159-adb1-64e80c630018/release_service_config.json\",\"type\":1},{\"key\":\"resultsDir\",\"value\":\"73a7398d-e21e-4159-adb1-64e80c630018/results\",\"type\":1},{\"key\":\"singleComponentMode\",\"value\":\"false\",\"type\":1},{\"key\":\"snapshotBuildId\",\"value\":\"tsf-demo-comp-on-push-cttl8\",\"type\":1},{\"key\":\"snapshotName\",\"value\":\"tsf-demo-app-20260415-231650-000\",\"type\":1},{\"key\":\"snapshotNamespace\",\"value\":\"default-tenant\",\"type\":1},{\"key\":\"snapshotSpec\",\"value\":\"73a7398d-e21e-4159-adb1-64e80c630018/snapshot_spec.json\",\"type\":1},{\"key\":\"subdirectory\",\"value\":\"73a7398d-e21e-4159-adb1-64e80c630018\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:26:51Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Tekton task to collect the information added to the data field of the release resources.\n\nThe purpose of this task is to collect all the data and supply it to the other task in the pipeline by creating\na json file called `data.json` in the workspace.\n\nThis task also stores the passed resources as json files in a workspace.\n\nThe parameters to this task are lowercase instead of camelCase because they are passed from the operator, and the\noperator passes them as lowercase.\n\nA task result is returned for each resource with the relative path to the stored JSON for it in the workspace.\n\nFinally, the task checks that the keys from the correct resource (a key that should come from the\nReleasePlanAdmission should not be present in the Release data section).",
                    "params": [
                        {
                            "description": "The namespaced name of the Release",
                            "name": "release",
                            "type": "string"
                        },
                        {
                            "description": "The namespaced name of the ReleasePlan",
                            "name": "releasePlan",
                            "type": "string"
                        },
                        {
                            "description": "The namespaced name of the ReleasePlanAdmission",
                            "name": "releasePlanAdmission",
                            "type": "string"
                        },
                        {
                            "description": "The namespaced name of the ReleaseServiceConfig",
                            "name": "releaseServiceConfig",
                            "type": "string"
                        },
                        {
                            "description": "The namespaced name of the Snapshot",
                            "name": "snapshot",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Subdirectory inside the workspace to be used",
                            "name": "subdirectory",
                            "type": "string"
                        },
                        {
                            "default": "empty",
                            "description": "The OCI repository where the Trusted Artifacts are stored",
                            "name": "ociStorage",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "oras options to pass to Trusted Artifacts calls",
                            "name": "orasOptions",
                            "type": "string"
                        },
                        {
                            "default": "1d",
                            "description": "Expiration date for the trusted artifacts created in the OCI repository. An empty string means the artifacts do not expire",
                            "name": "ociArtifactExpiresAfter",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Flag to enable debug logging in trusted artifacts. Set to a non-empty string to enable",
                            "name": "trustedArtifactsDebug",
                            "type": "string"
                        },
                        {
                            "default": "/var/workdir/release",
                            "description": "The location where data will be stored",
                            "name": "dataDir",
                            "type": "string"
                        },
                        {
                            "description": "The url to the git repo where the release-service-catalog tasks and stepactions to be used are stored",
                            "name": "taskGitUrl",
                            "type": "string"
                        },
                        {
                            "description": "The revision in the taskGitUrl repo to be used",
                            "name": "taskGitRevision",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from",
                            "name": "caTrustConfigMapName",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data",
                            "name": "caTrustConfigMapKey",
                            "type": "string"
                        },
                        {
                            "default": "/etc/pki/tls/certs/ca-bundle.crt",
                            "description": "Path to CA certificate bundle for TLS verification with self-signed certificates",
                            "name": "caCertPath",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "The relative path in the workspace to the stored release json",
                            "name": "release",
                            "type": "string"
                        },
                        {
                            "description": "The relative path in the workspace to the stored releasePlan json",
                            "name": "releasePlan",
                            "type": "string"
                        },
                        {
                            "description": "The relative path in the workspace to the stored releasePlanAdmission json",
                            "name": "releasePlanAdmission",
                            "type": "string"
                        },
                        {
                            "description": "The relative path in the workspace to the stored releaseServiceConfig json",
                            "name": "releaseServiceConfig",
                            "type": "string"
                        },
                        {
                            "description": "The relative path in the workspace to the stored snapshotSpec json",
                            "name": "snapshotSpec",
                            "type": "string"
                        },
                        {
                            "description": "The relative path in the workspace to the stored data json",
                            "name": "data",
                            "type": "string"
                        },
                        {
                            "description": "The relative path in the workspace to the results directory",
                            "name": "resultsDir",
                            "type": "string"
                        },
                        {
                            "description": "single component mode",
                            "name": "singleComponentMode",
                            "type": "string"
                        },
                        {
                            "description": "name of Snapshot resource",
                            "name": "snapshotName",
                            "type": "string"
                        },
                        {
                            "description": "namespace where Snapshot is located",
                            "name": "snapshotNamespace",
                            "type": "string"
                        },
                        {
                            "description": "Build Id where Snapshot originated",
                            "name": "snapshotBuildId",
                            "type": "string"
                        },
                        {
                            "description": "json object containing git resolver metadata about the running release pipeline",
                            "name": "releasePipelineMetadata",
                            "type": "string"
                        },
                        {
                            "description": "Produced trusted data artifact",
                            "name": "sourceDataArtifact",
                            "type": "string"
                        },
                        {
                            "description": "Subdirectory inside the workspace to be used",
                            "name": "subdirectory",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "IMAGE_EXPIRES_AFTER",
                                "value": "1d"
                            },
                            {
                                "name": "ORAS_OPTIONS"
                            },
                            {
                                "name": "DEBUG"
                            }
                        ],
                        "securityContext": {
                            "runAsUser": 1001
                        },
                        "volumeMounts": [
                            {
                                "mountPath": "/var/workdir",
                                "name": "workdir"
                            },
                            {
                                "mountPath": "/etc/pki/tls/certs/ca-bundle.crt",
                                "name": "trusted-ca",
                                "readOnly": true,
                                "subPath": "ca-bundle.crt"
                            },
                            {
                                "mountPath": "/etc/ssl/certs/ca-custom-bundle.crt",
                                "name": "trusted-ca",
                                "readOnly": true,
                                "subPath": "ca-bundle.crt"
                            }
                        ]
                    },
                    "steps": [
                        {
                            "computeResources": {
                                "limits": {
                                    "memory": "64Mi"
                                },
                                "requests": {
                                    "cpu": "50m",
                                    "memory": "64Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "RELEASE",
                                    "value": "default-tenant/tsf-demo-app-20260415-231650-000-8a419f9-vm66n"
                                },
                                {
                                    "name": "RELEASE_PLAN",
                                    "value": "default-tenant/tsf-release"
                                },
                                {
                                    "name": "RELEASE_PLAN_ADMISSION",
                                    "value": "default-managed-tenant-syc5c/tsf-release"
                                },
                                {
                                    "name": "RELEASE_SERVICE_CONFIG",
                                    "value": "release-service/release-service-config"
                                },
                                {
                                    "name": "SNAPSHOT",
                                    "value": "default-tenant/tsf-demo-app-20260415-231650-000"
                                }
                            ],
                            "image": "quay.io/konflux-ci/release-service-utils@sha256:5546fa78d3c88d7b6a2e8cff8902f7757f00541d0bbaf113b9f293133894afa3",
                            "name": "collect-data",
                            "script": "#!/usr/bin/env bash\nset -eo pipefail\n\nset -x\necho -n \"73a7398d-e21e-4159-adb1-64e80c630018\" \u003e \"/tekton/results/subdirectory\"\n\nRESULTS_DIR_PATH=\"results\"\nif [ -n \"73a7398d-e21e-4159-adb1-64e80c630018\" ]; then\n  mkdir -p \"/var/workdir/release/73a7398d-e21e-4159-adb1-64e80c630018\"\n  RESULTS_DIR_PATH=\"73a7398d-e21e-4159-adb1-64e80c630018/results\"\nfi\n\nmkdir -p \"/var/workdir/release/$RESULTS_DIR_PATH\"\necho -n \"$RESULTS_DIR_PATH\" \u003e \"/tekton/results/resultsDir\"\n\nRELEASE_PATH=\"73a7398d-e21e-4159-adb1-64e80c630018/release.json\"\necho -n \"$RELEASE_PATH\" \u003e \"/tekton/results/release\"\nget-resource \"release\" \"${RELEASE}\" | tee \"/var/workdir/release/$RELEASE_PATH\"\n\nRELEASEPLAN_PATH=\"73a7398d-e21e-4159-adb1-64e80c630018/release_plan.json\"\necho -n \"$RELEASEPLAN_PATH\" \u003e \"/tekton/results/releasePlan\"\nget-resource \"releaseplan\" \"${RELEASE_PLAN}\" | tee \"/var/workdir/release/$RELEASEPLAN_PATH\"\n\nRELEASEPLANADMISSION_PATH=\"73a7398d-e21e-4159-adb1-64e80c630018/release_plan_admission.json\"\necho -n \"$RELEASEPLANADMISSION_PATH\" \u003e \"/tekton/results/releasePlanAdmission\"\nget-resource \"releaseplanadmission\" \"${RELEASE_PLAN_ADMISSION}\" \\\n  | tee \"/var/workdir/release/$RELEASEPLANADMISSION_PATH\"\n\nRELEASESERVICECONFIG_PATH=\"73a7398d-e21e-4159-adb1-64e80c630018/release_service_config.json\"\necho -n \"$RELEASESERVICECONFIG_PATH\" \u003e \"/tekton/results/releaseServiceConfig\"\nget-resource \"releaseserviceconfig\" \"${RELEASE_SERVICE_CONFIG}\" \\\n  | tee \"/var/workdir/release/$RELEASESERVICECONFIG_PATH\"\n\necho -e \"\\nFetching Snapshot Spec\"\nSNAPSHOTSPEC_PATH=\"73a7398d-e21e-4159-adb1-64e80c630018/snapshot_spec.json\"\necho -n \"$SNAPSHOTSPEC_PATH\" \u003e \"/tekton/results/snapshotSpec\"\nget-resource \"snapshot\" \"${SNAPSHOT}\" \"{.spec}\" \\\n  | jq '(if .componentGroup == null then .componentGroup = .application else . end) | del(.application)' \\\n  | tee \"/var/workdir/release/$SNAPSHOTSPEC_PATH\"\nlabels=$(get-resource \"snapshot\" \"${SNAPSHOT}\" \"{.metadata.labels}\")\nBUILD_ID=$(jq -r '.\"appstudio.openshift.io/build-pipelinerun\" // \"\"' \u003c\u003c\u003c \"${labels}\")\necho -n \"${BUILD_ID}\" | tee \"/tekton/results/snapshotBuildId\"\n\necho -e \"\\nGenerating collectors data\"\ncollectors_status=$(get-resource \"release\" \"${RELEASE}\" \"{.status.collectors}\")\necho \"***collectors status\"\necho \"${collectors_status}\"\necho \"***\"\n\ncollectors_result=$(jq -c '\n  def deepmerge(a; b):\n    reduce b[] as $item (a;\n    reduce ($item | keys_unsorted[]) as $key (.;\n    $item[$key] as $val | ($val | type) as $type | .[$key] = if ($type == \"object\") then\n    deepmerge({}; [if .[$key] == null then {} else .[$key] end, $val])\n    elif ($type == \"array\") then\n    (.[$key] + $val | unique)\n    else\n    $val\n    end)\n    );\n\n  # Ensure we safely handle missing collectors\n  (.? // {}) as $collectors |\n\n  # Flatten and combine the managed and tenant sections\n  [($collectors.managed? // {} | to_entries | map(.value)) +\n   ($collectors.tenant? // {} | to_entries | map(.value))] |\n   flatten |\n   deepmerge({}; .)\n' \u003c\u003c\u003c \"${collectors_status}\")\necho \"***collectors\"\njq \u003c\u003c\u003c \"$collectors_result\"\necho \"***\"\n\necho -e \"\\nFetching merged data json\"\nrelease_result=$(get-resource \"release\" \"${RELEASE}\" \"{.spec.data}\")\n\nrelease_plan_result=$(get-resource \"releaseplan\" \"${RELEASE_PLAN}\" \"{.spec.data}\")\n\nrelease_plan_admission_result=$(get-resource \"releaseplanadmission\" \"${RELEASE_PLAN_ADMISSION}\" \\\n    \"{.spec.data}\")\n\n# Merge collectors and Release keys. Release has higher priority\nmerged_output=$(merge-json \"$collectors_result\" \"$release_result\")\n\n# Merge now with ReleasePlan keys. ReleasePlan has higher priority\nmerged_output=$(merge-json \"$merged_output\" \"$release_plan_result\")\n\n# Finally merge with ReleasePlanAdmission keys. ReleasePlanAdmission has higher priority\nmerged_output=$(merge-json \"$merged_output\" \"$release_plan_admission_result\")\n\nDATA_PATH=\"73a7398d-e21e-4159-adb1-64e80c630018/data.json\"\necho -n \"$DATA_PATH\" \u003e \"/tekton/results/data\"\necho \"$merged_output\" | tee \"/var/workdir/release/$DATA_PATH\"\n\n# get pipeline ref info\npipelineref=$(jq -c '.spec.pipeline.pipelineRef' \\\n  \"/var/workdir/release/73a7398d-e21e-4159-adb1-64e80c630018/release_plan_admission.json\")\nresolver=$(jq -r '.resolver // \"\"' \u003c\u003c\u003c \"${pipelineref}\")\nif [ \"${resolver}\" == \"git\" ] ; then\n  url=$(jq -r '.params[] | select(.name==\"url\") | .value' \u003c\u003c\u003c \"${pipelineref}\")\n  revision=$(jq -r '.params[] | select(.name==\"revision\") | .value' \u003c\u003c\u003c \"${pipelineref}\")\n  pathinrepo=$(jq -r '.params[] | select(.name==\"pathInRepo\") | .value' \u003c\u003c\u003c \"${pipelineref}\")\n  orgrepo=\"${url#*/*/*/}\"\n  org=$(echo \"${orgrepo}\" | cut -f1 -d/)\n  repo=$(echo \"${orgrepo}\" | cut -f2 -d/ | cut -d. -f1)\n\n  sha=$(curl -s \"https://api.github.com/repos/${org}/${repo}/commits/${revision}\" | jq -r '.sha // \"\"')\n\nfi\n\norg=\"${org:-unknown}\"\nrepo=\"${repo:-unknown}\"\nrevision=\"${revision:-unknown}\"\npathinrepo=\"${pathinrepo:-unknown}\"\nsha=\"${sha:-unknown}\"\n\necho \"\"\necho \"Release Pipeline Ref Info:\"\necho \"--------------------------\"\n\njson=$(jq -n -c \\\n  --arg org \"${org}\" \\\n  --arg repo \"${repo}\" \\\n  --arg revision \"${revision}\" \\\n  --arg pathinrepo \"${pathinrepo}\" \\\n  --arg sha \"${sha}\" \\\n  '$ARGS.named')\n\necho \"${json}\" \u003e \"/tekton/results/releasePipelineMetadata\"\n# pretty print for log message\njq . \u003c\u003c\u003c \"$json\"\n\nSINGLE_COMPONENT_MODE=$(jq -r '.singleComponentMode // \"false\"' \"/var/workdir/release/$DATA_PATH\")\nSNAPSHOT_NAME=$(echo \"${SNAPSHOT}\" | cut -f2 -d/)\nSNAPSHOT_NAMESPACE=$(echo \"${SNAPSHOT}\" | cut -f1 -d/)\n\necho -n \"${SINGLE_COMPONENT_MODE}\" | tee \"/tekton/results/singleComponentMode\"\necho -n \"${SNAPSHOT_NAME}\" | tee \"/tekton/results/snapshotName\"\necho -n \"${SNAPSHOT_NAMESPACE}\" | tee \"/tekton/results/snapshotNamespace\"\n"
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "memory": "32Mi"
                                },
                                "requests": {
                                    "cpu": "10m",
                                    "memory": "32Mi"
                                }
                            },
                            "image": "quay.io/konflux-ci/release-service-utils@sha256:5546fa78d3c88d7b6a2e8cff8902f7757f00541d0bbaf113b9f293133894afa3",
                            "name": "check-data-key-sources",
                            "script": "#!/usr/bin/env bash\nset -ex\n\nDISALLOWED_KEYS_JSON='{\n    \"Release\": [\n        \"releaseNotes.product_id\",\n        \"releaseNotes.product_name\",\n        \"releaseNotes.product_version\",\n        \"releaseNotes.product_stream\",\n        \"releaseNotes.cpe\",\n        \"releaseNotes.allow_custom_live_id\"\n    ],\n    \"ReleasePlan\": [\n        \"releaseNotes.product_id\",\n        \"releaseNotes.product_name\",\n        \"releaseNotes.product_version\",\n        \"releaseNotes.product_stream\",\n        \"releaseNotes.cpe\",\n        \"releaseNotes.allow_custom_live_id\"\n    ],\n    \"ReleasePlanAdmission\": [\n    ]\n}'\n\nRC=0\n\ncheck_source () { # Expected arguments are [CRD from DISALLOWED_KEYS_JSON, file]\n    for KEY in $(jq -r \".$1[]\" \u003c\u003c\u003c \"$DISALLOWED_KEYS_JSON\") ; do\n        if [[ $(jq \".spec.data.$KEY\" \"$2\") != \"null\" ]] ; then\n            echo \"Found disallowed key: $KEY in resource $1\"\n            RC=1\n        fi\n    done\n}\n\ncheck_source \"Release\" \"/var/workdir/release/73a7398d-e21e-4159-adb1-64e80c630018/release.json\"\ncheck_source \"ReleasePlan\" \"/var/workdir/release/73a7398d-e21e-4159-adb1-64e80c630018/release_plan.json\"\ncheck_source \"ReleasePlanAdmission\" \\\n    \"/var/workdir/release/73a7398d-e21e-4159-adb1-64e80c630018/release_plan_admission.json\"\n\nexit $RC\n"
                        },
                        {
                            "args": [
                                "create",
                                "--store",
                                "quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts",
                                "/tekton/results/sourceDataArtifact=/var/workdir/release"
                            ],
                            "computeResources": {
                                "limits": {
                                    "memory": "128Mi"
                                },
                                "requests": {
                                    "cpu": "250m",
                                    "memory": "128Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "HOME",
                                    "value": "/tekton/home"
                                },
                                {
                                    "name": "ORAS_OPTIONS"
                                },
                                {
                                    "name": "CA_FILE",
                                    "value": "/etc/pki/tls/certs/ca-bundle.crt"
                                }
                            ],
                            "image": "quay.io/konflux-ci/build-trusted-artifacts:653578444c73afc32b3a865fee9869a09f96c1a2",
                            "name": "create-trusted-artifact"
                        }
                    ],
                    "volumes": [
                        {
                            "emptyDir": {},
                            "name": "workdir"
                        },
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=48",
                    "operator-sdk/primary-resource": "default-tenant/tsf-demo-app-20260415-231650-000-8a419f9-vm66n",
                    "operator-sdk/primary-resource-type": "Release.appstudio.redhat.com",
                    "pac.test.appstudio.openshift.io/branch": "base-miwkfv",
                    "pac.test.appstudio.openshift.io/cancel-in-progress": "false",
                    "pac.test.appstudio.openshift.io/check-run-id": "71552493202",
                    "pac.test.appstudio.openshift.io/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pac.test.appstudio.openshift.io/event-type": "push",
                    "pac.test.appstudio.openshift.io/git-auth-secret": "pac-gitauth-ojyaao",
                    "pac.test.appstudio.openshift.io/git-provider": "github",
                    "pac.test.appstudio.openshift.io/installation-id": "112348674",
                    "pac.test.appstudio.openshift.io/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-push-cttl8",
                    "pac.test.appstudio.openshift.io/max-keep-runs": "3",
                    "pac.test.appstudio.openshift.io/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-miwkfv\"",
                    "pac.test.appstudio.openshift.io/original-prname": "tsf-demo-comp-on-push",
                    "pac.test.appstudio.openshift.io/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pac.test.appstudio.openshift.io/repository": "tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/scm-reporting-plr-started": "true",
                    "pac.test.appstudio.openshift.io/sender": "rhtap-ci-tests-bot",
                    "pac.test.appstudio.openshift.io/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pac.test.appstudio.openshift.io/sha-title": "Merge pull request #181 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pac.test.appstudio.openshift.io/source-branch": "refs/heads/base-miwkfv",
                    "pac.test.appstudio.openshift.io/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pac.test.appstudio.openshift.io/state": "completed",
                    "pac.test.appstudio.openshift.io/url-org": "rhads-tsf-qe",
                    "pac.test.appstudio.openshift.io/url-repository": "testrepo",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-managed-tenant-syc5c/results/73a7398d-e21e-4159-adb1-64e80c630018/records/901364a6-806a-4adf-9059-f04c026b0351",
                    "results.tekton.dev/result": "default-managed-tenant-syc5c/results/73a7398d-e21e-4159-adb1-64e80c630018",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "release"
                },
                "creationTimestamp": "2026-04-15T23:26:56Z",
                "finalizers": [
                    "chains.tekton.dev",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "tekton-pipelines",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/service": "release",
                    "appstudio.openshift.io/snapshot": "tsf-demo-app-20260415-231650-000",
                    "pipelines.appstudio.openshift.io/type": "managed",
                    "release.appstudio.openshift.io/name": "tsf-demo-app-20260415-231650-000-8a419f9-vm66n",
                    "release.appstudio.openshift.io/namespace": "default-tenant",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "push-to-external-registry",
                    "tekton.dev/pipelineRun": "managed-25x6p",
                    "tekton.dev/pipelineRunUID": "73a7398d-e21e-4159-adb1-64e80c630018",
                    "tekton.dev/pipelineTask": "collect-registry-token-secret",
                    "tekton.dev/task": "collect-registry-token-secret"
                },
                "name": "managed-25x6p-collect-registry-token-secret",
                "namespace": "default-managed-tenant-syc5c",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "managed-25x6p",
                        "uid": "73a7398d-e21e-4159-adb1-64e80c630018"
                    }
                ],
                "resourceVersion": "42598",
                "uid": "901364a6-806a-4adf-9059-f04c026b0351"
            },
            "spec": {
                "params": [
                    {
                        "name": "dataPath",
                        "value": "73a7398d-e21e-4159-adb1-64e80c630018/data.json"
                    },
                    {
                        "name": "ociStorage",
                        "value": "quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts"
                    },
                    {
                        "name": "sourceDataArtifact",
                        "value": "oci:quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts@sha256:2b2a184ca76db29ad1e0173934515414433ee35e7ce2e30c83fa080d97f997a4"
                    },
                    {
                        "name": "dataDir",
                        "value": "/var/workdir/release"
                    },
                    {
                        "name": "trustedArtifactsDebug",
                        "value": ""
                    },
                    {
                        "name": "taskGitUrl",
                        "value": "https://github.com/konflux-ci/release-service-catalog.git"
                    },
                    {
                        "name": "taskGitRevision",
                        "value": "development"
                    }
                ],
                "serviceAccountName": "release-pipeline",
                "taskRef": {
                    "params": [
                        {
                            "name": "url",
                            "value": "https://github.com/konflux-ci/release-service-catalog.git"
                        },
                        {
                            "name": "revision",
                            "value": "development"
                        },
                        {
                            "name": "pathInRepo",
                            "value": "tasks/managed/collect-registry-token-secret/collect-registry-token-secret.yaml"
                        }
                    ],
                    "resolver": "git"
                },
                "timeout": "1h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:27:06Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:27:06Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "managed-25x6p-collect-registry-token-secret-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha1": "4f00b1a3062b53809bf42ca120e84d73cc199954"
                        },
                        "entryPoint": "tasks/managed/collect-registry-token-secret/collect-registry-token-secret.yaml",
                        "uri": "git+https://github.com/konflux-ci/release-service-catalog.git"
                    }
                },
                "results": [
                    {
                        "name": "registrySecret",
                        "type": "string",
                        "value": ""
                    }
                ],
                "startTime": "2026-04-15T23:26:57Z",
                "steps": [
                    {
                        "container": "step-use-trusted-artifact",
                        "imageID": "quay.io/konflux-ci/build-trusted-artifacts@sha256:27ddb820f0d30609dcb8de88219309edbced429896324e474f494470c2f003fb",
                        "name": "use-trusted-artifact",
                        "provenance": {
                            "refSource": {
                                "digest": {
                                    "sha1": "4f00b1a3062b53809bf42ca120e84d73cc199954"
                                },
                                "entryPoint": "stepactions/use-trusted-artifact/use-trusted-artifact.yaml",
                                "uri": "git+https://github.com/konflux-ci/release-service-catalog.git"
                            }
                        },
                        "terminated": {
                            "containerID": "cri-o://77ace728a058884828f8523134f6425d9d544619b556c20c408ec27162f72c28",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:27:04Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:27:04Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-collect-secret",
                        "imageID": "quay.io/konflux-ci/release-service-utils@sha256:5546fa78d3c88d7b6a2e8cff8902f7757f00541d0bbaf113b9f293133894afa3",
                        "name": "collect-secret",
                        "terminated": {
                            "containerID": "cri-o://d620741269bef426ae657415478461f93bab16411761f51149d8c7d20efe7e6b",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:27:05Z",
                            "message": "[{\"key\":\"registrySecret\",\"value\":\"\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:27:05Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Tekton task that collects secret name containing registry token from the data file",
                    "params": [
                        {
                            "description": "Path to the merged data JSON file generated by collect-data task",
                            "name": "dataPath",
                            "type": "string"
                        },
                        {
                            "default": "empty",
                            "description": "The OCI repository where the Trusted Artifacts are stored",
                            "name": "ociStorage",
                            "type": "string"
                        },
                        {
                            "default": "1d",
                            "description": "Expiration date for the trusted artifacts created in the OCI repository. An empty string means the artifacts do not expire",
                            "name": "ociArtifactExpiresAfter",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Flag to enable debug logging in trusted artifacts. Set to a non-empty string to enable",
                            "name": "trustedArtifactsDebug",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "oras options to pass to Trusted Artifacts calls",
                            "name": "orasOptions",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Location of trusted artifacts to be used to populate data directory",
                            "name": "sourceDataArtifact",
                            "type": "string"
                        },
                        {
                            "default": "/var/workdir/release",
                            "description": "The location where data will be stored",
                            "name": "dataDir",
                            "type": "string"
                        },
                        {
                            "description": "The url to the git repo where the release-service-catalog tasks and stepactions to be used are stored",
                            "name": "taskGitUrl",
                            "type": "string"
                        },
                        {
                            "description": "The revision in the taskGitUrl repo to be used",
                            "name": "taskGitRevision",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from",
                            "name": "caTrustConfigMapName",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data",
                            "name": "caTrustConfigMapKey",
                            "type": "string"
                        },
                        {
                            "default": "/etc/pki/tls/certs/ca-bundle.crt",
                            "description": "Path to CA certificate bundle for TLS verification with self-signed certificates",
                            "name": "caCertPath",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "The kube secret to use quay.io API, containing one key: token",
                            "name": "registrySecret",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "IMAGE_EXPIRES_AFTER",
                                "value": "1d"
                            },
                            {
                                "name": "ORAS_OPTIONS"
                            },
                            {
                                "name": "DEBUG"
                            }
                        ],
                        "securityContext": {
                            "runAsUser": 1001
                        },
                        "volumeMounts": [
                            {
                                "mountPath": "/var/workdir",
                                "name": "workdir"
                            },
                            {
                                "mountPath": "/etc/pki/tls/certs/ca-bundle.crt",
                                "name": "trusted-ca",
                                "readOnly": true,
                                "subPath": "ca-bundle.crt"
                            },
                            {
                                "mountPath": "/etc/ssl/certs/ca-custom-bundle.crt",
                                "name": "trusted-ca",
                                "readOnly": true,
                                "subPath": "ca-bundle.crt"
                            }
                        ]
                    },
                    "steps": [
                        {
                            "args": [
                                "use",
                                "oci:quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts@sha256:2b2a184ca76db29ad1e0173934515414433ee35e7ce2e30c83fa080d97f997a4=/var/workdir/release"
                            ],
                            "computeResources": {
                                "limits": {
                                    "memory": "64Mi"
                                },
                                "requests": {
                                    "cpu": "30m",
                                    "memory": "64Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "HOME",
                                    "value": "/tekton/home"
                                },
                                {
                                    "name": "ORAS_OPTIONS"
                                },
                                {
                                    "name": "CA_FILE",
                                    "value": "/etc/pki/tls/certs/ca-bundle.crt"
                                }
                            ],
                            "image": "quay.io/konflux-ci/build-trusted-artifacts:653578444c73afc32b3a865fee9869a09f96c1a2",
                            "name": "use-trusted-artifact"
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "memory": "128Mi"
                                },
                                "requests": {
                                    "cpu": "50m",
                                    "memory": "128Mi"
                                }
                            },
                            "image": "quay.io/konflux-ci/release-service-utils@sha256:5546fa78d3c88d7b6a2e8cff8902f7757f00541d0bbaf113b9f293133894afa3",
                            "name": "collect-secret",
                            "script": "#!/usr/bin/env bash\nset -eux\n\nDATA_FILE=\"/var/workdir/release/73a7398d-e21e-4159-adb1-64e80c630018/data.json\"\nif [ ! -f \"${DATA_FILE}\" ] ; then\n    echo \"No valid data file was provided.\"\n    exit 1\nfi\n\n# Check if there is anything to make public - either in defaults, or a component\nSECRET_REQUIRED=false\nif [ \"$(jq -r '.mapping.defaults.public // false' \"$DATA_FILE\")\" = true ] ; then\n  SECRET_REQUIRED=true\nelse\n  NUM_COMPONENTS=$(jq '.mapping.components | length' \"$DATA_FILE\")\n  for ((i=0; i \u003c NUM_COMPONENTS; i++)); do\n    COMPONENT=$(jq -c \".mapping.components[$i]\" \"$DATA_FILE\")\n    if [ \"$(jq -r '.public // false' \u003c\u003c\u003c \"$COMPONENT\")\" = true ] ; then\n      SECRET_REQUIRED=true\n      break\n    fi\n  done\nfi\n\nif [ \"$SECRET_REQUIRED\" = false ]; then\n  echo No repos to make public, so no secret is required. Exiting...\n  echo -n \"\" \u003e \"/tekton/results/registrySecret\"\n  exit 0\nfi\n\nif [ \"$(jq '.mapping | has(\"registrySecret\")' \"$DATA_FILE\")\" == false ] ; then\n    echo \"Registry secret missing in data JSON file\"\n    exit 1\nfi\n\njq -j '.mapping.registrySecret' \"$DATA_FILE\" | tee \"/tekton/results/registrySecret\"\n"
                        }
                    ],
                    "volumes": [
                        {
                            "emptyDir": {},
                            "name": "workdir"
                        },
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=49",
                    "operator-sdk/primary-resource": "default-tenant/tsf-demo-app-20260415-231650-000-8a419f9-vm66n",
                    "operator-sdk/primary-resource-type": "Release.appstudio.redhat.com",
                    "pac.test.appstudio.openshift.io/branch": "base-miwkfv",
                    "pac.test.appstudio.openshift.io/cancel-in-progress": "false",
                    "pac.test.appstudio.openshift.io/check-run-id": "71552493202",
                    "pac.test.appstudio.openshift.io/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pac.test.appstudio.openshift.io/event-type": "push",
                    "pac.test.appstudio.openshift.io/git-auth-secret": "pac-gitauth-ojyaao",
                    "pac.test.appstudio.openshift.io/git-provider": "github",
                    "pac.test.appstudio.openshift.io/installation-id": "112348674",
                    "pac.test.appstudio.openshift.io/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-push-cttl8",
                    "pac.test.appstudio.openshift.io/max-keep-runs": "3",
                    "pac.test.appstudio.openshift.io/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-miwkfv\"",
                    "pac.test.appstudio.openshift.io/original-prname": "tsf-demo-comp-on-push",
                    "pac.test.appstudio.openshift.io/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pac.test.appstudio.openshift.io/repository": "tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/scm-reporting-plr-started": "true",
                    "pac.test.appstudio.openshift.io/sender": "rhtap-ci-tests-bot",
                    "pac.test.appstudio.openshift.io/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pac.test.appstudio.openshift.io/sha-title": "Merge pull request #181 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pac.test.appstudio.openshift.io/source-branch": "refs/heads/base-miwkfv",
                    "pac.test.appstudio.openshift.io/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pac.test.appstudio.openshift.io/state": "completed",
                    "pac.test.appstudio.openshift.io/url-org": "rhads-tsf-qe",
                    "pac.test.appstudio.openshift.io/url-repository": "testrepo",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-managed-tenant-syc5c/results/73a7398d-e21e-4159-adb1-64e80c630018/records/4f80b063-e552-4c33-be9e-d965c3d3f1f5",
                    "results.tekton.dev/result": "default-managed-tenant-syc5c/results/73a7398d-e21e-4159-adb1-64e80c630018",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "release"
                },
                "creationTimestamp": "2026-04-15T23:26:56Z",
                "finalizers": [
                    "chains.tekton.dev",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "tekton-pipelines",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/service": "release",
                    "appstudio.openshift.io/snapshot": "tsf-demo-app-20260415-231650-000",
                    "pipelines.appstudio.openshift.io/type": "managed",
                    "release.appstudio.openshift.io/name": "tsf-demo-app-20260415-231650-000-8a419f9-vm66n",
                    "release.appstudio.openshift.io/namespace": "default-tenant",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "push-to-external-registry",
                    "tekton.dev/pipelineRun": "managed-25x6p",
                    "tekton.dev/pipelineRunUID": "73a7398d-e21e-4159-adb1-64e80c630018",
                    "tekton.dev/pipelineTask": "collect-signing-params",
                    "tekton.dev/task": "collect-signing-params"
                },
                "name": "managed-25x6p-collect-signing-params",
                "namespace": "default-managed-tenant-syc5c",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "managed-25x6p",
                        "uid": "73a7398d-e21e-4159-adb1-64e80c630018"
                    }
                ],
                "resourceVersion": "42678",
                "uid": "4f80b063-e552-4c33-be9e-d965c3d3f1f5"
            },
            "spec": {
                "serviceAccountName": "release-pipeline",
                "taskRef": {
                    "params": [
                        {
                            "name": "url",
                            "value": "https://github.com/konflux-ci/release-service-catalog.git"
                        },
                        {
                            "name": "revision",
                            "value": "development"
                        },
                        {
                            "name": "pathInRepo",
                            "value": "tasks/managed/collect-signing-params/collect-signing-params.yaml"
                        }
                    ],
                    "resolver": "git"
                },
                "timeout": "1h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:27:10Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:27:10Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "managed-25x6p-collect-signing-params-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha1": "4f00b1a3062b53809bf42ca120e84d73cc199954"
                        },
                        "entryPoint": "tasks/managed/collect-signing-params/collect-signing-params.yaml",
                        "uri": "git+https://github.com/konflux-ci/release-service-catalog.git"
                    }
                },
                "results": [
                    {
                        "name": "buildIdentityRegexp",
                        "type": "string",
                        "value": "^https://kubernetes.io/namespaces/[a-z0-9-]+-tenant/serviceaccounts/build-pipeline-[a-z0-9-]+$"
                    },
                    {
                        "name": "defaultOIDCIssuer",
                        "type": "string",
                        "value": "https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j"
                    },
                    {
                        "name": "enableKeylessSigning",
                        "type": "string",
                        "value": "true"
                    },
                    {
                        "name": "fulcioExternalUrl",
                        "type": "string",
                        "value": "https://fulcio-server-tsf-tas.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com"
                    },
                    {
                        "name": "fulcioUrl",
                        "type": "string",
                        "value": "http://fulcio-server.tsf-tas.svc.cluster.local"
                    },
                    {
                        "name": "rekorExternalUrl",
                        "type": "string",
                        "value": "https://rekor-server-tsf-tas.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com"
                    },
                    {
                        "name": "rekorUrl",
                        "type": "string",
                        "value": "http://rekor-server.tsf-tas.svc.cluster.local"
                    },
                    {
                        "name": "tektonChainsIdentity",
                        "type": "string",
                        "value": "https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller"
                    },
                    {
                        "name": "tufExternalUrl",
                        "type": "string",
                        "value": "https://tuf-tsf-tas.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com"
                    },
                    {
                        "name": "tufUrl",
                        "type": "string",
                        "value": "http://tuf.tsf-tas.svc.cluster.local"
                    }
                ],
                "startTime": "2026-04-15T23:26:56Z",
                "steps": [
                    {
                        "container": "step-collect-signing-params",
                        "imageID": "quay.io/konflux-ci/release-service-utils@sha256:5546fa78d3c88d7b6a2e8cff8902f7757f00541d0bbaf113b9f293133894afa3",
                        "name": "collect-signing-params",
                        "terminated": {
                            "containerID": "cri-o://877996f993675b59c0087943390f7e972bae31c17b3c7445ed31542b3da75434",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:27:08Z",
                            "message": "[{\"key\":\"buildIdentityRegexp\",\"value\":\"^https://kubernetes.io/namespaces/[a-z0-9-]+-tenant/serviceaccounts/build-pipeline-[a-z0-9-]+$\",\"type\":1},{\"key\":\"defaultOIDCIssuer\",\"value\":\"https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j\",\"type\":1},{\"key\":\"enableKeylessSigning\",\"value\":\"true\",\"type\":1},{\"key\":\"fulcioExternalUrl\",\"value\":\"https://fulcio-server-tsf-tas.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com\",\"type\":1},{\"key\":\"fulcioUrl\",\"value\":\"http://fulcio-server.tsf-tas.svc.cluster.local\",\"type\":1},{\"key\":\"rekorExternalUrl\",\"value\":\"https://rekor-server-tsf-tas.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com\",\"type\":1},{\"key\":\"rekorUrl\",\"value\":\"http://rekor-server.tsf-tas.svc.cluster.local\",\"type\":1},{\"key\":\"tektonChainsIdentity\",\"value\":\"https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller\",\"type\":1},{\"key\":\"tufExternalUrl\",\"value\":\"https://tuf-tsf-tas.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com\",\"type\":1},{\"key\":\"tufUrl\",\"value\":\"http://tuf.tsf-tas.svc.cluster.local\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:27:01Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Tekton task to collect Konflux configuration parameters related to\nkeyless signing using cosign. The task attempts to read the \"cluster-config\"\nConfigMap in the \"konflux-info\" namespace to extract signing parameters.\n\nIn case the ConfigMap is not found, the task will output empty strings for all parameters,\nallowing the pipeline to continue without signing parameters.",
                    "params": [
                        {
                            "default": "cluster-config",
                            "description": "The name of the ConfigMap to read signing parameters from",
                            "name": "configMapName",
                            "type": "string"
                        },
                        {
                            "default": "konflux-info",
                            "description": "The namespace where the ConfigMap is located",
                            "name": "configMapNamespace",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from",
                            "name": "caTrustConfigMapName",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data",
                            "name": "caTrustConfigMapKey",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "A flag indicating whether keyless signing should be enabled, based on the presence of signing parameters.\n",
                            "name": "enableKeylessSigning",
                            "type": "string"
                        },
                        {
                            "description": "A default OIDC issuer URL to be used for signing.\n",
                            "name": "defaultOIDCIssuer",
                            "type": "string"
                        },
                        {
                            "description": "The external URL of the Rekor transparency log.\n",
                            "name": "rekorExternalUrl",
                            "type": "string"
                        },
                        {
                            "description": "The internal URL of the Rekor transparency log.\n",
                            "name": "rekorUrl",
                            "type": "string"
                        },
                        {
                            "description": "The external URL of the Fulcio certificate authority.\n",
                            "name": "fulcioExternalUrl",
                            "type": "string"
                        },
                        {
                            "description": "The internal URL of the Fulcio certificate authority.\n",
                            "name": "fulcioUrl",
                            "type": "string"
                        },
                        {
                            "description": "The external URL of the TUF repository.\n",
                            "name": "tufExternalUrl",
                            "type": "string"
                        },
                        {
                            "description": "The internal URL of the TUF repository.\n",
                            "name": "tufUrl",
                            "type": "string"
                        },
                        {
                            "description": "A regular expression to extract build identity from the OIDC token claims, if applicable.\n",
                            "name": "buildIdentityRegexp",
                            "type": "string"
                        },
                        {
                            "description": "The identity used in the certificate, generated by fulcio.\n",
                            "name": "tektonChainsIdentity",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "securityContext": {
                            "runAsUser": 1001
                        },
                        "volumeMounts": [
                            {
                                "mountPath": "/mnt/trusted-ca",
                                "name": "trusted-ca",
                                "readOnly": true
                            }
                        ]
                    },
                    "steps": [
                        {
                            "computeResources": {
                                "limits": {
                                    "cpu": "50m",
                                    "memory": "128Mi"
                                },
                                "requests": {
                                    "cpu": "50m",
                                    "memory": "128Mi"
                                }
                            },
                            "image": "quay.io/konflux-ci/release-service-utils@sha256:5546fa78d3c88d7b6a2e8cff8902f7757f00541d0bbaf113b9f293133894afa3",
                            "name": "collect-signing-params",
                            "script": "#!/usr/bin/env bash\necho \"Getting cluster-config ConfigMap\"\nKFLX_CONFIG_PATH='/tmp/konflux_config.json'\n\n# Attempt to fetch the ConfigMap with retries, capture exit code\nif retry 3 kubectl get configmap \"cluster-config\" -n \"konflux-info\" -o json \u003e \\\n\"$KFLX_CONFIG_PATH\" 2\u003e/dev/null; then\n    echo \"ConfigMap found, extracting signing parameters\"\n\n    # Extract signing parameters from ConfigMap data, defaulting to empty string if not found\n    enableKeylessSigning=$(jq -r '.data.enableKeylessSigning // \"\"' \"$KFLX_CONFIG_PATH\")\n    defaultOIDCIssuer=$(jq -r '.data.defaultOIDCIssuer // \"\"' \"$KFLX_CONFIG_PATH\")\n    rekorExternalUrl=$(jq -r '.data.rekorExternalUrl // \"\"' \"$KFLX_CONFIG_PATH\")\n    rekorInternalUrl=$(jq -r '.data.rekorInternalUrl // \"\"' \"$KFLX_CONFIG_PATH\")\n    fulcioExternalUrl=$(jq -r '.data.fulcioExternalUrl // \"\"' \"$KFLX_CONFIG_PATH\")\n    fulcioInternalUrl=$(jq -r '.data.fulcioInternalUrl // \"\"' \"$KFLX_CONFIG_PATH\")\n    tufExternalUrl=$(jq -r '.data.tufExternalUrl // \"\"' \"$KFLX_CONFIG_PATH\")\n    tufInternalUrl=$(jq -r '.data.tufInternalUrl // \"\"' \"$KFLX_CONFIG_PATH\")\n    buildIdentityRegexp=$(jq -r '.data.buildIdentityRegexp // \"\"' \"$KFLX_CONFIG_PATH\")\n    tektonChainsIdentity=$(jq -r '.data.tektonChainsIdentity // \"\"' \"$KFLX_CONFIG_PATH\")\nelse\n    echo \"ConfigMap not found, using default empty values\"\n\n    # Set all parameters to empty strings when ConfigMap doesn't exist\n    enableKeylessSigning=\"false\"\n    defaultOIDCIssuer=\"\"\n    rekorExternalUrl=\"\"\n    rekorInternalUrl=\"\"\n    fulcioExternalUrl=\"\"\n    fulcioInternalUrl=\"\"\n    tufExternalUrl=\"\"\n    tufInternalUrl=\"\"\n    buildIdentityRegexp=\"\"\n    tektonChainsIdentity=\"\"\nfi\n\n# Write the values to the respective result paths and print them\necho -n \"$enableKeylessSigning\" | tee \"/tekton/results/enableKeylessSigning\"\necho -n \"$defaultOIDCIssuer\" | tee \"/tekton/results/defaultOIDCIssuer\"\necho -n \"$rekorExternalUrl\" | tee \"/tekton/results/rekorExternalUrl\"\nprefer_internal_or_external() {\n  local internal=\"$1\"\n  local external=\"$2\"\n  local result_path=\"$3\"\n\n  if [ -n \"$internal\" ]; then\n    echo -n \"$internal\" | tee \"$result_path\"\n  else\n    echo -n \"$external\" | tee \"$result_path\"\n  fi\n}\n\nprefer_internal_or_external \"$rekorInternalUrl\" \"$rekorExternalUrl\" \"/tekton/results/rekorUrl\"\necho -n \"$fulcioExternalUrl\" | tee \"/tekton/results/fulcioExternalUrl\"\nprefer_internal_or_external \"$fulcioInternalUrl\" \"$fulcioExternalUrl\" \"/tekton/results/fulcioUrl\"\necho -n \"$tufExternalUrl\" | tee \"/tekton/results/tufExternalUrl\"\nprefer_internal_or_external \"$tufInternalUrl\" \"$tufExternalUrl\" \"/tekton/results/tufUrl\"\necho -n \"$buildIdentityRegexp\" | tee \"/tekton/results/buildIdentityRegexp\"\necho -n \"$tektonChainsIdentity\" | tee \"/tekton/results/tektonChainsIdentity\"\n"
                        }
                    ],
                    "volumes": [
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=47",
                    "operator-sdk/primary-resource": "default-tenant/tsf-demo-app-20260415-231650-000-8a419f9-vm66n",
                    "operator-sdk/primary-resource-type": "Release.appstudio.redhat.com",
                    "pac.test.appstudio.openshift.io/branch": "base-miwkfv",
                    "pac.test.appstudio.openshift.io/cancel-in-progress": "false",
                    "pac.test.appstudio.openshift.io/check-run-id": "71552493202",
                    "pac.test.appstudio.openshift.io/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pac.test.appstudio.openshift.io/event-type": "push",
                    "pac.test.appstudio.openshift.io/git-auth-secret": "pac-gitauth-ojyaao",
                    "pac.test.appstudio.openshift.io/git-provider": "github",
                    "pac.test.appstudio.openshift.io/installation-id": "112348674",
                    "pac.test.appstudio.openshift.io/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-push-cttl8",
                    "pac.test.appstudio.openshift.io/max-keep-runs": "3",
                    "pac.test.appstudio.openshift.io/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-miwkfv\"",
                    "pac.test.appstudio.openshift.io/original-prname": "tsf-demo-comp-on-push",
                    "pac.test.appstudio.openshift.io/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pac.test.appstudio.openshift.io/repository": "tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/scm-reporting-plr-started": "true",
                    "pac.test.appstudio.openshift.io/sender": "rhtap-ci-tests-bot",
                    "pac.test.appstudio.openshift.io/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pac.test.appstudio.openshift.io/sha-title": "Merge pull request #181 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pac.test.appstudio.openshift.io/source-branch": "refs/heads/base-miwkfv",
                    "pac.test.appstudio.openshift.io/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pac.test.appstudio.openshift.io/state": "completed",
                    "pac.test.appstudio.openshift.io/url-org": "rhads-tsf-qe",
                    "pac.test.appstudio.openshift.io/url-repository": "testrepo",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-managed-tenant-syc5c/results/73a7398d-e21e-4159-adb1-64e80c630018/records/46a0c433-5eef-41db-a8f7-da26d525cf4b",
                    "results.tekton.dev/result": "default-managed-tenant-syc5c/results/73a7398d-e21e-4159-adb1-64e80c630018",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "release"
                },
                "creationTimestamp": "2026-04-15T23:26:56Z",
                "finalizers": [
                    "chains.tekton.dev",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "tekton-pipelines",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/service": "release",
                    "appstudio.openshift.io/snapshot": "tsf-demo-app-20260415-231650-000",
                    "pipelines.appstudio.openshift.io/type": "managed",
                    "release.appstudio.openshift.io/name": "tsf-demo-app-20260415-231650-000-8a419f9-vm66n",
                    "release.appstudio.openshift.io/namespace": "default-tenant",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "push-to-external-registry",
                    "tekton.dev/pipelineRun": "managed-25x6p",
                    "tekton.dev/pipelineRunUID": "73a7398d-e21e-4159-adb1-64e80c630018",
                    "tekton.dev/pipelineTask": "collect-task-params",
                    "tekton.dev/task": "collect-task-params"
                },
                "name": "managed-25x6p-collect-task-params",
                "namespace": "default-managed-tenant-syc5c",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "managed-25x6p",
                        "uid": "73a7398d-e21e-4159-adb1-64e80c630018"
                    }
                ],
                "resourceVersion": "42484",
                "uid": "46a0c433-5eef-41db-a8f7-da26d525cf4b"
            },
            "spec": {
                "params": [
                    {
                        "name": "dataDir",
                        "value": "/var/workdir/release"
                    },
                    {
                        "name": "dataPath",
                        "value": "73a7398d-e21e-4159-adb1-64e80c630018/data.json"
                    },
                    {
                        "name": "keysToExtract",
                        "value": "[\n  {\"resultIndex\": 0, \"key\": \".conforma.workerCount\", \"default\": \"4\"},\n  {\"resultIndex\": 1, \"key\": \".sign.cosignSecretName\", \"default\": \"secret-not-present\"}\n]\n"
                    },
                    {
                        "name": "taskGitUrl",
                        "value": "https://github.com/konflux-ci/release-service-catalog.git"
                    },
                    {
                        "name": "taskGitRevision",
                        "value": "development"
                    },
                    {
                        "name": "ociStorage",
                        "value": "quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts"
                    },
                    {
                        "name": "sourceDataArtifact",
                        "value": "oci:quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts@sha256:2b2a184ca76db29ad1e0173934515414433ee35e7ce2e30c83fa080d97f997a4"
                    },
                    {
                        "name": "trustedArtifactsDebug",
                        "value": ""
                    }
                ],
                "serviceAccountName": "release-pipeline",
                "taskRef": {
                    "params": [
                        {
                            "name": "url",
                            "value": "https://github.com/konflux-ci/release-service-catalog.git"
                        },
                        {
                            "name": "revision",
                            "value": "development"
                        },
                        {
                            "name": "pathInRepo",
                            "value": "tasks/managed/collect-task-params/collect-task-params.yaml"
                        }
                    ],
                    "resolver": "git"
                },
                "timeout": "1h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:27:05Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:27:05Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "managed-25x6p-collect-task-params-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha1": "4f00b1a3062b53809bf42ca120e84d73cc199954"
                        },
                        "entryPoint": "tasks/managed/collect-task-params/collect-task-params.yaml",
                        "uri": "git+https://github.com/konflux-ci/release-service-catalog.git"
                    }
                },
                "results": [
                    {
                        "name": "extractedValues",
                        "type": "array",
                        "value": [
                            "4",
                            "secret-not-present"
                        ]
                    }
                ],
                "startTime": "2026-04-15T23:26:56Z",
                "steps": [
                    {
                        "container": "step-use-trusted-artifact",
                        "imageID": "quay.io/konflux-ci/build-trusted-artifacts@sha256:27ddb820f0d30609dcb8de88219309edbced429896324e474f494470c2f003fb",
                        "name": "use-trusted-artifact",
                        "provenance": {
                            "refSource": {
                                "digest": {
                                    "sha1": "4f00b1a3062b53809bf42ca120e84d73cc199954"
                                },
                                "entryPoint": "stepactions/use-trusted-artifact/use-trusted-artifact.yaml",
                                "uri": "git+https://github.com/konflux-ci/release-service-catalog.git"
                            }
                        },
                        "terminated": {
                            "containerID": "cri-o://ea933d85dfcb5a24ba1e0471338aeb42c8af4770ae400b878078e03545a1f5f7",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:27:04Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:27:04Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-collect-task-params",
                        "imageID": "quay.io/konflux-ci/release-service-utils@sha256:5546fa78d3c88d7b6a2e8cff8902f7757f00541d0bbaf113b9f293133894afa3",
                        "name": "collect-task-params",
                        "terminated": {
                            "containerID": "cri-o://41f99d9e0e449390a7c446b8f6dd22781cb6991e231f6b2f01468359381fac1c",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:27:04Z",
                            "message": "[{\"key\":\"extractedValues\",\"value\":\"[\\n  \\\"4\\\",\\n  \\\"secret-not-present\\\"\\n]\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:27:04Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Tekton task that extracts values from the data JSON file based on specified keys and exposes them as task results.\nThe task takes an array of resultIndex/key pairs and extracts the corresponding values from the dataPath JSON file.\nEach extracted value is placed at the specified resultIndex in the extractedValues array for use by downstream\ntasks. Optional default values can be provided for keys that may not exist in the data file. If no default is\nprovided and the key does not exist, the task will fail.",
                    "params": [
                        {
                            "description": "Path to the JSON string of the merged data containing the values to extract",
                            "name": "dataPath",
                            "type": "string"
                        },
                        {
                            "description": "JSON array of objects with \"resultIndex\", \"key\", and optional \"default\" fields. Each object specifies the array\nindex where the extracted value should be placed, the JSON path key to extract from the data file, and an\noptional default value to use if the key is not found. Example: [{\"resultIndex\": 1,\n\"key\": \".releaseNotes.summary\"}, {\"resultIndex\": 0, \"key\": \".foo\", \"default\": \"fallback_value\"}]\n",
                            "name": "keysToExtract",
                            "type": "string"
                        },
                        {
                            "default": "empty",
                            "description": "The OCI repository where the Trusted Artifacts are stored",
                            "name": "ociStorage",
                            "type": "string"
                        },
                        {
                            "default": "1d",
                            "description": "Expiration date for the trusted artifacts created in the OCI repository. An empty string means the artifacts do not expire",
                            "name": "ociArtifactExpiresAfter",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Flag to enable debug logging in trusted artifacts. Set to a non-empty string to enable",
                            "name": "trustedArtifactsDebug",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "oras options to pass to Trusted Artifacts calls",
                            "name": "orasOptions",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Location of trusted artifacts to be used to populate data directory",
                            "name": "sourceDataArtifact",
                            "type": "string"
                        },
                        {
                            "default": "/var/workdir/release",
                            "description": "The location where data will be stored",
                            "name": "dataDir",
                            "type": "string"
                        },
                        {
                            "description": "The url to the git repo where the release-service-catalog tasks and stepactions to be used are stored",
                            "name": "taskGitUrl",
                            "type": "string"
                        },
                        {
                            "description": "The revision in the taskGitUrl repo to be used",
                            "name": "taskGitRevision",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from",
                            "name": "caTrustConfigMapName",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data",
                            "name": "caTrustConfigMapKey",
                            "type": "string"
                        },
                        {
                            "default": "/etc/pki/tls/certs/ca-bundle.crt",
                            "description": "Path to CA certificate bundle for TLS verification with self-signed certificates",
                            "name": "caCertPath",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Array of extracted values. Each value is placed at the resultIndex specified in the keysToExtract parameter.\nValues can be accessed by their specified index in downstream tasks.\n",
                            "name": "extractedValues",
                            "type": "array"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "IMAGE_EXPIRES_AFTER",
                                "value": "1d"
                            },
                            {
                                "name": "ORAS_OPTIONS"
                            },
                            {
                                "name": "DEBUG"
                            }
                        ],
                        "securityContext": {
                            "runAsUser": 1001
                        },
                        "volumeMounts": [
                            {
                                "mountPath": "/var/workdir",
                                "name": "workdir"
                            },
                            {
                                "mountPath": "/etc/pki/tls/certs/ca-bundle.crt",
                                "name": "trusted-ca",
                                "readOnly": true,
                                "subPath": "ca-bundle.crt"
                            },
                            {
                                "mountPath": "/etc/ssl/certs/ca-custom-bundle.crt",
                                "name": "trusted-ca",
                                "readOnly": true,
                                "subPath": "ca-bundle.crt"
                            }
                        ]
                    },
                    "steps": [
                        {
                            "args": [
                                "use",
                                "oci:quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts@sha256:2b2a184ca76db29ad1e0173934515414433ee35e7ce2e30c83fa080d97f997a4=/var/workdir/release"
                            ],
                            "computeResources": {
                                "limits": {
                                    "memory": "64Mi"
                                },
                                "requests": {
                                    "cpu": "30m",
                                    "memory": "64Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "HOME",
                                    "value": "/tekton/home"
                                },
                                {
                                    "name": "ORAS_OPTIONS"
                                },
                                {
                                    "name": "CA_FILE",
                                    "value": "/etc/pki/tls/certs/ca-bundle.crt"
                                }
                            ],
                            "image": "quay.io/konflux-ci/build-trusted-artifacts:653578444c73afc32b3a865fee9869a09f96c1a2",
                            "name": "use-trusted-artifact"
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "memory": "128Mi"
                                },
                                "requests": {
                                    "cpu": "50m",
                                    "memory": "128Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "KEYS_JSON",
                                    "value": "[\n  {\"resultIndex\": 0, \"key\": \".conforma.workerCount\", \"default\": \"4\"},\n  {\"resultIndex\": 1, \"key\": \".sign.cosignSecretName\", \"default\": \"secret-not-present\"}\n]\n"
                                }
                            ],
                            "image": "quay.io/konflux-ci/release-service-utils@sha256:5546fa78d3c88d7b6a2e8cff8902f7757f00541d0bbaf113b9f293133894afa3",
                            "name": "collect-task-params",
                            "script": "#!/usr/bin/env bash\nset -x\n\nDATA_FILE=\"/var/workdir/release/73a7398d-e21e-4159-adb1-64e80c630018/data.json\"\nif [ ! -f \"${DATA_FILE}\" ] ; then\n    echo \"No valid data file was provided.\"\n    exit 1\nfi\n\n# Validate KEYS_JSON format\nif ! jq -e 'type == \"array\"' \u003c\u003c\u003c \"$KEYS_JSON\" \u003e /dev/null; then\n    echo \"keysToExtract must be a valid JSON array\"\n    echo \"Received value: $KEYS_JSON\"\n    exit 1\nfi\n\n# Get the number of keys to extract\nKEY_COUNT=$(jq 'length' \u003c\u003c\u003c \"$KEYS_JSON\")\nif [ \"$KEY_COUNT\" -eq 0 ]; then\n    echo \"keysToExtract array is empty\"\n    exit 1\nfi\n\n# Initialize result array with empty strings since it may not be populated in order based on\n# keysToExtract resultIndex input\nRESULT_ARRAY=\"[]\"\nfor i in $(seq 0 $((KEY_COUNT - 1))); do\n    RESULT_ARRAY=$(jq '. += [\"\"]' \u003c\u003c\u003c \"$RESULT_ARRAY\")\ndone\n\nfor i in $(seq 0 $((KEY_COUNT - 1))); do\n    RESULT_INDEX=$(jq -r \".[$i].resultIndex\" \u003c\u003c\u003c \"$KEYS_JSON\")\n    KEY=$(jq -r \".[$i].key\" \u003c\u003c\u003c \"$KEYS_JSON\")\n    DEFAULT_VALUE=$(jq -r \".[$i].default // null\" \u003c\u003c\u003c \"$KEYS_JSON\")\n\n    if [ \"$RESULT_INDEX\" = \"null\" ] || [ \"$KEY\" = \"null\" ]; then\n        echo \"Invalid key extraction specification at index $i: missing resultIndex or key\"\n        exit 1\n    fi\n\n    # Check if resultIndex is a valid integer\n    if ! [[ \"$RESULT_INDEX\" =~ ^[0-9]+$ ]]; then\n        echo \"Error: resultIndex at position $i must be a non-negative integer, got: $RESULT_INDEX\"\n        exit 1\n    fi\n\n    # Check if resultIndex is within valid bounds\n    if [ \"$RESULT_INDEX\" -ge \"$KEY_COUNT\" ]; then\n        echo \"Error: resultIndex $RESULT_INDEX at position $i is out of bounds.\"\n        echo \"Valid range is 0 to $((KEY_COUNT - 1))\"\n        exit 1\n    fi\n\n    # Extract the value from the data file using the specified key\n    TRANSFORMED_KEY=$(echo \"$KEY\" | sed -E 's/\\.([^\\.\"\\[]+|\"[^\"]+\")/.\"\\1\"/g')\n    VALUE=$(jq -r \"$TRANSFORMED_KEY\" \"$DATA_FILE\" 2\u003e/dev/null)\n\n    # Check if the key exists in the data file\n    if [ \"$VALUE\" = \"null\" ]; then\n        if [ \"$DEFAULT_VALUE\" != \"null\" ]; then\n            echo \"Key $KEY not found in data file, using default value: $DEFAULT_VALUE\"\n            VALUE=\"$DEFAULT_VALUE\"\n        else\n            echo \"Error: Key $KEY not found in data file, and no default value for it was passed\"\n            exit 1\n        fi\n    fi\n\n    # Update the array at the specified resultIndex\n    RESULT_ARRAY=$(jq --argjson idx \"$RESULT_INDEX\" --arg value \"$VALUE\" '.[$idx] = $value' \u003c\u003c\u003c \"$RESULT_ARRAY\")\ndone\n\n# Write the array result\njq \u003c\u003c\u003c \"$RESULT_ARRAY\" | tee \"/tekton/results/extractedValues\"\n"
                        }
                    ],
                    "volumes": [
                        {
                            "emptyDir": {},
                            "name": "workdir"
                        },
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=54",
                    "operator-sdk/primary-resource": "default-tenant/tsf-demo-app-20260415-231650-000-8a419f9-vm66n",
                    "operator-sdk/primary-resource-type": "Release.appstudio.redhat.com",
                    "pac.test.appstudio.openshift.io/branch": "base-miwkfv",
                    "pac.test.appstudio.openshift.io/cancel-in-progress": "false",
                    "pac.test.appstudio.openshift.io/check-run-id": "71552493202",
                    "pac.test.appstudio.openshift.io/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pac.test.appstudio.openshift.io/event-type": "push",
                    "pac.test.appstudio.openshift.io/git-auth-secret": "pac-gitauth-ojyaao",
                    "pac.test.appstudio.openshift.io/git-provider": "github",
                    "pac.test.appstudio.openshift.io/installation-id": "112348674",
                    "pac.test.appstudio.openshift.io/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-push-cttl8",
                    "pac.test.appstudio.openshift.io/max-keep-runs": "3",
                    "pac.test.appstudio.openshift.io/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-miwkfv\"",
                    "pac.test.appstudio.openshift.io/original-prname": "tsf-demo-comp-on-push",
                    "pac.test.appstudio.openshift.io/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pac.test.appstudio.openshift.io/repository": "tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/scm-reporting-plr-started": "true",
                    "pac.test.appstudio.openshift.io/sender": "rhtap-ci-tests-bot",
                    "pac.test.appstudio.openshift.io/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pac.test.appstudio.openshift.io/sha-title": "Merge pull request #181 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pac.test.appstudio.openshift.io/source-branch": "refs/heads/base-miwkfv",
                    "pac.test.appstudio.openshift.io/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pac.test.appstudio.openshift.io/state": "completed",
                    "pac.test.appstudio.openshift.io/url-org": "rhads-tsf-qe",
                    "pac.test.appstudio.openshift.io/url-repository": "testrepo",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-managed-tenant-syc5c/results/73a7398d-e21e-4159-adb1-64e80c630018/records/d1b941a5-6bbe-4e05-a3f1-62074166d3a3",
                    "results.tekton.dev/result": "default-managed-tenant-syc5c/results/73a7398d-e21e-4159-adb1-64e80c630018",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "release"
                },
                "creationTimestamp": "2026-04-15T23:27:39Z",
                "finalizers": [
                    "chains.tekton.dev",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "tekton-pipelines",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/service": "release",
                    "appstudio.openshift.io/snapshot": "tsf-demo-app-20260415-231650-000",
                    "pipelines.appstudio.openshift.io/type": "managed",
                    "release.appstudio.openshift.io/name": "tsf-demo-app-20260415-231650-000-8a419f9-vm66n",
                    "release.appstudio.openshift.io/namespace": "default-tenant",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "push-to-external-registry",
                    "tekton.dev/pipelineRun": "managed-25x6p",
                    "tekton.dev/pipelineRunUID": "73a7398d-e21e-4159-adb1-64e80c630018",
                    "tekton.dev/pipelineTask": "collect-tpa-params",
                    "tekton.dev/task": "collect-tpa-params"
                },
                "name": "managed-25x6p-collect-tpa-params",
                "namespace": "default-managed-tenant-syc5c",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "managed-25x6p",
                        "uid": "73a7398d-e21e-4159-adb1-64e80c630018"
                    }
                ],
                "resourceVersion": "43288",
                "uid": "d1b941a5-6bbe-4e05-a3f1-62074166d3a3"
            },
            "spec": {
                "params": [
                    {
                        "name": "dataPath",
                        "value": "73a7398d-e21e-4159-adb1-64e80c630018/data.json"
                    },
                    {
                        "name": "ociStorage",
                        "value": "quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts"
                    },
                    {
                        "name": "sourceDataArtifact",
                        "value": "oci:quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts@sha256:2b2a184ca76db29ad1e0173934515414433ee35e7ce2e30c83fa080d97f997a4"
                    },
                    {
                        "name": "dataDir",
                        "value": "/var/workdir/release"
                    },
                    {
                        "name": "trustedArtifactsDebug",
                        "value": ""
                    },
                    {
                        "name": "taskGitUrl",
                        "value": "https://github.com/konflux-ci/release-service-catalog.git"
                    },
                    {
                        "name": "taskGitRevision",
                        "value": "development"
                    },
                    {
                        "name": "failOnMissing",
                        "value": "false"
                    }
                ],
                "serviceAccountName": "release-pipeline",
                "taskRef": {
                    "params": [
                        {
                            "name": "url",
                            "value": "https://github.com/konflux-ci/release-service-catalog.git"
                        },
                        {
                            "name": "revision",
                            "value": "development"
                        },
                        {
                            "name": "pathInRepo",
                            "value": "tasks/managed/collect-tpa-params/collect-tpa-params.yaml"
                        }
                    ],
                    "resolver": "git"
                },
                "timeout": "1h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:27:48Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:27:48Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "managed-25x6p-collect-tpa-params-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha1": "4f00b1a3062b53809bf42ca120e84d73cc199954"
                        },
                        "entryPoint": "tasks/managed/collect-tpa-params/collect-tpa-params.yaml",
                        "uri": "git+https://github.com/konflux-ci/release-service-catalog.git"
                    }
                },
                "results": [
                    {
                        "name": "atlasApiUrl",
                        "type": "string",
                        "value": "https://server-tsf-tpa.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com"
                    },
                    {
                        "name": "retryAWSSecretName",
                        "type": "string",
                        "value": "secret-not-present"
                    },
                    {
                        "name": "retryS3Bucket",
                        "type": "string",
                        "value": ""
                    },
                    {
                        "name": "secretName",
                        "type": "string",
                        "value": "release-sso-secret"
                    },
                    {
                        "name": "ssoTokenUrl",
                        "type": "string",
                        "value": "https://tsf-sso.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/realms/tsf-iam/protocol/openid-connect/token"
                    }
                ],
                "startTime": "2026-04-15T23:27:39Z",
                "steps": [
                    {
                        "container": "step-use-trusted-artifact",
                        "imageID": "quay.io/konflux-ci/build-trusted-artifacts@sha256:27ddb820f0d30609dcb8de88219309edbced429896324e474f494470c2f003fb",
                        "name": "use-trusted-artifact",
                        "provenance": {
                            "refSource": {
                                "digest": {
                                    "sha1": "4f00b1a3062b53809bf42ca120e84d73cc199954"
                                },
                                "entryPoint": "stepactions/use-trusted-artifact/use-trusted-artifact.yaml",
                                "uri": "git+https://github.com/konflux-ci/release-service-catalog.git"
                            }
                        },
                        "terminated": {
                            "containerID": "cri-o://4eb600c6abf01829186b02a7a64537f5c9d685c9659eb3d6aa6ba396cf137a75",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:27:46Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:27:46Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-collect-tpa-params",
                        "imageID": "quay.io/konflux-ci/release-service-utils@sha256:5546fa78d3c88d7b6a2e8cff8902f7757f00541d0bbaf113b9f293133894afa3",
                        "name": "collect-tpa-params",
                        "terminated": {
                            "containerID": "cri-o://6b223269316ee7ff0d12632039061900375cace5a91575ac55c0012158978513",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:27:47Z",
                            "message": "[{\"key\":\"atlasApiUrl\",\"value\":\"https://server-tsf-tpa.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com\",\"type\":1},{\"key\":\"retryAWSSecretName\",\"value\":\"secret-not-present\",\"type\":1},{\"key\":\"retryS3Bucket\",\"value\":\"\",\"type\":1},{\"key\":\"secretName\",\"value\":\"release-sso-secret\",\"type\":1},{\"key\":\"ssoTokenUrl\",\"value\":\"https://tsf-sso.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/realms/tsf-iam/protocol/openid-connect/token\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:27:47Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Tekton task that collects the TPA server option from the data file.\nIt can either parse the cluster configuration stored in konflux-info\nnamespace or parse a dataPath JSON file for values.\n\nIf the desired configmap is present in konflux-info, it will be used\nas a preferred option.\n\nOtherwise it outputs values based on the value of the \"atlas.server\" or\n\"tpa.servers\" field (\"stage\" or \"production\"), the output values are used\nto push SBOMs to TPA. Also outputs results used to push SBOMs to an S3\nbucket.\n\nIf the configmap in konflux-info cannot be parsed and no TPA fields\nare present in the data file, the task fails. If this is undesired,\nthe task can be configured to return empty results instead by setting\nthe parameter 'failOnMissing' to 'false'.",
                    "params": [
                        {
                            "default": "",
                            "description": "Path to the JSON string of the merged data containing the TPA config\n",
                            "name": "dataPath",
                            "type": "string"
                        },
                        {
                            "default": "empty",
                            "description": "The OCI repository where the Trusted Artifacts are stored",
                            "name": "ociStorage",
                            "type": "string"
                        },
                        {
                            "default": "1d",
                            "description": "Expiration date for the trusted artifacts created in the OCI repository. An empty string means the artifacts do not expire",
                            "name": "ociArtifactExpiresAfter",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Flag to enable debug logging in trusted artifacts. Set to a non-empty string to enable",
                            "name": "trustedArtifactsDebug",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "oras options to pass to Trusted Artifacts calls",
                            "name": "orasOptions",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Location of trusted artifacts to be used to populate data directory",
                            "name": "sourceDataArtifact",
                            "type": "string"
                        },
                        {
                            "default": "/var/workdir/release",
                            "description": "The location where data will be stored",
                            "name": "dataDir",
                            "type": "string"
                        },
                        {
                            "description": "The url to the git repo where the release-service-catalog tasks and stepactions to be used are stored",
                            "name": "taskGitUrl",
                            "type": "string"
                        },
                        {
                            "description": "The revision in the taskGitUrl repo to be used",
                            "name": "taskGitRevision",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from",
                            "name": "caTrustConfigMapName",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data",
                            "name": "caTrustConfigMapKey",
                            "type": "string"
                        },
                        {
                            "default": "konflux-info",
                            "description": "The namespace where the ConfigMap is located",
                            "name": "configMapNamespace",
                            "type": "string"
                        },
                        {
                            "default": "cluster-config",
                            "description": "The name of the ConfigMap to read TPA parameters from",
                            "name": "configMapName",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Specify if this task should fail on missing parameters",
                            "name": "failOnMissing",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "URL of the TPA API.\n",
                            "name": "atlasApiUrl",
                            "type": "string"
                        },
                        {
                            "description": "URL of the SSO token issuer.\n",
                            "name": "ssoTokenUrl",
                            "type": "string"
                        },
                        {
                            "description": "The kubernetes secret to use to authenticate to TPA.\n",
                            "name": "secretName",
                            "type": "string"
                        },
                        {
                            "description": "The kubernetes secret to use to authenticate to the S3 retry mechanism bucket.\n",
                            "name": "retryAWSSecretName",
                            "type": "string"
                        },
                        {
                            "description": "Name of the S3 retry mechanism bucket.\n",
                            "name": "retryS3Bucket",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "IMAGE_EXPIRES_AFTER",
                                "value": "1d"
                            },
                            {
                                "name": "ORAS_OPTIONS"
                            },
                            {
                                "name": "DEBUG"
                            }
                        ],
                        "securityContext": {
                            "runAsUser": 1001
                        },
                        "volumeMounts": [
                            {
                                "mountPath": "/var/workdir",
                                "name": "workdir"
                            },
                            {
                                "mountPath": "/mnt/trusted-ca",
                                "name": "trusted-ca",
                                "readOnly": true
                            }
                        ]
                    },
                    "steps": [
                        {
                            "args": [
                                "use",
                                "oci:quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts@sha256:2b2a184ca76db29ad1e0173934515414433ee35e7ce2e30c83fa080d97f997a4=/var/workdir/release"
                            ],
                            "computeResources": {
                                "limits": {
                                    "memory": "64Mi"
                                },
                                "requests": {
                                    "cpu": "30m",
                                    "memory": "64Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "HOME",
                                    "value": "/tekton/home"
                                },
                                {
                                    "name": "ORAS_OPTIONS"
                                },
                                {
                                    "name": "CA_FILE",
                                    "value": "/etc/pki/tls/certs/ca-bundle.crt"
                                }
                            ],
                            "image": "quay.io/konflux-ci/build-trusted-artifacts:653578444c73afc32b3a865fee9869a09f96c1a2",
                            "name": "use-trusted-artifact"
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "memory": "128Mi"
                                },
                                "requests": {
                                    "cpu": "50m",
                                    "memory": "128Mi"
                                }
                            },
                            "image": "quay.io/konflux-ci/release-service-utils@sha256:5546fa78d3c88d7b6a2e8cff8902f7757f00541d0bbaf113b9f293133894afa3",
                            "name": "collect-tpa-params",
                            "script": "#!/usr/bin/env bash\nset -x\n\nKFLX_CONFIG_PATH='/tmp/konflux_config.json'\n\necho 'Checking for configuration...'\nif retry 3 kubectl get configmap \"cluster-config\" -n \"konflux-info\" -o json \u003e \\\n \"$KFLX_CONFIG_PATH\"; then\n  atlasApiURL=$(jq -r '.data.trustifyServerExternalUrl // \"\"' \"$KFLX_CONFIG_PATH\")\n  ssoTokenBaseURL=$(jq -r '.data.trustifyOIDCIssuerUrl // \"\"' \"$KFLX_CONFIG_PATH\")\n  if [ -n \"$atlasApiURL\" ] \u0026\u0026 [ -n \"$ssoTokenBaseURL\" ]; then\n    echo 'Detected cluster-config, gathering information...'\n    ssoTokenFullURL=\"${ssoTokenBaseURL}/protocol/openid-connect/token\"\n    echo -n \"$atlasApiURL\" \u003e \"/tekton/results/atlasApiUrl\"\n    echo -n \"$ssoTokenFullURL\" \u003e \"/tekton/results/ssoTokenUrl\"\n    echo -n 'release-sso-secret' \u003e \"/tekton/results/secretName\"\n    # TSF doesn't use AWS S3, but empty secret names are invalid in K8s\n    echo -n 'secret-not-present' \u003e \"/tekton/results/retryAWSSecretName\"\n    echo -n '' \u003e \"/tekton/results/retryS3Bucket\"\n    echo 'Gathered info from cluster-config, shutting down script.'\n    exit 0\n  fi\nfi\n\necho 'Gathering data from data file...'\n\nDATA_FILE=\"/var/workdir/release/73a7398d-e21e-4159-adb1-64e80c630018/data.json\"\nif [ ! -f \"${DATA_FILE}\" ] ; then\n    echo \"ERROR: No valid data file was provided.\"\n    exit 1\nfi\natlasServer=$(jq -r '(.atlas // .tpa).server' \"$DATA_FILE\")\nif [ \"$atlasServer\" = \"stage\" ]; then\n    atlasApiUrl=\"https://atlas.release.stage.devshift.net\"\n    ssoTokenUrl=\"https://auth.stage.redhat.com/auth/realms/EmployeeIDP/protocol/openid-connect/token\"\n    secretName=$(jq -r \\\n      '(.atlas // .tpa).\"atlas-sso-secret-name\" // \"atlas-staging-sso-secret\"' \"$DATA_FILE\")\n    retryAWSSecretName=$(jq -r \\\n      '(.atlas // .tpa).\"atlas-retry-aws-secret-name\" // \"atlas-retry-s3-staging-secret\"' \"$DATA_FILE\")\n    retryS3Bucket=\"mpp-e1-preprod-sbom-29093454-2ea7-4fd0-b4cf-dc69a7529ee0\"\nelif [ \"$atlasServer\" = \"production\" ]; then\n    atlasApiUrl=\"https://atlas.release.devshift.net\"\n    ssoTokenUrl=\"https://auth.redhat.com/auth/realms/EmployeeIDP/protocol/openid-connect/token\"\n    secretName=$(jq -r '(.atlas // .tpa).\"atlas-sso-secret-name\" // \"atlas-prod-sso-secret\"' \"$DATA_FILE\")\n    retryAWSSecretName=$(jq -r \\\n      '(.atlas // .tpa).\"atlas-retry-aws-secret-name\" // \"atlas-retry-s3-production-secret\"' \"$DATA_FILE\")\n    retryS3Bucket=\"mpp-e1-prod-sbom-e02138d3-5c5c-4d90-a38f-6c54f658604d\"\nelif [ \"false\" == 'true' ]; then\n    if [ \"$atlasServer\" = \"null\" ]; then\n        echo \"ERROR: .(tpa/atlas).server value is missing from the data file. This field is mandatory.\"\n        echo \"Consult with your release engineering contact to ask why you are missing this value\"\n        exit 1\n    else\n        echo \"ERROR: Unknown .(tpa/atlas).server value '$atlasServer'. Expected 'stage' or 'production'.\"\n        exit 1\n    fi\nfi\n\necho -n \"$atlasApiUrl\" \u003e \"/tekton/results/atlasApiUrl\"\necho -n \"$ssoTokenUrl\" \u003e \"/tekton/results/ssoTokenUrl\"\necho -n \"$secretName\" \u003e \"/tekton/results/secretName\"\necho -n \"$retryAWSSecretName\" \u003e \"/tekton/results/retryAWSSecretName\"\necho -n \"$retryS3Bucket\" \u003e \"/tekton/results/retryS3Bucket\"\n"
                        }
                    ],
                    "volumes": [
                        {
                            "emptyDir": {},
                            "name": "workdir"
                        },
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=53",
                    "operator-sdk/primary-resource": "default-tenant/tsf-demo-app-20260415-231650-000-8a419f9-vm66n",
                    "operator-sdk/primary-resource-type": "Release.appstudio.redhat.com",
                    "pac.test.appstudio.openshift.io/branch": "base-miwkfv",
                    "pac.test.appstudio.openshift.io/cancel-in-progress": "false",
                    "pac.test.appstudio.openshift.io/check-run-id": "71552493202",
                    "pac.test.appstudio.openshift.io/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pac.test.appstudio.openshift.io/event-type": "push",
                    "pac.test.appstudio.openshift.io/git-auth-secret": "pac-gitauth-ojyaao",
                    "pac.test.appstudio.openshift.io/git-provider": "github",
                    "pac.test.appstudio.openshift.io/installation-id": "112348674",
                    "pac.test.appstudio.openshift.io/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-push-cttl8",
                    "pac.test.appstudio.openshift.io/max-keep-runs": "3",
                    "pac.test.appstudio.openshift.io/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-miwkfv\"",
                    "pac.test.appstudio.openshift.io/original-prname": "tsf-demo-comp-on-push",
                    "pac.test.appstudio.openshift.io/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pac.test.appstudio.openshift.io/repository": "tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/scm-reporting-plr-started": "true",
                    "pac.test.appstudio.openshift.io/sender": "rhtap-ci-tests-bot",
                    "pac.test.appstudio.openshift.io/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pac.test.appstudio.openshift.io/sha-title": "Merge pull request #181 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pac.test.appstudio.openshift.io/source-branch": "refs/heads/base-miwkfv",
                    "pac.test.appstudio.openshift.io/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pac.test.appstudio.openshift.io/state": "completed",
                    "pac.test.appstudio.openshift.io/url-org": "rhads-tsf-qe",
                    "pac.test.appstudio.openshift.io/url-repository": "testrepo",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-managed-tenant-syc5c/results/73a7398d-e21e-4159-adb1-64e80c630018/records/73457dd4-4808-4e67-8492-7ff007b0f698",
                    "results.tekton.dev/result": "default-managed-tenant-syc5c/results/73a7398d-e21e-4159-adb1-64e80c630018",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "release"
                },
                "creationTimestamp": "2026-04-15T23:27:26Z",
                "finalizers": [
                    "chains.tekton.dev",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "tekton-pipelines",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/service": "release",
                    "appstudio.openshift.io/snapshot": "tsf-demo-app-20260415-231650-000",
                    "pipelines.appstudio.openshift.io/type": "managed",
                    "release.appstudio.openshift.io/name": "tsf-demo-app-20260415-231650-000-8a419f9-vm66n",
                    "release.appstudio.openshift.io/namespace": "default-tenant",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "push-to-external-registry",
                    "tekton.dev/pipelineRun": "managed-25x6p",
                    "tekton.dev/pipelineRunUID": "73a7398d-e21e-4159-adb1-64e80c630018",
                    "tekton.dev/pipelineTask": "filter-already-released-images",
                    "tekton.dev/task": "filter-already-released-images"
                },
                "name": "managed-25x6p-filter-already-released-images",
                "namespace": "default-managed-tenant-syc5c",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "managed-25x6p",
                        "uid": "73a7398d-e21e-4159-adb1-64e80c630018"
                    }
                ],
                "resourceVersion": "43003",
                "uid": "73457dd4-4808-4e67-8492-7ff007b0f698"
            },
            "spec": {
                "params": [
                    {
                        "name": "snapshotPath",
                        "value": "73a7398d-e21e-4159-adb1-64e80c630018/snapshot_spec.json"
                    },
                    {
                        "name": "ociStorage",
                        "value": "quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts"
                    },
                    {
                        "name": "sourceDataArtifact",
                        "value": "oci:quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts@sha256:10637a1d22053e337836c216e5952b45d7d95c17ec9c73f75ea92c4cf8f7b4fa"
                    },
                    {
                        "name": "dataDir",
                        "value": "/var/workdir/release"
                    },
                    {
                        "name": "trustedArtifactsDebug",
                        "value": ""
                    },
                    {
                        "name": "taskGitUrl",
                        "value": "https://github.com/konflux-ci/release-service-catalog.git"
                    },
                    {
                        "name": "taskGitRevision",
                        "value": "development"
                    }
                ],
                "serviceAccountName": "release-pipeline",
                "taskRef": {
                    "params": [
                        {
                            "name": "url",
                            "value": "https://github.com/konflux-ci/release-service-catalog.git"
                        },
                        {
                            "name": "revision",
                            "value": "development"
                        },
                        {
                            "name": "pathInRepo",
                            "value": "tasks/managed/filter-already-released-images/filter-already-released-images.yaml"
                        }
                    ],
                    "resolver": "git"
                },
                "timeout": "1h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:27:39Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:27:39Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "managed-25x6p-filter-already-released-images-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha1": "4f00b1a3062b53809bf42ca120e84d73cc199954"
                        },
                        "entryPoint": "tasks/managed/filter-already-released-images/filter-already-released-images.yaml",
                        "uri": "git+https://github.com/konflux-ci/release-service-catalog.git"
                    }
                },
                "results": [
                    {
                        "name": "skip_release",
                        "type": "string",
                        "value": "false"
                    },
                    {
                        "name": "sourceDataArtifact",
                        "type": "string",
                        "value": "oci:quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts@sha256:2b862c40aec76316fae1617a2dad50d546c0cf26cbc3a955428c846df20dc71e"
                    }
                ],
                "startTime": "2026-04-15T23:27:26Z",
                "steps": [
                    {
                        "container": "step-use-trusted-artifact",
                        "imageID": "quay.io/konflux-ci/build-trusted-artifacts@sha256:27ddb820f0d30609dcb8de88219309edbced429896324e474f494470c2f003fb",
                        "name": "use-trusted-artifact",
                        "provenance": {
                            "refSource": {
                                "digest": {
                                    "sha1": "4f00b1a3062b53809bf42ca120e84d73cc199954"
                                },
                                "entryPoint": "stepactions/use-trusted-artifact/use-trusted-artifact.yaml",
                                "uri": "git+https://github.com/konflux-ci/release-service-catalog.git"
                            }
                        },
                        "terminated": {
                            "containerID": "cri-o://3909b348d1bf2ad754e62fcfc99941e081b193a662e7c7f89445ee6ecc440ee8",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:27:34Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:27:34Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-create-trusted-artifact",
                        "imageID": "quay.io/konflux-ci/build-trusted-artifacts@sha256:27ddb820f0d30609dcb8de88219309edbced429896324e474f494470c2f003fb",
                        "name": "create-trusted-artifact",
                        "provenance": {
                            "refSource": {
                                "digest": {
                                    "sha1": "4f00b1a3062b53809bf42ca120e84d73cc199954"
                                },
                                "entryPoint": "stepactions/create-trusted-artifact/create-trusted-artifact.yaml",
                                "uri": "git+https://github.com/konflux-ci/release-service-catalog.git"
                            }
                        },
                        "terminated": {
                            "containerID": "cri-o://9f254a91f547e9f4a520cfce3160fe40fa63bfda823cd02853c8d8dc137ed08b",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:27:38Z",
                            "message": "[{\"key\":\"skip_release\",\"value\":\"false\",\"type\":1},{\"key\":\"sourceDataArtifact\",\"value\":\"oci:quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts@sha256:2b862c40aec76316fae1617a2dad50d546c0cf26cbc3a955428c846df20dc71e\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:27:36Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-filter-already-released-images",
                        "imageID": "quay.io/konflux-ci/release-service-utils@sha256:5546fa78d3c88d7b6a2e8cff8902f7757f00541d0bbaf113b9f293133894afa3",
                        "name": "filter-already-released-images",
                        "terminated": {
                            "containerID": "cri-o://02688736deedda5d81a1a0cf74c761cf090198de0e082ed597f876e61c08db41",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:27:35Z",
                            "message": "[{\"key\":\"skip_release\",\"value\":\"false\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:27:35Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Tekton task to filter out images from a snapshot that have already been released.\nThis task checks target registries to determine if push-snapshot has completed successfully\nfor each component by validating that ALL required tags exist with the correct digest.\nComponents that are fully released (all tags present) are filtered out before conforma validation.\n\nTag-level validation ensures complete releases and prevents filtering components with\npartial tag pushes. A component is only filtered if ALL repositories have ALL\nrequired tags pointing to the correct digest.\n\nThe task overwrites the original snapshot file in place with a filtered version\ncontaining only unpublished or partially published images.\n\nThis task must run AFTER apply-mapping since it needs the mapped target repositories\nand their required tags from the enriched snapshot stored in trusted artifacts",
                    "params": [
                        {
                            "description": "Path to the JSON string of the Snapshot spec in the data workspace",
                            "name": "snapshotPath",
                            "type": "string"
                        },
                        {
                            "default": "empty",
                            "description": "The OCI repository where the Trusted Artifacts are stored",
                            "name": "ociStorage",
                            "type": "string"
                        },
                        {
                            "default": "1d",
                            "description": "Expiration date for the trusted artifacts created in the OCI repository.\nAn empty string means the artifacts do not expire",
                            "name": "ociArtifactExpiresAfter",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Flag to enable debug logging in trusted artifacts. Set to a non-empty string to enable",
                            "name": "trustedArtifactsDebug",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "oras options to pass to Trusted Artifacts calls",
                            "name": "orasOptions",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Location of trusted artifacts to be used to populate data directory",
                            "name": "sourceDataArtifact",
                            "type": "string"
                        },
                        {
                            "default": "/var/workdir/release",
                            "description": "The location where data will be stored",
                            "name": "dataDir",
                            "type": "string"
                        },
                        {
                            "default": "https://github.com/konflux-ci/release-service-catalog.git",
                            "description": "The url to the git repo where the release-service-catalog tasks to be used are stored",
                            "name": "taskGitUrl",
                            "type": "string"
                        },
                        {
                            "description": "The revision in the taskGitUrl repo to be used",
                            "name": "taskGitRevision",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from",
                            "name": "caTrustConfigMapName",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data",
                            "name": "caTrustConfigMapKey",
                            "type": "string"
                        },
                        {
                            "default": "/etc/pki/tls/certs/ca-bundle.crt",
                            "description": "Path to CA certificate bundle for TLS verification with self-signed certificates",
                            "name": "caCertPath",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Whether to skip release tasks (true if all components are already released)",
                            "name": "skip_release",
                            "type": "string"
                        },
                        {
                            "description": "The location of the source data artifact in the OCI repository",
                            "name": "sourceDataArtifact",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "IMAGE_EXPIRES_AFTER",
                                "value": "1d"
                            },
                            {
                                "name": "ORAS_OPTIONS"
                            },
                            {
                                "name": "DEBUG"
                            }
                        ],
                        "securityContext": {
                            "runAsUser": 1001
                        },
                        "volumeMounts": [
                            {
                                "mountPath": "/var/workdir",
                                "name": "workdir"
                            },
                            {
                                "mountPath": "/etc/pki/tls/certs/ca-bundle.crt",
                                "name": "trusted-ca",
                                "readOnly": true,
                                "subPath": "ca-bundle.crt"
                            },
                            {
                                "mountPath": "/etc/ssl/certs/ca-custom-bundle.crt",
                                "name": "trusted-ca",
                                "readOnly": true,
                                "subPath": "ca-bundle.crt"
                            }
                        ]
                    },
                    "steps": [
                        {
                            "args": [
                                "use",
                                "oci:quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts@sha256:10637a1d22053e337836c216e5952b45d7d95c17ec9c73f75ea92c4cf8f7b4fa=/var/workdir/release"
                            ],
                            "computeResources": {
                                "limits": {
                                    "memory": "64Mi"
                                },
                                "requests": {
                                    "cpu": "30m",
                                    "memory": "64Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "HOME",
                                    "value": "/tekton/home"
                                },
                                {
                                    "name": "ORAS_OPTIONS"
                                },
                                {
                                    "name": "CA_FILE",
                                    "value": "/etc/pki/tls/certs/ca-bundle.crt"
                                }
                            ],
                            "image": "quay.io/konflux-ci/build-trusted-artifacts:653578444c73afc32b3a865fee9869a09f96c1a2",
                            "name": "use-trusted-artifact"
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "memory": "1Gi"
                                },
                                "requests": {
                                    "cpu": "250m",
                                    "memory": "1Gi"
                                }
                            },
                            "image": "quay.io/konflux-ci/release-service-utils@sha256:5546fa78d3c88d7b6a2e8cff8902f7757f00541d0bbaf113b9f293133894afa3",
                            "name": "filter-already-released-images",
                            "script": "#!/usr/bin/env bash\nset -eux\n\nSNAPSHOT_FILE=\"/var/workdir/release/73a7398d-e21e-4159-adb1-64e80c630018/snapshot_spec.json\"\n\nif [ ! -f \"${SNAPSHOT_FILE}\" ]; then\n    echo \"Error: Snapshot file not found: ${SNAPSHOT_FILE}\"\n    exit 1\nfi\n\nSNAPSHOT_JSON=$(cat \"${SNAPSHOT_FILE}\")\nCOMPONENT_COUNT=$(jq '.components | length' \u003c\u003c\u003c \"${SNAPSHOT_JSON}\")\n\nFILTERED_COMPONENTS='[]'\nFILTERED_COUNT=0\n\nfor ((i=0; i\u003cCOMPONENT_COUNT; i++)); do\n    COMPONENT=$(jq -c \".components[$i]\" \u003c\u003c\u003c \"${SNAPSHOT_JSON}\")\n    COMPONENT_NAME=$(jq -r '.name' \u003c\u003c\u003c \"${COMPONENT}\")\n    CONTAINER_IMAGE=$(jq -r '.containerImage' \u003c\u003c\u003c \"${COMPONENT}\")\n\n    # Get the component image digest using oras resolve (same as push-snapshot)\n    # This ensures we compare manifest index digests, not platform-specific ones\n    COMPONENT_AUTH_FILE=$(mktemp)\n    if ! select-oci-auth \"${CONTAINER_IMAGE}\" \u003e \"${COMPONENT_AUTH_FILE}\" 2\u003e/dev/null || \\\n       [ ! -s \"${COMPONENT_AUTH_FILE}\" ]; then\n        echo '{}' \u003e \"${COMPONENT_AUTH_FILE}\"\n    fi\n\n    # Try to resolve the component image. If this fails for ANY reason\n    # (auth, network, not found, etc.), treat as \"not released\"\n    if ! DIGEST=$(oras resolve --registry-config \"${COMPONENT_AUTH_FILE}\" \\\n        \"${CONTAINER_IMAGE}\" 2\u003e/dev/null); then\n        echo \"WARNING: Cannot resolve component image ${CONTAINER_IMAGE}, treating as not yet released\"\n        FILTERED_COMPONENTS=$(jq --argjson comp \"${COMPONENT}\" '. += [$comp]' \u003c\u003c\u003c \"${FILTERED_COMPONENTS}\")\n        rm -f \"${COMPONENT_AUTH_FILE}\"\n        continue\n    fi\n    rm -f \"${COMPONENT_AUTH_FILE}\"\n\n    if [ -z \"${DIGEST}\" ]; then\n        echo \"WARNING: Empty digest for ${CONTAINER_IMAGE}, treating as not yet released\"\n        FILTERED_COMPONENTS=$(jq --argjson comp \"${COMPONENT}\" '. += [$comp]' \u003c\u003c\u003c \"${FILTERED_COMPONENTS}\")\n        continue\n    fi\n\n    echo \"  Component digest: ${DIGEST}\"\n\n    # Check if component has repositories (added by apply-mapping)\n    REPOSITORIES=$(jq -c '.repositories // []' \u003c\u003c\u003c \"${COMPONENT}\")\n    NUM_REPOS=$(jq 'length' \u003c\u003c\u003c \"${REPOSITORIES}\")\n\n    if [ \"${NUM_REPOS}\" -eq 0 ]; then\n        echo \"WARNING: No repositories found for component ${COMPONENT_NAME}\"\n        echo \"  Component will be kept (not filtered) since there are no target repos to check\"\n        FILTERED_COMPONENTS=$(jq --argjson comp \"${COMPONENT}\" \\\n          '. += [$comp]' \u003c\u003c\u003c \"${FILTERED_COMPONENTS}\")\n        continue\n    fi\n\n    echo \"Checking component: ${COMPONENT_NAME} (${NUM_REPOS} target repositories)\"\n\n    # Check if ALL required tags exist with correct digest in ANY target repository\n    # We consider the component \"released\" if it is fully released to ANY of the\n    # mapped registries (i.e., if any repository has all required tags pointing\n    # to the same manifest digest).\n    ALL_TAGS_COMPLETE=\"false\"\n\n    for ((j=0; j\u003cNUM_REPOS; j++)); do\n        REPO_OBJ=$(jq -c \".[$j]\" \u003c\u003c\u003c \"${REPOSITORIES}\")\n        REPO_URL=$(jq -r '.url // \"\"' \u003c\u003c\u003c \"${REPO_OBJ}\")\n        REPO_TAGS=$(jq -c '.tags // []' \u003c\u003c\u003c \"${REPO_OBJ}\")\n\n        if [ -z \"${REPO_URL}\" ]; then\n            echo \"  WARNING: Repository #$((j+1)) has empty URL, skipping\"\n            continue\n        fi\n\n        NUM_TAGS=$(jq 'length' \u003c\u003c\u003c \"${REPO_TAGS}\")\n\n        if [ \"${NUM_TAGS}\" -eq 0 ]; then\n            echo \"  WARNING: Repository ${REPO_URL} has no tags specified, skipping\"\n            continue\n        fi\n\n        echo \"  Checking repository: ${REPO_URL} (${NUM_TAGS} tags)\"\n\n        REPO_COMPLETE=\"true\"\n        for ((k=0; k\u003cNUM_TAGS; k++)); do\n            TAG=$(jq -r \".[$k]\" \u003c\u003c\u003c \"${REPO_TAGS}\")\n            TARGET_IMAGE=\"${REPO_URL}:${TAG}\"\n\n            # Try to create auth file for target registry (optional for public/test registries)\n            TARGET_AUTH_FILE=$(mktemp)\n            if ! select-oci-auth \"${REPO_URL}\" \u003e \"${TARGET_AUTH_FILE}\" 2\u003e/dev/null || \\\n               [ ! -s \"${TARGET_AUTH_FILE}\" ]; then\n                # No auth available, use empty config\n                echo '{}' \u003e \"${TARGET_AUTH_FILE}\"\n            fi\n\n            # Try to resolve the target image. If this fails for ANY reason,\n            # treat as \"not found\" (repository doesn't exist, tag missing, etc.)\n            if ! ACTUAL_DIGEST=$(oras resolve --registry-config \"${TARGET_AUTH_FILE}\" \\\n                \"${TARGET_IMAGE}\" 2\u003e/dev/null); then\n                echo \"    Tag ${TAG}: Cannot resolve (treating as not found)\"\n                REPO_COMPLETE=\"false\"\n                rm -f \"${TARGET_AUTH_FILE}\"\n                break\n            fi\n            rm -f \"${TARGET_AUTH_FILE}\"\n\n            if [ -z \"${ACTUAL_DIGEST}\" ]; then\n                # Tag doesn't exist\n                echo \"    Tag ${TAG}: NOT FOUND\"\n                REPO_COMPLETE=\"false\"\n                break\n            elif [ \"${ACTUAL_DIGEST}\" != \"${DIGEST}\" ]; then\n                # Tag exists but points to wrong digest\n                echo \"    Tag ${TAG}: DIGEST MISMATCH\"\n                echo \"      Expected: ${DIGEST}\"\n                echo \"      Found:    ${ACTUAL_DIGEST}\"\n                REPO_COMPLETE=\"false\"\n                break\n            else\n                echo \"    Tag ${TAG}: ✅ MATCH (${ACTUAL_DIGEST})\"\n            fi\n        done\n\n        # If this repository is complete (all tags present and digests matched)\n        # then this component can be treated as already released (any-repo logic)\n        if [ \"${REPO_COMPLETE}\" == \"true\" ]; then\n          ALL_TAGS_COMPLETE=\"true\"\n          # We can stop checking other repos, one match is sufficient\n          break\n        fi\n    done\n\n    if [ \"${ALL_TAGS_COMPLETE}\" == \"true\" ]; then\n        echo \"✅ Component ${COMPONENT_NAME}: FILTERED (already released)\"\n        FILTERED_COUNT=$((FILTERED_COUNT + 1))\n    else\n        echo \"⏭️  Component ${COMPONENT_NAME}: KEPT (needs to be released)\"\n        FILTERED_COMPONENTS=$(jq --argjson comp \"${COMPONENT}\" '. += [$comp]' \u003c\u003c\u003c \"${FILTERED_COMPONENTS}\")\n    fi\n    echo \"\"\ndone\n\n# Update snapshot with filtered components\nFILTERED_SNAPSHOT=$(jq --argjson comps \"${FILTERED_COMPONENTS}\" '.components = $comps' \u003c\u003c\u003c \"${SNAPSHOT_JSON}\")\necho \"${FILTERED_SNAPSHOT}\" \u003e \"${SNAPSHOT_FILE}\"\n\n# Summary\necho \"━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━\"\necho \"SUMMARY:\"\necho \"  Total components: ${COMPONENT_COUNT}\"\necho \"  Filtered (already released): ${FILTERED_COUNT}\"\necho \"  To be released: $((COMPONENT_COUNT - FILTERED_COUNT))\"\necho \"━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━\"\n\n# Set skip_release=true if all components were filtered\nif [ \"${FILTERED_COUNT}\" -eq \"${COMPONENT_COUNT}\" ] \u0026\u0026 [ \"${COMPONENT_COUNT}\" -gt 0 ]; then\n    echo -n \"true\" \u003e \"/tekton/results/skip_release\"\nelse\n    echo -n \"false\" \u003e \"/tekton/results/skip_release\"\nfi\n"
                        },
                        {
                            "args": [
                                "create",
                                "--store",
                                "quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts",
                                "/tekton/results/sourceDataArtifact=/var/workdir/release"
                            ],
                            "computeResources": {
                                "limits": {
                                    "memory": "128Mi"
                                },
                                "requests": {
                                    "cpu": "250m",
                                    "memory": "128Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "HOME",
                                    "value": "/tekton/home"
                                },
                                {
                                    "name": "ORAS_OPTIONS"
                                },
                                {
                                    "name": "CA_FILE",
                                    "value": "/etc/pki/tls/certs/ca-bundle.crt"
                                }
                            ],
                            "image": "quay.io/konflux-ci/build-trusted-artifacts:653578444c73afc32b3a865fee9869a09f96c1a2",
                            "name": "create-trusted-artifact"
                        }
                    ],
                    "volumes": [
                        {
                            "emptyDir": {},
                            "name": "workdir"
                        },
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=58",
                    "operator-sdk/primary-resource": "default-tenant/tsf-demo-app-20260415-231650-000-8a419f9-vm66n",
                    "operator-sdk/primary-resource-type": "Release.appstudio.redhat.com",
                    "pac.test.appstudio.openshift.io/branch": "base-miwkfv",
                    "pac.test.appstudio.openshift.io/cancel-in-progress": "false",
                    "pac.test.appstudio.openshift.io/check-run-id": "71552493202",
                    "pac.test.appstudio.openshift.io/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pac.test.appstudio.openshift.io/event-type": "push",
                    "pac.test.appstudio.openshift.io/git-auth-secret": "pac-gitauth-ojyaao",
                    "pac.test.appstudio.openshift.io/git-provider": "github",
                    "pac.test.appstudio.openshift.io/installation-id": "112348674",
                    "pac.test.appstudio.openshift.io/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-push-cttl8",
                    "pac.test.appstudio.openshift.io/max-keep-runs": "3",
                    "pac.test.appstudio.openshift.io/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-miwkfv\"",
                    "pac.test.appstudio.openshift.io/original-prname": "tsf-demo-comp-on-push",
                    "pac.test.appstudio.openshift.io/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pac.test.appstudio.openshift.io/repository": "tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/scm-reporting-plr-started": "true",
                    "pac.test.appstudio.openshift.io/sender": "rhtap-ci-tests-bot",
                    "pac.test.appstudio.openshift.io/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pac.test.appstudio.openshift.io/sha-title": "Merge pull request #181 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pac.test.appstudio.openshift.io/source-branch": "refs/heads/base-miwkfv",
                    "pac.test.appstudio.openshift.io/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pac.test.appstudio.openshift.io/state": "completed",
                    "pac.test.appstudio.openshift.io/url-org": "rhads-tsf-qe",
                    "pac.test.appstudio.openshift.io/url-repository": "testrepo",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-managed-tenant-syc5c/results/73a7398d-e21e-4159-adb1-64e80c630018/records/fb58c9a3-6cbd-4834-9b9a-b77a4c418779",
                    "results.tekton.dev/result": "default-managed-tenant-syc5c/results/73a7398d-e21e-4159-adb1-64e80c630018",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "release"
                },
                "creationTimestamp": "2026-04-15T23:28:29Z",
                "finalizers": [
                    "results.tekton.dev/taskrun",
                    "chains.tekton.dev"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "tekton-pipelines",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/service": "release",
                    "appstudio.openshift.io/snapshot": "tsf-demo-app-20260415-231650-000",
                    "pipelines.appstudio.openshift.io/type": "managed",
                    "release.appstudio.openshift.io/name": "tsf-demo-app-20260415-231650-000-8a419f9-vm66n",
                    "release.appstudio.openshift.io/namespace": "default-tenant",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "push-to-external-registry",
                    "tekton.dev/pipelineRun": "managed-25x6p",
                    "tekton.dev/pipelineRunUID": "73a7398d-e21e-4159-adb1-64e80c630018",
                    "tekton.dev/pipelineTask": "process-component-sbom"
                },
                "name": "managed-25x6p-process-component-sbom",
                "namespace": "default-managed-tenant-syc5c",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "managed-25x6p",
                        "uid": "73a7398d-e21e-4159-adb1-64e80c630018"
                    }
                ],
                "resourceVersion": "44035",
                "uid": "fb58c9a3-6cbd-4834-9b9a-b77a4c418779"
            },
            "spec": {
                "params": [
                    {
                        "name": "resultsDirPath",
                        "value": "73a7398d-e21e-4159-adb1-64e80c630018/results"
                    },
                    {
                        "name": "snapshotSpec",
                        "value": "73a7398d-e21e-4159-adb1-64e80c630018/snapshot_spec.json"
                    },
                    {
                        "name": "releaseData",
                        "value": "73a7398d-e21e-4159-adb1-64e80c630018/data.json"
                    },
                    {
                        "name": "retryAWSSecretName",
                        "value": "secret-not-present"
                    },
                    {
                        "name": "retryS3Bucket",
                        "value": ""
                    },
                    {
                        "name": "atlasSecretName",
                        "value": "release-sso-secret"
                    },
                    {
                        "name": "ssoTokenUrl",
                        "value": "https://tsf-sso.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/realms/tsf-iam/protocol/openid-connect/token"
                    },
                    {
                        "name": "atlasApiUrl",
                        "value": "https://server-tsf-tpa.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com"
                    },
                    {
                        "name": "ociStorage",
                        "value": "quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts"
                    },
                    {
                        "name": "sourceDataArtifact",
                        "value": "oci:quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts@sha256:2b862c40aec76316fae1617a2dad50d546c0cf26cbc3a955428c846df20dc71e"
                    },
                    {
                        "name": "dataDir",
                        "value": "/var/workdir/release"
                    },
                    {
                        "name": "trustedArtifactsDebug",
                        "value": ""
                    },
                    {
                        "name": "taskGitUrl",
                        "value": "https://github.com/konflux-ci/release-service-catalog.git"
                    },
                    {
                        "name": "taskGitRevision",
                        "value": "development"
                    },
                    {
                        "name": "cosignSecretName",
                        "value": "secret-not-present"
                    },
                    {
                        "name": "attestationPubKey",
                        "value": "k8s://openshift-pipelines/public-key"
                    },
                    {
                        "name": "defaultOIDCIssuer",
                        "value": "https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j"
                    },
                    {
                        "name": "rekorExternalUrl",
                        "value": "https://rekor-server-tsf-tas.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com"
                    },
                    {
                        "name": "fulcioExternalUrl",
                        "value": "https://fulcio-server-tsf-tas.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com"
                    },
                    {
                        "name": "tufExternalUrl",
                        "value": "https://tuf-tsf-tas.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com"
                    },
                    {
                        "name": "buildIdentityRegexp",
                        "value": "^https://kubernetes.io/namespaces/[a-z0-9-]+-tenant/serviceaccounts/build-pipeline-[a-z0-9-]+$"
                    }
                ],
                "serviceAccountName": "release-pipeline",
                "taskRef": {
                    "params": [
                        {
                            "name": "url",
                            "value": "https://github.com/konflux-ci/mobster.git"
                        },
                        {
                            "name": "revision",
                            "value": "fb3aaa43fb938f05c3f175a7e4c699da63c5f34b"
                        },
                        {
                            "name": "pathInRepo",
                            "value": "tasks/augment-component-sboms-ta/0.3/augment-component-sboms-ta.yaml"
                        }
                    ],
                    "resolver": "git"
                },
                "timeout": "1h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:28:51Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:28:51Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "managed-25x6p-process-component-sbom-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha1": "fb3aaa43fb938f05c3f175a7e4c699da63c5f34b"
                        },
                        "entryPoint": "tasks/augment-component-sboms-ta/0.3/augment-component-sboms-ta.yaml",
                        "uri": "git+https://github.com/konflux-ci/mobster.git"
                    }
                },
                "results": [
                    {
                        "name": "sourceDataArtifact",
                        "type": "string",
                        "value": "oci:quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts@sha256:ef638514f1e31ce4a678604953e9395feff9af2c51fb8b00b31c66c02d03599b"
                    }
                ],
                "startTime": "2026-04-15T23:28:29Z",
                "steps": [
                    {
                        "container": "step-use-trusted-artifact",
                        "imageID": "quay.io/konflux-ci/build-trusted-artifacts@sha256:27ddb820f0d30609dcb8de88219309edbced429896324e474f494470c2f003fb",
                        "name": "use-trusted-artifact",
                        "provenance": {
                            "refSource": {
                                "digest": {
                                    "sha1": "4f00b1a3062b53809bf42ca120e84d73cc199954"
                                },
                                "entryPoint": "stepactions/use-trusted-artifact/use-trusted-artifact.yaml",
                                "uri": "git+https://github.com/konflux-ci/release-service-catalog.git"
                            }
                        },
                        "terminated": {
                            "containerID": "cri-o://d7bf1d78aa8e9e141a0a57d9bc697bdf808f92bd0a6cc14f59fff2f6e83b76e7",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:28:40Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:28:40Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-create-trusted-artifact",
                        "imageID": "quay.io/konflux-ci/build-trusted-artifacts@sha256:27ddb820f0d30609dcb8de88219309edbced429896324e474f494470c2f003fb",
                        "name": "create-trusted-artifact",
                        "provenance": {
                            "refSource": {
                                "digest": {
                                    "sha1": "4f00b1a3062b53809bf42ca120e84d73cc199954"
                                },
                                "entryPoint": "stepactions/create-trusted-artifact/create-trusted-artifact.yaml",
                                "uri": "git+https://github.com/konflux-ci/release-service-catalog.git"
                            }
                        },
                        "terminated": {
                            "containerID": "cri-o://25212990a7900b28dc09c7c60f2cb42307171a5d84d3c3993cd7fa50ab42df29",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:28:51Z",
                            "message": "[{\"key\":\"sourceDataArtifact\",\"value\":\"oci:quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts@sha256:ef638514f1e31ce4a678604953e9395feff9af2c51fb8b00b31c66c02d03599b\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:28:49Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-process-component-sboms",
                        "imageID": "quay.io/konflux-ci/mobster@sha256:6031da763d8e624d21cd9be1f91e90449b5801227c52adbf76b964895c0718b9",
                        "name": "process-component-sboms",
                        "terminated": {
                            "containerID": "cri-o://7513e125a1369e046cbe446425b0599db3e3c908481452019a21573cbf16b4ec",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:28:48Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:28:41Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Update component-level SBOMs with release-time information, optionally upload them to Atlas and S3.",
                    "params": [
                        {
                            "default": "empty",
                            "description": "The OCI repository where the Trusted Artifacts are stored.",
                            "name": "ociStorage",
                            "type": "string"
                        },
                        {
                            "default": "1d",
                            "description": "Expiration date for the trusted artifacts created in the OCI repository. An empty string means the artifacts do not expire.",
                            "name": "ociArtifactExpiresAfter",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Flag to enable debug logging in trusted artifacts. Set to a non-empty string to enable.",
                            "name": "trustedArtifactsDebug",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "oras options to pass to Trusted Artifacts calls",
                            "name": "orasOptions",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Location of trusted artifacts to be used to populate data directory",
                            "name": "sourceDataArtifact",
                            "type": "string"
                        },
                        {
                            "default": "/var/workdir/release",
                            "description": "The location where data will be stored",
                            "name": "dataDir",
                            "type": "string"
                        },
                        {
                            "description": "The url to the git repo where the trusted artifact stepactions to be used are stored",
                            "name": "taskGitUrl",
                            "type": "string"
                        },
                        {
                            "description": "The revision in the taskGitUrl repo to be used for trusted artifact stepactions",
                            "name": "taskGitRevision",
                            "type": "string"
                        },
                        {
                            "description": "Path to the mapped snapshot spec.",
                            "name": "snapshotSpec",
                            "type": "string"
                        },
                        {
                            "description": "The name of the K8s secret containing the 'sso_account' and 'sso_token' keys used for Atlas OIDC authentication.\n",
                            "name": "atlasSecretName",
                            "type": "string"
                        },
                        {
                            "default": "secret-not-present",
                            "description": "The name of the K8s secret containing the 'atlas-aws-access-key-id' and 'atlas-aws-secret-access-key' keys used for AWS S3 access.\n",
                            "name": "retryAWSSecretName",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "The name of the S3 bucket used to store data for the retry mechanism.\n",
                            "name": "retryS3Bucket",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "URL of the Atlas API host.",
                            "name": "atlasApiUrl",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "URL of the SSO token issuer.",
                            "name": "ssoTokenUrl",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Path to the certificate authority bundle to set up TPA requests.",
                            "name": "caPath",
                            "type": "string"
                        },
                        {
                            "default": "8",
                            "description": "Maximum number of SBOMs that will be augmented concurrently. Higher\nlimit will speed up execution for larger snapshots, but will have\nhigher memory requirements.\n",
                            "name": "augmentConcurrency",
                            "type": "string"
                        },
                        {
                            "default": "8",
                            "description": "Maximum number of SBOMs that will be uploaded to Atlas concurrently.\nHigher limit will speed up execution for larger snapshots, but will\nhave higher memory requirements.\n",
                            "name": "uploadConcurrency",
                            "type": "string"
                        },
                        {
                            "description": "Path to directory in the dataDir to store JSON task results to.",
                            "name": "resultsDirPath",
                            "type": "string"
                        },
                        {
                            "default": "secret-not-present",
                            "description": "K8s secret name with a cosign signing key used for SBOM attestation.",
                            "name": "cosignSecretName",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "K8s reference to a secret containing a key for verifying provenance attestations",
                            "name": "attestationPubKey",
                            "type": "string"
                        },
                        {
                            "description": "Path to the merged data file from collect-data in the dataDir.",
                            "name": "releaseData",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "A default OIDC issuer URL to be used for signing.",
                            "name": "defaultOIDCIssuer",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "The external URL of the Rekor transparency log.",
                            "name": "rekorExternalUrl",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "The external URL of the Fulcio certificate authority.",
                            "name": "fulcioExternalUrl",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "The external URL of the TUF repository.",
                            "name": "tufExternalUrl",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "A regular expression to extract build identity from the OIDC token claims, if applicable.\n",
                            "name": "buildIdentityRegexp",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from",
                            "name": "caTrustConfigMapName",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data",
                            "name": "caTrustConfigMapKey",
                            "type": "string"
                        },
                        {
                            "default": "/mnt/trusted-ca/ca-bundle.crt",
                            "description": "Path to CA certificate bundle for TLS verification with self-signed certificates",
                            "name": "caCertPath",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Produced trusted data artifact",
                            "name": "sourceDataArtifact",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "IMAGE_EXPIRES_AFTER",
                                "value": "1d"
                            },
                            {
                                "name": "ORAS_OPTIONS"
                            },
                            {
                                "name": "DEBUG"
                            }
                        ],
                        "volumeMounts": [
                            {
                                "mountPath": "/var/workdir",
                                "name": "workdir"
                            },
                            {
                                "mountPath": "/mnt/trusted-ca",
                                "name": "trusted-ca",
                                "readOnly": true
                            }
                        ]
                    },
                    "steps": [
                        {
                            "args": [
                                "use",
                                "oci:quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts@sha256:2b862c40aec76316fae1617a2dad50d546c0cf26cbc3a955428c846df20dc71e=/var/workdir/release"
                            ],
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "HOME",
                                    "value": "/tekton/home"
                                },
                                {
                                    "name": "ORAS_OPTIONS"
                                },
                                {
                                    "name": "CA_FILE",
                                    "value": "/etc/pki/tls/certs/ca-bundle.crt"
                                }
                            ],
                            "image": "quay.io/konflux-ci/build-trusted-artifacts:653578444c73afc32b3a865fee9869a09f96c1a2",
                            "name": "use-trusted-artifact"
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "memory": "2Gi"
                                },
                                "requests": {
                                    "cpu": "350m",
                                    "memory": "2Gi"
                                }
                            },
                            "env": [
                                {
                                    "name": "MOBSTER_TPA_SSO_ACCOUNT",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "sso_account",
                                            "name": "release-sso-secret",
                                            "optional": true
                                        }
                                    }
                                },
                                {
                                    "name": "MOBSTER_TPA_SSO_TOKEN",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "sso_token",
                                            "name": "release-sso-secret",
                                            "optional": true
                                        }
                                    }
                                },
                                {
                                    "name": "MOBSTER_TPA_SSO_TOKEN_URL",
                                    "value": "https://tsf-sso.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/realms/tsf-iam/protocol/openid-connect/token"
                                },
                                {
                                    "name": "MOBSTER_TPA_CA_INFO"
                                },
                                {
                                    "name": "AWS_ACCESS_KEY_ID",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "atlas-aws-access-key-id",
                                            "name": "secret-not-present",
                                            "optional": true
                                        }
                                    }
                                },
                                {
                                    "name": "AWS_SECRET_ACCESS_KEY",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "atlas-aws-secret-access-key",
                                            "name": "secret-not-present",
                                            "optional": true
                                        }
                                    }
                                },
                                {
                                    "name": "AWS_DEFAULT_REGION",
                                    "value": "us-east-1"
                                },
                                {
                                    "name": "SIGN_KEY",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "SIGN_KEY",
                                            "name": "secret-not-present",
                                            "optional": true
                                        }
                                    }
                                },
                                {
                                    "name": "COSIGN_AWS_DEFAULT_REGION",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "AWS_DEFAULT_REGION",
                                            "name": "secret-not-present",
                                            "optional": true
                                        }
                                    }
                                },
                                {
                                    "name": "COSIGN_AWS_ACCESS_KEY_ID",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "AWS_ACCESS_KEY_ID",
                                            "name": "secret-not-present",
                                            "optional": true
                                        }
                                    }
                                },
                                {
                                    "name": "COSIGN_AWS_SECRET_ACCESS_KEY",
                                    "valueFrom": {
                                        "secretKeyRef": {
                                            "key": "AWS_SECRET_ACCESS_KEY",
                                            "name": "secret-not-present",
                                            "optional": true
                                        }
                                    }
                                }
                            ],
                            "image": "quay.io/konflux-ci/mobster@sha256:a70cc191987b39b3b4e67ec4fecc26baa0a5197530bf67049604880c3789fbd7",
                            "name": "process-component-sboms",
                            "script": "#!/usr/bin/env bash\nset -eux\n\nca_bundle=/mnt/trusted-ca/ca-bundle.crt\nsystem_bundle=/etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nif [ -f \"$ca_bundle\" ]; then\n  echo \"[$(date --utc -Ins)] Using mounted CA bundle: $ca_bundle\"\n  cat \"$ca_bundle\" \u003e\u003e \"$system_bundle\"\nfi\n\n# This is a little fragile, ideally it would be just a param. It's here\n# for consistency with other tasks in release-service-catalog. The\n# script below will verify that the release_id has the correct format.\nrelease_id=$(dirname \"73a7398d-e21e-4159-adb1-64e80c630018/snapshot_spec.json\")\n\nmobster_args=(\n  --data-dir \"/var/workdir/release\"\n  --snapshot-spec \"73a7398d-e21e-4159-adb1-64e80c630018/snapshot_spec.json\"\n  --atlas-api-url \"https://server-tsf-tpa.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com\"\n  --release-id \"$release_id\"\n  --augment-concurrency \"8\"\n  --upload-concurrency \"8\"\n  --result-dir \"73a7398d-e21e-4159-adb1-64e80c630018/results\"\n  --release-data \"73a7398d-e21e-4159-adb1-64e80c630018/data.json\"\n)\n# Params are basically Bash commands, their value\n# has to be checked with -n. Env variables should\n# be checked with -v to not leak expanded secrets\n# through xtrace. Bash conditionals ([[) have to\n# be used instead of Shell conditionals ([) to use -v\nif [[ -n \"https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j\" \\\n  \u0026\u0026 -n \"https://rekor-server-tsf-tas.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com\" \\\n  \u0026\u0026 -n \"https://fulcio-server-tsf-tas.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com\" \\\n  \u0026\u0026 -n \"https://tuf-tsf-tas.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com\" \\\n  \u0026\u0026 -n \"^https://kubernetes.io/namespaces/[a-z0-9-]+-tenant/serviceaccounts/build-pipeline-[a-z0-9-]+$\" \\\n]]; then\n  # Keyless signing is used for augmentation\n  cosign initialize --root \"https://tuf-tsf-tas.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/root.json\" \\\n    --mirror \"https://tuf-tsf-tas.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com\"\n  mobster_args+=(\n    --oidc-token /var/run/sigstore/cosign/oidc-token\n    --fulcio-url \"https://fulcio-server-tsf-tas.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com\"\n    --oidc-issuer \"https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j\"\n    --oidc-identity-pattern \"^https://kubernetes.io/namespaces/[a-z0-9-]+-tenant/serviceaccounts/build-pipeline-[a-z0-9-]+$\"\n    --rekor-url \"https://rekor-server-tsf-tas.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com\"\n  )\nelif [[ -n \"k8s://openshift-pipelines/public-key\" \\\n  \u0026\u0026 -v SIGN_KEY \\\n  \u0026\u0026 -v COSIGN_AWS_DEFAULT_REGION \\\n  \u0026\u0026 -v COSIGN_AWS_ACCESS_KEY_ID \\\n  \u0026\u0026 -v COSIGN_AWS_SECRET_ACCESS_KEY\n]]; then\n  # Static key signing is used for augmentation\n  mobster_args+=(\n    --verify-key \"k8s://openshift-pipelines/public-key\"\n    --sign-key \"$SIGN_KEY\"\n  )\nfi\nif [[ -n \"\" ]]; then\n  mobster_args+=(\n    --retry-s3-bucket \"\"\n  )\nfi\nprocess_component_sboms \"${mobster_args[@]}\"\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/var/run/sigstore/cosign",
                                    "name": "oidc-token"
                                }
                            ]
                        },
                        {
                            "args": [
                                "create",
                                "--store",
                                "quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts",
                                "/tekton/results/sourceDataArtifact=/var/workdir/release"
                            ],
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "HOME",
                                    "value": "/tekton/home"
                                },
                                {
                                    "name": "ORAS_OPTIONS"
                                },
                                {
                                    "name": "CA_FILE",
                                    "value": "/mnt/trusted-ca/ca-bundle.crt"
                                }
                            ],
                            "image": "quay.io/konflux-ci/build-trusted-artifacts:653578444c73afc32b3a865fee9869a09f96c1a2",
                            "name": "create-trusted-artifact"
                        }
                    ],
                    "volumes": [
                        {
                            "emptyDir": {},
                            "name": "workdir"
                        },
                        {
                            "name": "oidc-token",
                            "projected": {
                                "sources": [
                                    {
                                        "serviceAccountToken": {
                                            "audience": "sigstore",
                                            "expirationSeconds": 1800,
                                            "path": "oidc-token"
                                        }
                                    }
                                ]
                            }
                        },
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=56",
                    "operator-sdk/primary-resource": "default-tenant/tsf-demo-app-20260415-231650-000-8a419f9-vm66n",
                    "operator-sdk/primary-resource-type": "Release.appstudio.redhat.com",
                    "pac.test.appstudio.openshift.io/branch": "base-miwkfv",
                    "pac.test.appstudio.openshift.io/cancel-in-progress": "false",
                    "pac.test.appstudio.openshift.io/check-run-id": "71552493202",
                    "pac.test.appstudio.openshift.io/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pac.test.appstudio.openshift.io/event-type": "push",
                    "pac.test.appstudio.openshift.io/git-auth-secret": "pac-gitauth-ojyaao",
                    "pac.test.appstudio.openshift.io/git-provider": "github",
                    "pac.test.appstudio.openshift.io/installation-id": "112348674",
                    "pac.test.appstudio.openshift.io/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-push-cttl8",
                    "pac.test.appstudio.openshift.io/max-keep-runs": "3",
                    "pac.test.appstudio.openshift.io/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-miwkfv\"",
                    "pac.test.appstudio.openshift.io/original-prname": "tsf-demo-comp-on-push",
                    "pac.test.appstudio.openshift.io/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pac.test.appstudio.openshift.io/repository": "tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/scm-reporting-plr-started": "true",
                    "pac.test.appstudio.openshift.io/sender": "rhtap-ci-tests-bot",
                    "pac.test.appstudio.openshift.io/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pac.test.appstudio.openshift.io/sha-title": "Merge pull request #181 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pac.test.appstudio.openshift.io/source-branch": "refs/heads/base-miwkfv",
                    "pac.test.appstudio.openshift.io/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pac.test.appstudio.openshift.io/state": "completed",
                    "pac.test.appstudio.openshift.io/url-org": "rhads-tsf-qe",
                    "pac.test.appstudio.openshift.io/url-repository": "testrepo",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-managed-tenant-syc5c/results/73a7398d-e21e-4159-adb1-64e80c630018/records/41e7296c-c422-439b-87a3-a2965b7623a4",
                    "results.tekton.dev/result": "default-managed-tenant-syc5c/results/73a7398d-e21e-4159-adb1-64e80c630018",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "release"
                },
                "creationTimestamp": "2026-04-15T23:28:04Z",
                "finalizers": [
                    "results.tekton.dev/taskrun",
                    "chains.tekton.dev"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "tekton-pipelines",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/service": "release",
                    "appstudio.openshift.io/snapshot": "tsf-demo-app-20260415-231650-000",
                    "pipelines.appstudio.openshift.io/type": "managed",
                    "release.appstudio.openshift.io/name": "tsf-demo-app-20260415-231650-000-8a419f9-vm66n",
                    "release.appstudio.openshift.io/namespace": "default-tenant",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "push-to-external-registry",
                    "tekton.dev/pipelineRun": "managed-25x6p",
                    "tekton.dev/pipelineRunUID": "73a7398d-e21e-4159-adb1-64e80c630018",
                    "tekton.dev/pipelineTask": "push-snapshot",
                    "tekton.dev/task": "push-snapshot"
                },
                "name": "managed-25x6p-push-snapshot",
                "namespace": "default-managed-tenant-syc5c",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "managed-25x6p",
                        "uid": "73a7398d-e21e-4159-adb1-64e80c630018"
                    }
                ],
                "resourceVersion": "43754",
                "uid": "41e7296c-c422-439b-87a3-a2965b7623a4"
            },
            "spec": {
                "params": [
                    {
                        "name": "snapshotPath",
                        "value": "73a7398d-e21e-4159-adb1-64e80c630018/snapshot_spec.json"
                    },
                    {
                        "name": "dataPath",
                        "value": "73a7398d-e21e-4159-adb1-64e80c630018/data.json"
                    },
                    {
                        "name": "resultsDirPath",
                        "value": "73a7398d-e21e-4159-adb1-64e80c630018/results"
                    },
                    {
                        "name": "ociStorage",
                        "value": "quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts"
                    },
                    {
                        "name": "sourceDataArtifact",
                        "value": "oci:quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts@sha256:2b862c40aec76316fae1617a2dad50d546c0cf26cbc3a955428c846df20dc71e"
                    },
                    {
                        "name": "dataDir",
                        "value": "/var/workdir/release"
                    },
                    {
                        "name": "trustedArtifactsDebug",
                        "value": ""
                    },
                    {
                        "name": "taskGitUrl",
                        "value": "https://github.com/konflux-ci/release-service-catalog.git"
                    },
                    {
                        "name": "taskGitRevision",
                        "value": "development"
                    }
                ],
                "retries": 5,
                "serviceAccountName": "release-pipeline",
                "stepSpecs": [
                    {
                        "computeResources": {
                            "limits": {
                                "memory": "1Gi"
                            },
                            "requests": {
                                "cpu": "10m",
                                "memory": "256Mi"
                            }
                        },
                        "name": "push-snapshot"
                    }
                ],
                "taskRef": {
                    "params": [
                        {
                            "name": "url",
                            "value": "https://github.com/konflux-ci/release-service-catalog.git"
                        },
                        {
                            "name": "revision",
                            "value": "development"
                        },
                        {
                            "name": "pathInRepo",
                            "value": "tasks/managed/push-snapshot/push-snapshot.yaml"
                        }
                    ],
                    "resolver": "git"
                },
                "timeout": "1h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:28:29Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:28:29Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "managed-25x6p-push-snapshot-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha1": "4f00b1a3062b53809bf42ca120e84d73cc199954"
                        },
                        "entryPoint": "tasks/managed/push-snapshot/push-snapshot.yaml",
                        "uri": "git+https://github.com/konflux-ci/release-service-catalog.git"
                    }
                },
                "results": [
                    {
                        "name": "sourceDataArtifact",
                        "type": "string",
                        "value": "oci:quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts@sha256:8cfee0a38ba29843874e5213fc2adc58f66ee488d844cd39be3bd9a64de30d6f"
                    }
                ],
                "startTime": "2026-04-15T23:28:04Z",
                "steps": [
                    {
                        "container": "step-use-trusted-artifact",
                        "imageID": "quay.io/konflux-ci/build-trusted-artifacts@sha256:27ddb820f0d30609dcb8de88219309edbced429896324e474f494470c2f003fb",
                        "name": "use-trusted-artifact",
                        "provenance": {
                            "refSource": {
                                "digest": {
                                    "sha1": "4f00b1a3062b53809bf42ca120e84d73cc199954"
                                },
                                "entryPoint": "stepactions/use-trusted-artifact/use-trusted-artifact.yaml",
                                "uri": "git+https://github.com/konflux-ci/release-service-catalog.git"
                            }
                        },
                        "terminated": {
                            "containerID": "cri-o://096e66e16ec0fbdaf940826b19ba019f54fe575dbd9b14d9fc51a489f16b31a7",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:28:23Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:28:23Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-create-trusted-artifact",
                        "imageID": "quay.io/konflux-ci/build-trusted-artifacts@sha256:27ddb820f0d30609dcb8de88219309edbced429896324e474f494470c2f003fb",
                        "name": "create-trusted-artifact",
                        "provenance": {
                            "refSource": {
                                "digest": {
                                    "sha1": "4f00b1a3062b53809bf42ca120e84d73cc199954"
                                },
                                "entryPoint": "stepactions/create-trusted-artifact/create-trusted-artifact.yaml",
                                "uri": "git+https://github.com/konflux-ci/release-service-catalog.git"
                            }
                        },
                        "terminated": {
                            "containerID": "cri-o://33c54465bfd3977bb4588e2a24b27e6069feacee98d083a86e878911b777dfa8",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:28:28Z",
                            "message": "[{\"key\":\"sourceDataArtifact\",\"value\":\"oci:quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts@sha256:8cfee0a38ba29843874e5213fc2adc58f66ee488d844cd39be3bd9a64de30d6f\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:28:27Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-push-snapshot",
                        "imageID": "quay.io/konflux-ci/release-service-utils@sha256:3cb03b14ac9d90ff27070036ce2b50712e65aa285daeb28852254a745bb25dfc",
                        "name": "push-snapshot",
                        "terminated": {
                            "containerID": "cri-o://dd3e6016c9eefb004f8bf917f32e613275dad6fbb3b178da4cade3ff5cf16b28",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:28:27Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:28:24Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Tekton task to push snapshot images to an image registry using `cosign copy`.",
                    "params": [
                        {
                            "description": "Path to the JSON string of the mapped Snapshot spec in the data workspace",
                            "name": "snapshotPath",
                            "type": "string"
                        },
                        {
                            "description": "Path to the JSON string of the merged data to use in the data workspace",
                            "name": "dataPath",
                            "type": "string"
                        },
                        {
                            "description": "Path to the results directory in the data workspace",
                            "name": "resultsDirPath",
                            "type": "string"
                        },
                        {
                            "default": "20",
                            "description": "The maximum number of images to be proccessed concurrently",
                            "name": "concurrentLimit",
                            "type": "string"
                        },
                        {
                            "default": "3",
                            "description": "Retry copy N times",
                            "name": "retries",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from",
                            "name": "caTrustConfigMapName",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data",
                            "name": "caTrustConfigMapKey",
                            "type": "string"
                        },
                        {
                            "default": "empty",
                            "description": "The OCI repository where the Trusted Artifacts are stored",
                            "name": "ociStorage",
                            "type": "string"
                        },
                        {
                            "default": "1d",
                            "description": "Expiration date for the trusted artifacts created in the OCI repository. An empty string means the artifacts do not expire",
                            "name": "ociArtifactExpiresAfter",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Flag to enable debug logging in trusted artifacts. Set to a non-empty string to enable",
                            "name": "trustedArtifactsDebug",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "oras options to pass to Trusted Artifacts calls",
                            "name": "orasOptions",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Location of trusted artifacts to be used to populate data directory",
                            "name": "sourceDataArtifact",
                            "type": "string"
                        },
                        {
                            "default": "/var/workdir/release",
                            "description": "The location where data will be stored",
                            "name": "dataDir",
                            "type": "string"
                        },
                        {
                            "description": "The url to the git repo where the release-service-catalog tasks and stepactions to be used are stored",
                            "name": "taskGitUrl",
                            "type": "string"
                        },
                        {
                            "description": "The revision in the taskGitUrl repo to be used",
                            "name": "taskGitRevision",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Enable copying of attached artifacts",
                            "name": "copyBundleMigrations",
                            "type": "string"
                        },
                        {
                            "default": "/etc/pki/tls/certs/ca-bundle.crt",
                            "description": "Path to CA certificate bundle for TLS verification with self-signed certificates",
                            "name": "caCertPath",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Produced trusted data artifact",
                            "name": "sourceDataArtifact",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "IMAGE_EXPIRES_AFTER",
                                "value": "1d"
                            },
                            {
                                "name": "ORAS_OPTIONS"
                            },
                            {
                                "name": "DEBUG"
                            }
                        ],
                        "securityContext": {
                            "runAsUser": 1001
                        },
                        "volumeMounts": [
                            {
                                "mountPath": "/var/workdir",
                                "name": "workdir"
                            },
                            {
                                "mountPath": "/etc/pki/tls/certs/ca-bundle.crt",
                                "name": "trusted-ca",
                                "readOnly": true,
                                "subPath": "ca-bundle.crt"
                            },
                            {
                                "mountPath": "/etc/ssl/certs/ca-custom-bundle.crt",
                                "name": "trusted-ca",
                                "readOnly": true,
                                "subPath": "ca-bundle.crt"
                            }
                        ]
                    },
                    "steps": [
                        {
                            "args": [
                                "use",
                                "oci:quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts@sha256:2b862c40aec76316fae1617a2dad50d546c0cf26cbc3a955428c846df20dc71e=/var/workdir/release"
                            ],
                            "computeResources": {
                                "limits": {
                                    "memory": "64Mi"
                                },
                                "requests": {
                                    "cpu": "30m",
                                    "memory": "64Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "HOME",
                                    "value": "/tekton/home"
                                },
                                {
                                    "name": "ORAS_OPTIONS"
                                },
                                {
                                    "name": "CA_FILE",
                                    "value": "/etc/pki/tls/certs/ca-bundle.crt"
                                }
                            ],
                            "image": "quay.io/konflux-ci/build-trusted-artifacts:653578444c73afc32b3a865fee9869a09f96c1a2",
                            "name": "use-trusted-artifact"
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "memory": "1Gi"
                                },
                                "requests": {
                                    "cpu": "2",
                                    "memory": "1Gi"
                                }
                            },
                            "image": "quay.io/konflux-ci/release-service-utils@sha256:3cb03b14ac9d90ff27070036ce2b50712e65aa285daeb28852254a745bb25dfc",
                            "name": "push-snapshot",
                            "script": "#!/usr/bin/env bash\nset -eux\n\npush_image () { # Expected arguments are [origin_digest, name, containerImage, repository, tag, platform]\n  # note: Inspection might fail on empty repos, hence `|| true`\n\n  # oras has very limited support for selecting the right auth entry,\n  # so create a custom auth file with just one entry.\n  DEST_AUTH_FILE=$(mktemp)\n  registry=$(echo \"$4\" | cut -d '/' -f 1)\n  if [ \"$registry\" = \"docker.io\" ]; then\n    # For docker.io, the auth key will always be https://index.docker.io/v1/\n    select-oci-auth \"$4\" \u003e \"$DEST_AUTH_FILE\"\n  else\n    # For other registries, the auth key will be modified to the full repository path, so that\n    # we can create a combined auth file with source and destination entries for `cosign copy` later\n    select-oci-auth \"$4\" | jq -c \\\n      '.auths.\"'\"$4\"'\" = .auths.\"'\"$registry\"'\" | del(.auths.\"'\"$registry\"'\")' \u003e \"$DEST_AUTH_FILE\"\n  fi\n\n  oras_args=()\n  if [ -n \"$6\" ]; then\n    oras_args=(--platform \"$6\")\n  fi\n\n  destination_digest=$(oras resolve --registry-config \"$DEST_AUTH_FILE\" \"$4:$5\" || true)\n\n  if [[ \"$destination_digest\" != \"$1\" || -z \"$destination_digest\" ]]; then\n    printf '* Pushing component: %s to %s:%s\\n' \"$2\" \"$4\" \"$5\"\n    # Create a combined auth file to enable partial oci matches to work\n    DOCKER_CONFIG=\"$(mktemp -d)\"\n    export DOCKER_CONFIG\n    # shellcheck disable=SC2128\n    jq -s 'reduce .[] as $item ({}; . * $item)' \\\n      \"$SOURCE_AUTH_FILE\" \"$DEST_AUTH_FILE\" \u003e \"$DOCKER_CONFIG\"/config.json\n\n    # Check if we should copy attached artifacts\n    if [[ \"$COPY_BUNDLE_MIGRATIONS\" == \"true\" ]]; then\n      # Check for any attached artifacts using oras discover, with retries on failure\n      printf '* Checking for attached artifacts on %s\\n' \"$3\"\n      artifact_count=\"0\"\n      discover_attempt=0\n      discover_succeeded=false\n      until [ \"$discover_attempt\" -gt \"3\" ]; do # same retry style as copy loop\n        if oras discover \\\n          --registry-config \"$SOURCE_AUTH_FILE\" \\\n          \"$3\" \\\n          --format json \\\n          \u003e/tmp/artifacts.json\n        then\n          artifact_count=$(jq -r '.referrers | length' /tmp/artifacts.json || echo \"0\")\n          echo \"Found $artifact_count artifacts\"\n          discover_succeeded=true\n          break\n        else\n          rc=$?\n          echo \"oras discover failed (attempt $((discover_attempt+1))) with exit code $rc\"\n          discover_attempt=$((discover_attempt+1))\n        fi\n      done\n      if [ \"$discover_succeeded\" != true ]; then\n        echo \"Max retries exceeded. Proceeding without attached artifacts (falling back to cosign copy).\"\n      fi\n    fi\n\n    attempt=0\n    until [ \"$attempt\" -gt \"3\" ] ; do # 0 retries by default which will execute this once\n      if [[ \"$COPY_BUNDLE_MIGRATIONS\" == \"true\" \u0026\u0026 \"${artifact_count}\" -gt 0 ]]; then\n        # Copy the image and all attached artifacts\n        oras cp -r \\\n          --from-registry-config \"$SOURCE_AUTH_FILE\" \\\n          --to-registry-config \"$DEST_AUTH_FILE\" \\\n          \"${oras_args[@]}\" \\\n          \"$3\" \\\n          \"$4:$5\" \\\n          \u0026\u0026 break\n      else\n        # Fallback to classic image copy\n        cosign copy -f \"$3\" \"$4:$5\" \u0026\u0026 break\n      fi\n      attempt=$((attempt+1))\n    done\n    if [ \"$attempt\" -gt \"3\" ] ; then\n      echo \"Max retries exceeded.\"\n      exit 1\n    fi\n    # Only the cosign call above needs this custom Docker config. Unset it, so that skopeo call\n    # in get-image-architecture uses the default config in ~/.docker/config.json (this one would break it)\n    unset DOCKER_CONFIG\n  else\n    printf '* Component push skipped (source digest exists at destination): %s (%s)\\n' \\\n      \"$2\" \"$3\"\n  fi\n  jq -n --arg name \"$2\" --arg url \"$4:$5\" '{name: $name, url: $url}' \u003e \"$TMP_RESULTS_DIR/$2-$5.json\"\n}\n\n# Push migration artifact using oras cp\n# Expected arguments are [source_repo, migration_digest, name, repository, migration_tag, source_auth_file]\npush_migration_artifact () {\n  local source_repo=\"$1\"\n  local migration_digest=\"$2\"\n  local name=\"$3\"\n  local repository=\"$4\"\n  local migration_tag=\"$5\"\n  local source_auth_file=\"$6\"\n\n  local migration_source=\"${source_repo}@${migration_digest}\"\n\n  # Create destination auth file\n  local dest_auth_file\n  dest_auth_file=$(mktemp)\n  local dest_registry\n  dest_registry=$(echo \"$repository\" | cut -d '/' -f 1)\n  if [ \"$dest_registry\" = \"docker.io\" ]; then\n    select-oci-auth \"$repository\" \u003e \"$dest_auth_file\"\n  else\n    select-oci-auth \"$repository\" | jq -c \\\n      '.auths.\"'\"$repository\"'\" = .auths.\"'\"$dest_registry\"'\" | del(.auths.\"'\"$dest_registry\"'\")' \\\n      \u003e \"$dest_auth_file\"\n  fi\n\n  # Check if migration artifact already exists at destination\n  local destination_digest\n  destination_digest=$(oras resolve --registry-config \"$dest_auth_file\" \\\n    \"${repository}:${migration_tag}\" || true)\n\n  if [[ \"$destination_digest\" != \"$migration_digest\" || -z \"$destination_digest\" ]]; then\n    printf '* Pushing migration artifact for component: %s to %s:%s\\n' \"$name\" \"$repository\" \"$migration_tag\"\n\n    local attempt=0\n    until [ \"$attempt\" -gt \"3\" ] ; do\n      if oras cp \\\n        --from-registry-config \"$source_auth_file\" \\\n        --to-registry-config \"$dest_auth_file\" \\\n        \"$migration_source\" \\\n        \"${repository}:${migration_tag}\"\n      then\n        break\n      fi\n      attempt=$((attempt+1))\n      echo \"Migration artifact copy failed (attempt $attempt)\"\n    done\n    if [ \"$attempt\" -gt \"3\" ] ; then\n      echo \"Max retries exceeded for migration artifact copy.\"\n      exit 1\n    fi\n  else\n    printf '* Migration artifact push skipped (already exists at destination): %s (%s)\\n' \\\n      \"$name\" \"$migration_source\"\n  fi\n}\n\nSNAPSHOT_SPEC_FILE=\"/var/workdir/release/73a7398d-e21e-4159-adb1-64e80c630018/snapshot_spec.json\"\nif [ ! -f \"${SNAPSHOT_SPEC_FILE}\" ] ; then\n    echo \"No valid snapshot file was provided.\"\n    exit 1\nfi\n\nDATA_FILE=\"/var/workdir/release/73a7398d-e21e-4159-adb1-64e80c630018/data.json\"\nif [ ! -f \"${DATA_FILE}\" ] ; then\n    echo \"No data JSON was provided.\"\n    exit 1\nfi\n\nif [ \"$(jq '.components | map(select(.repositories |\n  map(select((has(\"tags\")|not) or (.tags | IN([])))) | length \u003e 0)) | length' \\\n  \"${SNAPSHOT_SPEC_FILE}\")\" -ne 0 ] ; then\n    echo \"Found components in the snapshot file that do not contain tags. Failing\"\n    cat \"${SNAPSHOT_SPEC_FILE}\"\n    exit 1\nfi\n\nRESULTS_FILE=\"/var/workdir/release/73a7398d-e21e-4159-adb1-64e80c630018/results/push-snapshot-results.json\"\nRESULTS_JSON_FILE=$(mktemp)\necho '{\"images\":[]}' \u003e \"$RESULTS_JSON_FILE\"\n\n# Initialize memory throttling\n# This file is located at utils/memory-throttle.sh in the release-service-utils image\n# shellcheck source=/dev/null\nsource memory-throttle.sh\n# This function is stored in the utils/memory-throttle.sh file\nlog_memory_throttle_status 80\n\nRUNNING_JOBS=\"\\j\" # A Bash param for number of jobs running\nCONCURRENT_LIMIT=20\nBURST_SIZE=5\nSTABILIZATION_DELAY=2\nREQUEST_COUNT=0\nSUCCESS=true\njobs_spawned=0\njobs_collected=0\n\n# Wait for a slot to open up in the concurrent limit and for memory to be available\nwait_for_slot () {\n  # This function is stored in the utils/memory-throttle.sh file\n  # First wait for memory to be available\n  wait_for_memory 80\n  # Then wait for concurrent limit\n  while (( ${RUNNING_JOBS@P} \u003e= \"$CONCURRENT_LIMIT\" )); do\n    wait -n || SUCCESS=false\n    jobs_collected=$((jobs_collected + 1))\n  done\n}\n\n# Create a temporary directory to store the results of each push\nTMP_RESULTS_DIR=$(mktemp -d)\n\ndefaultPushSourceContainer=$(jq -r \\\n  '.mapping.defaults.pushSourceContainer | if . == null then true else . end' \"$DATA_FILE\")\nCOPY_BUNDLE_MIGRATIONS=\"false\"\n\ncomponentGroup=$(jq -r '.componentGroup' \"${SNAPSHOT_SPEC_FILE}\")\nNUM_COMPONENTS=$(jq '.components | length' \"${SNAPSHOT_SPEC_FILE}\")\nprintf 'Beginning \"%s\" for \"%s\"\\n\\n' \"managed-25x6p-push-snapshot\" \"$componentGroup\"\nfor ((i = 0; i \u003c NUM_COMPONENTS; i++))\ndo\n  component=$(jq -c --argjson i \"$i\" '.components[$i]' \"${SNAPSHOT_SPEC_FILE}\")\n  containerImage=$(jq -r '.containerImage' \u003c\u003c\u003c \"$component\")\n\n  # oras has very limited support for selecting the right auth entry,\n  # so create a custom auth file with just one entry.\n  registry=$(echo \"${containerImage}\" | cut -d '/' -f 1)\n  # Apply-mapping ensures that the containerImage contains a sha256 digest\n  source_repo=${containerImage%%@sha256:*}\n  SOURCE_AUTH_FILE=$(mktemp)\n  select-oci-auth \"${containerImage}\" | jq -c \\\n    '.auths.\"'\"$source_repo\"'\" = .auths.\"'\"$registry\"'\" | del(.auths.\"'\"$registry\"'\")' \u003e \"$SOURCE_AUTH_FILE\"\n\n  arch_json=$(get-image-architectures \"${containerImage}\")\n  arches=$(jq -s 'map(.platform.architecture)' \u003c\u003c\u003c \"$arch_json\")\n  oses=$(jq -s 'map(.platform.os)' \u003c\u003c\u003c \"$arch_json\")\n\n  # Just read the first from the list of architectures\n  os=$(jq -r '.[0]' \u003c\u003c\u003c \"$oses\")\n  arch=$(jq -r '.[0]' \u003c\u003c\u003c \"$arches\")\n  name=$(jq -r '.name' \u003c\u003c\u003c \"$component\")\n  media_type=$(skopeo inspect --retry-times 3 --raw \"docker://${containerImage}\" | jq -r .mediaType)\n  oras_args=()\n  platform=\n  if [[ \"$media_type\" == \"application/vnd.docker.distribution.manifest.list.v2+json\" ]]\\\n    || [[ \"$media_type\" == \"application/vnd.oci.image.index.v1+json\" ]]; then\n    platform=$os/$arch\n    oras_args=(--platform \"$platform\")\n  fi\n\n  # we do not use oras_args here since we want to get the manifest index image digest\n  origin_digest=$(oras resolve --registry-config \"$SOURCE_AUTH_FILE\" \"${containerImage}\")\n\n  jq --arg i \"$i\" --argjson arches \"$arches\" --argjson oses \"$oses\" --arg name \"$name\" \\\n    --arg sha \"$origin_digest\" \\\n    '.images[$i|tonumber] += {\"arches\": $arches, \"oses\": $oses, \"name\": $name, \"shasum\": $sha, \"urls\": []}' \\\n      \"$RESULTS_JSON_FILE\" \u003e \"$RESULTS_JSON_FILE.tmp\" \u0026\u0026 mv \"$RESULTS_JSON_FILE.tmp\" \"$RESULTS_JSON_FILE\"\n\n  # Push source container if the component has pushSourceContainer: true or if the\n  # pushSourceContainer key is missing from the component and the defaults has\n  # pushSourceContainer: true or omitted (defaultPushSourceContainer defaults to true)\n  pushSourceContainer=$(jq -r '.pushSourceContainer' \u003c\u003c\u003c \"$component\")\n  hasPushSourceContainer=$(jq 'has(\"pushSourceContainer\")' \u003c\u003c\u003c \"$component\")\n\n  if [[ \"${pushSourceContainer}\" == \"true\" ]] || [[ \"${hasPushSourceContainer}\" == \"false\" \u0026\u0026 \\\n          ${defaultPushSourceContainer} == \"true\" ]] ; then\n    source_tag=${origin_digest/:/-}.src\n    # Calculate the source container image based on the provided container image\n    sourceContainer=\"${source_repo}:${source_tag}\"\n    # Check if the source container exists\n    source_container_digest=$(oras resolve --registry-config \"$SOURCE_AUTH_FILE\" \\\n      \"${sourceContainer}\")\n\n    if [ -z \"$source_container_digest\" ] ; then\n      echo \"Error: Source container ${sourceContainer} not found!\"\n      exit 1\n    fi\n  fi\n\n  # Extract migration annotations if COPY_BUNDLE_MIGRATIONS is enabled\n  migration_digest=\"\"\n  migration_tag=\"\"\n  if [[ \"$COPY_BUNDLE_MIGRATIONS\" == \"true\" ]]; then\n    # Annotations are stored as [{name: key, value: value}, ...] in component.metadata.annotations\n    migration_digest=$(jq -r '.metadata.annotations // [] |\n      map(select(.name == \"dev.konflux-ci.task.migration.digest\")) |\n      .[0].value // \"\"' \u003c\u003c\u003c \"$component\")\n    migration_tag=$(jq -r '.metadata.annotations // [] |\n      map(select(.name == \"dev.konflux-ci.task.migration.tag\")) |\n      .[0].value // \"\"' \u003c\u003c\u003c \"$component\")\n    if [ -n \"$migration_digest\" ] \u0026\u0026 [ -n \"$migration_tag\" ]; then\n      printf '* Found migration annotations for component %s: digest=%s, tag=%s\\n' \\\n        \"$name\" \"$migration_digest\" \"$migration_tag\"\n    fi\n  fi\n\n  NUM_REPOS=$(jq -c '.repositories | length' \u003c\u003c\u003c \"$component\")\n  for ((j = 0; j \u003c NUM_REPOS; j++)); do\n    repository=$(jq -c --argjson j \"$j\" '.repositories[$j]' \u003c\u003c\u003c \"$component\")\n    imageTags=$(jq '.tags' \u003c\u003c\u003c \"$repository\")\n    repository_url=$(jq -r '.url' \u003c\u003c\u003c \"$repository\")\n\n    if [ -n \"${source_container_digest-}\" ] ; then\n      # Push the source image with the source tag here. The source image will be\n      # pushed with the provided tags below in the loop\n      wait_for_slot\n      push_image \"${source_container_digest}\" \"${name}\" \"${sourceContainer}\" \\\n        \"${repository_url}\" \"${source_tag}\" \"\" \u003e \"$TMP_RESULTS_DIR/${name}-${source_tag}.out\" 2\u003e\u00261 \u0026\n      ((++REQUEST_COUNT))\n      echo \"Request Count: $REQUEST_COUNT\"\n      jobs_spawned=$((jobs_spawned + 1))\n      # Allow memory usage to stabilize every BURST_SIZE spawns.\n      if (( jobs_spawned % BURST_SIZE == 0 )); then\n        sleep $STABILIZATION_DELAY\n      fi\n    fi\n\n    for tag in $(jq -r '.[]' \u003c\u003c\u003c \"$imageTags\") ; do\n      wait_for_slot\n      # Push the container image\n      push_image \"${origin_digest}\" \"${name}\" \"${containerImage}\" \"${repository_url}\" \"${tag}\" \\\n      \"$platform\" \u003e \"$TMP_RESULTS_DIR/${name}-${tag}.out\" 2\u003e\u00261 \u0026\n      ((++REQUEST_COUNT))\n      echo \"Request Count: $REQUEST_COUNT\"\n      jobs_spawned=$((jobs_spawned + 1))\n      if (( jobs_spawned % BURST_SIZE == 0 )); then\n        sleep $STABILIZATION_DELAY\n      fi\n\n      # This variable will only exist if the above logic determined the source container should\n      # be pushed for this component\n      if [ -n \"${source_container_digest-}\" ] ; then\n        wait_for_slot\n        push_image \"${source_container_digest}\" \"${name}\" \"${sourceContainer}\" \\\n          \"${repository_url}\" \"${tag}-source\" \"\" \u003e \"$TMP_RESULTS_DIR/${name}-${tag}-source.out\" 2\u003e\u00261 \u0026\n        ((++REQUEST_COUNT))\n        echo \"Request Count: $REQUEST_COUNT\"\n        jobs_spawned=$((jobs_spawned + 1))\n        if (( jobs_spawned % BURST_SIZE == 0 )); then\n          sleep $STABILIZATION_DELAY\n        fi\n      fi\n    done\n\n    # Push migration artifact if annotations are present\n    if [[ \"$COPY_BUNDLE_MIGRATIONS\" == \"true\" ]] \u0026\u0026 [ -n \"$migration_digest\" ] \u0026\u0026 [ -n \"$migration_tag\" ]; then\n      wait_for_slot\n      push_migration_artifact \"${source_repo}\" \"${migration_digest}\" \"${name}\" \\\n        \"${repository_url}\" \"${migration_tag}\" \"$SOURCE_AUTH_FILE\" \\\n        \u003e \"$TMP_RESULTS_DIR/${name}-migration-${migration_tag}.out\" 2\u003e\u00261 \u0026\n      ((++REQUEST_COUNT))\n      echo \"Request Count: $REQUEST_COUNT (migration artifact)\"\n      jobs_spawned=$((jobs_spawned + 1))\n      if (( jobs_spawned % BURST_SIZE == 0 )); then\n        sleep $STABILIZATION_DELAY\n      fi\n    fi\n  done\ndone\n\necho \"Waiting for all jobs to complete....\"\n# Use counter to collect all exit codes in case processes finished during a burst sleep\nwhile (( jobs_collected \u003c jobs_spawned )); do\n  wait -n || SUCCESS=false\n  jobs_collected=$((jobs_collected + 1))\ndone\n\necho \"Printing outputs for each push image\"\nfor file in \"$TMP_RESULTS_DIR\"/*.out; do\n  echo \"=== $(basename \"${file}\" .out) ===\"\n  cat \"$file\"\n  echo\ndone\n\nif [ \"$SUCCESS\" != true ]; then\n    echo \"One or more jobs failed. Please check the logs above for details.\"\n    exit 1\nfi\n\n# Create a temporary file for the pushes data to avoid command line argument length limits\nPUSHES_FILE=$(mktemp)\njq -s . \"$TMP_RESULTS_DIR\"/*.json \u003e \"$PUSHES_FILE\"\n\n# Use file input instead of command line arguments to avoid argument length limits\njq --slurpfile PUSHES \"$PUSHES_FILE\" '\n  reduce $PUSHES[0][] as $p (.; (.images[] | select(.name == $p.name).urls) += [$p.url])\n' \"$RESULTS_JSON_FILE\" | tee \"$RESULTS_FILE\"\n\n# Clean up temporary files\nrm -f \"$RESULTS_JSON_FILE\" \"$RESULTS_JSON_FILE.tmp\" \"$PUSHES_FILE\"\n\nprintf 'Completed \"%s\" for \"%s\"\\n\\n' \"managed-25x6p-push-snapshot\" \"$componentGroup\"\n"
                        },
                        {
                            "args": [
                                "create",
                                "--store",
                                "quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts",
                                "/tekton/results/sourceDataArtifact=/var/workdir/release"
                            ],
                            "computeResources": {
                                "limits": {
                                    "memory": "128Mi"
                                },
                                "requests": {
                                    "cpu": "250m",
                                    "memory": "128Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "HOME",
                                    "value": "/tekton/home"
                                },
                                {
                                    "name": "ORAS_OPTIONS"
                                },
                                {
                                    "name": "CA_FILE",
                                    "value": "/etc/pki/tls/certs/ca-bundle.crt"
                                }
                            ],
                            "image": "quay.io/konflux-ci/build-trusted-artifacts:653578444c73afc32b3a865fee9869a09f96c1a2",
                            "name": "create-trusted-artifact"
                        }
                    ],
                    "volumes": [
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        },
                        {
                            "emptyDir": {},
                            "name": "workdir"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=51",
                    "operator-sdk/primary-resource": "default-tenant/tsf-demo-app-20260415-231650-000-8a419f9-vm66n",
                    "operator-sdk/primary-resource-type": "Release.appstudio.redhat.com",
                    "pac.test.appstudio.openshift.io/branch": "base-miwkfv",
                    "pac.test.appstudio.openshift.io/cancel-in-progress": "false",
                    "pac.test.appstudio.openshift.io/check-run-id": "71552493202",
                    "pac.test.appstudio.openshift.io/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pac.test.appstudio.openshift.io/event-type": "push",
                    "pac.test.appstudio.openshift.io/git-auth-secret": "pac-gitauth-ojyaao",
                    "pac.test.appstudio.openshift.io/git-provider": "github",
                    "pac.test.appstudio.openshift.io/installation-id": "112348674",
                    "pac.test.appstudio.openshift.io/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-push-cttl8",
                    "pac.test.appstudio.openshift.io/max-keep-runs": "3",
                    "pac.test.appstudio.openshift.io/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-miwkfv\"",
                    "pac.test.appstudio.openshift.io/original-prname": "tsf-demo-comp-on-push",
                    "pac.test.appstudio.openshift.io/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pac.test.appstudio.openshift.io/repository": "tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/scm-reporting-plr-started": "true",
                    "pac.test.appstudio.openshift.io/sender": "rhtap-ci-tests-bot",
                    "pac.test.appstudio.openshift.io/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pac.test.appstudio.openshift.io/sha-title": "Merge pull request #181 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pac.test.appstudio.openshift.io/source-branch": "refs/heads/base-miwkfv",
                    "pac.test.appstudio.openshift.io/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pac.test.appstudio.openshift.io/state": "completed",
                    "pac.test.appstudio.openshift.io/url-org": "rhads-tsf-qe",
                    "pac.test.appstudio.openshift.io/url-repository": "testrepo",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-managed-tenant-syc5c/results/73a7398d-e21e-4159-adb1-64e80c630018/records/510e0944-ab9f-4c67-9d17-9eaf501e4497",
                    "results.tekton.dev/result": "default-managed-tenant-syc5c/results/73a7398d-e21e-4159-adb1-64e80c630018",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "release"
                },
                "creationTimestamp": "2026-04-15T23:26:56Z",
                "finalizers": [
                    "chains.tekton.dev",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "tekton-pipelines",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/service": "release",
                    "appstudio.openshift.io/snapshot": "tsf-demo-app-20260415-231650-000",
                    "pipelines.appstudio.openshift.io/type": "managed",
                    "release.appstudio.openshift.io/name": "tsf-demo-app-20260415-231650-000-8a419f9-vm66n",
                    "release.appstudio.openshift.io/namespace": "default-tenant",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "push-to-external-registry",
                    "tekton.dev/pipelineRun": "managed-25x6p",
                    "tekton.dev/pipelineRunUID": "73a7398d-e21e-4159-adb1-64e80c630018",
                    "tekton.dev/pipelineTask": "reduce-snapshot",
                    "tekton.dev/task": "reduce-snapshot"
                },
                "name": "managed-25x6p-reduce-snapshot",
                "namespace": "default-managed-tenant-syc5c",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "managed-25x6p",
                        "uid": "73a7398d-e21e-4159-adb1-64e80c630018"
                    }
                ],
                "resourceVersion": "42721",
                "uid": "510e0944-ab9f-4c67-9d17-9eaf501e4497"
            },
            "spec": {
                "params": [
                    {
                        "name": "SNAPSHOT",
                        "value": "/var/workdir/release/73a7398d-e21e-4159-adb1-64e80c630018/snapshot_spec.json"
                    },
                    {
                        "name": "SINGLE_COMPONENT",
                        "value": "false"
                    },
                    {
                        "name": "SINGLE_COMPONENT_CUSTOM_RESOURCE",
                        "value": "snapshot/tsf-demo-app-20260415-231650-000"
                    },
                    {
                        "name": "SINGLE_COMPONENT_CUSTOM_RESOURCE_NS",
                        "value": "default-tenant"
                    },
                    {
                        "name": "SNAPSHOT_PATH",
                        "value": "/var/workdir/release/73a7398d-e21e-4159-adb1-64e80c630018/snapshot_spec.json"
                    },
                    {
                        "name": "ociStorage",
                        "value": "quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts"
                    },
                    {
                        "name": "sourceDataArtifact",
                        "value": "oci:quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts@sha256:2b2a184ca76db29ad1e0173934515414433ee35e7ce2e30c83fa080d97f997a4"
                    },
                    {
                        "name": "dataDir",
                        "value": "/var/workdir/release"
                    },
                    {
                        "name": "trustedArtifactsDebug",
                        "value": ""
                    },
                    {
                        "name": "taskGitUrl",
                        "value": "https://github.com/konflux-ci/release-service-catalog.git"
                    },
                    {
                        "name": "taskGitRevision",
                        "value": "development"
                    }
                ],
                "serviceAccountName": "release-pipeline",
                "taskRef": {
                    "params": [
                        {
                            "name": "url",
                            "value": "https://github.com/konflux-ci/release-service-catalog.git"
                        },
                        {
                            "name": "revision",
                            "value": "development"
                        },
                        {
                            "name": "pathInRepo",
                            "value": "tasks/managed/reduce-snapshot/reduce-snapshot.yaml"
                        }
                    ],
                    "resolver": "git"
                },
                "timeout": "1h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:27:14Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:27:14Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "managed-25x6p-reduce-snapshot-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha1": "4f00b1a3062b53809bf42ca120e84d73cc199954"
                        },
                        "entryPoint": "tasks/managed/reduce-snapshot/reduce-snapshot.yaml",
                        "uri": "git+https://github.com/konflux-ci/release-service-catalog.git"
                    }
                },
                "results": [
                    {
                        "name": "sourceDataArtifact",
                        "type": "string",
                        "value": "oci:quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts@sha256:99c20aac747b474333407302421c12b85da090e344c655e4c20a14acad05a2c8"
                    }
                ],
                "startTime": "2026-04-15T23:26:56Z",
                "steps": [
                    {
                        "container": "step-use-trusted-artifact",
                        "imageID": "quay.io/konflux-ci/build-trusted-artifacts@sha256:27ddb820f0d30609dcb8de88219309edbced429896324e474f494470c2f003fb",
                        "name": "use-trusted-artifact",
                        "provenance": {
                            "refSource": {
                                "digest": {
                                    "sha1": "4f00b1a3062b53809bf42ca120e84d73cc199954"
                                },
                                "entryPoint": "stepactions/use-trusted-artifact/use-trusted-artifact.yaml",
                                "uri": "git+https://github.com/konflux-ci/release-service-catalog.git"
                            }
                        },
                        "terminated": {
                            "containerID": "cri-o://490488ef09d93ea577bad105174795ff207ef8ba6389b51c8a5cc8e6d648d09a",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:27:11Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:27:11Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-create-trusted-artifact",
                        "imageID": "quay.io/konflux-ci/build-trusted-artifacts@sha256:27ddb820f0d30609dcb8de88219309edbced429896324e474f494470c2f003fb",
                        "name": "create-trusted-artifact",
                        "provenance": {
                            "refSource": {
                                "digest": {
                                    "sha1": "4f00b1a3062b53809bf42ca120e84d73cc199954"
                                },
                                "entryPoint": "stepactions/create-trusted-artifact/create-trusted-artifact.yaml",
                                "uri": "git+https://github.com/konflux-ci/release-service-catalog.git"
                            }
                        },
                        "terminated": {
                            "containerID": "cri-o://2b712c501e51311da2572a3955abd75927004b8fa398755eb57fbd76689a18bc",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:27:13Z",
                            "message": "[{\"key\":\"sourceDataArtifact\",\"value\":\"oci:quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts@sha256:99c20aac747b474333407302421c12b85da090e344c655e4c20a14acad05a2c8\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:27:12Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-ensure-required-labels-present",
                        "imageID": "quay.io/konflux-ci/release-service-utils@sha256:5546fa78d3c88d7b6a2e8cff8902f7757f00541d0bbaf113b9f293133894afa3",
                        "name": "ensure-required-labels-present",
                        "terminated": {
                            "containerID": "cri-o://646ba31bbc116f2217d6637d4b267fca0eb83f4b9d895dd50aa59ecc331b042c",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:27:11Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:27:11Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-reduce",
                        "imageID": "quay.io/conforma/cli@sha256:0a6c6cea9b6db5bbc798cb4c2ff0269789e547a8e25410c947a123eb727dc399",
                        "name": "reduce",
                        "terminated": {
                            "containerID": "cri-o://1f6b3d51a0c693c8463d89f7330db9d5a9af4025a8de5794270d9eb3dc55df15",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:27:12Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:27:11Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Tekton task to reduce a snapshot to a single component based on the component that the snapshot was built for.",
                    "params": [
                        {
                            "description": "String representation of Snapshot spec",
                            "name": "SNAPSHOT",
                            "type": "string"
                        },
                        {
                            "description": "Single mode component enabled",
                            "name": "SINGLE_COMPONENT",
                            "type": "string"
                        },
                        {
                            "description": "Custom Resource to query for built component in Snapshot",
                            "name": "SINGLE_COMPONENT_CUSTOM_RESOURCE",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Namespace where Custom Resource is found",
                            "name": "SINGLE_COMPONENT_CUSTOM_RESOURCE_NS",
                            "type": "string"
                        },
                        {
                            "description": "The location to place the reduced Snapshot",
                            "name": "SNAPSHOT_PATH",
                            "type": "string"
                        },
                        {
                            "default": "empty",
                            "description": "The OCI repository where the Trusted Artifacts are stored",
                            "name": "ociStorage",
                            "type": "string"
                        },
                        {
                            "default": "1d",
                            "description": "Expiration date for the trusted artifacts created in the OCI repository. An empty string means the artifacts do not expire",
                            "name": "ociArtifactExpiresAfter",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Flag to enable debug logging in trusted artifacts. Set to a non-empty string to enable",
                            "name": "trustedArtifactsDebug",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "oras options to pass to Trusted Artifacts calls",
                            "name": "orasOptions",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Location of trusted artifacts to be used to populate data directory",
                            "name": "sourceDataArtifact",
                            "type": "string"
                        },
                        {
                            "default": "/var/workdir/release",
                            "description": "The location where data will be stored",
                            "name": "dataDir",
                            "type": "string"
                        },
                        {
                            "description": "The url to the git repo where the release-service-catalog tasks and stepactions to be used are stored",
                            "name": "taskGitUrl",
                            "type": "string"
                        },
                        {
                            "description": "The revision in the taskGitUrl repo to be used",
                            "name": "taskGitRevision",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from",
                            "name": "caTrustConfigMapName",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data",
                            "name": "caTrustConfigMapKey",
                            "type": "string"
                        },
                        {
                            "default": "/etc/pki/tls/certs/ca-bundle.crt",
                            "description": "Path to CA certificate bundle for TLS verification with self-signed certificates",
                            "name": "caCertPath",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Produced trusted data artifact",
                            "name": "sourceDataArtifact",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "IMAGE_EXPIRES_AFTER",
                                "value": "1d"
                            },
                            {
                                "name": "ORAS_OPTIONS"
                            },
                            {
                                "name": "DEBUG"
                            }
                        ],
                        "securityContext": {
                            "runAsUser": 1001
                        },
                        "volumeMounts": [
                            {
                                "mountPath": "/var/workdir",
                                "name": "workdir"
                            },
                            {
                                "mountPath": "/etc/pki/tls/certs/ca-bundle.crt",
                                "name": "trusted-ca",
                                "readOnly": true,
                                "subPath": "ca-bundle.crt"
                            },
                            {
                                "mountPath": "/etc/ssl/certs/ca-custom-bundle.crt",
                                "name": "trusted-ca",
                                "readOnly": true,
                                "subPath": "ca-bundle.crt"
                            }
                        ]
                    },
                    "steps": [
                        {
                            "args": [
                                "use",
                                "oci:quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts@sha256:2b2a184ca76db29ad1e0173934515414433ee35e7ce2e30c83fa080d97f997a4=/var/workdir/release"
                            ],
                            "computeResources": {
                                "limits": {
                                    "memory": "64Mi"
                                },
                                "requests": {
                                    "cpu": "30m",
                                    "memory": "64Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "HOME",
                                    "value": "/tekton/home"
                                },
                                {
                                    "name": "ORAS_OPTIONS"
                                },
                                {
                                    "name": "CA_FILE",
                                    "value": "/etc/pki/tls/certs/ca-bundle.crt"
                                }
                            ],
                            "image": "quay.io/konflux-ci/build-trusted-artifacts:653578444c73afc32b3a865fee9869a09f96c1a2",
                            "name": "use-trusted-artifact"
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "memory": "128Mi"
                                },
                                "requests": {
                                    "cpu": "10m",
                                    "memory": "128Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "SINGLE_COMPONENT",
                                    "value": "false"
                                },
                                {
                                    "name": "CUSTOM_RESOURCE",
                                    "value": "snapshot/tsf-demo-app-20260415-231650-000"
                                },
                                {
                                    "name": "CUSTOM_RESOURCE_NAMESPACE",
                                    "value": "default-tenant"
                                }
                            ],
                            "image": "quay.io/konflux-ci/release-service-utils@sha256:5546fa78d3c88d7b6a2e8cff8902f7757f00541d0bbaf113b9f293133894afa3",
                            "name": "ensure-required-labels-present",
                            "script": "#!/usr/bin/env bash\nset -eu\n\nif [ \"${SINGLE_COMPONENT}\" != \"true\" ]; then\n  echo \"Single component mode is not enabled, skipping label check\"\n  exit 0\nfi\n\nCR_NAMESPACE_ARG=\nif [ \"${CUSTOM_RESOURCE_NAMESPACE}\" != \"\" ]; then\n  CR_NAMESPACE_ARG=\"-n ${CUSTOM_RESOURCE_NAMESPACE}\"\nfi\n\nLABELS=$(kubectl get \"$CUSTOM_RESOURCE\" ${CR_NAMESPACE_ARG:+$CR_NAMESPACE_ARG} -ojson \\\n    | jq -r '.metadata.labels')\nSNAPSHOT_CREATION_TYPE=$(jq -r '.\"test.appstudio.openshift.io/type\" // \"\"' \u003c\u003c\u003c \"${LABELS}\")\nSNAPSHOT_CREATION_COMPONENT=$(jq -r '.\"appstudio.openshift.io/component\" // \"\"' \u003c\u003c\u003c \"${LABELS}\")\n\necho \"SNAPSHOT_CREATION_TYPE: ${SNAPSHOT_CREATION_TYPE}\"\necho \"SNAPSHOT_CREATION_COMPONENT: ${SNAPSHOT_CREATION_COMPONENT}\"\nif [ \"${SNAPSHOT_CREATION_TYPE}\" != \"component\" ] || [ \"${SNAPSHOT_CREATION_COMPONENT}\" == \"\" ]; then\n    echo \"Single component mode is enabled, but the snapshot is missing the required labels to use it.\"\n    echo \"This is likely due to a manually created snapshot\"\n    echo \"The test.appstudio.openshift.io/type label must exist with value component\"\n    echo \"The appstudio.openshift.io/component label must also exist saying which component to use\"\n    echo \"Failing the pipelineRun to prevent unexpected behavior in future tasks\"\n    exit 1\nfi\n"
                        },
                        {
                            "command": [
                                "reduce-snapshot.sh"
                            ],
                            "computeResources": {
                                "limits": {
                                    "memory": "128Mi"
                                },
                                "requests": {
                                    "cpu": "10m",
                                    "memory": "128Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "SNAPSHOT",
                                    "value": "/var/workdir/release/73a7398d-e21e-4159-adb1-64e80c630018/snapshot_spec.json"
                                },
                                {
                                    "name": "SINGLE_COMPONENT",
                                    "value": "false"
                                },
                                {
                                    "name": "CUSTOM_RESOURCE",
                                    "value": "snapshot/tsf-demo-app-20260415-231650-000"
                                },
                                {
                                    "name": "CUSTOM_RESOURCE_NAMESPACE",
                                    "value": "default-tenant"
                                },
                                {
                                    "name": "SNAPSHOT_PATH",
                                    "value": "/var/workdir/release/73a7398d-e21e-4159-adb1-64e80c630018/snapshot_spec.json"
                                }
                            ],
                            "image": "quay.io/conforma/cli@sha256:0a6c6cea9b6db5bbc798cb4c2ff0269789e547a8e25410c947a123eb727dc399",
                            "name": "reduce",
                            "onError": "continue"
                        },
                        {
                            "args": [
                                "create",
                                "--store",
                                "quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts",
                                "/tekton/results/sourceDataArtifact=/var/workdir/release"
                            ],
                            "computeResources": {
                                "limits": {
                                    "memory": "128Mi"
                                },
                                "requests": {
                                    "cpu": "250m",
                                    "memory": "128Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "HOME",
                                    "value": "/tekton/home"
                                },
                                {
                                    "name": "ORAS_OPTIONS"
                                },
                                {
                                    "name": "CA_FILE",
                                    "value": "/etc/pki/tls/certs/ca-bundle.crt"
                                }
                            ],
                            "image": "quay.io/konflux-ci/build-trusted-artifacts:653578444c73afc32b3a865fee9869a09f96c1a2",
                            "name": "create-trusted-artifact"
                        }
                    ],
                    "volumes": [
                        {
                            "emptyDir": {},
                            "name": "workdir"
                        },
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=59",
                    "operator-sdk/primary-resource": "default-tenant/tsf-demo-app-20260415-231650-000-8a419f9-vm66n",
                    "operator-sdk/primary-resource-type": "Release.appstudio.redhat.com",
                    "pac.test.appstudio.openshift.io/branch": "base-miwkfv",
                    "pac.test.appstudio.openshift.io/cancel-in-progress": "false",
                    "pac.test.appstudio.openshift.io/check-run-id": "71552493202",
                    "pac.test.appstudio.openshift.io/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pac.test.appstudio.openshift.io/event-type": "push",
                    "pac.test.appstudio.openshift.io/git-auth-secret": "pac-gitauth-ojyaao",
                    "pac.test.appstudio.openshift.io/git-provider": "github",
                    "pac.test.appstudio.openshift.io/installation-id": "112348674",
                    "pac.test.appstudio.openshift.io/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-push-cttl8",
                    "pac.test.appstudio.openshift.io/max-keep-runs": "3",
                    "pac.test.appstudio.openshift.io/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-miwkfv\"",
                    "pac.test.appstudio.openshift.io/original-prname": "tsf-demo-comp-on-push",
                    "pac.test.appstudio.openshift.io/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pac.test.appstudio.openshift.io/repository": "tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/scm-reporting-plr-started": "true",
                    "pac.test.appstudio.openshift.io/sender": "rhtap-ci-tests-bot",
                    "pac.test.appstudio.openshift.io/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pac.test.appstudio.openshift.io/sha-title": "Merge pull request #181 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pac.test.appstudio.openshift.io/source-branch": "refs/heads/base-miwkfv",
                    "pac.test.appstudio.openshift.io/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pac.test.appstudio.openshift.io/state": "completed",
                    "pac.test.appstudio.openshift.io/url-org": "rhads-tsf-qe",
                    "pac.test.appstudio.openshift.io/url-repository": "testrepo",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-managed-tenant-syc5c/results/73a7398d-e21e-4159-adb1-64e80c630018/records/986138f7-b190-48e6-b045-36a641e155fd",
                    "results.tekton.dev/result": "default-managed-tenant-syc5c/results/73a7398d-e21e-4159-adb1-64e80c630018",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "release"
                },
                "creationTimestamp": "2026-04-15T23:28:52Z",
                "finalizers": [
                    "chains.tekton.dev",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "tekton-pipelines",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/service": "release",
                    "appstudio.openshift.io/snapshot": "tsf-demo-app-20260415-231650-000",
                    "pipelines.appstudio.openshift.io/type": "managed",
                    "release.appstudio.openshift.io/name": "tsf-demo-app-20260415-231650-000-8a419f9-vm66n",
                    "release.appstudio.openshift.io/namespace": "default-tenant",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "push-to-external-registry",
                    "tekton.dev/pipelineRun": "managed-25x6p",
                    "tekton.dev/pipelineRunUID": "73a7398d-e21e-4159-adb1-64e80c630018",
                    "tekton.dev/pipelineTask": "update-cr-status"
                },
                "name": "managed-25x6p-update-cr-status",
                "namespace": "default-managed-tenant-syc5c",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "managed-25x6p",
                        "uid": "73a7398d-e21e-4159-adb1-64e80c630018"
                    }
                ],
                "resourceVersion": "44168",
                "uid": "986138f7-b190-48e6-b045-36a641e155fd"
            },
            "spec": {
                "params": [
                    {
                        "name": "resource",
                        "value": "default-tenant/tsf-demo-app-20260415-231650-000-8a419f9-vm66n"
                    },
                    {
                        "name": "resultsDirPath",
                        "value": "73a7398d-e21e-4159-adb1-64e80c630018/results"
                    },
                    {
                        "name": "ociStorage",
                        "value": "quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts"
                    },
                    {
                        "name": "resultArtifacts",
                        "value": [
                            "oci:quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts@sha256:8cfee0a38ba29843874e5213fc2adc58f66ee488d844cd39be3bd9a64de30d6f=/var/workdir/release"
                        ]
                    },
                    {
                        "name": "dataDir",
                        "value": "/var/workdir/release"
                    },
                    {
                        "name": "trustedArtifactsDebug",
                        "value": ""
                    },
                    {
                        "name": "taskGitUrl",
                        "value": "https://github.com/konflux-ci/release-service-catalog.git"
                    },
                    {
                        "name": "taskGitRevision",
                        "value": "development"
                    }
                ],
                "serviceAccountName": "release-pipeline",
                "taskRef": {
                    "params": [
                        {
                            "name": "url",
                            "value": "https://github.com/konflux-ci/release-service-catalog.git"
                        },
                        {
                            "name": "revision",
                            "value": "development"
                        },
                        {
                            "name": "pathInRepo",
                            "value": "tasks/managed/update-cr-status/update-cr-status.yaml"
                        }
                    ],
                    "resolver": "git"
                },
                "timeout": "1h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:29:00Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:29:00Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "managed-25x6p-update-cr-status-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha1": "4f00b1a3062b53809bf42ca120e84d73cc199954"
                        },
                        "entryPoint": "tasks/managed/update-cr-status/update-cr-status.yaml",
                        "uri": "git+https://github.com/konflux-ci/release-service-catalog.git"
                    }
                },
                "startTime": "2026-04-15T23:28:52Z",
                "steps": [
                    {
                        "container": "step-use-trusted-artifact-array",
                        "imageID": "quay.io/konflux-ci/build-trusted-artifacts@sha256:27ddb820f0d30609dcb8de88219309edbced429896324e474f494470c2f003fb",
                        "name": "use-trusted-artifact-array",
                        "provenance": {
                            "refSource": {
                                "digest": {
                                    "sha1": "4f00b1a3062b53809bf42ca120e84d73cc199954"
                                },
                                "entryPoint": "stepactions/use-trusted-artifact-array/use-trusted-artifact-array.yaml",
                                "uri": "git+https://github.com/konflux-ci/release-service-catalog.git"
                            }
                        },
                        "terminated": {
                            "containerID": "cri-o://ed129dc5f93438f7640b0f8df1a2389e79c680014d0cfc1db561b4d7aaec9e7c",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:28:58Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:28:58Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-update-cr-status",
                        "imageID": "quay.io/konflux-ci/release-service-utils@sha256:5546fa78d3c88d7b6a2e8cff8902f7757f00541d0bbaf113b9f293133894afa3",
                        "name": "update-cr-status",
                        "terminated": {
                            "containerID": "cri-o://e5c4844a6c2f8584c2625f00a4bf0f76e8bc761ea3ac161227f9815ad9ce6089",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:28:59Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:28:59Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "A tekton task that updates the passed CR status with the contents stored in the files in the resultsDir.",
                    "params": [
                        {
                            "default": "release",
                            "description": "The type of resource that is being patched",
                            "name": "resourceType",
                            "type": "string"
                        },
                        {
                            "default": "artifacts",
                            "description": "The top level key to overwrite in the resource status",
                            "name": "statusKey",
                            "type": "string"
                        },
                        {
                            "description": "The namespaced name of the resource to be patched",
                            "name": "resource",
                            "type": "string"
                        },
                        {
                            "description": "Path to the directory containing the result files in the data workspace which will be added to the\nresource's status\n",
                            "name": "resultsDirPath",
                            "type": "string"
                        },
                        {
                            "default": "empty",
                            "description": "The OCI repository where the Trusted Artifacts are stored",
                            "name": "ociStorage",
                            "type": "string"
                        },
                        {
                            "default": "1d",
                            "description": "Expiration date for the trusted artifacts created in the OCI repository. An empty string means the artifacts do not expire",
                            "name": "ociArtifactExpiresAfter",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Flag to enable debug logging in trusted artifacts. Set to a non-empty string to enable",
                            "name": "trustedArtifactsDebug",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "oras options to pass to Trusted Artifacts calls",
                            "name": "orasOptions",
                            "type": "string"
                        },
                        {
                            "default": [],
                            "description": "Array of artifacts to use to obtain results",
                            "name": "resultArtifacts",
                            "type": "array"
                        },
                        {
                            "default": "/var/workdir/release",
                            "description": "The location where data will be stored",
                            "name": "dataDir",
                            "type": "string"
                        },
                        {
                            "description": "The url to the git repo where the release-service-catalog tasks and stepactions to be used are stored",
                            "name": "taskGitUrl",
                            "type": "string"
                        },
                        {
                            "description": "The revision in the taskGitUrl repo to be used",
                            "name": "taskGitRevision",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from",
                            "name": "caTrustConfigMapName",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data",
                            "name": "caTrustConfigMapKey",
                            "type": "string"
                        },
                        {
                            "default": "/etc/pki/tls/certs/ca-bundle.crt",
                            "description": "Path to CA certificate bundle for TLS verification with self-signed certificates",
                            "name": "caCertPath",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "IMAGE_EXPIRES_AFTER",
                                "value": "1d"
                            },
                            {
                                "name": "ORAS_OPTIONS"
                            },
                            {
                                "name": "DEBUG"
                            }
                        ],
                        "securityContext": {
                            "runAsUser": 1001
                        },
                        "volumeMounts": [
                            {
                                "mountPath": "/var/workdir",
                                "name": "workdir"
                            },
                            {
                                "mountPath": "/etc/pki/tls/certs/ca-bundle.crt",
                                "name": "trusted-ca",
                                "readOnly": true,
                                "subPath": "ca-bundle.crt"
                            },
                            {
                                "mountPath": "/etc/ssl/certs/ca-custom-bundle.crt",
                                "name": "trusted-ca",
                                "readOnly": true,
                                "subPath": "ca-bundle.crt"
                            }
                        ]
                    },
                    "steps": [
                        {
                            "args": [
                                "use",
                                "oci:quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts@sha256:8cfee0a38ba29843874e5213fc2adc58f66ee488d844cd39be3bd9a64de30d6f=/var/workdir/release"
                            ],
                            "computeResources": {
                                "limits": {
                                    "memory": "128Mi"
                                },
                                "requests": {
                                    "cpu": "20m",
                                    "memory": "128Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "HOME",
                                    "value": "/tekton/home"
                                },
                                {
                                    "name": "CA_FILE",
                                    "value": "/etc/pki/tls/certs/ca-bundle.crt"
                                }
                            ],
                            "image": "quay.io/konflux-ci/build-trusted-artifacts:653578444c73afc32b3a865fee9869a09f96c1a2",
                            "name": "use-trusted-artifact-array"
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "memory": "128Mi"
                                },
                                "requests": {
                                    "cpu": "50m",
                                    "memory": "128Mi"
                                }
                            },
                            "image": "quay.io/konflux-ci/release-service-utils@sha256:5546fa78d3c88d7b6a2e8cff8902f7757f00541d0bbaf113b9f293133894afa3",
                            "name": "update-cr-status",
                            "script": "#!/usr/bin/env bash\nset -ex\n\nRESULTS_DIR=\"/var/workdir/release/73a7398d-e21e-4159-adb1-64e80c630018/results\"\nTEMP_FILE=\"/tmp/temp.json\"\nRESULTS_JSON=\"/tmp/results.json\"\necho '{}' \u003e \"$RESULTS_JSON\"\n\nfor resultsFile in $([ -d \"$RESULTS_DIR\" ] \u0026\u0026 find \"$RESULTS_DIR\" -type f); do\n    if ! jq . \u003e/dev/null 2\u003e\u00261 \"${resultsFile}\" ; then\n        echo \"Passed results JSON file ${resultsFile} in results directory was not proper JSON.\"\n        exit 1\n    fi\n\n    # Merge with array concatenation for array fields and object merging\n    jq --slurpfile new \"${resultsFile}\" '\n      # Store current values as $base and get all unique keys from both objects\n      . as $base | ($base | keys + ($new[0] | keys)) | unique |\n      # Process each key and build the merged result\n      reduce .[] as $key ({}; . + {($key): (\n        # Case 1: Both values are arrays - concatenate them\n        if ($new[0][$key] | type == \"array\") and ($base[$key] | type == \"array\")\n        then $base[$key] + $new[0][$key]\n        else\n          # Case 2: Both values are objects - merge them recursively\n          if ($new[0][$key] | type == \"object\") and ($base[$key] | type == \"object\")\n          then $base[$key] * $new[0][$key]\n          # Case 3: Default - use new value or fall back to base value\n          else $new[0][$key] // $base[$key]\n          end\n        end\n      )})\n    ' \"$RESULTS_JSON\" \u003e \"$TEMP_FILE\"\n    mv \"$TEMP_FILE\" \"$RESULTS_JSON\"\ndone\n\n# Read the final JSON from the file\nFINAL_JSON=$(cat \"$RESULTS_JSON\")\n\nIFS='/' read -r namespace name \u003c\u003c\u003c \"default-tenant/tsf-demo-app-20260415-231650-000-8a419f9-vm66n\"\n\n# Create patch file to avoid \"Argument list too long\" error\nPATCH_FILE=\"/tmp/patch-$(date +%s).json\"\necho \"status: {'artifacts':${FINAL_JSON}}\" \u003e \"$PATCH_FILE\"\n\nkubectl --warnings-as-errors=true patch \"release\" -n \"$namespace\" \"$name\" \\\n  --type=merge --subresource status --patch-file \"$PATCH_FILE\"\n\n# Clean up\nrm -f \"$PATCH_FILE\"\n"
                        }
                    ],
                    "volumes": [
                        {
                            "emptyDir": {},
                            "name": "workdir"
                        },
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=45",
                    "operator-sdk/primary-resource": "default-tenant/tsf-demo-app-20260415-231650-000-8a419f9-vm66n",
                    "operator-sdk/primary-resource-type": "Release.appstudio.redhat.com",
                    "pac.test.appstudio.openshift.io/branch": "base-miwkfv",
                    "pac.test.appstudio.openshift.io/cancel-in-progress": "false",
                    "pac.test.appstudio.openshift.io/check-run-id": "71552493202",
                    "pac.test.appstudio.openshift.io/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pac.test.appstudio.openshift.io/event-type": "push",
                    "pac.test.appstudio.openshift.io/git-auth-secret": "pac-gitauth-ojyaao",
                    "pac.test.appstudio.openshift.io/git-provider": "github",
                    "pac.test.appstudio.openshift.io/installation-id": "112348674",
                    "pac.test.appstudio.openshift.io/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-push-cttl8",
                    "pac.test.appstudio.openshift.io/max-keep-runs": "3",
                    "pac.test.appstudio.openshift.io/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-miwkfv\"",
                    "pac.test.appstudio.openshift.io/original-prname": "tsf-demo-comp-on-push",
                    "pac.test.appstudio.openshift.io/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pac.test.appstudio.openshift.io/repository": "tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/scm-reporting-plr-started": "true",
                    "pac.test.appstudio.openshift.io/sender": "rhtap-ci-tests-bot",
                    "pac.test.appstudio.openshift.io/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pac.test.appstudio.openshift.io/sha-title": "Merge pull request #181 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pac.test.appstudio.openshift.io/source-branch": "refs/heads/base-miwkfv",
                    "pac.test.appstudio.openshift.io/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pac.test.appstudio.openshift.io/state": "completed",
                    "pac.test.appstudio.openshift.io/url-org": "rhads-tsf-qe",
                    "pac.test.appstudio.openshift.io/url-repository": "testrepo",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-managed-tenant-syc5c/results/73a7398d-e21e-4159-adb1-64e80c630018/records/efa5bcc8-a8ea-4cc2-ad31-0db801f27aa6",
                    "results.tekton.dev/result": "default-managed-tenant-syc5c/results/73a7398d-e21e-4159-adb1-64e80c630018",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "release"
                },
                "creationTimestamp": "2026-04-15T23:26:12Z",
                "finalizers": [
                    "chains.tekton.dev",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "tekton-pipelines",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/service": "release",
                    "appstudio.openshift.io/snapshot": "tsf-demo-app-20260415-231650-000",
                    "pipelines.appstudio.openshift.io/type": "managed",
                    "release.appstudio.openshift.io/name": "tsf-demo-app-20260415-231650-000-8a419f9-vm66n",
                    "release.appstudio.openshift.io/namespace": "default-tenant",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "push-to-external-registry",
                    "tekton.dev/pipelineRun": "managed-25x6p",
                    "tekton.dev/pipelineRunUID": "73a7398d-e21e-4159-adb1-64e80c630018",
                    "tekton.dev/pipelineTask": "verify-access-to-resources",
                    "tekton.dev/task": "verify-access-to-resources"
                },
                "name": "managed-25x6p-verify-access-to-resources",
                "namespace": "default-managed-tenant-syc5c",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "managed-25x6p",
                        "uid": "73a7398d-e21e-4159-adb1-64e80c630018"
                    }
                ],
                "resourceVersion": "41739",
                "uid": "efa5bcc8-a8ea-4cc2-ad31-0db801f27aa6"
            },
            "spec": {
                "params": [
                    {
                        "name": "release",
                        "value": "default-tenant/tsf-demo-app-20260415-231650-000-8a419f9-vm66n"
                    },
                    {
                        "name": "releasePlan",
                        "value": "default-tenant/tsf-release"
                    },
                    {
                        "name": "releasePlanAdmission",
                        "value": "default-managed-tenant-syc5c/tsf-release"
                    },
                    {
                        "name": "releaseServiceConfig",
                        "value": "release-service/release-service-config"
                    },
                    {
                        "name": "snapshot",
                        "value": "default-tenant/tsf-demo-app-20260415-231650-000"
                    },
                    {
                        "name": "requireInternalServices",
                        "value": "false"
                    }
                ],
                "serviceAccountName": "release-pipeline",
                "taskRef": {
                    "params": [
                        {
                            "name": "url",
                            "value": "https://github.com/konflux-ci/release-service-catalog.git"
                        },
                        {
                            "name": "revision",
                            "value": "development"
                        },
                        {
                            "name": "pathInRepo",
                            "value": "tasks/managed/verify-access-to-resources/verify-access-to-resources.yaml"
                        }
                    ],
                    "resolver": "git"
                },
                "timeout": "1h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:26:28Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:26:28Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "managed-25x6p-verify-access-to-resources-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha1": "4f00b1a3062b53809bf42ca120e84d73cc199954"
                        },
                        "entryPoint": "tasks/managed/verify-access-to-resources/verify-access-to-resources.yaml",
                        "uri": "git+https://github.com/konflux-ci/release-service-catalog.git"
                    }
                },
                "startTime": "2026-04-15T23:26:13Z",
                "steps": [
                    {
                        "container": "step-verify-access-to-resources",
                        "imageID": "quay.io/konflux-ci/release-service-utils@sha256:5546fa78d3c88d7b6a2e8cff8902f7757f00541d0bbaf113b9f293133894afa3",
                        "name": "verify-access-to-resources",
                        "terminated": {
                            "containerID": "cri-o://85b811ab2693307ba3a7ed129a919c1a063b81e0f5dfc411c924b3f7af2a0ceb",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:26:28Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:26:28Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "This Tekton task is used to verify access to various resources in the pipelines. It ensures that the necessary\nresources, such as the release, release plan, release plan admission, release service config and snapshot,\nare available and accessible. Additionally, it checks if internal requests can be created if\n`requireInternalServices` is set to `true`.",
                    "params": [
                        {
                            "description": "Namespace/name of the Release",
                            "name": "release",
                            "type": "string"
                        },
                        {
                            "description": "Namespace/name of the ReleasePlan",
                            "name": "releasePlan",
                            "type": "string"
                        },
                        {
                            "description": "Namespace/name of the ReleasePlanAdmission",
                            "name": "releasePlanAdmission",
                            "type": "string"
                        },
                        {
                            "description": "Namespace/name of the ReleaseServiceConfig",
                            "name": "releaseServiceConfig",
                            "type": "string"
                        },
                        {
                            "description": "Namespace/name of the Snapshot",
                            "name": "snapshot",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Whether internal services are required",
                            "name": "requireInternalServices",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from",
                            "name": "caTrustConfigMapName",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data",
                            "name": "caTrustConfigMapKey",
                            "type": "string"
                        },
                        {
                            "default": "/etc/pki/tls/certs/ca-bundle.crt",
                            "description": "Path to CA certificate bundle for TLS verification with self-signed certificates",
                            "name": "caCertPath",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "securityContext": {
                            "runAsUser": 1001
                        },
                        "volumeMounts": [
                            {
                                "mountPath": "/etc/pki/tls/certs/ca-bundle.crt",
                                "name": "trusted-ca",
                                "readOnly": true,
                                "subPath": "ca-bundle.crt"
                            },
                            {
                                "mountPath": "/etc/ssl/certs/ca-custom-bundle.crt",
                                "name": "trusted-ca",
                                "readOnly": true,
                                "subPath": "ca-bundle.crt"
                            }
                        ]
                    },
                    "steps": [
                        {
                            "computeResources": {
                                "limits": {
                                    "memory": "100Mi"
                                },
                                "requests": {
                                    "cpu": "10m",
                                    "memory": "100Mi"
                                }
                            },
                            "image": "quay.io/konflux-ci/release-service-utils@sha256:5546fa78d3c88d7b6a2e8cff8902f7757f00541d0bbaf113b9f293133894afa3",
                            "name": "verify-access-to-resources",
                            "script": "#!/usr/bin/env bash\n\nORIGIN_NAMESPACE=\"$(cut -f1 -d/ \u003c\u003c\u003c \"default-tenant/tsf-demo-app-20260415-231650-000-8a419f9-vm66n\")\"\nTARGET_NAMESPACE=\"$(cut -f1 -d/ \u003c\u003c\u003c \"default-managed-tenant-syc5c/tsf-release\")\"\nRSC_NAMESPACE=\"$(cut -f1 -d/ \u003c\u003c\u003c \"release-service/release-service-config\")\"\n\nRELEASE_NAME=\"$(cut -f2 -d/ \u003c\u003c\u003c \"default-tenant/tsf-demo-app-20260415-231650-000-8a419f9-vm66n\")\"\nRELEASEPLAN_NAME=\"$(cut -f2 -d/ \u003c\u003c\u003c \"default-tenant/tsf-release\")\"\nRELEASEPLANADMISSION_NAME=\"$(cut -f2 -d/ \u003c\u003c\u003c \"default-managed-tenant-syc5c/tsf-release\")\"\nRELEASESERVICECONFIG_NAME=\"$(cut -f2 -d/ \u003c\u003c\u003c \"release-service/release-service-config\")\"\nSNAPSHOT_NAME=\"$(cut -f2 -d/ \u003c\u003c\u003c \"default-tenant/tsf-demo-app-20260415-231650-000\")\"\n\nCAN_I_READ_RELEASES=\"$(kubectl auth can-i get release/\"${RELEASE_NAME}\" -n \"${ORIGIN_NAMESPACE}\")\"\nCAN_I_READ_RELEASEPLANS=\"$(kubectl auth can-i get releaseplan/\"${RELEASEPLAN_NAME}\"\\\n    -n \"${ORIGIN_NAMESPACE}\")\"\nCAN_I_READ_RELEASEPLANADMISSIONS=\"$(kubectl auth can-i get\\\n    releaseplanadmission/\"${RELEASEPLANADMISSION_NAME}\" -n \"${TARGET_NAMESPACE}\")\"\nCAN_I_READ_RELEASESERVICECONFIG=\"$(kubectl auth can-i get\\\n    releaseserviceconfig/\"${RELEASESERVICECONFIG_NAME}\" -n \"${RSC_NAMESPACE}\")\"\nCAN_I_READ_SNAPSHOTS=\"$(kubectl auth can-i get snapshot/\"${SNAPSHOT_NAME}\" -n \"${ORIGIN_NAMESPACE}\")\"\n\nif [ \"false\" = \"true\" ]; then\n  CAN_I_CREATE_INTERNALREQUESTS=\"$(kubectl auth can-i create internalrequest -n \"${TARGET_NAMESPACE}\")\"\nelse\n  CAN_I_CREATE_INTERNALREQUESTS=\"skipped\"\nfi\n\necho \"\"\necho \"CAN_I_READ_RELEASES? ${CAN_I_READ_RELEASES}\"\necho \"CAN_I_READ_RELEASEPLANS? ${CAN_I_READ_RELEASEPLANS}\"\necho \"CAN_I_READ_RELEASEPLANADMISSIONS? ${CAN_I_READ_RELEASEPLANADMISSIONS}\"\necho \"CAN_I_READ_RELEASESERVICECONFIG? ${CAN_I_READ_RELEASESERVICECONFIG}\"\necho \"CAN_I_READ_SNAPSHOTS? ${CAN_I_READ_SNAPSHOTS}\"\necho \"\"\necho \"CAN_I_CREATE_INTERNALREQUESTS? ${CAN_I_CREATE_INTERNALREQUESTS}\"\necho \"\"\n\nif [ \"${CAN_I_READ_RELEASES}\" = \"no\" ] ||\\\n    [ \"${CAN_I_READ_RELEASEPLANS}\" = \"no\" ] ||\\\n    [ \"${CAN_I_READ_RELEASEPLANADMISSIONS}\" = \"no\" ] ||\\\n    [ \"${CAN_I_READ_RELEASESERVICECONFIG}\" = \"no\" ] ||\\\n    [ \"${CAN_I_READ_SNAPSHOTS}\" = \"no\" ] ||\\\n    [ \"${CAN_I_CREATE_INTERNALREQUESTS}\" = \"no\" ] ; then\n  echo \"Error: Cannot read or create required Release resources!\"\n  echo \"\"\n  echo \"This indicates that your workspace is not correctly setup\"\n  echo \"Please reach out to a workspace administrator\"\n  exit 1\nfi\n\necho \"Access to Release resources verified\"\n"
                        }
                    ],
                    "volumes": [
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=55",
                    "operator-sdk/primary-resource": "default-tenant/tsf-demo-app-20260415-231650-000-8a419f9-vm66n",
                    "operator-sdk/primary-resource-type": "Release.appstudio.redhat.com",
                    "pac.test.appstudio.openshift.io/branch": "base-miwkfv",
                    "pac.test.appstudio.openshift.io/cancel-in-progress": "false",
                    "pac.test.appstudio.openshift.io/check-run-id": "71552493202",
                    "pac.test.appstudio.openshift.io/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pac.test.appstudio.openshift.io/event-type": "push",
                    "pac.test.appstudio.openshift.io/git-auth-secret": "pac-gitauth-ojyaao",
                    "pac.test.appstudio.openshift.io/git-provider": "github",
                    "pac.test.appstudio.openshift.io/installation-id": "112348674",
                    "pac.test.appstudio.openshift.io/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-push-cttl8",
                    "pac.test.appstudio.openshift.io/max-keep-runs": "3",
                    "pac.test.appstudio.openshift.io/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-miwkfv\"",
                    "pac.test.appstudio.openshift.io/original-prname": "tsf-demo-comp-on-push",
                    "pac.test.appstudio.openshift.io/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pac.test.appstudio.openshift.io/repository": "tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/scm-reporting-plr-started": "true",
                    "pac.test.appstudio.openshift.io/sender": "rhtap-ci-tests-bot",
                    "pac.test.appstudio.openshift.io/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pac.test.appstudio.openshift.io/sha-title": "Merge pull request #181 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pac.test.appstudio.openshift.io/source-branch": "refs/heads/base-miwkfv",
                    "pac.test.appstudio.openshift.io/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pac.test.appstudio.openshift.io/state": "completed",
                    "pac.test.appstudio.openshift.io/url-org": "rhads-tsf-qe",
                    "pac.test.appstudio.openshift.io/url-repository": "testrepo",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-managed-tenant-syc5c/results/73a7398d-e21e-4159-adb1-64e80c630018/records/c753ba63-1823-4870-8a33-98b719d279a2",
                    "results.tekton.dev/result": "default-managed-tenant-syc5c/results/73a7398d-e21e-4159-adb1-64e80c630018",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "release"
                },
                "creationTimestamp": "2026-04-15T23:27:39Z",
                "finalizers": [
                    "chains.tekton.dev",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "tekton-pipelines",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/service": "release",
                    "appstudio.openshift.io/snapshot": "tsf-demo-app-20260415-231650-000",
                    "pipelines.appstudio.openshift.io/type": "managed",
                    "release.appstudio.openshift.io/name": "tsf-demo-app-20260415-231650-000-8a419f9-vm66n",
                    "release.appstudio.openshift.io/namespace": "default-tenant",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "push-to-external-registry",
                    "tekton.dev/pipelineRun": "managed-25x6p",
                    "tekton.dev/pipelineRunUID": "73a7398d-e21e-4159-adb1-64e80c630018",
                    "tekton.dev/pipelineTask": "verify-conforma"
                },
                "name": "managed-25x6p-verify-conforma",
                "namespace": "default-managed-tenant-syc5c",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "managed-25x6p",
                        "uid": "73a7398d-e21e-4159-adb1-64e80c630018"
                    }
                ],
                "resourceVersion": "43453",
                "uid": "c753ba63-1823-4870-8a33-98b719d279a2"
            },
            "spec": {
                "params": [
                    {
                        "name": "SNAPSHOT_FILENAME",
                        "value": "73a7398d-e21e-4159-adb1-64e80c630018/snapshot_spec.json"
                    },
                    {
                        "name": "SSL_CERT_DIR",
                        "value": "/var/run/secrets/kubernetes.io/serviceaccount"
                    },
                    {
                        "name": "POLICY_CONFIGURATION",
                        "value": "{\"name\":\"Default\",\"description\":\"Includes most of the rules and policies required internally by Red Hat when building Red Hat products. It excludes the requirement of hermetic builds. Available collections are defined in https://redhat-appstudio.github.io/docs.stonesoup.io/ec-policies/release_policy.html#_available_rule_collections. If a different policy configuration is desired, this resource can serve as a starting point. See the docs on how to include and exclude rules https://redhat-appstudio.github.io/docs.stonesoup.io/ec-policies/policy_configuration.html#_including_and_excluding_rules.\",\"sources\":[{\"name\":\"Default\",\"policy\":[\"oci::quay.io/conforma/release-policy:konflux@sha256:6eb386faaf76de0d7dbc9f9e770a7f5639ebcee88e4ed4f004f8053189b21eae\"],\"data\":[\"oci::quay.io/konflux-ci/tekton-catalog/data-acceptable-bundles:latest@sha256:2a869236b26abd735799a2a696be9098c9c7dfd974ef067353227c01398dfeb1\",\"github.com/redhat-appstudio/tsf-conforma-data//data?ref=33b9228b4f2846d827128e776b4a956788d7df8a\"],\"config\":{\"exclude\":[\"hermetic_task\",\"source_image\",\"rpm_repos\"],\"include\":[\"@redhat\"]}}],\"publicKey\":\"k8s://openshift-pipelines/public-key\"}"
                    },
                    {
                        "name": "STRICT",
                        "value": "true"
                    },
                    {
                        "name": "IGNORE_REKOR",
                        "value": "true"
                    },
                    {
                        "name": "EXTRA_RULE_DATA",
                        "value": "pipeline_intention=release"
                    },
                    {
                        "name": "WORKERS",
                        "value": "4"
                    },
                    {
                        "name": "SOURCE_DATA_ARTIFACT",
                        "value": "oci:quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts@sha256:2b862c40aec76316fae1617a2dad50d546c0cf26cbc3a955428c846df20dc71e"
                    },
                    {
                        "name": "TRUSTED_ARTIFACTS_DEBUG",
                        "value": ""
                    },
                    {
                        "name": "CERTIFICATE_IDENTITY",
                        "value": "https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller"
                    },
                    {
                        "name": "CERTIFICATE_OIDC_ISSUER",
                        "value": "https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j"
                    },
                    {
                        "name": "TUF_MIRROR",
                        "value": "http://tuf.tsf-tas.svc.cluster.local"
                    },
                    {
                        "name": "REKOR_HOST",
                        "value": "http://rekor-server.tsf-tas.svc.cluster.local"
                    }
                ],
                "serviceAccountName": "release-pipeline",
                "taskRef": {
                    "params": [
                        {
                            "name": "url",
                            "value": "https://github.com/conforma/cli"
                        },
                        {
                            "name": "revision",
                            "value": "671c67269434c73faa7e3a0800b2983cf48a6f1d"
                        },
                        {
                            "name": "pathInRepo",
                            "value": "tasks/verify-conforma-konflux-ta/0.1/verify-conforma-konflux-ta.yaml"
                        }
                    ],
                    "resolver": "git"
                },
                "timeout": "4h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:28:03Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:28:03Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "managed-25x6p-verify-conforma-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha1": "671c67269434c73faa7e3a0800b2983cf48a6f1d"
                        },
                        "entryPoint": "tasks/verify-conforma-konflux-ta/0.1/verify-conforma-konflux-ta.yaml",
                        "uri": "git+https://github.com/conforma/cli"
                    }
                },
                "results": [
                    {
                        "name": "TEST_OUTPUT",
                        "type": "string",
                        "value": "{\"timestamp\":\"1776295681\",\"namespace\":\"\",\"successes\":127,\"failures\":0,\"warnings\":6,\"result\":\"WARNING\"}\n"
                    },
                    {
                        "name": "VSA_GENERATED",
                        "type": "string",
                        "value": "false"
                    }
                ],
                "startTime": "2026-04-15T23:27:39Z",
                "steps": [
                    {
                        "container": "step-create-trusted-artifact",
                        "imageID": "quay.io/konflux-ci/build-trusted-artifacts@sha256:27ddb820f0d30609dcb8de88219309edbced429896324e474f494470c2f003fb",
                        "name": "create-trusted-artifact",
                        "provenance": {
                            "refSource": {
                                "digest": {
                                    "sha1": "4f00b1a3062b53809bf42ca120e84d73cc199954"
                                },
                                "entryPoint": "stepactions/create-trusted-artifact/create-trusted-artifact.yaml",
                                "uri": "git+https://github.com/konflux-ci/release-service-catalog"
                            }
                        },
                        "terminated": {
                            "containerID": "cri-o://98deb353ca19640492432046c12eead7ed6d2a78b0affe928e174f0b09e913d1",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:28:03Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:28:03Z"
                        },
                        "terminationReason": "Skipped"
                    },
                    {
                        "container": "step-use-trusted-artifact",
                        "imageID": "quay.io/redhat-appstudio/build-trusted-artifacts@sha256:3732f40fc8a6148eec58400421f7b15076c5db8be5243ec43d99a227023df577",
                        "name": "use-trusted-artifact",
                        "terminated": {
                            "containerID": "cri-o://d1878de26b570250d363eab4670c8e9481f72161a5002ce069ccbdf287d39784",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:27:52Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:27:51Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-initialize-tuf",
                        "imageID": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                        "name": "initialize-tuf",
                        "terminated": {
                            "containerID": "cri-o://cf984d3f5566dcf0bda5844fafac9b852f11424544ef4b69e4dd6ad774de70a6",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:27:52Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:27:52Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-reduce",
                        "imageID": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                        "name": "reduce",
                        "terminated": {
                            "containerID": "cri-o://97ab3817f7fe77adcf3201e96293ccb8c640f9cf62a82b47fe6fe94de408d515",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:27:52Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:27:52Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-validate",
                        "imageID": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                        "name": "validate",
                        "terminated": {
                            "containerID": "cri-o://d4c1aa4fefe50e09fc2b58d37a8ce95967c6721f0cfeb6d8ee6f87693f07ef09",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:28:01Z",
                            "message": "[{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"timestamp\\\":\\\"1776295681\\\",\\\"namespace\\\":\\\"\\\",\\\"successes\\\":127,\\\"failures\\\":0,\\\"warnings\\\":6,\\\"result\\\":\\\"WARNING\\\"}\\n\",\"type\":1},{\"key\":\"VSA_GENERATED\",\"value\":\"false\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:27:53Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-report-json",
                        "imageID": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                        "name": "report-json",
                        "terminated": {
                            "containerID": "cri-o://3532406bdd4f7184986cb758623359dfb6669c1015c5b30466afb3b43032f888",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:28:01Z",
                            "message": "[{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"timestamp\\\":\\\"1776295681\\\",\\\"namespace\\\":\\\"\\\",\\\"successes\\\":127,\\\"failures\\\":0,\\\"warnings\\\":6,\\\"result\\\":\\\"WARNING\\\"}\\n\",\"type\":1},{\"key\":\"VSA_GENERATED\",\"value\":\"false\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:28:01Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-summary",
                        "imageID": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                        "name": "summary",
                        "terminated": {
                            "containerID": "cri-o://27957e169ab17dd4479a76c7d16e4bb1fc0397d92e88d43185488bd977b30f7e",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:28:02Z",
                            "message": "[{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"timestamp\\\":\\\"1776295681\\\",\\\"namespace\\\":\\\"\\\",\\\"successes\\\":127,\\\"failures\\\":0,\\\"warnings\\\":6,\\\"result\\\":\\\"WARNING\\\"}\\n\",\"type\":1},{\"key\":\"VSA_GENERATED\",\"value\":\"false\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:28:02Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-version",
                        "imageID": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                        "name": "version",
                        "terminated": {
                            "containerID": "cri-o://30df6fec00d67f02d571f36e063b8fc43235a395b93b31bd0bcaffc1e1a9e69c",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:28:02Z",
                            "message": "[{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"timestamp\\\":\\\"1776295681\\\",\\\"namespace\\\":\\\"\\\",\\\"successes\\\":127,\\\"failures\\\":0,\\\"warnings\\\":6,\\\"result\\\":\\\"WARNING\\\"}\\n\",\"type\":1},{\"key\":\"VSA_GENERATED\",\"value\":\"false\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:28:02Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-show-config",
                        "imageID": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                        "name": "show-config",
                        "terminated": {
                            "containerID": "cri-o://4f111038dadd94260a4a8741b442c274c012248796af7ce9ff2f55c0934cb245",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:28:02Z",
                            "message": "[{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"timestamp\\\":\\\"1776295681\\\",\\\"namespace\\\":\\\"\\\",\\\"successes\\\":127,\\\"failures\\\":0,\\\"warnings\\\":6,\\\"result\\\":\\\"WARNING\\\"}\\n\",\"type\":1},{\"key\":\"VSA_GENERATED\",\"value\":\"false\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:28:02Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-detailed-report",
                        "imageID": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                        "name": "detailed-report",
                        "terminated": {
                            "containerID": "cri-o://01dca5152130449daf40ffcdbd2dc2b41102c3622816926bc0bc0a7531cde09a",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:28:03Z",
                            "message": "[{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"timestamp\\\":\\\"1776295681\\\",\\\"namespace\\\":\\\"\\\",\\\"successes\\\":127,\\\"failures\\\":0,\\\"warnings\\\":6,\\\"result\\\":\\\"WARNING\\\"}\\n\",\"type\":1},{\"key\":\"VSA_GENERATED\",\"value\":\"false\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:28:03Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-assert",
                        "imageID": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                        "name": "assert",
                        "terminated": {
                            "containerID": "cri-o://dc4ad2ffac9b679ccc2092ac6d24fe939ebb7cac0bc7467e7e6f94cffd26f083",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:28:03Z",
                            "message": "[{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"timestamp\\\":\\\"1776295681\\\",\\\"namespace\\\":\\\"\\\",\\\"successes\\\":127,\\\"failures\\\":0,\\\"warnings\\\":6,\\\"result\\\":\\\"WARNING\\\"}\\n\",\"type\":1},{\"key\":\"VSA_GENERATED\",\"value\":\"false\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:28:03Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Verify the enterprise contract is met",
                    "params": [
                        {
                            "description": "The filename of the `Snapshot` that is located within the trusted artifact\n",
                            "name": "SNAPSHOT_FILENAME",
                            "type": "string"
                        },
                        {
                            "description": "Trusted Artifact to use to obtain the Snapshot to validate.\n",
                            "name": "SOURCE_DATA_ARTIFACT",
                            "type": "string"
                        },
                        {
                            "default": "enterprise-contract-service/default",
                            "description": "Name of the policy configuration (EnterpriseContractPolicy\nresource) to use. `namespace/name` or `name` syntax supported. If\nnamespace is omitted the namespace where the task runs is used.\nYou can also specify a policy configuration using a git url, e.g.\n`github.com/conforma/config//slsa3`.\n",
                            "name": "POLICY_CONFIGURATION",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Public key used to verify traditional long-lived signatures. Must be a valid k8s cosign reference, e.g. k8s://my-space/my-secret where my-secret contains the expected cosign.pub attribute. Required for traditional signing key verification. Will be ignored if any of CERTIFICATE_IDENTITY, CERTIFICATE_IDENTITY_REGEXP, CERTIFICATE_OIDC_ISSUER, or CERTIFICATE_OIDC_ISSUER_REGEXP are provided.",
                            "name": "PUBLIC_KEY",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Rekor host for transparency log lookups",
                            "name": "REKOR_HOST",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Expected identity in the signing certificate for keyless verification. This should be the email or URI that was used when signing. You should provide both CERTIFICATE_OIDC_ISSUER and CERTIFICATE_IDENTITY for keyless verification. The PUBLIC_KEY param will be ignored if this is provided.",
                            "name": "CERTIFICATE_IDENTITY",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Expected OIDC issuer in the signing certificate for keyless verification. This should match the issuer that provided the identity token used for signing. You should provide both CERTIFICATE_OIDC_ISSUER and CERTIFICATE_IDENTITY for keyless verification. The PUBLIC_KEY param will be ignored if this is provided.",
                            "name": "CERTIFICATE_OIDC_ISSUER",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Similar to CERTIFICATE_IDENTITY but the value is a regexp that will be matched. Note that CERTIFICATE_IDENTITY takes precedence over this if both are present.",
                            "name": "CERTIFICATE_IDENTITY_REGEXP",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Similar to CERTIFICATE_OIDC_ISSUER but a regexp that will be matched. Note that CERTIFICATE_OIDC_ISSUER takes precedence over this if both are present.",
                            "name": "CERTIFICATE_OIDC_ISSUER_REGEXP",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Skip Rekor transparency log checks during validation. Compatible with traditional signing secret signature checks only. If any of the CERTIFICATE_* keyless verification params are present, this value is disregarded and Rekor transparency log checks are included.",
                            "name": "IGNORE_REKOR",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "TUF mirror URL. Provide a value when NOT using public sigstore deployment.",
                            "name": "TUF_MIRROR",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Path to a directory containing SSL certs to be used when communicating\nwith external services. This is useful when using the integrated registry\nand a local instance of Rekor on a development cluster which may use\ncertificates issued by a not-commonly trusted root CA. In such cases,\n`/var/run/secrets/kubernetes.io/serviceaccount` is a good value. Multiple\npaths can be provided by using the `:` separator.\n",
                            "name": "SSL_CERT_DIR",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from.",
                            "name": "CA_TRUST_CONFIGMAP_NAME",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data.",
                            "name": "CA_TRUST_CONFIG_MAP_KEY",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Include rule titles and descriptions in the output. Set to `\"false\"` to disable it.",
                            "name": "INFO",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Fail the task if policy fails. Set to `\"false\"` to disable it.",
                            "name": "STRICT",
                            "type": "string"
                        },
                        {
                            "default": "/tekton/home",
                            "description": "Value for the HOME environment variable.",
                            "name": "HOMEDIR",
                            "type": "string"
                        },
                        {
                            "default": "now",
                            "description": "Run policy checks with the provided time.",
                            "name": "EFFECTIVE_TIME",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Merge additional Rego variables into the policy data. Use syntax \"key=value,key2=value2...\"",
                            "name": "EXTRA_RULE_DATA",
                            "type": "string"
                        },
                        {
                            "default": "4",
                            "description": "Number of parallel workers to use for policy evaluation.\n",
                            "name": "WORKERS",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Reduce the Snapshot to only the component whose build caused the Snapshot to be created",
                            "name": "SINGLE_COMPONENT",
                            "type": "string"
                        },
                        {
                            "default": "unknown",
                            "description": "Name, including kind, of the Kubernetes resource to query for labels when single component mode is enabled, e.g. pr/somepipeline.\n",
                            "name": "SINGLE_COMPONENT_CUSTOM_RESOURCE",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Kubernetes namespace where the SINGLE_COMPONENT_NAME is found. Only used when single component mode is enabled.\n",
                            "name": "SINGLE_COMPONENT_CUSTOM_RESOURCE_NS",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "oras options to pass to Trusted Artifacts calls",
                            "name": "ORAS_OPTIONS",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Flag to enable debug logging in trusted artifacts. Set to a non-empty string to enable.",
                            "name": "TRUSTED_ARTIFACTS_DEBUG",
                            "type": "string"
                        },
                        {
                            "default": "/var/workdir/conforma",
                            "description": "Directory to use to extract trusted artifact archive.",
                            "name": "TRUSTED_ARTIFACTS_EXTRACT_DIR",
                            "type": "string"
                        },
                        {
                            "default": "1s",
                            "description": "Base duration for exponential backoff calculation (e.g., \"1s\", \"500ms\")",
                            "name": "RETRY_DURATION",
                            "type": "string"
                        },
                        {
                            "default": "2.0",
                            "description": "Exponential backoff multiplier (e.g., \"2.0\", \"1.5\")",
                            "name": "RETRY_FACTOR",
                            "type": "string"
                        },
                        {
                            "default": "0.1",
                            "description": "Randomness factor for backoff calculation (0.0-1.0, e.g., \"0.1\", \"0.2\")",
                            "name": "RETRY_JITTER",
                            "type": "string"
                        },
                        {
                            "default": "3",
                            "description": "Maximum number of retry attempts",
                            "name": "RETRY_MAX_RETRY",
                            "type": "string"
                        },
                        {
                            "default": "3s",
                            "description": "Maximum wait time between retries (e.g., \"3s\", \"10s\")",
                            "name": "RETRY_MAX_WAIT",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Enable VSA generation",
                            "name": "ENABLE_VSA",
                            "type": "string"
                        },
                        {
                            "default": "dsse",
                            "description": "Attestation format: dsse (signed envelope) or predicate (raw JSON)",
                            "name": "ATTESTATION_FORMAT",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Signing key for format=dsse (k8s:// or file:// URL)",
                            "name": "VSA_SIGNING_KEY",
                            "type": "string"
                        },
                        {
                            "default": "local@/var/workdir/conforma/vsa",
                            "description": "VSA upload destination",
                            "name": "VSA_UPLOAD",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "OCI storage URL for trusted artifacts",
                            "name": "ociStorage",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Short summary of the policy evaluation for each image",
                            "name": "TEST_OUTPUT",
                            "type": "string"
                        },
                        {
                            "description": "Whether VSAs were generated (true/false)",
                            "name": "VSA_GENERATED",
                            "type": "string"
                        },
                        {
                            "description": "Trusted Artifact URI containing VSA files",
                            "name": "sourceDataArtifact",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "ORAS_OPTIONS"
                            },
                            {
                                "name": "DEBUG"
                            },
                            {
                                "name": "HOME",
                                "value": "/tekton/home"
                            }
                        ],
                        "securityContext": {
                            "runAsUser": 1001
                        },
                        "volumeMounts": [
                            {
                                "mountPath": "/var/workdir",
                                "name": "workdir"
                            },
                            {
                                "mountPath": "/mnt/trusted-ca",
                                "name": "trusted-ca",
                                "readOnly": true
                            },
                            {
                                "mountPath": "/etc/ssl/certs/ca-custom-bundle.crt",
                                "name": "trusted-ca",
                                "readOnly": true,
                                "subPath": "ca-bundle.crt"
                            }
                        ]
                    },
                    "steps": [
                        {
                            "args": [
                                "use",
                                "oci:quay.io/rhtap_qe/default-managed-tenant-syc5c/default-managed-tenant-syc5c-91415c/trusted-artifacts@sha256:2b862c40aec76316fae1617a2dad50d546c0cf26cbc3a955428c846df20dc71e=/var/workdir/conforma"
                            ],
                            "computeResources": {},
                            "image": "quay.io/redhat-appstudio/build-trusted-artifacts:e02102ede09aa07187cba066ad547a54724e5cf4",
                            "name": "use-trusted-artifact"
                        },
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "TUF_MIRROR",
                                    "value": "http://tuf.tsf-tas.svc.cluster.local"
                                }
                            ],
                            "image": "quay.io/conforma/cli:latest",
                            "name": "initialize-tuf",
                            "script": "set -euo pipefail\n\nif [[ -z \"${TUF_MIRROR:-}\" ]]; then\n    echo 'TUF_MIRROR parameter not provided. Skipping TUF root initialization.'\n    exit\nfi\n\necho 'Initializing TUF root...'\nec sigstore initialize --mirror \"${TUF_MIRROR}\" --root \"${TUF_MIRROR}/root.json\"\necho 'Done!'"
                        },
                        {
                            "command": [
                                "reduce-snapshot.sh"
                            ],
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "SNAPSHOT",
                                    "value": "/var/workdir/conforma/73a7398d-e21e-4159-adb1-64e80c630018/snapshot_spec.json"
                                },
                                {
                                    "name": "SINGLE_COMPONENT",
                                    "value": "false"
                                },
                                {
                                    "name": "CUSTOM_RESOURCE",
                                    "value": "unknown"
                                },
                                {
                                    "name": "CUSTOM_RESOURCE_NAMESPACE"
                                },
                                {
                                    "name": "SNAPSHOT_PATH",
                                    "value": "/tekton/home/snapshot.json"
                                }
                            ],
                            "image": "quay.io/conforma/cli:latest",
                            "name": "reduce",
                            "onError": "continue"
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "memory": "2Gi"
                                },
                                "requests": {
                                    "cpu": "250m",
                                    "memory": "2Gi"
                                }
                            },
                            "env": [
                                {
                                    "name": "POLICY_CONFIGURATION",
                                    "value": "{\"name\":\"Default\",\"description\":\"Includes most of the rules and policies required internally by Red Hat when building Red Hat products. It excludes the requirement of hermetic builds. Available collections are defined in https://redhat-appstudio.github.io/docs.stonesoup.io/ec-policies/release_policy.html#_available_rule_collections. If a different policy configuration is desired, this resource can serve as a starting point. See the docs on how to include and exclude rules https://redhat-appstudio.github.io/docs.stonesoup.io/ec-policies/policy_configuration.html#_including_and_excluding_rules.\",\"sources\":[{\"name\":\"Default\",\"policy\":[\"oci::quay.io/conforma/release-policy:konflux@sha256:6eb386faaf76de0d7dbc9f9e770a7f5639ebcee88e4ed4f004f8053189b21eae\"],\"data\":[\"oci::quay.io/konflux-ci/tekton-catalog/data-acceptable-bundles:latest@sha256:2a869236b26abd735799a2a696be9098c9c7dfd974ef067353227c01398dfeb1\",\"github.com/redhat-appstudio/tsf-conforma-data//data?ref=33b9228b4f2846d827128e776b4a956788d7df8a\"],\"config\":{\"exclude\":[\"hermetic_task\",\"source_image\",\"rpm_repos\"],\"include\":[\"@redhat\"]}}],\"publicKey\":\"k8s://openshift-pipelines/public-key\"}"
                                },
                                {
                                    "name": "PUBLIC_KEY"
                                },
                                {
                                    "name": "CERTIFICATE_IDENTITY",
                                    "value": "https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller"
                                },
                                {
                                    "name": "CERTIFICATE_OIDC_ISSUER",
                                    "value": "https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j"
                                },
                                {
                                    "name": "CERTIFICATE_IDENTITY_REGEXP"
                                },
                                {
                                    "name": "CERTIFICATE_OIDC_ISSUER_REGEXP"
                                },
                                {
                                    "name": "REKOR_HOST",
                                    "value": "http://rekor-server.tsf-tas.svc.cluster.local"
                                },
                                {
                                    "name": "IGNORE_REKOR",
                                    "value": "true"
                                },
                                {
                                    "name": "WORKERS",
                                    "value": "4"
                                },
                                {
                                    "name": "INFO",
                                    "value": "true"
                                },
                                {
                                    "name": "EFFECTIVE_TIME",
                                    "value": "now"
                                },
                                {
                                    "name": "EXTRA_RULE_DATA",
                                    "value": "pipeline_intention=release"
                                },
                                {
                                    "name": "RETRY_MAX_WAIT",
                                    "value": "3s"
                                },
                                {
                                    "name": "RETRY_MAX_RETRY",
                                    "value": "3"
                                },
                                {
                                    "name": "RETRY_DURATION",
                                    "value": "1s"
                                },
                                {
                                    "name": "RETRY_FACTOR",
                                    "value": "2.0"
                                },
                                {
                                    "name": "RETRY_JITTER",
                                    "value": "0.1"
                                },
                                {
                                    "name": "ENABLE_VSA",
                                    "value": "false"
                                },
                                {
                                    "name": "ATTESTATION_FORMAT",
                                    "value": "dsse"
                                },
                                {
                                    "name": "VSA_SIGNING_KEY"
                                },
                                {
                                    "name": "VSA_UPLOAD",
                                    "value": "local@/var/workdir/conforma/vsa"
                                },
                                {
                                    "name": "HOMEDIR",
                                    "value": "/tekton/home"
                                },
                                {
                                    "name": "SSL_CERT_DIR",
                                    "value": "/tekton-custom-certs:/etc/ssl/certs:/etc/pki/tls/certs:/system/etc/security/cacerts:/var/run/secrets/kubernetes.io/serviceaccount"
                                },
                                {
                                    "name": "EC_CACHE",
                                    "value": "false"
                                }
                            ],
                            "image": "quay.io/conforma/cli:latest",
                            "name": "validate",
                            "onError": "continue",
                            "script": "#!/bin/bash\nset -euo pipefail\n\ncmd_args=(\n  validate\n  image\n  --images=\"${HOMEDIR}/snapshot.json\"\n  --policy=\"${POLICY_CONFIGURATION}\"\n)\n\n# To keep bash logic as thin as possible we deliberately don't sanitize\n# these params. If something is wrong or missing let Conforma handle it.\n\nif [ -n \"${CERTIFICATE_IDENTITY}\" ] || \\\n   [ -n \"${CERTIFICATE_OIDC_ISSUER}\" ] || \\\n   [ -n \"${CERTIFICATE_IDENTITY_REGEXP}\" ] || \\\n   [ -n \"${CERTIFICATE_OIDC_ISSUER_REGEXP}\" ]; then\n  # If *any* of the above are non-empty assume the intention is to\n  # try keyless verification\n\n  if [ -n \"${CERTIFICATE_IDENTITY}\" ]; then\n    cmd_args+=(\n      --certificate-identity=\"${CERTIFICATE_IDENTITY}\"\n    )\n  elif [ -n \"${CERTIFICATE_IDENTITY_REGEXP}\" ]; then\n    cmd_args+=(\n      --certificate-identity-regexp=\"${CERTIFICATE_IDENTITY_REGEXP}\"\n    )\n  fi\n\n  if [ -n \"${CERTIFICATE_OIDC_ISSUER}\" ]; then\n    cmd_args+=(\n      --certificate-oidc-issuer=\"${CERTIFICATE_OIDC_ISSUER}\"\n    )\n  elif [ -n \"${CERTIFICATE_OIDC_ISSUER_REGEXP}\" ]; then\n    cmd_args+=(\n      --certificate-oidc-issuer-regexp=\"${CERTIFICATE_OIDC_ISSUER_REGEXP}\"\n    )\n  fi\n\n  # Force --ignore-rekor to false since we need rekor\n  cmd_args+=(\n    --ignore-rekor=false\n  )\nelse\n  # Assume traditional signing secret verification\n  cmd_args+=(\n    --public-key=\"${PUBLIC_KEY}\"\n    --ignore-rekor=\"${IGNORE_REKOR}\"\n  )\nfi\n\ncmd_args+=(\n  --rekor-url=\"${REKOR_HOST}\"\n  --workers=\"${WORKERS}\"\n  --info=\"${INFO}\"\n  --timeout=0\n  --strict=false\n  --show-successes=true\n  --effective-time=\"${EFFECTIVE_TIME}\"\n  --extra-rule-data=\"${EXTRA_RULE_DATA}\"\n  --retry-max-wait=\"${RETRY_MAX_WAIT}\"\n  --retry-max-retry=\"${RETRY_MAX_RETRY}\"\n  --retry-duration=\"${RETRY_DURATION}\"\n  --retry-factor=\"${RETRY_FACTOR}\"\n  --retry-jitter=\"${RETRY_JITTER}\"\n  --output=\"text=${HOMEDIR}/text-report.txt?show-successes=false\"\n  --output=\"json=${HOMEDIR}/report-json.json\"\n  --output=\"appstudio=/tekton/results/TEST_OUTPUT\"\n)\n\n# Add VSA arguments if enabled\nif [[ \"${ENABLE_VSA}\" == \"true\" ]]; then\n  cmd_args+=(\n    --vsa=\"true\"\n    --attestation-format=\"${ATTESTATION_FORMAT}\"\n  )\n\n\n  if [[ \"${ATTESTATION_FORMAT}\" == \"dsse\" ]]; then\n    if [[ -z \"${VSA_SIGNING_KEY}\" ]]; then\n      echo \"ERROR: VSA_SIGNING_KEY required for format=dsse\" \u003e\u00262\n      exit 1\n    fi\n    cmd_args+=(\n      --vsa-signing-key=\"${VSA_SIGNING_KEY}\"\n      --vsa-upload=\"${VSA_UPLOAD}\"\n    )\n  fi\n\n  # ec requires --attestation-output-dir to be under /tmp or cwd.\n  # Write there first, then copy to the workdir so\n  # create-trusted-artifact includes them in the archive.\n  VSA_TMP_DIR=\"/tmp/vsa-output\"\n  mkdir -p \"$VSA_TMP_DIR\"\n  cmd_args+=(\n    --attestation-output-dir=\"$VSA_TMP_DIR\"\n  )\n\n  echo -n \"true\" \u003e /tekton/results/VSA_GENERATED\nelse\n  echo -n \"false\" \u003e /tekton/results/VSA_GENERATED\nfi\n\n# Execute Conforma with constructed arguments\nec \"${cmd_args[@]}\"\n\n# Copy VSA output from /tmp to workdir for trusted artifact archival\nif [[ \"${ENABLE_VSA}\" == \"true\" ]]; then\n  # Extract local path from VSA_UPLOAD for output directory\n  # VSA_UPLOAD format is \"local@/path/to/dir\"\n  # Fixme: Because of -o pipefail this will fail the whole task when the grep doesn't match\n  VSA_LOCAL_PATH=$(echo \"${VSA_UPLOAD}\" | grep -oE '^local@[^ ]+' | sed 's/^local@//' | head -n1 || true)\n  if [[ -n \"$VSA_LOCAL_PATH\" \u0026\u0026 -d \"/tmp/vsa-output\" ]]; then\n    mkdir -p \"$VSA_LOCAL_PATH\"\n    cp -r /tmp/vsa-output/* \"$VSA_LOCAL_PATH\"/ 2\u003e/dev/null || true\n    # Include raw JSON report for downstream SLSA VSA generation\n    cp \"${HOMEDIR}/report-json.json\" \"$VSA_LOCAL_PATH\"/ 2\u003e/dev/null || true\n  fi\nfi\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/etc/pki/tls/certs/ca-custom-bundle.crt",
                                    "name": "trusted-ca",
                                    "readOnly": true,
                                    "subPath": "ca-bundle.crt"
                                }
                            ]
                        },
                        {
                            "args": [
                                "jq . /tekton/home/report-json.json | awk '{gsub(/^ +/, \"\"); acc += length; if (acc \u003e= 8000) { printf \"\\n\"; acc=length } printf $0 }'"
                            ],
                            "command": [
                                "sh",
                                "-c"
                            ],
                            "computeResources": {},
                            "image": "quay.io/conforma/cli:latest",
                            "name": "report-json",
                            "onError": "continue"
                        },
                        {
                            "args": [
                                ".",
                                "/tekton/results/TEST_OUTPUT"
                            ],
                            "command": [
                                "jq"
                            ],
                            "computeResources": {},
                            "image": "quay.io/conforma/cli:latest",
                            "name": "summary",
                            "onError": "continue"
                        },
                        {
                            "args": [
                                "version"
                            ],
                            "command": [
                                "ec"
                            ],
                            "computeResources": {},
                            "image": "quay.io/conforma/cli:latest",
                            "name": "version"
                        },
                        {
                            "args": [
                                "{policy: .policy, key: .key, \"effective-time\": .[\"effective-time\"]}",
                                "/tekton/home/report-json.json"
                            ],
                            "command": [
                                "jq"
                            ],
                            "computeResources": {},
                            "image": "quay.io/conforma/cli:latest",
                            "name": "show-config"
                        },
                        {
                            "args": [
                                "/tekton/home/text-report.txt"
                            ],
                            "command": [
                                "cat"
                            ],
                            "computeResources": {},
                            "image": "quay.io/conforma/cli:latest",
                            "name": "detailed-report",
                            "onError": "continue"
                        },
                        {
                            "args": [
                                "--argjson",
                                "strict",
                                "true",
                                "-e",
                                ".result == \"SUCCESS\" or .result == \"WARNING\" or ($strict | not)\n",
                                "/tekton/results/TEST_OUTPUT"
                            ],
                            "command": [
                                "jq"
                            ],
                            "computeResources": {},
                            "image": "quay.io/conforma/cli:latest",
                            "name": "assert"
                        },
                        {
                            "args": [
                                "create",
                                "--store",
                                "",
                                "/tekton/results/sourceDataArtifact=/var/workdir/conforma"
                            ],
                            "computeResources": {
                                "limits": {
                                    "memory": "128Mi"
                                },
                                "requests": {
                                    "cpu": "250m",
                                    "memory": "128Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "HOME",
                                    "value": "/tekton/home"
                                },
                                {
                                    "name": "ORAS_OPTIONS"
                                },
                                {
                                    "name": "CA_FILE",
                                    "value": "/etc/pki/tls/certs/ca-bundle.crt"
                                }
                            ],
                            "image": "quay.io/konflux-ci/build-trusted-artifacts:653578444c73afc32b3a865fee9869a09f96c1a2",
                            "name": "create-trusted-artifact",
                            "when": [
                                {
                                    "input": "false",
                                    "operator": "in",
                                    "values": [
                                        "true"
                                    ]
                                },
                                {
                                    "operator": "notin",
                                    "values": [
                                        "",
                                        "empty"
                                    ]
                                }
                            ]
                        }
                    ],
                    "volumes": [
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        },
                        {
                            "emptyDir": {},
                            "name": "workdir"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.openshift.io/repo": "https://github.com/rhads-tsf-qe/testrepo?rev=c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "build.appstudio.redhat.com/commit_sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "build.appstudio.redhat.com/target_branch": "base-uovnpl",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=38",
                    "pac.test.appstudio.openshift.io/branch": "base-uovnpl",
                    "pac.test.appstudio.openshift.io/cancel-in-progress": "false",
                    "pac.test.appstudio.openshift.io/check-run-id": "71552388922",
                    "pac.test.appstudio.openshift.io/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pac.test.appstudio.openshift.io/event-type": "push",
                    "pac.test.appstudio.openshift.io/git-auth-secret": "pac-gitauth-ahlxga",
                    "pac.test.appstudio.openshift.io/git-provider": "github",
                    "pac.test.appstudio.openshift.io/installation-id": "112348674",
                    "pac.test.appstudio.openshift.io/log-url": "https://konflux-ui-konflux-ui.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/ns/default-tenant/pipelinerun/my-integration-test-lucx-8jfcg",
                    "pac.test.appstudio.openshift.io/max-keep-runs": "3",
                    "pac.test.appstudio.openshift.io/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-uovnpl\"",
                    "pac.test.appstudio.openshift.io/original-prname": "tsf-demo-comp-on-push",
                    "pac.test.appstudio.openshift.io/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pac.test.appstudio.openshift.io/repository": "tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/scm-reporting-plr-started": "true",
                    "pac.test.appstudio.openshift.io/sender": "rhtap-ci-tests-bot",
                    "pac.test.appstudio.openshift.io/sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pac.test.appstudio.openshift.io/sha-title": "Merge pull request #180 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pac.test.appstudio.openshift.io/source-branch": "refs/heads/base-uovnpl",
                    "pac.test.appstudio.openshift.io/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pac.test.appstudio.openshift.io/state": "completed",
                    "pac.test.appstudio.openshift.io/url-org": "rhads-tsf-qe",
                    "pac.test.appstudio.openshift.io/url-repository": "testrepo",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-tenant/results/f53ed6c0-d84a-43c8-8fef-e1d18ae93b1b/records/e0cb0e47-4516-44ec-ae3f-71851d82af2c",
                    "results.tekton.dev/result": "default-tenant/results/f53ed6c0-d84a-43c8-8fef-e1d18ae93b1b",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/displayName": "Collect Keyless Signing Parameters",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "ec, keyless, signing, configuration",
                    "test.appstudio.openshift.io/added-to-global-candidate-list": "{\"result\":true,\"reason\":\"Success\",\"lastupdatedtime\":\"2026-04-15T23:25:14Z\"}",
                    "test.appstudio.openshift.io/integration-workflow": "push",
                    "test.appstudio.openshift.io/pipelinerunstarttime": "1776294949000",
                    "test.appstudio.openshift.io/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "test.appstudio.openshift.io/status": "[{\"scenario\":\"my-integration-test-lucx\",\"status\":\"Pending\",\"lastUpdateTime\":\"2026-04-15T23:25:14.645809199Z\",\"details\":\"Pending\"}]"
                },
                "creationTimestamp": "2026-04-15T23:25:15Z",
                "finalizers": [
                    "chains.tekton.dev",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "tekton-pipelines",
                    "app.kubernetes.io/version": "0.1",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/component": "tsf-demo-comp",
                    "appstudio.openshift.io/snapshot": "tsf-demo-app-20260415-231549-000",
                    "build.appstudio.redhat.com/pipeline": "enterprise-contract",
                    "pac.test.appstudio.openshift.io/cancel-in-progress": "false",
                    "pac.test.appstudio.openshift.io/check-run-id": "71552388922",
                    "pac.test.appstudio.openshift.io/event-type": "push",
                    "pac.test.appstudio.openshift.io/original-prname": "tsf-demo-comp-on-push",
                    "pac.test.appstudio.openshift.io/repository": "tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pac.test.appstudio.openshift.io/state": "completed",
                    "pac.test.appstudio.openshift.io/url-org": "rhads-tsf-qe",
                    "pac.test.appstudio.openshift.io/url-repository": "testrepo",
                    "pipelines.appstudio.openshift.io/type": "test",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "enterprise-contract",
                    "tekton.dev/pipelineRun": "my-integration-test-lucx-8jfcg",
                    "tekton.dev/pipelineRunUID": "f53ed6c0-d84a-43c8-8fef-e1d18ae93b1b",
                    "tekton.dev/pipelineTask": "collect-keyless-params",
                    "tekton.dev/task": "collect-keyless-params",
                    "test.appstudio.openshift.io/optional": "false",
                    "test.appstudio.openshift.io/pipelinerunfinishtime": "1776295511",
                    "test.appstudio.openshift.io/scenario": "my-integration-test-lucx",
                    "test.appstudio.openshift.io/type": "component"
                },
                "name": "my-integration-test-lucx-8jfcg-collect-keyless-params",
                "namespace": "default-tenant",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "my-integration-test-lucx-8jfcg",
                        "uid": "f53ed6c0-d84a-43c8-8fef-e1d18ae93b1b"
                    }
                ],
                "resourceVersion": "40865",
                "uid": "e0cb0e47-4516-44ec-ae3f-71851d82af2c"
            },
            "spec": {
                "serviceAccountName": "konflux-integration-runner",
                "taskRef": {
                    "params": [
                        {
                            "name": "bundle",
                            "value": "quay.io/conforma/tekton-task:konflux"
                        },
                        {
                            "name": "name",
                            "value": "collect-keyless-params"
                        },
                        {
                            "name": "kind",
                            "value": "task"
                        }
                    ],
                    "resolver": "bundles"
                },
                "timeout": "1h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:25:28Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:25:28Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "my-integration-test-lucx-8jfcg-collect-keyless-params-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha256": "ce81caef343582bd5e20b51fb965f6bde405277f977d8e4e7652ea23e63da837"
                        },
                        "entryPoint": "collect-keyless-params",
                        "uri": "quay.io/conforma/tekton-task"
                    }
                },
                "results": [
                    {
                        "name": "buildIdentityRegexp",
                        "type": "string",
                        "value": "^https://kubernetes.io/namespaces/[a-z0-9-]+-tenant/serviceaccounts/build-pipeline-[a-z0-9-]+$"
                    },
                    {
                        "name": "defaultOIDCIssuer",
                        "type": "string",
                        "value": "https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j"
                    },
                    {
                        "name": "fulcioUrl",
                        "type": "string",
                        "value": "http://fulcio-server.tsf-tas.svc.cluster.local"
                    },
                    {
                        "name": "keylessSigningEnabled",
                        "type": "string",
                        "value": "true"
                    },
                    {
                        "name": "rekorUrl",
                        "type": "string",
                        "value": "http://rekor-server.tsf-tas.svc.cluster.local"
                    },
                    {
                        "name": "tektonChainsIdentity",
                        "type": "string",
                        "value": "https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller"
                    },
                    {
                        "name": "tufUrl",
                        "type": "string",
                        "value": "http://tuf.tsf-tas.svc.cluster.local"
                    }
                ],
                "startTime": "2026-04-15T23:25:15Z",
                "steps": [
                    {
                        "container": "step-collect-signing-params",
                        "imageID": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                        "name": "collect-signing-params",
                        "terminated": {
                            "containerID": "cri-o://65a5743c8cd8801ea07abfc6e8da88cff005ab2500f1b171553640f41f4faec4",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:25:27Z",
                            "message": "[{\"key\":\"buildIdentityRegexp\",\"value\":\"^https://kubernetes.io/namespaces/[a-z0-9-]+-tenant/serviceaccounts/build-pipeline-[a-z0-9-]+$\",\"type\":1},{\"key\":\"defaultOIDCIssuer\",\"value\":\"https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j\",\"type\":1},{\"key\":\"fulcioUrl\",\"value\":\"http://fulcio-server.tsf-tas.svc.cluster.local\",\"type\":1},{\"key\":\"keylessSigningEnabled\",\"value\":\"true\",\"type\":1},{\"key\":\"rekorUrl\",\"value\":\"http://rekor-server.tsf-tas.svc.cluster.local\",\"type\":1},{\"key\":\"tektonChainsIdentity\",\"value\":\"https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller\",\"type\":1},{\"key\":\"tufUrl\",\"value\":\"http://tuf.tsf-tas.svc.cluster.local\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:25:24Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Tekton task to collect Konflux configuration parameters related to\nkeyless signing using cosign. The task attempts to read the \"cluster-config\"\nConfigMap in the \"konflux-info\" namespace to extract signing parameters.\n\nIn case the ConfigMap is not found, the task will output empty strings for all parameters,\nallowing the pipeline to continue without signing parameters.\n",
                    "params": [
                        {
                            "default": "cluster-config",
                            "description": "The name of the ConfigMap to read signing parameters from",
                            "name": "configMapName",
                            "type": "string"
                        },
                        {
                            "default": "konflux-info",
                            "description": "The namespace where the ConfigMap is located",
                            "name": "configMapNamespace",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "A flag indicating whether keyless signing is enabled based on the presence of signing parameters.\n",
                            "name": "keylessSigningEnabled",
                            "type": "string"
                        },
                        {
                            "description": "A default OIDC issuer URL to be used for signing.\n",
                            "name": "defaultOIDCIssuer",
                            "type": "string"
                        },
                        {
                            "description": "A regular expression to extract build identity from the OIDC token claims, if applicable.\n",
                            "name": "buildIdentityRegexp",
                            "type": "string"
                        },
                        {
                            "description": "The Tekton Chains identity from the OIDC token claims, if applicable.\n",
                            "name": "tektonChainsIdentity",
                            "type": "string"
                        },
                        {
                            "description": "The URL of the Fulcio certificate authority.\n",
                            "name": "fulcioUrl",
                            "type": "string"
                        },
                        {
                            "description": "The URL of the Rekor transparency log.\n",
                            "name": "rekorUrl",
                            "type": "string"
                        },
                        {
                            "description": "The URL of the TUF repository.\n",
                            "name": "tufUrl",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "securityContext": {
                            "runAsUser": 1001
                        }
                    },
                    "steps": [
                        {
                            "computeResources": {
                                "limits": {
                                    "cpu": "50m",
                                    "memory": "128Mi"
                                },
                                "requests": {
                                    "cpu": "50m",
                                    "memory": "128Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "configMapNamespace",
                                    "value": "konflux-info"
                                },
                                {
                                    "name": "configMapName",
                                    "value": "cluster-config"
                                }
                            ],
                            "image": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                            "name": "collect-signing-params",
                            "script": "#!/bin/bash\nset -euo pipefail\n\n# Default value is \"false\"\nkeylessSigningEnabled=\"false\"\n\n# Default values are empty strings\ndefaultOIDCIssuer=\"\"\nbuildIdentityRegexp=\"\"\ntektonChainsIdentity=\"\"\nfulcioUrl=\"\"\nrekorUrl=\"\"\ntufUrl=\"\"\n\n# Read from the ConfigMap\necho \"Reading ConfigMap ${configMapNamespace}/${configMapName}\"\nKFLX_CONFIG_PATH='/tmp/cluster-config.json'\n\nif kubectl get configmap \"${configMapName}\" -n \"${configMapNamespace}\" -o json --ignore-not-found \u003e \"${KFLX_CONFIG_PATH}\"; then\n  if [ -s \"${KFLX_CONFIG_PATH}\" ]; then\n    echo \"ConfigMap found, extracting keyless signing parameters\"\n\n    # First we read \"keylessSigningEnabled\"\n    keylessSigningEnabled=$(jq -r '.data.enableKeylessSigning // \"false\"' \"$KFLX_CONFIG_PATH\")\n\n    if [ \"$keylessSigningEnabled\" = \"true\" ]; then\n      # If that is set to \"true\" then read the other values\n      defaultOIDCIssuer=$(jq -r '.data.defaultOIDCIssuer // \"\"' \"$KFLX_CONFIG_PATH\")\n      buildIdentityRegexp=$(jq -r '.data.buildIdentityRegexp // \"\"' \"$KFLX_CONFIG_PATH\")\n      tektonChainsIdentity=$(jq -r '.data.tektonChainsIdentity // \"\"' \"$KFLX_CONFIG_PATH\")\n\n      # For each of these we prefer the internal url if its present\n      fulcioUrl=$(jq -r '.data.fulcioInternalUrl // \"\"' \"$KFLX_CONFIG_PATH\")\n      if [ -z \"$fulcioUrl\" ]; then\n        fulcioUrl=$(jq -r '.data.fulcioExternalUrl // \"\"' \"$KFLX_CONFIG_PATH\")\n      fi\n\n      rekorUrl=$(jq -r '.data.rekorInternalUrl // \"\"' \"$KFLX_CONFIG_PATH\")\n      if [ -z \"$rekorUrl\" ]; then\n        rekorUrl=$(jq -r '.data.rekorExternalUrl // \"\"' \"$KFLX_CONFIG_PATH\")\n      fi\n\n      tufUrl=$(jq -r '.data.tufInternalUrl // \"\"' \"$KFLX_CONFIG_PATH\")\n      if [ -z \"$tufUrl\" ]; then\n        tufUrl=$(jq -r '.data.tufExternalUrl // \"\"' \"$KFLX_CONFIG_PATH\")\n      fi\n\n    else\n      # Otherwise we ignore the rest of the ConfigMap\n      echo \"enableKeylessSigning is not set, using default empty values\"\n\n    fi\n  else\n    # Because we used --ignore-not-found this doesn't produce an error\n    echo \"ConfigMap not found, using default empty values\"\n\n  fi\n\nelse\n  # Some error other than \"not found\"\n  # (Stderr from kubectl should be visible in the task log.)\n  echo \"Problem reading ConfigMap, using default empty values\"\n\nfi\n\n# Write to task results\necho -n \"$keylessSigningEnabled\" \u003e \"/tekton/results/keylessSigningEnabled\"\necho -n \"$defaultOIDCIssuer\" \u003e \"/tekton/results/defaultOIDCIssuer\"\necho -n \"$buildIdentityRegexp\" \u003e \"/tekton/results/buildIdentityRegexp\"\necho -n \"$tektonChainsIdentity\" \u003e \"/tekton/results/tektonChainsIdentity\"\necho -n \"$fulcioUrl\" \u003e \"/tekton/results/fulcioUrl\"\necho -n \"$rekorUrl\" \u003e \"/tekton/results/rekorUrl\"\necho -n \"$tufUrl\" \u003e \"/tekton/results/tufUrl\"\n\n# Output for troubleshooting/debugging\necho \"results.keylessSigningEnabled: $keylessSigningEnabled\"\necho \"results.defaultOIDCIssuer: $defaultOIDCIssuer\"\necho \"results.buildIdentityRegexp: $buildIdentityRegexp\"\necho \"results.tektonChainsIdentity: $tektonChainsIdentity\"\necho \"results.fulcioUrl: $fulcioUrl\"\necho \"results.rekorUrl: $rekorUrl\"\necho \"results.tufUrl: $tufUrl\"\n"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.openshift.io/repo": "https://github.com/rhads-tsf-qe/testrepo?rev=c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "build.appstudio.redhat.com/commit_sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "build.appstudio.redhat.com/target_branch": "base-uovnpl",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=40",
                    "pac.test.appstudio.openshift.io/branch": "base-uovnpl",
                    "pac.test.appstudio.openshift.io/cancel-in-progress": "false",
                    "pac.test.appstudio.openshift.io/check-run-id": "71552388922",
                    "pac.test.appstudio.openshift.io/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pac.test.appstudio.openshift.io/event-type": "push",
                    "pac.test.appstudio.openshift.io/git-auth-secret": "pac-gitauth-ahlxga",
                    "pac.test.appstudio.openshift.io/git-provider": "github",
                    "pac.test.appstudio.openshift.io/installation-id": "112348674",
                    "pac.test.appstudio.openshift.io/log-url": "https://konflux-ui-konflux-ui.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/ns/default-tenant/pipelinerun/my-integration-test-lucx-8jfcg",
                    "pac.test.appstudio.openshift.io/max-keep-runs": "3",
                    "pac.test.appstudio.openshift.io/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-uovnpl\"",
                    "pac.test.appstudio.openshift.io/original-prname": "tsf-demo-comp-on-push",
                    "pac.test.appstudio.openshift.io/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pac.test.appstudio.openshift.io/repository": "tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/scm-reporting-plr-started": "true",
                    "pac.test.appstudio.openshift.io/sender": "rhtap-ci-tests-bot",
                    "pac.test.appstudio.openshift.io/sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pac.test.appstudio.openshift.io/sha-title": "Merge pull request #180 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pac.test.appstudio.openshift.io/source-branch": "refs/heads/base-uovnpl",
                    "pac.test.appstudio.openshift.io/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pac.test.appstudio.openshift.io/state": "completed",
                    "pac.test.appstudio.openshift.io/url-org": "rhads-tsf-qe",
                    "pac.test.appstudio.openshift.io/url-repository": "testrepo",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-tenant/results/f53ed6c0-d84a-43c8-8fef-e1d18ae93b1b/records/a60b0e3e-4414-44bf-b599-719bd4538df7",
                    "results.tekton.dev/result": "default-tenant/results/f53ed6c0-d84a-43c8-8fef-e1d18ae93b1b",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/displayName": "Verify Enterprise Contract",
                    "tekton.dev/pipelines.minVersion": "0.19",
                    "tekton.dev/tags": "ec, chains, signature, conftest",
                    "test.appstudio.openshift.io/added-to-global-candidate-list": "{\"result\":true,\"reason\":\"Success\",\"lastupdatedtime\":\"2026-04-15T23:25:14Z\"}",
                    "test.appstudio.openshift.io/integration-workflow": "push",
                    "test.appstudio.openshift.io/pipelinerunstarttime": "1776294949000",
                    "test.appstudio.openshift.io/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "test.appstudio.openshift.io/status": "[{\"scenario\":\"my-integration-test-lucx\",\"status\":\"Pending\",\"lastUpdateTime\":\"2026-04-15T23:25:14.645809199Z\",\"details\":\"Pending\"}]"
                },
                "creationTimestamp": "2026-04-15T23:25:28Z",
                "finalizers": [
                    "chains.tekton.dev",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "tekton-pipelines",
                    "app.kubernetes.io/version": "0.1",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/component": "tsf-demo-comp",
                    "appstudio.openshift.io/snapshot": "tsf-demo-app-20260415-231549-000",
                    "build.appstudio.redhat.com/pipeline": "enterprise-contract",
                    "pac.test.appstudio.openshift.io/cancel-in-progress": "false",
                    "pac.test.appstudio.openshift.io/check-run-id": "71552388922",
                    "pac.test.appstudio.openshift.io/event-type": "push",
                    "pac.test.appstudio.openshift.io/original-prname": "tsf-demo-comp-on-push",
                    "pac.test.appstudio.openshift.io/repository": "tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pac.test.appstudio.openshift.io/state": "completed",
                    "pac.test.appstudio.openshift.io/url-org": "rhads-tsf-qe",
                    "pac.test.appstudio.openshift.io/url-repository": "testrepo",
                    "pipelines.appstudio.openshift.io/type": "test",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "enterprise-contract",
                    "tekton.dev/pipelineRun": "my-integration-test-lucx-8jfcg",
                    "tekton.dev/pipelineRunUID": "f53ed6c0-d84a-43c8-8fef-e1d18ae93b1b",
                    "tekton.dev/pipelineTask": "verify",
                    "tekton.dev/task": "verify-enterprise-contract",
                    "test.appstudio.openshift.io/optional": "false",
                    "test.appstudio.openshift.io/pipelinerunfinishtime": "1776295511",
                    "test.appstudio.openshift.io/scenario": "my-integration-test-lucx",
                    "test.appstudio.openshift.io/type": "component"
                },
                "name": "my-integration-test-lucx-8jfcg-verify",
                "namespace": "default-tenant",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "my-integration-test-lucx-8jfcg",
                        "uid": "f53ed6c0-d84a-43c8-8fef-e1d18ae93b1b"
                    }
                ],
                "resourceVersion": "41149",
                "uid": "a60b0e3e-4414-44bf-b599-719bd4538df7"
            },
            "spec": {
                "params": [
                    {
                        "name": "POLICY_CONFIGURATION",
                        "value": "enterprise-contract-service/default"
                    },
                    {
                        "name": "IMAGES",
                        "value": "{\"application\":\"tsf-demo-app\",\"componentGroup\":\"\",\"components\":[{\"name\":\"tsf-demo-comp\",\"version\":\"\",\"containerImage\":\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6\",\"source\":{\"git\":{\"url\":\"https://github.com/rhads-tsf-qe/testrepo\",\"revision\":\"c4481f5e1453d8c204c7bae0f626b245e6bf6525\"}}}],\"artifacts\":{}}"
                    },
                    {
                        "name": "SSL_CERT_DIR",
                        "value": ""
                    },
                    {
                        "name": "STRICT",
                        "value": "true"
                    },
                    {
                        "name": "PUBLIC_KEY",
                        "value": "k8s://openshift-pipelines/public-key"
                    },
                    {
                        "name": "IGNORE_REKOR",
                        "value": "true"
                    },
                    {
                        "name": "CERTIFICATE_OIDC_ISSUER",
                        "value": "https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j"
                    },
                    {
                        "name": "CERTIFICATE_IDENTITY",
                        "value": "https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller"
                    },
                    {
                        "name": "TUF_MIRROR",
                        "value": "http://tuf.tsf-tas.svc.cluster.local"
                    },
                    {
                        "name": "REKOR_HOST",
                        "value": "http://rekor-server.tsf-tas.svc.cluster.local"
                    },
                    {
                        "name": "WORKERS",
                        "value": "1"
                    },
                    {
                        "name": "CA_TRUST_CONFIGMAP_NAME",
                        "value": "trusted-ca"
                    },
                    {
                        "name": "CA_TRUST_CONFIG_MAP_KEY",
                        "value": "ca-bundle.crt"
                    },
                    {
                        "name": "EXTRA_RULE_DATA",
                        "value": ""
                    },
                    {
                        "name": "SINGLE_COMPONENT",
                        "value": "false"
                    },
                    {
                        "name": "SINGLE_COMPONENT_CUSTOM_RESOURCE",
                        "value": "pr/my-integration-test-lucx-8jfcg"
                    }
                ],
                "serviceAccountName": "konflux-integration-runner",
                "taskRef": {
                    "params": [
                        {
                            "name": "bundle",
                            "value": "quay.io/conforma/tekton-task:konflux"
                        },
                        {
                            "name": "name",
                            "value": "verify-enterprise-contract"
                        },
                        {
                            "name": "kind",
                            "value": "task"
                        }
                    ],
                    "resolver": "bundles"
                },
                "timeout": "4h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:25:42Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:25:42Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "my-integration-test-lucx-8jfcg-verify-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha256": "ce81caef343582bd5e20b51fb965f6bde405277f977d8e4e7652ea23e63da837"
                        },
                        "entryPoint": "verify-enterprise-contract",
                        "uri": "quay.io/conforma/tekton-task"
                    }
                },
                "results": [
                    {
                        "name": "TEST_OUTPUT",
                        "type": "string",
                        "value": "{\"timestamp\":\"1776295541\",\"namespace\":\"\",\"successes\":127,\"failures\":0,\"warnings\":6,\"result\":\"WARNING\"}\n"
                    }
                ],
                "startTime": "2026-04-15T23:25:28Z",
                "steps": [
                    {
                        "container": "step-initialize-tuf",
                        "imageID": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                        "name": "initialize-tuf",
                        "terminated": {
                            "containerID": "cri-o://6f642f6b1fbd183dd775374da82ff82b5d7538fc6d0dcac621dc74932d047bb7",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:25:33Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:25:33Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-reduce",
                        "imageID": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                        "name": "reduce",
                        "terminated": {
                            "containerID": "cri-o://7df06ef0b172f75837d60da876317984c72e498b9a5ed666a33b362b43a411f0",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:25:33Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:25:33Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-validate",
                        "imageID": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                        "name": "validate",
                        "terminated": {
                            "containerID": "cri-o://08a51ec32e8f210795c4dd15d99bcf75dad1cac2fc5d9733bb202d2d44c66c4d",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:25:41Z",
                            "message": "[{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"timestamp\\\":\\\"1776295541\\\",\\\"namespace\\\":\\\"\\\",\\\"successes\\\":127,\\\"failures\\\":0,\\\"warnings\\\":6,\\\"result\\\":\\\"WARNING\\\"}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:25:33Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-report-json",
                        "imageID": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                        "name": "report-json",
                        "terminated": {
                            "containerID": "cri-o://b6ab30fb07676c29eed11b1b04b8cbaa370d85e7ac6fdd21a1e802ce9f3afbad",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:25:41Z",
                            "message": "[{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"timestamp\\\":\\\"1776295541\\\",\\\"namespace\\\":\\\"\\\",\\\"successes\\\":127,\\\"failures\\\":0,\\\"warnings\\\":6,\\\"result\\\":\\\"WARNING\\\"}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:25:41Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-summary",
                        "imageID": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                        "name": "summary",
                        "terminated": {
                            "containerID": "cri-o://26adbe3279f54a9032ebf26cbfd6f375d9209d1fe6db2f9b7b7e641b12e4d609",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:25:41Z",
                            "message": "[{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"timestamp\\\":\\\"1776295541\\\",\\\"namespace\\\":\\\"\\\",\\\"successes\\\":127,\\\"failures\\\":0,\\\"warnings\\\":6,\\\"result\\\":\\\"WARNING\\\"}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:25:41Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-version",
                        "imageID": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                        "name": "version",
                        "terminated": {
                            "containerID": "cri-o://c852d53f6e8b0aac3be5a401cd51149f8a521eead93983bd857c069665d0bcc3",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:25:41Z",
                            "message": "[{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"timestamp\\\":\\\"1776295541\\\",\\\"namespace\\\":\\\"\\\",\\\"successes\\\":127,\\\"failures\\\":0,\\\"warnings\\\":6,\\\"result\\\":\\\"WARNING\\\"}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:25:41Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-show-config",
                        "imageID": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                        "name": "show-config",
                        "terminated": {
                            "containerID": "cri-o://6b58f055b39090a2c9c5a79a859ad04fbbd3f2a79e54d0700bf5675fc6e62f5c",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:25:41Z",
                            "message": "[{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"timestamp\\\":\\\"1776295541\\\",\\\"namespace\\\":\\\"\\\",\\\"successes\\\":127,\\\"failures\\\":0,\\\"warnings\\\":6,\\\"result\\\":\\\"WARNING\\\"}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:25:41Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-detailed-report",
                        "imageID": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                        "name": "detailed-report",
                        "terminated": {
                            "containerID": "cri-o://b4f41a56f4e1d2cdf534aa90b3de6f4698dd80a573edf25de580a2fa6deb4c18",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:25:41Z",
                            "message": "[{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"timestamp\\\":\\\"1776295541\\\",\\\"namespace\\\":\\\"\\\",\\\"successes\\\":127,\\\"failures\\\":0,\\\"warnings\\\":6,\\\"result\\\":\\\"WARNING\\\"}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:25:41Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-assert",
                        "imageID": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                        "name": "assert",
                        "terminated": {
                            "containerID": "cri-o://b2b913d4d49ba55a801697841241dd209ab03b6f8c31522c66dc58a380ca595b",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:25:41Z",
                            "message": "[{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"timestamp\\\":\\\"1776295541\\\",\\\"namespace\\\":\\\"\\\",\\\"successes\\\":127,\\\"failures\\\":0,\\\"warnings\\\":6,\\\"result\\\":\\\"WARNING\\\"}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:25:41Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Verify the enterprise contract is met",
                    "params": [
                        {
                            "description": "Spec section of an ApplicationSnapshot resource. Not all fields of the\nresource are required. A minimal example:\n\n```json\n  {\n    \"components\": [\n      {\n        \"containerImage\": \"quay.io/example/repo:latest\"\n      }\n    ]\n  }\n```\n\nEach `containerImage` in the `components` array is validated.\n",
                            "name": "IMAGES",
                            "type": "string"
                        },
                        {
                            "default": "enterprise-contract-service/default",
                            "description": "Name of the policy configuration (EnterpriseContractPolicy\nresource) to use. `namespace/name` or `name` syntax supported. If\nnamespace is omitted the namespace where the task runs is used.\nYou can also specify a policy configuration using a git url, e.g.\n`github.com/conforma/config//slsa3`.\n",
                            "name": "POLICY_CONFIGURATION",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Public key used to verify traditional long-lived signatures. Must be a valid k8s cosign reference, e.g. k8s://my-space/my-secret where my-secret contains the expected cosign.pub attribute. Required for traditional signing key verification. Will be ignored if any of CERTIFICATE_IDENTITY, CERTIFICATE_IDENTITY_REGEXP, CERTIFICATE_OIDC_ISSUER, or CERTIFICATE_OIDC_ISSUER_REGEXP are provided.",
                            "name": "PUBLIC_KEY",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Rekor host for transparency log lookups",
                            "name": "REKOR_HOST",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Expected identity in the signing certificate for keyless verification. This should be the email or URI that was used when signing. You should provide both CERTIFICATE_OIDC_ISSUER and CERTIFICATE_IDENTITY for keyless verification. The PUBLIC_KEY param will be ignored if this is provided.",
                            "name": "CERTIFICATE_IDENTITY",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Expected OIDC issuer in the signing certificate for keyless verification. This should match the issuer that provided the identity token used for signing. You should provide both CERTIFICATE_OIDC_ISSUER and CERTIFICATE_IDENTITY for keyless verification. The PUBLIC_KEY param will be ignored if this is provided.",
                            "name": "CERTIFICATE_OIDC_ISSUER",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Similar to CERTIFICATE_IDENTITY but the value is a regexp that will be matched. Note that CERTIFICATE_IDENTITY takes precedence over this if both are present.",
                            "name": "CERTIFICATE_IDENTITY_REGEXP",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Similar to CERTIFICATE_OIDC_ISSUER but a regexp that will be matched. Note that CERTIFICATE_OIDC_ISSUER takes precedence over this if both are present.",
                            "name": "CERTIFICATE_OIDC_ISSUER_REGEXP",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Skip Rekor transparency log checks during validation. Compatible with traditional signing secret signature checks only. If any of the CERTIFICATE_* keyless verification params are present, this value is disregarded and Rekor transparency log checks are included.",
                            "name": "IGNORE_REKOR",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "TUF mirror URL. Provide a value when NOT using public sigstore deployment.",
                            "name": "TUF_MIRROR",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Path to a directory containing SSL certs to be used when communicating\nwith external services. This is useful when using the integrated registry\nand a local instance of Rekor on a development cluster which may use\ncertificates issued by a not-commonly trusted root CA. In such cases,\n`/var/run/secrets/kubernetes.io/serviceaccount` is a good value. Multiple\npaths can be provided by using the `:` separator.\n",
                            "name": "SSL_CERT_DIR",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from.",
                            "name": "CA_TRUST_CONFIGMAP_NAME",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data.",
                            "name": "CA_TRUST_CONFIG_MAP_KEY",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Include rule titles and descriptions in the output. Set to `\"false\"` to disable it.",
                            "name": "INFO",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Fail the task if policy fails. Set to `\"false\"` to disable it.",
                            "name": "STRICT",
                            "type": "string"
                        },
                        {
                            "default": "/tekton/home",
                            "description": "Value for the HOME environment variable.",
                            "name": "HOMEDIR",
                            "type": "string"
                        },
                        {
                            "default": "now",
                            "description": "Run policy checks with the provided time.",
                            "name": "EFFECTIVE_TIME",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Merge additional Rego variables into the policy data. Use syntax \"key=value,key2=value2...\"",
                            "name": "EXTRA_RULE_DATA",
                            "type": "string"
                        },
                        {
                            "default": "1",
                            "description": "Number of parallel workers to use for policy evaluation.",
                            "name": "WORKERS",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Reduce the Snapshot to only the component whose build caused the Snapshot to be created",
                            "name": "SINGLE_COMPONENT",
                            "type": "string"
                        },
                        {
                            "default": "unknown",
                            "description": "Name, including kind, of the Kubernetes resource to query for labels when single component mode is enabled, e.g. pr/somepipeline.\n",
                            "name": "SINGLE_COMPONENT_CUSTOM_RESOURCE",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Kubernetes namespace where the SINGLE_COMPONENT_NAME is found. Only used when single component mode is enabled.\n",
                            "name": "SINGLE_COMPONENT_CUSTOM_RESOURCE_NS",
                            "type": "string"
                        },
                        {
                            "default": "1s",
                            "description": "Base duration for exponential backoff calculation (e.g., \"1s\", \"500ms\")",
                            "name": "RETRY_DURATION",
                            "type": "string"
                        },
                        {
                            "default": "2.0",
                            "description": "Exponential backoff multiplier (e.g., \"2.0\", \"1.5\")",
                            "name": "RETRY_FACTOR",
                            "type": "string"
                        },
                        {
                            "default": "0.1",
                            "description": "Randomness factor for backoff calculation (0.0-1.0, e.g., \"0.1\", \"0.2\")",
                            "name": "RETRY_JITTER",
                            "type": "string"
                        },
                        {
                            "default": "3",
                            "description": "Maximum number of retry attempts",
                            "name": "RETRY_MAX_RETRY",
                            "type": "string"
                        },
                        {
                            "default": "3s",
                            "description": "Maximum wait time between retries (e.g., \"3s\", \"10s\")",
                            "name": "RETRY_MAX_WAIT",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Short summary of the policy evaluation for each image",
                            "name": "TEST_OUTPUT",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "HOME",
                                "value": "/tekton/home"
                            }
                        ]
                    },
                    "steps": [
                        {
                            "args": [
                                "sigstore",
                                "initialize",
                                "--mirror",
                                "http://tuf.tsf-tas.svc.cluster.local",
                                "--root",
                                "http://tuf.tsf-tas.svc.cluster.local/root.json"
                            ],
                            "command": [
                                "ec"
                            ],
                            "computeResources": {
                                "limits": {
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "image": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                            "name": "initialize-tuf",
                            "when": [
                                {
                                    "input": "http://tuf.tsf-tas.svc.cluster.local",
                                    "operator": "notin",
                                    "values": [
                                        ""
                                    ]
                                }
                            ]
                        },
                        {
                            "command": [
                                "reduce-snapshot.sh"
                            ],
                            "computeResources": {
                                "limits": {
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "SNAPSHOT",
                                    "value": "{\"application\":\"tsf-demo-app\",\"componentGroup\":\"\",\"components\":[{\"name\":\"tsf-demo-comp\",\"version\":\"\",\"containerImage\":\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6\",\"source\":{\"git\":{\"url\":\"https://github.com/rhads-tsf-qe/testrepo\",\"revision\":\"c4481f5e1453d8c204c7bae0f626b245e6bf6525\"}}}],\"artifacts\":{}}"
                                },
                                {
                                    "name": "SINGLE_COMPONENT",
                                    "value": "false"
                                },
                                {
                                    "name": "CUSTOM_RESOURCE",
                                    "value": "pr/my-integration-test-lucx-8jfcg"
                                },
                                {
                                    "name": "CUSTOM_RESOURCE_NAMESPACE"
                                },
                                {
                                    "name": "SNAPSHOT_PATH",
                                    "value": "/tekton/home/snapshot.json"
                                }
                            ],
                            "image": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                            "name": "reduce",
                            "onError": "continue"
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "memory": "2Gi"
                                },
                                "requests": {
                                    "cpu": "1800m",
                                    "memory": "2Gi"
                                }
                            },
                            "env": [
                                {
                                    "name": "POLICY_CONFIGURATION",
                                    "value": "enterprise-contract-service/default"
                                },
                                {
                                    "name": "PUBLIC_KEY",
                                    "value": "k8s://openshift-pipelines/public-key"
                                },
                                {
                                    "name": "CERTIFICATE_IDENTITY",
                                    "value": "https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller"
                                },
                                {
                                    "name": "CERTIFICATE_OIDC_ISSUER",
                                    "value": "https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j"
                                },
                                {
                                    "name": "CERTIFICATE_IDENTITY_REGEXP"
                                },
                                {
                                    "name": "CERTIFICATE_OIDC_ISSUER_REGEXP"
                                },
                                {
                                    "name": "REKOR_HOST",
                                    "value": "http://rekor-server.tsf-tas.svc.cluster.local"
                                },
                                {
                                    "name": "IGNORE_REKOR",
                                    "value": "true"
                                },
                                {
                                    "name": "WORKERS",
                                    "value": "1"
                                },
                                {
                                    "name": "INFO",
                                    "value": "true"
                                },
                                {
                                    "name": "EFFECTIVE_TIME",
                                    "value": "now"
                                },
                                {
                                    "name": "EXTRA_RULE_DATA"
                                },
                                {
                                    "name": "RETRY_MAX_WAIT",
                                    "value": "3s"
                                },
                                {
                                    "name": "RETRY_MAX_RETRY",
                                    "value": "3"
                                },
                                {
                                    "name": "RETRY_DURATION",
                                    "value": "1s"
                                },
                                {
                                    "name": "RETRY_FACTOR",
                                    "value": "2.0"
                                },
                                {
                                    "name": "RETRY_JITTER",
                                    "value": "0.1"
                                },
                                {
                                    "name": "HOMEDIR",
                                    "value": "/tekton/home"
                                },
                                {
                                    "name": "SSL_CERT_DIR",
                                    "value": "/tekton-custom-certs:/etc/ssl/certs:/etc/pki/tls/certs:/system/etc/security/cacerts:"
                                }
                            ],
                            "image": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                            "name": "validate",
                            "onError": "continue",
                            "script": "#!/bin/bash\nset -euo pipefail\n\ncmd_args=(\n  validate\n  image\n  --images=\"${HOMEDIR}/snapshot.json\"\n  --policy=\"${POLICY_CONFIGURATION}\"\n)\n\n# To keep bash logic as thin as possible we deliberately don't sanitize\n# these params. If something is wrong or missing let Conforma handle it.\n\nif [ -n \"${CERTIFICATE_IDENTITY}\" ] || \\\n   [ -n \"${CERTIFICATE_OIDC_ISSUER}\" ] || \\\n   [ -n \"${CERTIFICATE_IDENTITY_REGEXP}\" ] || \\\n   [ -n \"${CERTIFICATE_OIDC_ISSUER_REGEXP}\" ]; then\n  # If *any* of the above are non-empty assume the intention is to\n  # try keyless verification\n\n  if [ -n \"${CERTIFICATE_IDENTITY}\" ]; then\n    cmd_args+=(\n      --certificate-identity=\"${CERTIFICATE_IDENTITY}\"\n    )\n  elif [ -n \"${CERTIFICATE_IDENTITY_REGEXP}\" ]; then\n    cmd_args+=(\n      --certificate-identity-regexp=\"${CERTIFICATE_IDENTITY_REGEXP}\"\n    )\n  fi\n\n  if [ -n \"${CERTIFICATE_OIDC_ISSUER}\" ]; then\n    cmd_args+=(\n      --certificate-oidc-issuer=\"${CERTIFICATE_OIDC_ISSUER}\"\n    )\n  elif [ -n \"${CERTIFICATE_OIDC_ISSUER_REGEXP}\" ]; then\n    cmd_args+=(\n      --certificate-oidc-issuer-regexp=\"${CERTIFICATE_OIDC_ISSUER_REGEXP}\"\n    )\n  fi\n\n  # Force --ignore-rekor to false since we need rekor\n  cmd_args+=(\n    --ignore-rekor=false\n  )\nelse\n  # Assume traditional signing secret verification\n  cmd_args+=(\n    --public-key=\"${PUBLIC_KEY}\"\n    --ignore-rekor=\"${IGNORE_REKOR}\"\n  )\nfi\n\ncmd_args+=(\n  --rekor-url=\"${REKOR_HOST}\"\n  --workers=\"${WORKERS}\"\n  --info=\"${INFO}\"\n  --timeout=0\n  --strict=false\n  --show-successes=true\n  --show-policy-docs-link=true\n  --effective-time=\"${EFFECTIVE_TIME}\"\n  --extra-rule-data=\"${EXTRA_RULE_DATA}\"\n  --retry-max-wait=\"${RETRY_MAX_WAIT}\"\n  --retry-max-retry=\"${RETRY_MAX_RETRY}\"\n  --retry-duration=\"${RETRY_DURATION}\"\n  --retry-factor=\"${RETRY_FACTOR}\"\n  --retry-jitter=\"${RETRY_JITTER}\"\n  --output=\"text=${HOMEDIR}/text-report.txt?show-successes=false\"\n  --output=\"json=${HOMEDIR}/report-json.json\"\n  --output=\"appstudio=/tekton/results/TEST_OUTPUT\"\n)\n\n\n# Execute Conforma with constructed arguments\nexec ec \"${cmd_args[@]}\"\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/etc/pki/tls/certs/ca-custom-bundle.crt",
                                    "name": "trusted-ca",
                                    "readOnly": true,
                                    "subPath": "ca-bundle.crt"
                                }
                            ]
                        },
                        {
                            "args": [
                                "jq . /tekton/home/report-json.json | awk '{gsub(/^ +/, \"\"); acc += length; if (acc \u003e= 8000) { printf \"\\n\"; acc=length } printf $0 }'"
                            ],
                            "command": [
                                "sh",
                                "-c"
                            ],
                            "computeResources": {
                                "limits": {
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "image": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                            "name": "report-json",
                            "onError": "continue"
                        },
                        {
                            "args": [
                                ".",
                                "/tekton/results/TEST_OUTPUT"
                            ],
                            "command": [
                                "jq"
                            ],
                            "computeResources": {
                                "limits": {
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "image": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                            "name": "summary",
                            "onError": "continue"
                        },
                        {
                            "args": [
                                "version"
                            ],
                            "command": [
                                "ec"
                            ],
                            "computeResources": {
                                "limits": {
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "image": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                            "name": "version"
                        },
                        {
                            "args": [
                                "{policy: .policy, key: .key, \"effective-time\": .[\"effective-time\"]}",
                                "/tekton/home/report-json.json"
                            ],
                            "command": [
                                "jq"
                            ],
                            "computeResources": {
                                "limits": {
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "image": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                            "name": "show-config"
                        },
                        {
                            "args": [
                                "/tekton/home/text-report.txt"
                            ],
                            "command": [
                                "cat"
                            ],
                            "computeResources": {},
                            "image": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                            "name": "detailed-report",
                            "onError": "continue"
                        },
                        {
                            "args": [
                                "--argjson",
                                "strict",
                                "true",
                                "-e",
                                ".result == \"SUCCESS\" or .result == \"WARNING\" or ($strict | not)\n",
                                "/tekton/results/TEST_OUTPUT"
                            ],
                            "command": [
                                "jq"
                            ],
                            "computeResources": {
                                "limits": {
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "image": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                            "name": "assert"
                        }
                    ],
                    "volumes": [
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "The workspace where the snapshot spec json file resides",
                            "name": "data",
                            "optional": true
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.openshift.io/repo": "https://github.com/rhads-tsf-qe/testrepo?rev=8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "build.appstudio.redhat.com/commit_sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "build.appstudio.redhat.com/target_branch": "base-miwkfv",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=42",
                    "pac.test.appstudio.openshift.io/branch": "base-miwkfv",
                    "pac.test.appstudio.openshift.io/cancel-in-progress": "false",
                    "pac.test.appstudio.openshift.io/check-run-id": "71552493202",
                    "pac.test.appstudio.openshift.io/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pac.test.appstudio.openshift.io/event-type": "push",
                    "pac.test.appstudio.openshift.io/git-auth-secret": "pac-gitauth-ojyaao",
                    "pac.test.appstudio.openshift.io/git-provider": "github",
                    "pac.test.appstudio.openshift.io/installation-id": "112348674",
                    "pac.test.appstudio.openshift.io/log-url": "https://konflux-ui-konflux-ui.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/ns/default-tenant/pipelinerun/my-integration-test-lucx-m4xnv",
                    "pac.test.appstudio.openshift.io/max-keep-runs": "3",
                    "pac.test.appstudio.openshift.io/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-miwkfv\"",
                    "pac.test.appstudio.openshift.io/original-prname": "tsf-demo-comp-on-push",
                    "pac.test.appstudio.openshift.io/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pac.test.appstudio.openshift.io/repository": "tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/scm-reporting-plr-started": "true",
                    "pac.test.appstudio.openshift.io/sender": "rhtap-ci-tests-bot",
                    "pac.test.appstudio.openshift.io/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pac.test.appstudio.openshift.io/sha-title": "Merge pull request #181 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pac.test.appstudio.openshift.io/source-branch": "refs/heads/base-miwkfv",
                    "pac.test.appstudio.openshift.io/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pac.test.appstudio.openshift.io/state": "completed",
                    "pac.test.appstudio.openshift.io/url-org": "rhads-tsf-qe",
                    "pac.test.appstudio.openshift.io/url-repository": "testrepo",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-tenant/results/74ea7e42-2ab2-4243-bb8e-83483101038e/records/9ea7ef65-5b07-4b78-bf8e-04800ccaac2b",
                    "results.tekton.dev/result": "default-tenant/results/74ea7e42-2ab2-4243-bb8e-83483101038e",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/displayName": "Collect Keyless Signing Parameters",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "ec, keyless, signing, configuration",
                    "test.appstudio.openshift.io/added-to-global-candidate-list": "{\"result\":true,\"reason\":\"Success\",\"lastupdatedtime\":\"2026-04-15T23:25:29Z\"}",
                    "test.appstudio.openshift.io/integration-workflow": "push",
                    "test.appstudio.openshift.io/pipelinerunstarttime": "1776295010000",
                    "test.appstudio.openshift.io/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "test.appstudio.openshift.io/status": "[{\"scenario\":\"my-integration-test-lucx\",\"status\":\"Pending\",\"lastUpdateTime\":\"2026-04-15T23:25:30.085289821Z\",\"details\":\"Pending\"}]"
                },
                "creationTimestamp": "2026-04-15T23:25:31Z",
                "finalizers": [
                    "chains.tekton.dev",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "tekton-pipelines",
                    "app.kubernetes.io/version": "0.1",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/component": "tsf-demo-comp",
                    "appstudio.openshift.io/snapshot": "tsf-demo-app-20260415-231650-000",
                    "build.appstudio.redhat.com/pipeline": "enterprise-contract",
                    "pac.test.appstudio.openshift.io/cancel-in-progress": "false",
                    "pac.test.appstudio.openshift.io/check-run-id": "71552493202",
                    "pac.test.appstudio.openshift.io/event-type": "push",
                    "pac.test.appstudio.openshift.io/original-prname": "tsf-demo-comp-on-push",
                    "pac.test.appstudio.openshift.io/repository": "tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pac.test.appstudio.openshift.io/state": "completed",
                    "pac.test.appstudio.openshift.io/url-org": "rhads-tsf-qe",
                    "pac.test.appstudio.openshift.io/url-repository": "testrepo",
                    "pipelines.appstudio.openshift.io/type": "test",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "enterprise-contract",
                    "tekton.dev/pipelineRun": "my-integration-test-lucx-m4xnv",
                    "tekton.dev/pipelineRunUID": "74ea7e42-2ab2-4243-bb8e-83483101038e",
                    "tekton.dev/pipelineTask": "collect-keyless-params",
                    "tekton.dev/task": "collect-keyless-params",
                    "test.appstudio.openshift.io/optional": "false",
                    "test.appstudio.openshift.io/pipelinerunfinishtime": "1776295527",
                    "test.appstudio.openshift.io/scenario": "my-integration-test-lucx",
                    "test.appstudio.openshift.io/type": "component"
                },
                "name": "my-integration-test-lucx-m4xnv-collect-keyless-params",
                "namespace": "default-tenant",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "my-integration-test-lucx-m4xnv",
                        "uid": "74ea7e42-2ab2-4243-bb8e-83483101038e"
                    }
                ],
                "resourceVersion": "41202",
                "uid": "9ea7ef65-5b07-4b78-bf8e-04800ccaac2b"
            },
            "spec": {
                "serviceAccountName": "konflux-integration-runner",
                "taskRef": {
                    "params": [
                        {
                            "name": "bundle",
                            "value": "quay.io/conforma/tekton-task:konflux"
                        },
                        {
                            "name": "name",
                            "value": "collect-keyless-params"
                        },
                        {
                            "name": "kind",
                            "value": "task"
                        }
                    ],
                    "resolver": "bundles"
                },
                "timeout": "1h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:25:44Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:25:44Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "my-integration-test-lucx-m4xnv-collect-keyless-params-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha256": "ce81caef343582bd5e20b51fb965f6bde405277f977d8e4e7652ea23e63da837"
                        },
                        "entryPoint": "collect-keyless-params",
                        "uri": "quay.io/conforma/tekton-task"
                    }
                },
                "results": [
                    {
                        "name": "buildIdentityRegexp",
                        "type": "string",
                        "value": "^https://kubernetes.io/namespaces/[a-z0-9-]+-tenant/serviceaccounts/build-pipeline-[a-z0-9-]+$"
                    },
                    {
                        "name": "defaultOIDCIssuer",
                        "type": "string",
                        "value": "https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j"
                    },
                    {
                        "name": "fulcioUrl",
                        "type": "string",
                        "value": "http://fulcio-server.tsf-tas.svc.cluster.local"
                    },
                    {
                        "name": "keylessSigningEnabled",
                        "type": "string",
                        "value": "true"
                    },
                    {
                        "name": "rekorUrl",
                        "type": "string",
                        "value": "http://rekor-server.tsf-tas.svc.cluster.local"
                    },
                    {
                        "name": "tektonChainsIdentity",
                        "type": "string",
                        "value": "https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller"
                    },
                    {
                        "name": "tufUrl",
                        "type": "string",
                        "value": "http://tuf.tsf-tas.svc.cluster.local"
                    }
                ],
                "startTime": "2026-04-15T23:25:31Z",
                "steps": [
                    {
                        "container": "step-collect-signing-params",
                        "imageID": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                        "name": "collect-signing-params",
                        "terminated": {
                            "containerID": "cri-o://746edc344faf225493f944aaeb6ab987e20432742b524910e519eb1e395d7d1f",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:25:43Z",
                            "message": "[{\"key\":\"buildIdentityRegexp\",\"value\":\"^https://kubernetes.io/namespaces/[a-z0-9-]+-tenant/serviceaccounts/build-pipeline-[a-z0-9-]+$\",\"type\":1},{\"key\":\"defaultOIDCIssuer\",\"value\":\"https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j\",\"type\":1},{\"key\":\"fulcioUrl\",\"value\":\"http://fulcio-server.tsf-tas.svc.cluster.local\",\"type\":1},{\"key\":\"keylessSigningEnabled\",\"value\":\"true\",\"type\":1},{\"key\":\"rekorUrl\",\"value\":\"http://rekor-server.tsf-tas.svc.cluster.local\",\"type\":1},{\"key\":\"tektonChainsIdentity\",\"value\":\"https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller\",\"type\":1},{\"key\":\"tufUrl\",\"value\":\"http://tuf.tsf-tas.svc.cluster.local\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:25:41Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Tekton task to collect Konflux configuration parameters related to\nkeyless signing using cosign. The task attempts to read the \"cluster-config\"\nConfigMap in the \"konflux-info\" namespace to extract signing parameters.\n\nIn case the ConfigMap is not found, the task will output empty strings for all parameters,\nallowing the pipeline to continue without signing parameters.\n",
                    "params": [
                        {
                            "default": "cluster-config",
                            "description": "The name of the ConfigMap to read signing parameters from",
                            "name": "configMapName",
                            "type": "string"
                        },
                        {
                            "default": "konflux-info",
                            "description": "The namespace where the ConfigMap is located",
                            "name": "configMapNamespace",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "A flag indicating whether keyless signing is enabled based on the presence of signing parameters.\n",
                            "name": "keylessSigningEnabled",
                            "type": "string"
                        },
                        {
                            "description": "A default OIDC issuer URL to be used for signing.\n",
                            "name": "defaultOIDCIssuer",
                            "type": "string"
                        },
                        {
                            "description": "A regular expression to extract build identity from the OIDC token claims, if applicable.\n",
                            "name": "buildIdentityRegexp",
                            "type": "string"
                        },
                        {
                            "description": "The Tekton Chains identity from the OIDC token claims, if applicable.\n",
                            "name": "tektonChainsIdentity",
                            "type": "string"
                        },
                        {
                            "description": "The URL of the Fulcio certificate authority.\n",
                            "name": "fulcioUrl",
                            "type": "string"
                        },
                        {
                            "description": "The URL of the Rekor transparency log.\n",
                            "name": "rekorUrl",
                            "type": "string"
                        },
                        {
                            "description": "The URL of the TUF repository.\n",
                            "name": "tufUrl",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "securityContext": {
                            "runAsUser": 1001
                        }
                    },
                    "steps": [
                        {
                            "computeResources": {
                                "limits": {
                                    "cpu": "50m",
                                    "memory": "128Mi"
                                },
                                "requests": {
                                    "cpu": "50m",
                                    "memory": "128Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "configMapNamespace",
                                    "value": "konflux-info"
                                },
                                {
                                    "name": "configMapName",
                                    "value": "cluster-config"
                                }
                            ],
                            "image": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                            "name": "collect-signing-params",
                            "script": "#!/bin/bash\nset -euo pipefail\n\n# Default value is \"false\"\nkeylessSigningEnabled=\"false\"\n\n# Default values are empty strings\ndefaultOIDCIssuer=\"\"\nbuildIdentityRegexp=\"\"\ntektonChainsIdentity=\"\"\nfulcioUrl=\"\"\nrekorUrl=\"\"\ntufUrl=\"\"\n\n# Read from the ConfigMap\necho \"Reading ConfigMap ${configMapNamespace}/${configMapName}\"\nKFLX_CONFIG_PATH='/tmp/cluster-config.json'\n\nif kubectl get configmap \"${configMapName}\" -n \"${configMapNamespace}\" -o json --ignore-not-found \u003e \"${KFLX_CONFIG_PATH}\"; then\n  if [ -s \"${KFLX_CONFIG_PATH}\" ]; then\n    echo \"ConfigMap found, extracting keyless signing parameters\"\n\n    # First we read \"keylessSigningEnabled\"\n    keylessSigningEnabled=$(jq -r '.data.enableKeylessSigning // \"false\"' \"$KFLX_CONFIG_PATH\")\n\n    if [ \"$keylessSigningEnabled\" = \"true\" ]; then\n      # If that is set to \"true\" then read the other values\n      defaultOIDCIssuer=$(jq -r '.data.defaultOIDCIssuer // \"\"' \"$KFLX_CONFIG_PATH\")\n      buildIdentityRegexp=$(jq -r '.data.buildIdentityRegexp // \"\"' \"$KFLX_CONFIG_PATH\")\n      tektonChainsIdentity=$(jq -r '.data.tektonChainsIdentity // \"\"' \"$KFLX_CONFIG_PATH\")\n\n      # For each of these we prefer the internal url if its present\n      fulcioUrl=$(jq -r '.data.fulcioInternalUrl // \"\"' \"$KFLX_CONFIG_PATH\")\n      if [ -z \"$fulcioUrl\" ]; then\n        fulcioUrl=$(jq -r '.data.fulcioExternalUrl // \"\"' \"$KFLX_CONFIG_PATH\")\n      fi\n\n      rekorUrl=$(jq -r '.data.rekorInternalUrl // \"\"' \"$KFLX_CONFIG_PATH\")\n      if [ -z \"$rekorUrl\" ]; then\n        rekorUrl=$(jq -r '.data.rekorExternalUrl // \"\"' \"$KFLX_CONFIG_PATH\")\n      fi\n\n      tufUrl=$(jq -r '.data.tufInternalUrl // \"\"' \"$KFLX_CONFIG_PATH\")\n      if [ -z \"$tufUrl\" ]; then\n        tufUrl=$(jq -r '.data.tufExternalUrl // \"\"' \"$KFLX_CONFIG_PATH\")\n      fi\n\n    else\n      # Otherwise we ignore the rest of the ConfigMap\n      echo \"enableKeylessSigning is not set, using default empty values\"\n\n    fi\n  else\n    # Because we used --ignore-not-found this doesn't produce an error\n    echo \"ConfigMap not found, using default empty values\"\n\n  fi\n\nelse\n  # Some error other than \"not found\"\n  # (Stderr from kubectl should be visible in the task log.)\n  echo \"Problem reading ConfigMap, using default empty values\"\n\nfi\n\n# Write to task results\necho -n \"$keylessSigningEnabled\" \u003e \"/tekton/results/keylessSigningEnabled\"\necho -n \"$defaultOIDCIssuer\" \u003e \"/tekton/results/defaultOIDCIssuer\"\necho -n \"$buildIdentityRegexp\" \u003e \"/tekton/results/buildIdentityRegexp\"\necho -n \"$tektonChainsIdentity\" \u003e \"/tekton/results/tektonChainsIdentity\"\necho -n \"$fulcioUrl\" \u003e \"/tekton/results/fulcioUrl\"\necho -n \"$rekorUrl\" \u003e \"/tekton/results/rekorUrl\"\necho -n \"$tufUrl\" \u003e \"/tekton/results/tufUrl\"\n\n# Output for troubleshooting/debugging\necho \"results.keylessSigningEnabled: $keylessSigningEnabled\"\necho \"results.defaultOIDCIssuer: $defaultOIDCIssuer\"\necho \"results.buildIdentityRegexp: $buildIdentityRegexp\"\necho \"results.tektonChainsIdentity: $tektonChainsIdentity\"\necho \"results.fulcioUrl: $fulcioUrl\"\necho \"results.rekorUrl: $rekorUrl\"\necho \"results.tufUrl: $tufUrl\"\n"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.openshift.io/repo": "https://github.com/rhads-tsf-qe/testrepo?rev=8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "build.appstudio.redhat.com/commit_sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "build.appstudio.redhat.com/target_branch": "base-miwkfv",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=43",
                    "pac.test.appstudio.openshift.io/branch": "base-miwkfv",
                    "pac.test.appstudio.openshift.io/cancel-in-progress": "false",
                    "pac.test.appstudio.openshift.io/check-run-id": "71552493202",
                    "pac.test.appstudio.openshift.io/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pac.test.appstudio.openshift.io/event-type": "push",
                    "pac.test.appstudio.openshift.io/git-auth-secret": "pac-gitauth-ojyaao",
                    "pac.test.appstudio.openshift.io/git-provider": "github",
                    "pac.test.appstudio.openshift.io/installation-id": "112348674",
                    "pac.test.appstudio.openshift.io/log-url": "https://konflux-ui-konflux-ui.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/ns/default-tenant/pipelinerun/my-integration-test-lucx-m4xnv",
                    "pac.test.appstudio.openshift.io/max-keep-runs": "3",
                    "pac.test.appstudio.openshift.io/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-miwkfv\"",
                    "pac.test.appstudio.openshift.io/original-prname": "tsf-demo-comp-on-push",
                    "pac.test.appstudio.openshift.io/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pac.test.appstudio.openshift.io/repository": "tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/scm-reporting-plr-started": "true",
                    "pac.test.appstudio.openshift.io/sender": "rhtap-ci-tests-bot",
                    "pac.test.appstudio.openshift.io/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pac.test.appstudio.openshift.io/sha-title": "Merge pull request #181 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pac.test.appstudio.openshift.io/source-branch": "refs/heads/base-miwkfv",
                    "pac.test.appstudio.openshift.io/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pac.test.appstudio.openshift.io/state": "completed",
                    "pac.test.appstudio.openshift.io/url-org": "rhads-tsf-qe",
                    "pac.test.appstudio.openshift.io/url-repository": "testrepo",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-tenant/results/74ea7e42-2ab2-4243-bb8e-83483101038e/records/05c47456-5854-4da1-b6f7-2baeb21da1cf",
                    "results.tekton.dev/result": "default-tenant/results/74ea7e42-2ab2-4243-bb8e-83483101038e",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/displayName": "Verify Enterprise Contract",
                    "tekton.dev/pipelines.minVersion": "0.19",
                    "tekton.dev/tags": "ec, chains, signature, conftest",
                    "test.appstudio.openshift.io/added-to-global-candidate-list": "{\"result\":true,\"reason\":\"Success\",\"lastupdatedtime\":\"2026-04-15T23:25:29Z\"}",
                    "test.appstudio.openshift.io/integration-workflow": "push",
                    "test.appstudio.openshift.io/pipelinerunstarttime": "1776295010000",
                    "test.appstudio.openshift.io/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "test.appstudio.openshift.io/status": "[{\"scenario\":\"my-integration-test-lucx\",\"status\":\"Pending\",\"lastUpdateTime\":\"2026-04-15T23:25:30.085289821Z\",\"details\":\"Pending\"}]"
                },
                "creationTimestamp": "2026-04-15T23:25:44Z",
                "finalizers": [
                    "chains.tekton.dev",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "tekton-pipelines",
                    "app.kubernetes.io/version": "0.1",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/component": "tsf-demo-comp",
                    "appstudio.openshift.io/snapshot": "tsf-demo-app-20260415-231650-000",
                    "build.appstudio.redhat.com/pipeline": "enterprise-contract",
                    "pac.test.appstudio.openshift.io/cancel-in-progress": "false",
                    "pac.test.appstudio.openshift.io/check-run-id": "71552493202",
                    "pac.test.appstudio.openshift.io/event-type": "push",
                    "pac.test.appstudio.openshift.io/original-prname": "tsf-demo-comp-on-push",
                    "pac.test.appstudio.openshift.io/repository": "tsf-demo-comp",
                    "pac.test.appstudio.openshift.io/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pac.test.appstudio.openshift.io/state": "completed",
                    "pac.test.appstudio.openshift.io/url-org": "rhads-tsf-qe",
                    "pac.test.appstudio.openshift.io/url-repository": "testrepo",
                    "pipelines.appstudio.openshift.io/type": "test",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "enterprise-contract",
                    "tekton.dev/pipelineRun": "my-integration-test-lucx-m4xnv",
                    "tekton.dev/pipelineRunUID": "74ea7e42-2ab2-4243-bb8e-83483101038e",
                    "tekton.dev/pipelineTask": "verify",
                    "tekton.dev/task": "verify-enterprise-contract",
                    "test.appstudio.openshift.io/optional": "false",
                    "test.appstudio.openshift.io/pipelinerunfinishtime": "1776295527",
                    "test.appstudio.openshift.io/scenario": "my-integration-test-lucx",
                    "test.appstudio.openshift.io/type": "component"
                },
                "name": "my-integration-test-lucx-m4xnv-verify",
                "namespace": "default-tenant",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "my-integration-test-lucx-m4xnv",
                        "uid": "74ea7e42-2ab2-4243-bb8e-83483101038e"
                    }
                ],
                "resourceVersion": "41323",
                "uid": "05c47456-5854-4da1-b6f7-2baeb21da1cf"
            },
            "spec": {
                "params": [
                    {
                        "name": "POLICY_CONFIGURATION",
                        "value": "enterprise-contract-service/default"
                    },
                    {
                        "name": "IMAGES",
                        "value": "{\"application\":\"tsf-demo-app\",\"componentGroup\":\"\",\"components\":[{\"name\":\"tsf-demo-comp\",\"version\":\"\",\"containerImage\":\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5\",\"source\":{\"git\":{\"url\":\"https://github.com/rhads-tsf-qe/testrepo\",\"revision\":\"8a419f9b1a920375f8112c9b7477d42bbd82b6c9\"}}}],\"artifacts\":{}}"
                    },
                    {
                        "name": "SSL_CERT_DIR",
                        "value": ""
                    },
                    {
                        "name": "STRICT",
                        "value": "true"
                    },
                    {
                        "name": "PUBLIC_KEY",
                        "value": "k8s://openshift-pipelines/public-key"
                    },
                    {
                        "name": "IGNORE_REKOR",
                        "value": "true"
                    },
                    {
                        "name": "CERTIFICATE_OIDC_ISSUER",
                        "value": "https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j"
                    },
                    {
                        "name": "CERTIFICATE_IDENTITY",
                        "value": "https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller"
                    },
                    {
                        "name": "TUF_MIRROR",
                        "value": "http://tuf.tsf-tas.svc.cluster.local"
                    },
                    {
                        "name": "REKOR_HOST",
                        "value": "http://rekor-server.tsf-tas.svc.cluster.local"
                    },
                    {
                        "name": "WORKERS",
                        "value": "1"
                    },
                    {
                        "name": "CA_TRUST_CONFIGMAP_NAME",
                        "value": "trusted-ca"
                    },
                    {
                        "name": "CA_TRUST_CONFIG_MAP_KEY",
                        "value": "ca-bundle.crt"
                    },
                    {
                        "name": "EXTRA_RULE_DATA",
                        "value": ""
                    },
                    {
                        "name": "SINGLE_COMPONENT",
                        "value": "false"
                    },
                    {
                        "name": "SINGLE_COMPONENT_CUSTOM_RESOURCE",
                        "value": "pr/my-integration-test-lucx-m4xnv"
                    }
                ],
                "serviceAccountName": "konflux-integration-runner",
                "taskRef": {
                    "params": [
                        {
                            "name": "bundle",
                            "value": "quay.io/conforma/tekton-task:konflux"
                        },
                        {
                            "name": "name",
                            "value": "verify-enterprise-contract"
                        },
                        {
                            "name": "kind",
                            "value": "task"
                        }
                    ],
                    "resolver": "bundles"
                },
                "timeout": "4h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:25:59Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:25:59Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "my-integration-test-lucx-m4xnv-verify-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha256": "ce81caef343582bd5e20b51fb965f6bde405277f977d8e4e7652ea23e63da837"
                        },
                        "entryPoint": "verify-enterprise-contract",
                        "uri": "quay.io/conforma/tekton-task"
                    }
                },
                "results": [
                    {
                        "name": "TEST_OUTPUT",
                        "type": "string",
                        "value": "{\"timestamp\":\"1776295558\",\"namespace\":\"\",\"successes\":127,\"failures\":0,\"warnings\":6,\"result\":\"WARNING\"}\n"
                    }
                ],
                "startTime": "2026-04-15T23:25:44Z",
                "steps": [
                    {
                        "container": "step-initialize-tuf",
                        "imageID": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                        "name": "initialize-tuf",
                        "terminated": {
                            "containerID": "cri-o://74002ea6fa6fb7bdf9a776b17a1225ec3fbf034439ff8cc2e1775aa31544a8a8",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:25:50Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:25:50Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-reduce",
                        "imageID": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                        "name": "reduce",
                        "terminated": {
                            "containerID": "cri-o://8a821a975c8bd2aad9534b865b35abcb9c70afb02d6428f97f0aa4fb1659b03e",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:25:50Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:25:50Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-validate",
                        "imageID": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                        "name": "validate",
                        "terminated": {
                            "containerID": "cri-o://36b405aaf97ca870babd17280f4adafe601501fa0dd70424e5e1a9a5558d0aa2",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:25:58Z",
                            "message": "[{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"timestamp\\\":\\\"1776295558\\\",\\\"namespace\\\":\\\"\\\",\\\"successes\\\":127,\\\"failures\\\":0,\\\"warnings\\\":6,\\\"result\\\":\\\"WARNING\\\"}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:25:50Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-report-json",
                        "imageID": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                        "name": "report-json",
                        "terminated": {
                            "containerID": "cri-o://d2afdd7ab96ef1a85ac0697b803c3c0212174393991ced4a0d5e003a991c8964",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:25:58Z",
                            "message": "[{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"timestamp\\\":\\\"1776295558\\\",\\\"namespace\\\":\\\"\\\",\\\"successes\\\":127,\\\"failures\\\":0,\\\"warnings\\\":6,\\\"result\\\":\\\"WARNING\\\"}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:25:58Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-summary",
                        "imageID": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                        "name": "summary",
                        "terminated": {
                            "containerID": "cri-o://6e5ebd2fbdf5175f18e141fdf1db8eb6e9bb4a70018405e5773ba37c308320d4",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:25:58Z",
                            "message": "[{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"timestamp\\\":\\\"1776295558\\\",\\\"namespace\\\":\\\"\\\",\\\"successes\\\":127,\\\"failures\\\":0,\\\"warnings\\\":6,\\\"result\\\":\\\"WARNING\\\"}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:25:58Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-version",
                        "imageID": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                        "name": "version",
                        "terminated": {
                            "containerID": "cri-o://43db7a0eac37331ddb658951c9d546b0092e0bdcd8618655244f4de8df6663d8",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:25:58Z",
                            "message": "[{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"timestamp\\\":\\\"1776295558\\\",\\\"namespace\\\":\\\"\\\",\\\"successes\\\":127,\\\"failures\\\":0,\\\"warnings\\\":6,\\\"result\\\":\\\"WARNING\\\"}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:25:58Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-show-config",
                        "imageID": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                        "name": "show-config",
                        "terminated": {
                            "containerID": "cri-o://0328f72248c0151b92619ee934378d1c7bf7c7a5935c2a41a37f33589978b4a3",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:25:58Z",
                            "message": "[{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"timestamp\\\":\\\"1776295558\\\",\\\"namespace\\\":\\\"\\\",\\\"successes\\\":127,\\\"failures\\\":0,\\\"warnings\\\":6,\\\"result\\\":\\\"WARNING\\\"}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:25:58Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-detailed-report",
                        "imageID": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                        "name": "detailed-report",
                        "terminated": {
                            "containerID": "cri-o://cbf191d9bded9d56254a1239bc45f6bba7f4881b969703bbcbb0c0ce9c95529c",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:25:58Z",
                            "message": "[{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"timestamp\\\":\\\"1776295558\\\",\\\"namespace\\\":\\\"\\\",\\\"successes\\\":127,\\\"failures\\\":0,\\\"warnings\\\":6,\\\"result\\\":\\\"WARNING\\\"}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:25:58Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-assert",
                        "imageID": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                        "name": "assert",
                        "terminated": {
                            "containerID": "cri-o://2db5467a530fafcdcf339272fb42eeb45a820b4138bf6c4acb293052fc50abcf",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:25:58Z",
                            "message": "[{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"timestamp\\\":\\\"1776295558\\\",\\\"namespace\\\":\\\"\\\",\\\"successes\\\":127,\\\"failures\\\":0,\\\"warnings\\\":6,\\\"result\\\":\\\"WARNING\\\"}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:25:58Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Verify the enterprise contract is met",
                    "params": [
                        {
                            "description": "Spec section of an ApplicationSnapshot resource. Not all fields of the\nresource are required. A minimal example:\n\n```json\n  {\n    \"components\": [\n      {\n        \"containerImage\": \"quay.io/example/repo:latest\"\n      }\n    ]\n  }\n```\n\nEach `containerImage` in the `components` array is validated.\n",
                            "name": "IMAGES",
                            "type": "string"
                        },
                        {
                            "default": "enterprise-contract-service/default",
                            "description": "Name of the policy configuration (EnterpriseContractPolicy\nresource) to use. `namespace/name` or `name` syntax supported. If\nnamespace is omitted the namespace where the task runs is used.\nYou can also specify a policy configuration using a git url, e.g.\n`github.com/conforma/config//slsa3`.\n",
                            "name": "POLICY_CONFIGURATION",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Public key used to verify traditional long-lived signatures. Must be a valid k8s cosign reference, e.g. k8s://my-space/my-secret where my-secret contains the expected cosign.pub attribute. Required for traditional signing key verification. Will be ignored if any of CERTIFICATE_IDENTITY, CERTIFICATE_IDENTITY_REGEXP, CERTIFICATE_OIDC_ISSUER, or CERTIFICATE_OIDC_ISSUER_REGEXP are provided.",
                            "name": "PUBLIC_KEY",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Rekor host for transparency log lookups",
                            "name": "REKOR_HOST",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Expected identity in the signing certificate for keyless verification. This should be the email or URI that was used when signing. You should provide both CERTIFICATE_OIDC_ISSUER and CERTIFICATE_IDENTITY for keyless verification. The PUBLIC_KEY param will be ignored if this is provided.",
                            "name": "CERTIFICATE_IDENTITY",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Expected OIDC issuer in the signing certificate for keyless verification. This should match the issuer that provided the identity token used for signing. You should provide both CERTIFICATE_OIDC_ISSUER and CERTIFICATE_IDENTITY for keyless verification. The PUBLIC_KEY param will be ignored if this is provided.",
                            "name": "CERTIFICATE_OIDC_ISSUER",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Similar to CERTIFICATE_IDENTITY but the value is a regexp that will be matched. Note that CERTIFICATE_IDENTITY takes precedence over this if both are present.",
                            "name": "CERTIFICATE_IDENTITY_REGEXP",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Similar to CERTIFICATE_OIDC_ISSUER but a regexp that will be matched. Note that CERTIFICATE_OIDC_ISSUER takes precedence over this if both are present.",
                            "name": "CERTIFICATE_OIDC_ISSUER_REGEXP",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Skip Rekor transparency log checks during validation. Compatible with traditional signing secret signature checks only. If any of the CERTIFICATE_* keyless verification params are present, this value is disregarded and Rekor transparency log checks are included.",
                            "name": "IGNORE_REKOR",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "TUF mirror URL. Provide a value when NOT using public sigstore deployment.",
                            "name": "TUF_MIRROR",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Path to a directory containing SSL certs to be used when communicating\nwith external services. This is useful when using the integrated registry\nand a local instance of Rekor on a development cluster which may use\ncertificates issued by a not-commonly trusted root CA. In such cases,\n`/var/run/secrets/kubernetes.io/serviceaccount` is a good value. Multiple\npaths can be provided by using the `:` separator.\n",
                            "name": "SSL_CERT_DIR",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from.",
                            "name": "CA_TRUST_CONFIGMAP_NAME",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data.",
                            "name": "CA_TRUST_CONFIG_MAP_KEY",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Include rule titles and descriptions in the output. Set to `\"false\"` to disable it.",
                            "name": "INFO",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Fail the task if policy fails. Set to `\"false\"` to disable it.",
                            "name": "STRICT",
                            "type": "string"
                        },
                        {
                            "default": "/tekton/home",
                            "description": "Value for the HOME environment variable.",
                            "name": "HOMEDIR",
                            "type": "string"
                        },
                        {
                            "default": "now",
                            "description": "Run policy checks with the provided time.",
                            "name": "EFFECTIVE_TIME",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Merge additional Rego variables into the policy data. Use syntax \"key=value,key2=value2...\"",
                            "name": "EXTRA_RULE_DATA",
                            "type": "string"
                        },
                        {
                            "default": "1",
                            "description": "Number of parallel workers to use for policy evaluation.",
                            "name": "WORKERS",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Reduce the Snapshot to only the component whose build caused the Snapshot to be created",
                            "name": "SINGLE_COMPONENT",
                            "type": "string"
                        },
                        {
                            "default": "unknown",
                            "description": "Name, including kind, of the Kubernetes resource to query for labels when single component mode is enabled, e.g. pr/somepipeline.\n",
                            "name": "SINGLE_COMPONENT_CUSTOM_RESOURCE",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Kubernetes namespace where the SINGLE_COMPONENT_NAME is found. Only used when single component mode is enabled.\n",
                            "name": "SINGLE_COMPONENT_CUSTOM_RESOURCE_NS",
                            "type": "string"
                        },
                        {
                            "default": "1s",
                            "description": "Base duration for exponential backoff calculation (e.g., \"1s\", \"500ms\")",
                            "name": "RETRY_DURATION",
                            "type": "string"
                        },
                        {
                            "default": "2.0",
                            "description": "Exponential backoff multiplier (e.g., \"2.0\", \"1.5\")",
                            "name": "RETRY_FACTOR",
                            "type": "string"
                        },
                        {
                            "default": "0.1",
                            "description": "Randomness factor for backoff calculation (0.0-1.0, e.g., \"0.1\", \"0.2\")",
                            "name": "RETRY_JITTER",
                            "type": "string"
                        },
                        {
                            "default": "3",
                            "description": "Maximum number of retry attempts",
                            "name": "RETRY_MAX_RETRY",
                            "type": "string"
                        },
                        {
                            "default": "3s",
                            "description": "Maximum wait time between retries (e.g., \"3s\", \"10s\")",
                            "name": "RETRY_MAX_WAIT",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Short summary of the policy evaluation for each image",
                            "name": "TEST_OUTPUT",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "HOME",
                                "value": "/tekton/home"
                            }
                        ]
                    },
                    "steps": [
                        {
                            "args": [
                                "sigstore",
                                "initialize",
                                "--mirror",
                                "http://tuf.tsf-tas.svc.cluster.local",
                                "--root",
                                "http://tuf.tsf-tas.svc.cluster.local/root.json"
                            ],
                            "command": [
                                "ec"
                            ],
                            "computeResources": {
                                "limits": {
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "image": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                            "name": "initialize-tuf",
                            "when": [
                                {
                                    "input": "http://tuf.tsf-tas.svc.cluster.local",
                                    "operator": "notin",
                                    "values": [
                                        ""
                                    ]
                                }
                            ]
                        },
                        {
                            "command": [
                                "reduce-snapshot.sh"
                            ],
                            "computeResources": {
                                "limits": {
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "SNAPSHOT",
                                    "value": "{\"application\":\"tsf-demo-app\",\"componentGroup\":\"\",\"components\":[{\"name\":\"tsf-demo-comp\",\"version\":\"\",\"containerImage\":\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5\",\"source\":{\"git\":{\"url\":\"https://github.com/rhads-tsf-qe/testrepo\",\"revision\":\"8a419f9b1a920375f8112c9b7477d42bbd82b6c9\"}}}],\"artifacts\":{}}"
                                },
                                {
                                    "name": "SINGLE_COMPONENT",
                                    "value": "false"
                                },
                                {
                                    "name": "CUSTOM_RESOURCE",
                                    "value": "pr/my-integration-test-lucx-m4xnv"
                                },
                                {
                                    "name": "CUSTOM_RESOURCE_NAMESPACE"
                                },
                                {
                                    "name": "SNAPSHOT_PATH",
                                    "value": "/tekton/home/snapshot.json"
                                }
                            ],
                            "image": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                            "name": "reduce",
                            "onError": "continue"
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "memory": "2Gi"
                                },
                                "requests": {
                                    "cpu": "1800m",
                                    "memory": "2Gi"
                                }
                            },
                            "env": [
                                {
                                    "name": "POLICY_CONFIGURATION",
                                    "value": "enterprise-contract-service/default"
                                },
                                {
                                    "name": "PUBLIC_KEY",
                                    "value": "k8s://openshift-pipelines/public-key"
                                },
                                {
                                    "name": "CERTIFICATE_IDENTITY",
                                    "value": "https://kubernetes.io/namespaces/openshift-pipelines/serviceaccounts/tekton-chains-controller"
                                },
                                {
                                    "name": "CERTIFICATE_OIDC_ISSUER",
                                    "value": "https://oidc.op1.openshiftapps.com/2jtsga3i2etnl697l7bk5i1kmbm4a95j"
                                },
                                {
                                    "name": "CERTIFICATE_IDENTITY_REGEXP"
                                },
                                {
                                    "name": "CERTIFICATE_OIDC_ISSUER_REGEXP"
                                },
                                {
                                    "name": "REKOR_HOST",
                                    "value": "http://rekor-server.tsf-tas.svc.cluster.local"
                                },
                                {
                                    "name": "IGNORE_REKOR",
                                    "value": "true"
                                },
                                {
                                    "name": "WORKERS",
                                    "value": "1"
                                },
                                {
                                    "name": "INFO",
                                    "value": "true"
                                },
                                {
                                    "name": "EFFECTIVE_TIME",
                                    "value": "now"
                                },
                                {
                                    "name": "EXTRA_RULE_DATA"
                                },
                                {
                                    "name": "RETRY_MAX_WAIT",
                                    "value": "3s"
                                },
                                {
                                    "name": "RETRY_MAX_RETRY",
                                    "value": "3"
                                },
                                {
                                    "name": "RETRY_DURATION",
                                    "value": "1s"
                                },
                                {
                                    "name": "RETRY_FACTOR",
                                    "value": "2.0"
                                },
                                {
                                    "name": "RETRY_JITTER",
                                    "value": "0.1"
                                },
                                {
                                    "name": "HOMEDIR",
                                    "value": "/tekton/home"
                                },
                                {
                                    "name": "SSL_CERT_DIR",
                                    "value": "/tekton-custom-certs:/etc/ssl/certs:/etc/pki/tls/certs:/system/etc/security/cacerts:"
                                }
                            ],
                            "image": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                            "name": "validate",
                            "onError": "continue",
                            "script": "#!/bin/bash\nset -euo pipefail\n\ncmd_args=(\n  validate\n  image\n  --images=\"${HOMEDIR}/snapshot.json\"\n  --policy=\"${POLICY_CONFIGURATION}\"\n)\n\n# To keep bash logic as thin as possible we deliberately don't sanitize\n# these params. If something is wrong or missing let Conforma handle it.\n\nif [ -n \"${CERTIFICATE_IDENTITY}\" ] || \\\n   [ -n \"${CERTIFICATE_OIDC_ISSUER}\" ] || \\\n   [ -n \"${CERTIFICATE_IDENTITY_REGEXP}\" ] || \\\n   [ -n \"${CERTIFICATE_OIDC_ISSUER_REGEXP}\" ]; then\n  # If *any* of the above are non-empty assume the intention is to\n  # try keyless verification\n\n  if [ -n \"${CERTIFICATE_IDENTITY}\" ]; then\n    cmd_args+=(\n      --certificate-identity=\"${CERTIFICATE_IDENTITY}\"\n    )\n  elif [ -n \"${CERTIFICATE_IDENTITY_REGEXP}\" ]; then\n    cmd_args+=(\n      --certificate-identity-regexp=\"${CERTIFICATE_IDENTITY_REGEXP}\"\n    )\n  fi\n\n  if [ -n \"${CERTIFICATE_OIDC_ISSUER}\" ]; then\n    cmd_args+=(\n      --certificate-oidc-issuer=\"${CERTIFICATE_OIDC_ISSUER}\"\n    )\n  elif [ -n \"${CERTIFICATE_OIDC_ISSUER_REGEXP}\" ]; then\n    cmd_args+=(\n      --certificate-oidc-issuer-regexp=\"${CERTIFICATE_OIDC_ISSUER_REGEXP}\"\n    )\n  fi\n\n  # Force --ignore-rekor to false since we need rekor\n  cmd_args+=(\n    --ignore-rekor=false\n  )\nelse\n  # Assume traditional signing secret verification\n  cmd_args+=(\n    --public-key=\"${PUBLIC_KEY}\"\n    --ignore-rekor=\"${IGNORE_REKOR}\"\n  )\nfi\n\ncmd_args+=(\n  --rekor-url=\"${REKOR_HOST}\"\n  --workers=\"${WORKERS}\"\n  --info=\"${INFO}\"\n  --timeout=0\n  --strict=false\n  --show-successes=true\n  --show-policy-docs-link=true\n  --effective-time=\"${EFFECTIVE_TIME}\"\n  --extra-rule-data=\"${EXTRA_RULE_DATA}\"\n  --retry-max-wait=\"${RETRY_MAX_WAIT}\"\n  --retry-max-retry=\"${RETRY_MAX_RETRY}\"\n  --retry-duration=\"${RETRY_DURATION}\"\n  --retry-factor=\"${RETRY_FACTOR}\"\n  --retry-jitter=\"${RETRY_JITTER}\"\n  --output=\"text=${HOMEDIR}/text-report.txt?show-successes=false\"\n  --output=\"json=${HOMEDIR}/report-json.json\"\n  --output=\"appstudio=/tekton/results/TEST_OUTPUT\"\n)\n\n\n# Execute Conforma with constructed arguments\nexec ec \"${cmd_args[@]}\"\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/etc/pki/tls/certs/ca-custom-bundle.crt",
                                    "name": "trusted-ca",
                                    "readOnly": true,
                                    "subPath": "ca-bundle.crt"
                                }
                            ]
                        },
                        {
                            "args": [
                                "jq . /tekton/home/report-json.json | awk '{gsub(/^ +/, \"\"); acc += length; if (acc \u003e= 8000) { printf \"\\n\"; acc=length } printf $0 }'"
                            ],
                            "command": [
                                "sh",
                                "-c"
                            ],
                            "computeResources": {
                                "limits": {
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "image": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                            "name": "report-json",
                            "onError": "continue"
                        },
                        {
                            "args": [
                                ".",
                                "/tekton/results/TEST_OUTPUT"
                            ],
                            "command": [
                                "jq"
                            ],
                            "computeResources": {
                                "limits": {
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "image": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                            "name": "summary",
                            "onError": "continue"
                        },
                        {
                            "args": [
                                "version"
                            ],
                            "command": [
                                "ec"
                            ],
                            "computeResources": {
                                "limits": {
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "image": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                            "name": "version"
                        },
                        {
                            "args": [
                                "{policy: .policy, key: .key, \"effective-time\": .[\"effective-time\"]}",
                                "/tekton/home/report-json.json"
                            ],
                            "command": [
                                "jq"
                            ],
                            "computeResources": {
                                "limits": {
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "image": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                            "name": "show-config"
                        },
                        {
                            "args": [
                                "/tekton/home/text-report.txt"
                            ],
                            "command": [
                                "cat"
                            ],
                            "computeResources": {},
                            "image": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                            "name": "detailed-report",
                            "onError": "continue"
                        },
                        {
                            "args": [
                                "--argjson",
                                "strict",
                                "true",
                                "-e",
                                ".result == \"SUCCESS\" or .result == \"WARNING\" or ($strict | not)\n",
                                "/tekton/results/TEST_OUTPUT"
                            ],
                            "command": [
                                "jq"
                            ],
                            "computeResources": {
                                "limits": {
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "image": "quay.io/conforma/cli@sha256:30f7da8493fd7713cc81b8d96645ae6dbc6b5d152d7d88083fd846e41e3aa365",
                            "name": "assert"
                        }
                    ],
                    "volumes": [
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "The workspace where the snapshot spec json file resides",
                            "name": "data",
                            "optional": true
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.openshift.io/repo": "https://github.com/rhads-tsf-qe/testrepo?rev=eb6230096291fbbd8dea97f5f6dabf4d02413292",
                    "build.appstudio.redhat.com/commit_sha": "eb6230096291fbbd8dea97f5f6dabf4d02413292",
                    "build.appstudio.redhat.com/pull_request_number": "181",
                    "build.appstudio.redhat.com/target_branch": "base-miwkfv",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=3",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "pipelinesascode.tekton.dev/branch": "base-miwkfv",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "true",
                    "pipelinesascode.tekton.dev/check-run-id": "71552471200",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "pull_request",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-ofissd",
                    "pipelinesascode.tekton.dev/git-provider": "github",
                    "pipelinesascode.tekton.dev/installation-id": "112348674",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-pull-request-5txdd",
                    "pipelinesascode.tekton.dev/max-keep-runs": "3",
                    "pipelinesascode.tekton.dev/on-cel-expression": "event == \"pull_request\" \u0026\u0026 target_branch == \"base-miwkfv\"",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-pull-request",
                    "pipelinesascode.tekton.dev/pull-request": "181",
                    "pipelinesascode.tekton.dev/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhads-tsf-ci[bot]",
                    "pipelinesascode.tekton.dev/sha": "eb6230096291fbbd8dea97f5f6dabf4d02413292",
                    "pipelinesascode.tekton.dev/sha-title": "RHADS-TSF-CI update tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/eb6230096291fbbd8dea97f5f6dabf4d02413292",
                    "pipelinesascode.tekton.dev/source-branch": "konflux-tsf-demo-comp",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-tenant/results/b512b4f0-fa00-4381-ac29-8318f681923c/records/1ebba0a1-51ae-493d-8a6e-9086d1ef9bd7",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"testrepo\",\"commit\":\"eb6230096291fbbd8dea97f5f6dabf4d02413292\",\"eventType\":\"pull_request\",\"pull_request-id\":181}",
                    "results.tekton.dev/result": "default-tenant/results/b512b4f0-fa00-4381-ac29-8318f681923c",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/categories": "Git",
                    "tekton.dev/displayName": "git clone oci trusted artifacts",
                    "tekton.dev/pipelines.minVersion": "0.21.0",
                    "tekton.dev/platforms": "linux/amd64,linux/s390x,linux/ppc64le,linux/arm64",
                    "tekton.dev/tags": "git",
                    "test.appstudio.openshift.io/pr-group": "konflux-tsf-demo-comp",
                    "test.appstudio.openshift.io/snapshot-creation-report": "SnapshotCreationFailed"
                },
                "creationTimestamp": "2026-04-15T23:16:50Z",
                "finalizers": [
                    "chains.tekton.dev",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 2,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/version": "v0.37.7",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/component": "tsf-demo-comp",
                    "pipelines.appstudio.openshift.io/type": "build",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "true",
                    "pipelinesascode.tekton.dev/check-run-id": "71552471200",
                    "pipelinesascode.tekton.dev/event-type": "pull_request",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-pull-request",
                    "pipelinesascode.tekton.dev/pull-request": "181",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha": "eb6230096291fbbd8dea97f5f6dabf4d02413292",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "tsf-demo-comp-on-pull-request-5txdd",
                    "tekton.dev/pipelineRun": "tsf-demo-comp-on-pull-request-5txdd",
                    "tekton.dev/pipelineRunUID": "b512b4f0-fa00-4381-ac29-8318f681923c",
                    "tekton.dev/pipelineTask": "clone-repository",
                    "tekton.dev/task": "git-clone-oci-ta-min",
                    "test.appstudio.openshift.io/pr-group-sha": "e5069fd5afbb0dd2d302e33fb7e375be47613ee02b0ea3b06542f7ea04bca2"
                },
                "name": "tsf-demo-comp-on-pull-request-5txdd-clone-repository",
                "namespace": "default-tenant",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "tsf-demo-comp-on-pull-request-5txdd",
                        "uid": "b512b4f0-fa00-4381-ac29-8318f681923c"
                    }
                ],
                "resourceVersion": "34451",
                "uid": "1ebba0a1-51ae-493d-8a6e-9086d1ef9bd7"
            },
            "spec": {
                "params": [
                    {
                        "name": "url",
                        "value": "https://github.com/rhads-tsf-qe/testrepo"
                    },
                    {
                        "name": "revision",
                        "value": "eb6230096291fbbd8dea97f5f6dabf4d02413292"
                    },
                    {
                        "name": "ociStorage",
                        "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:on-pr-eb6230096291fbbd8dea97f5f6dabf4d02413292.git"
                    },
                    {
                        "name": "ociArtifactExpiresAfter",
                        "value": "5d"
                    }
                ],
                "serviceAccountName": "build-pipeline-tsf-demo-comp",
                "status": "TaskRunCancelled",
                "statusMessage": "TaskRun cancelled as the PipelineRun it belongs to has been cancelled.",
                "taskRef": {
                    "params": [
                        {
                            "name": "name",
                            "value": "git-clone-oci-ta-min"
                        },
                        {
                            "name": "bundle",
                            "value": "quay.io/konflux-ci/tekton-catalog/task-git-clone-oci-ta-min:0.1@sha256:2fff50eaed7d278c3ed82375d28241eaf6eecbc389ec4d44992721786a0dfa68"
                        },
                        {
                            "name": "kind",
                            "value": "task"
                        }
                    ],
                    "resolver": "bundles"
                },
                "timeout": "1h0m0s",
                "workspaces": [
                    {
                        "name": "basic-auth",
                        "secret": {
                            "secretName": "pac-gitauth-ofissd"
                        }
                    }
                ]
            },
            "status": {
                "completionTime": "2026-04-15T23:16:54Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:16:54Z",
                        "message": "TaskRun \"tsf-demo-comp-on-pull-request-5txdd-clone-repository\" was cancelled. TaskRun cancelled as the PipelineRun it belongs to has been cancelled.",
                        "reason": "TaskRunCancelled",
                        "status": "False",
                        "type": "Succeeded"
                    }
                ],
                "podName": "tsf-demo-comp-on-pull-request-5txdd-clone-repository-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha256": "2fff50eaed7d278c3ed82375d28241eaf6eecbc389ec4d44992721786a0dfa68"
                        },
                        "entryPoint": "git-clone-oci-ta-min",
                        "uri": "quay.io/konflux-ci/tekton-catalog/task-git-clone-oci-ta-min"
                    }
                },
                "startTime": "2026-04-15T23:16:50Z",
                "steps": [
                    {
                        "container": "step-clone",
                        "imageID": "quay.io/konflux-ci/git-clone@sha256:09ac9c14392b5c2b8057f66cc4abfb8ce5d7214706318959d00908923a754434",
                        "name": "clone",
                        "terminated": {
                            "exitCode": 1,
                            "finishedAt": "2026-04-15T23:16:54Z",
                            "message": "Step clone terminated as pod tsf-demo-comp-on-pull-request-5txdd-clone-repository-pod is terminated",
                            "reason": "TaskRunCancelled",
                            "startedAt": "2026-04-15T23:16:53Z"
                        },
                        "terminationReason": "TaskRunCancelled"
                    },
                    {
                        "container": "step-symlink-check",
                        "imageID": "quay.io/konflux-ci/git-clone@sha256:09ac9c14392b5c2b8057f66cc4abfb8ce5d7214706318959d00908923a754434",
                        "name": "symlink-check",
                        "terminated": {
                            "exitCode": 1,
                            "finishedAt": "2026-04-15T23:16:54Z",
                            "message": "Step symlink-check terminated as pod tsf-demo-comp-on-pull-request-5txdd-clone-repository-pod is terminated",
                            "reason": "TaskRunCancelled",
                            "startedAt": "2026-04-15T23:16:53Z"
                        },
                        "terminationReason": "TaskRunCancelled"
                    },
                    {
                        "container": "step-create-trusted-artifact",
                        "imageID": "quay.io/konflux-ci/build-trusted-artifacts@sha256:15d7dc86012e41b10d1eb37679ec03ee75c96436224fadd0938a49dc537aa4ad",
                        "name": "create-trusted-artifact",
                        "terminated": {
                            "exitCode": 1,
                            "finishedAt": "2026-04-15T23:16:54Z",
                            "message": "Step create-trusted-artifact terminated as pod tsf-demo-comp-on-pull-request-5txdd-clone-repository-pod is terminated",
                            "reason": "TaskRunCancelled",
                            "startedAt": "2026-04-15T23:16:53Z"
                        },
                        "terminationReason": "TaskRunCancelled"
                    }
                ],
                "taskSpec": {
                    "description": "The git-clone-oci-ta Task will clone a repo from the provided url and store it as a trusted artifact in the provided OCI repository.",
                    "params": [
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data.",
                            "name": "caTrustConfigMapKey",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from.",
                            "name": "caTrustConfigMapName",
                            "type": "string"
                        },
                        {
                            "default": "1",
                            "description": "Perform a shallow clone, fetching only the most recent N commits.",
                            "name": "depth",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Check symlinks in the repo. If they're pointing outside of the repo, the build will fail.\n",
                            "name": "enableSymlinkCheck",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Fetch all tags for the repo.",
                            "name": "fetchTags",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "HTTP proxy server for non-SSL requests.",
                            "name": "httpProxy",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "HTTPS proxy server for SSL requests.",
                            "name": "httpsProxy",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Perform a shallow fetch of the target branch, fetching only the most recent N commits.\nIf empty, fetches the full history of the target branch.\n",
                            "name": "mergeSourceDepth",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "URL of the repository to fetch the target branch from when mergeTargetBranch is true.\nIf empty, uses the same repository (origin). This allows merging a branch from a different repository.\n",
                            "name": "mergeSourceRepoUrl",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Set to \"true\" to merge the targetBranch into the checked-out revision.",
                            "name": "mergeTargetBranch",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Opt out of proxying HTTP/HTTPS requests.",
                            "name": "noProxy",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Expiration date for the trusted artifacts created in the OCI repository. An empty string means the artifacts do not expire.",
                            "name": "ociArtifactExpiresAfter",
                            "type": "string"
                        },
                        {
                            "description": "The OCI repository where the Trusted Artifacts are stored.",
                            "name": "ociStorage",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Refspec to fetch before checking out revision.",
                            "name": "refspec",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Revision to checkout. (branch, tag, sha, ref, etc...)",
                            "name": "revision",
                            "type": "string"
                        },
                        {
                            "default": "7",
                            "description": "Length of short commit SHA",
                            "name": "shortCommitLength",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Define the directory patterns to match or exclude when performing a sparse checkout.",
                            "name": "sparseCheckoutDirectories",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Set the `http.sslVerify` global git config. Setting this to `false` is not advised unless you are sure that you trust your git remote.",
                            "name": "sslVerify",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Comma-separated list of specific submodule paths to initialize and fetch. Only submodules in the specified directories and their subdirectories will be fetched.\nEmpty string fetches all submodules. Parameter \"submodules\" must be set to \"true\" to make this parameter applicable.\n",
                            "name": "submodulePaths",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Initialize and fetch git submodules.",
                            "name": "submodules",
                            "type": "string"
                        },
                        {
                            "default": "main",
                            "description": "The target branch to merge into the revision (if mergeTargetBranch is true).",
                            "name": "targetBranch",
                            "type": "string"
                        },
                        {
                            "description": "Repository URL to clone from.",
                            "name": "url",
                            "type": "string"
                        },
                        {
                            "default": "/tekton/home",
                            "description": "Absolute path to the user's home directory. Set this explicitly if you are running the image as a non-root user.\n",
                            "name": "userHome",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Log the commands that are executed during `git-clone`'s operation.",
                            "name": "verbose",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "The precise commit SHA that was fetched by this Task. This result uses Chains type hinting to include in the provenance.",
                            "name": "CHAINS-GIT_COMMIT",
                            "type": "string"
                        },
                        {
                            "description": "The precise URL that was fetched by this Task. This result uses Chains type hinting to include in the provenance.",
                            "name": "CHAINS-GIT_URL",
                            "type": "string"
                        },
                        {
                            "description": "The Trusted Artifact URI pointing to the artifact with the application source code.",
                            "name": "SOURCE_ARTIFACT",
                            "type": "string"
                        },
                        {
                            "description": "The precise commit SHA that was fetched by this Task.",
                            "name": "commit",
                            "type": "string"
                        },
                        {
                            "description": "The commit timestamp of the checkout",
                            "name": "commit-timestamp",
                            "type": "string"
                        },
                        {
                            "description": "The SHA of the commit after merging the target branch (if the param mergeTargetBranch is true).",
                            "name": "merged_sha",
                            "type": "string"
                        },
                        {
                            "description": "The commit SHA that was fetched by this Task limited to params.shortCommitLength number of characters",
                            "name": "short-commit",
                            "type": "string"
                        },
                        {
                            "description": "The precise URL that was fetched by this Task.",
                            "name": "url",
                            "type": "string"
                        }
                    ],
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "HOME",
                                    "value": "/tekton/home"
                                },
                                {
                                    "name": "PARAM_URL",
                                    "value": "https://github.com/rhads-tsf-qe/testrepo"
                                },
                                {
                                    "name": "PARAM_REVISION",
                                    "value": "eb6230096291fbbd8dea97f5f6dabf4d02413292"
                                },
                                {
                                    "name": "PARAM_REFSPEC"
                                },
                                {
                                    "name": "PARAM_SUBMODULES",
                                    "value": "true"
                                },
                                {
                                    "name": "PARAM_SUBMODULE_PATHS"
                                },
                                {
                                    "name": "PARAM_DEPTH",
                                    "value": "1"
                                },
                                {
                                    "name": "PARAM_SHORT_COMMIT_LENGTH",
                                    "value": "7"
                                },
                                {
                                    "name": "PARAM_SSL_VERIFY",
                                    "value": "true"
                                },
                                {
                                    "name": "PARAM_HTTP_PROXY"
                                },
                                {
                                    "name": "PARAM_HTTPS_PROXY"
                                },
                                {
                                    "name": "PARAM_NO_PROXY"
                                },
                                {
                                    "name": "PARAM_VERBOSE",
                                    "value": "false"
                                },
                                {
                                    "name": "PARAM_SPARSE_CHECKOUT_DIRECTORIES"
                                },
                                {
                                    "name": "PARAM_USER_HOME",
                                    "value": "/tekton/home"
                                },
                                {
                                    "name": "PARAM_FETCH_TAGS",
                                    "value": "false"
                                },
                                {
                                    "name": "PARAM_MERGE_TARGET_BRANCH",
                                    "value": "false"
                                },
                                {
                                    "name": "PARAM_TARGET_BRANCH",
                                    "value": "main"
                                },
                                {
                                    "name": "PARAM_MERGE_SOURCE_REPO_URL"
                                },
                                {
                                    "name": "PARAM_MERGE_SOURCE_DEPTH"
                                },
                                {
                                    "name": "WORKSPACE_SSH_DIRECTORY_BOUND",
                                    "value": "false"
                                },
                                {
                                    "name": "WORKSPACE_SSH_DIRECTORY_PATH"
                                },
                                {
                                    "name": "WORKSPACE_BASIC_AUTH_DIRECTORY_BOUND",
                                    "value": "true"
                                },
                                {
                                    "name": "WORKSPACE_BASIC_AUTH_DIRECTORY_PATH",
                                    "value": "/workspace/basic-auth"
                                },
                                {
                                    "name": "CHECKOUT_DIR",
                                    "value": "/var/workdir/source"
                                }
                            ],
                            "image": "quay.io/konflux-ci/git-clone@sha256:09ac9c14392b5c2b8057f66cc4abfb8ce5d7214706318959d00908923a754434",
                            "name": "clone",
                            "script": "#!/usr/bin/env sh\nset -eu\n\nif [ \"${PARAM_VERBOSE}\" = \"true\" ]; then\n  set -x\nfi\n\nif [ \"${WORKSPACE_BASIC_AUTH_DIRECTORY_BOUND}\" = \"true\" ]; then\n  if [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.git-credentials\" ] \u0026\u0026 [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.gitconfig\" ]; then\n    cp \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.git-credentials\" \"${PARAM_USER_HOME}/.git-credentials\"\n    cp \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.gitconfig\" \"${PARAM_USER_HOME}/.gitconfig\"\n  # Compatibility with kubernetes.io/basic-auth secrets\n  elif [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/username\" ] \u0026\u0026 [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/password\" ]; then\n    HOSTNAME=$(echo $PARAM_URL | awk -F/ '{print $3}')\n    echo \"https://$(cat ${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/username):$(cat ${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/password)@$HOSTNAME\" \u003e\"${PARAM_USER_HOME}/.git-credentials\"\n    echo -e \"[credential \\\"https://$HOSTNAME\\\"]\\n  helper = store\" \u003e\"${PARAM_USER_HOME}/.gitconfig\"\n  else\n    echo \"Unknown basic-auth workspace format\"\n    exit 1\n  fi\n  chmod 400 \"${PARAM_USER_HOME}/.git-credentials\"\n  chmod 400 \"${PARAM_USER_HOME}/.gitconfig\"\nfi\n\n# Should be called after the gitconfig is copied from the repository secret\nca_bundle=/mnt/trusted-ca/ca-bundle.crt\nif [ -f \"$ca_bundle\" ]; then\n  echo \"INFO: Using mounted CA bundle: $ca_bundle\"\n  git config --global http.sslCAInfo \"$ca_bundle\"\nfi\n\nif [ \"${WORKSPACE_SSH_DIRECTORY_BOUND}\" = \"true\" ]; then\n  cp -R \"${WORKSPACE_SSH_DIRECTORY_PATH}\" \"${PARAM_USER_HOME}\"/.ssh\n  chmod 700 \"${PARAM_USER_HOME}\"/.ssh\n  chmod -R 400 \"${PARAM_USER_HOME}\"/.ssh/*\nfi\n\ntest -z \"${PARAM_HTTP_PROXY}\" || export HTTP_PROXY=\"${PARAM_HTTP_PROXY}\"\ntest -z \"${PARAM_HTTPS_PROXY}\" || export HTTPS_PROXY=\"${PARAM_HTTPS_PROXY}\"\ntest -z \"${PARAM_NO_PROXY}\" || export NO_PROXY=\"${PARAM_NO_PROXY}\"\n\n/ko-app/git-init \\\n  -url=\"${PARAM_URL}\" \\\n  -revision=\"${PARAM_REVISION}\" \\\n  -refspec=\"${PARAM_REFSPEC}\" \\\n  -path=\"${CHECKOUT_DIR}\" \\\n  -sslVerify=\"${PARAM_SSL_VERIFY}\" \\\n  -submodules=\"${PARAM_SUBMODULES}\" \\\n  -submodulePaths=\"${PARAM_SUBMODULE_PATHS}\" \\\n  -depth=\"${PARAM_DEPTH}\" \\\n  -sparseCheckoutDirectories=\"${PARAM_SPARSE_CHECKOUT_DIRECTORIES}\" \\\n  -retryMaxAttempts=10\ncd \"${CHECKOUT_DIR}\"\nRESULT_SHA=\"$(git rev-parse HEAD)\"\nRESULT_SHA_SHORT=\"$(git rev-parse --short=\"${PARAM_SHORT_COMMIT_LENGTH}\" HEAD)\"\n\nif [ \"${PARAM_MERGE_TARGET_BRANCH}\" = \"true\" ]; then\n  echo \"Merge option enabled. Attempting to merge target branch '${PARAM_TARGET_BRANCH}' into HEAD (${RESULT_SHA}).\"\n\n  if [ \"${PARAM_DEPTH}\" = \"1\" ]; then\n    echo \"WARNING: Shallow clone with depth=1 may cause merge conflicts due to insufficient commit history.\" \u003e\u00262\n  fi\n\n  if [ \"${PARAM_MERGE_SOURCE_DEPTH}\" = \"1\" ]; then\n    echo \"WARNING: Shallow fetch with mergeSourceDepth=1 may cause merge conflicts due to insufficient commit history.\" \u003e\u00262\n  fi\n\n  # Determine if merging from a different repository or the same one\n  if [ -n \"${PARAM_MERGE_SOURCE_REPO_URL}\" ]; then\n    # Normalize URLs for comparison (remove trailing slashes and .git suffix)\n    normalize_url() {\n      echo \"$1\" | sed -e 's#/$##' -e 's#\\.git$##'\n    }\n\n    NORMALIZED_ORIGIN_URL=$(normalize_url \"${PARAM_URL}\")\n    NORMALIZED_MERGE_URL=$(normalize_url \"${PARAM_MERGE_SOURCE_REPO_URL}\")\n\n    if [ \"${NORMALIZED_ORIGIN_URL}\" = \"${NORMALIZED_MERGE_URL}\" ]; then\n      echo \"Merge source URL is the same as origin. Using existing 'origin' remote.\"\n      MERGE_REMOTE=\"origin\"\n    else\n      echo \"Merging from different repository: ${PARAM_MERGE_SOURCE_REPO_URL}\"\n      echo \"Adding remote 'merge-source'...\"\n      git remote add merge-source \"${PARAM_MERGE_SOURCE_REPO_URL}\"\n      MERGE_REMOTE=\"merge-source\"\n    fi\n  else\n    echo \"Merging from the same repository (origin)\"\n    MERGE_REMOTE=\"origin\"\n  fi\n\n  echo \"Fetching target branch '${PARAM_TARGET_BRANCH}' from ${MERGE_REMOTE}...\"\n  if [ -n \"${PARAM_MERGE_SOURCE_DEPTH}\" ]; then\n    retry git fetch --depth=\"${PARAM_MERGE_SOURCE_DEPTH}\" ${MERGE_REMOTE} \"${PARAM_TARGET_BRANCH}\"\n  else\n    retry git fetch ${MERGE_REMOTE} \"${PARAM_TARGET_BRANCH}\"\n  fi\n\n  echo \"Merging ${MERGE_REMOTE}/${PARAM_TARGET_BRANCH} into current HEAD...\"\n  git config --global user.email \"tekton-git-clone@tekton.dev\"\n  git config --global user.name \"Tekton Git Clone Task\"\n\n  if ! git merge FETCH_HEAD --no-commit --no-ff --allow-unrelated-histories; then\n    echo \"ERROR: Merge conflict detected or merge failed before commit.\" \u003e\u00262\n    echo \"--- Git Status ---\"\n    git status\n    echo \"------------------\"\n    exit 1\n  fi\n\n  # Check if there are changes staged for commit\n  if git diff --staged --quiet; then\n    echo \"No diff was found, skipping merge...\" \u003e\u00262\n  else\n    echo \"Merge successful (no conflicts found), committing...\"\n    if ! git commit -m \"Merge branch '${PARAM_TARGET_BRANCH}' from ${MERGE_REMOTE} into ${RESULT_SHA}\"; then\n      echo \"ERROR: Failed to commit merge.\" \u003e\u00262\n      exit 1\n    fi\n    MERGED_SHA=$(git rev-parse HEAD)\n    echo \"New HEAD after merge: ${MERGED_SHA}\"\n    echo \"${MERGED_SHA}\" \u003e\"/tekton/results/merged_sha\"\n  fi\n\nelse\n  echo \"Merge option disabled. Using checked-out revision ${RESULT_SHA} directly.\"\nfi\nprintf \"%s\" \"${RESULT_SHA}\" \u003e\"/tekton/results/commit\"\nprintf \"%s\" \"${RESULT_SHA}\" \u003e\"/tekton/results/CHAINS-GIT_COMMIT\"\nprintf \"%s\" \"${RESULT_SHA_SHORT}\" \u003e\"/tekton/results/short-commit\"\nprintf \"%s\" \"${PARAM_URL}\" \u003e\"/tekton/results/url\"\nprintf \"%s\" \"${PARAM_URL}\" \u003e\"/tekton/results/CHAINS-GIT_URL\"\nprintf \"%s\" \"$(git log -1 --pretty=%ct)\" \u003e\"/tekton/results/commit-timestamp\"\n\nif [ \"${PARAM_FETCH_TAGS}\" = \"true\" ]; then\n  echo \"Fetching tags\"\n  retry git fetch --tags\nfi\n",
                            "securityContext": {
                                "runAsUser": 0
                            },
                            "volumeMounts": [
                                {
                                    "mountPath": "/mnt/trusted-ca",
                                    "name": "trusted-ca",
                                    "readOnly": true
                                },
                                {
                                    "mountPath": "/var/workdir",
                                    "name": "workdir"
                                }
                            ]
                        },
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "PARAM_ENABLE_SYMLINK_CHECK",
                                    "value": "true"
                                },
                                {
                                    "name": "CHECKOUT_DIR",
                                    "value": "/var/workdir/source"
                                }
                            ],
                            "image": "quay.io/konflux-ci/git-clone@sha256:09ac9c14392b5c2b8057f66cc4abfb8ce5d7214706318959d00908923a754434",
                            "name": "symlink-check",
                            "script": "#!/usr/bin/env bash\nset -euo pipefail\n\ncheck_symlinks() {\n  FOUND_SYMLINK_POINTING_OUTSIDE_OF_REPO=false\n  while read -r symlink; do\n    target=$(readlink -m \"$symlink\")\n    if ! [[ \"$target\" =~ ^$CHECKOUT_DIR ]]; then\n      echo \"The cloned repository contains symlink pointing outside of the cloned repository: $symlink\"\n      FOUND_SYMLINK_POINTING_OUTSIDE_OF_REPO=true\n    fi\n  done \u003c \u003c(find $CHECKOUT_DIR -type l -print)\n  if [ \"$FOUND_SYMLINK_POINTING_OUTSIDE_OF_REPO\" = true ]; then\n    return 1\n  fi\n}\n\nif [ \"${PARAM_ENABLE_SYMLINK_CHECK}\" = \"true\" ]; then\n  echo \"Running symlink check\"\n  check_symlinks\nfi\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/var/workdir",
                                    "name": "workdir"
                                }
                            ]
                        },
                        {
                            "args": [
                                "create",
                                "--store",
                                "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:on-pr-eb6230096291fbbd8dea97f5f6dabf4d02413292.git",
                                "/tekton/results/SOURCE_ARTIFACT=/var/workdir/source"
                            ],
                            "computeResources": {
                                "limits": {
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "IMAGE_EXPIRES_AFTER",
                                    "value": "5d"
                                }
                            ],
                            "image": "quay.io/konflux-ci/build-trusted-artifacts:latest@sha256:15d7dc86012e41b10d1eb37679ec03ee75c96436224fadd0938a49dc537aa4ad",
                            "name": "create-trusted-artifact",
                            "volumeMounts": [
                                {
                                    "mountPath": "/var/workdir",
                                    "name": "workdir"
                                },
                                {
                                    "mountPath": "/etc/pki/tls/certs/ca-custom-bundle.crt",
                                    "name": "trusted-ca",
                                    "readOnly": true,
                                    "subPath": "ca-bundle.crt"
                                }
                            ]
                        }
                    ],
                    "volumes": [
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        },
                        {
                            "emptyDir": {},
                            "name": "workdir"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "A Workspace containing a .gitconfig and .git-credentials file or username and password.\nThese will be copied to the user's home before any git commands are run. Any\nother files in this Workspace are ignored. It is strongly recommended\nto use ssh-directory over basic-auth whenever possible and to bind a\nSecret to this Workspace over other volume types.\n",
                            "name": "basic-auth",
                            "optional": true
                        },
                        {
                            "description": "A .ssh directory with private key, known_hosts, config, etc. Copied to\nthe user's home before git commands are executed. Used to authenticate\nwith the git remote when performing the clone. Binding a Secret to this\nWorkspace is strongly recommended over other volume types.\n",
                            "name": "ssh-directory",
                            "optional": true
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.openshift.io/repo": "https://github.com/rhads-tsf-qe/testrepo?rev=eb6230096291fbbd8dea97f5f6dabf4d02413292",
                    "build.appstudio.redhat.com/commit_sha": "eb6230096291fbbd8dea97f5f6dabf4d02413292",
                    "build.appstudio.redhat.com/pull_request_number": "181",
                    "build.appstudio.redhat.com/target_branch": "base-miwkfv",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=2",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "pipelinesascode.tekton.dev/branch": "base-miwkfv",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "true",
                    "pipelinesascode.tekton.dev/check-run-id": "71552471200",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "pull_request",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-ofissd",
                    "pipelinesascode.tekton.dev/git-provider": "github",
                    "pipelinesascode.tekton.dev/installation-id": "112348674",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-pull-request-5txdd",
                    "pipelinesascode.tekton.dev/max-keep-runs": "3",
                    "pipelinesascode.tekton.dev/on-cel-expression": "event == \"pull_request\" \u0026\u0026 target_branch == \"base-miwkfv\"",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-pull-request",
                    "pipelinesascode.tekton.dev/pull-request": "181",
                    "pipelinesascode.tekton.dev/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhads-tsf-ci[bot]",
                    "pipelinesascode.tekton.dev/sha": "eb6230096291fbbd8dea97f5f6dabf4d02413292",
                    "pipelinesascode.tekton.dev/sha-title": "RHADS-TSF-CI update tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/eb6230096291fbbd8dea97f5f6dabf4d02413292",
                    "pipelinesascode.tekton.dev/source-branch": "konflux-tsf-demo-comp",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-tenant/results/b512b4f0-fa00-4381-ac29-8318f681923c/records/7fdca9be-8cfb-48f6-8b80-e7f0b1f7959d",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"testrepo\",\"commit\":\"eb6230096291fbbd8dea97f5f6dabf4d02413292\",\"eventType\":\"pull_request\",\"pull_request-id\":181}",
                    "results.tekton.dev/result": "default-tenant/results/b512b4f0-fa00-4381-ac29-8318f681923c",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "konflux",
                    "test.appstudio.openshift.io/pr-group": "konflux-tsf-demo-comp",
                    "test.appstudio.openshift.io/snapshot-creation-report": "SnapshotCreationFailed"
                },
                "creationTimestamp": "2026-04-15T23:16:44Z",
                "finalizers": [
                    "results.tekton.dev/taskrun",
                    "chains.tekton.dev"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/version": "v0.37.7",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/component": "tsf-demo-comp",
                    "pipelines.appstudio.openshift.io/type": "build",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "true",
                    "pipelinesascode.tekton.dev/check-run-id": "71552471200",
                    "pipelinesascode.tekton.dev/event-type": "pull_request",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-pull-request",
                    "pipelinesascode.tekton.dev/pull-request": "181",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha": "eb6230096291fbbd8dea97f5f6dabf4d02413292",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "tsf-demo-comp-on-pull-request-5txdd",
                    "tekton.dev/pipelineRun": "tsf-demo-comp-on-pull-request-5txdd",
                    "tekton.dev/pipelineRunUID": "b512b4f0-fa00-4381-ac29-8318f681923c",
                    "tekton.dev/pipelineTask": "init",
                    "tekton.dev/task": "init",
                    "test.appstudio.openshift.io/pr-group-sha": "e5069fd5afbb0dd2d302e33fb7e375be47613ee02b0ea3b06542f7ea04bca2"
                },
                "name": "tsf-demo-comp-on-pull-request-5txdd-init",
                "namespace": "default-tenant",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "tsf-demo-comp-on-pull-request-5txdd",
                        "uid": "b512b4f0-fa00-4381-ac29-8318f681923c"
                    }
                ],
                "resourceVersion": "34349",
                "uid": "7fdca9be-8cfb-48f6-8b80-e7f0b1f7959d"
            },
            "spec": {
                "params": [
                    {
                        "name": "enable-cache-proxy",
                        "value": "false"
                    }
                ],
                "serviceAccountName": "build-pipeline-tsf-demo-comp",
                "taskRef": {
                    "params": [
                        {
                            "name": "name",
                            "value": "init"
                        },
                        {
                            "name": "bundle",
                            "value": "quay.io/konflux-ci/tekton-catalog/task-init:0.4@sha256:288f3106118edc1d0f0c79a89c960abf5841a4dd8bc3f38feb10527253105b19"
                        },
                        {
                            "name": "kind",
                            "value": "task"
                        }
                    ],
                    "resolver": "bundles"
                },
                "timeout": "1h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:16:50Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:16:50Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "tsf-demo-comp-on-pull-request-5txdd-init-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha256": "288f3106118edc1d0f0c79a89c960abf5841a4dd8bc3f38feb10527253105b19"
                        },
                        "entryPoint": "init",
                        "uri": "quay.io/konflux-ci/tekton-catalog/task-init"
                    }
                },
                "results": [
                    {
                        "name": "http-proxy",
                        "type": "string",
                        "value": ""
                    },
                    {
                        "name": "no-proxy",
                        "type": "string",
                        "value": ""
                    }
                ],
                "startTime": "2026-04-15T23:16:44Z",
                "steps": [
                    {
                        "container": "step-init",
                        "imageID": "quay.io/konflux-ci/konflux-build-cli@sha256:2d1039b614888ca46d5d771ca886a5843e56ac9acf7210040a61075371338247",
                        "name": "init",
                        "terminated": {
                            "containerID": "cri-o://bef3878e7894f30f8d2b3ba481aec6719c3ff5389d47febf59084989b7db92af",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:16:49Z",
                            "message": "[{\"key\":\"http-proxy\",\"value\":\"\",\"type\":1},{\"key\":\"no-proxy\",\"value\":\"\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:16:49Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Initialize Pipeline Task, enables configuration for cache-proxy if required during the PipelineRun.",
                    "params": [
                        {
                            "default": "false",
                            "description": "Enable cache proxy configuration",
                            "name": "enable-cache-proxy",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "HTTP proxy URL for cache proxy (when enable-cache-proxy is true)",
                            "name": "http-proxy",
                            "type": "string"
                        },
                        {
                            "description": "NO_PROXY value for cache proxy (when enable-cache-proxy is true)",
                            "name": "no-proxy",
                            "type": "string"
                        }
                    ],
                    "steps": [
                        {
                            "args": [
                                "--enable",
                                "false"
                            ],
                            "command": [
                                "konflux-build-cli",
                                "config",
                                "cache-proxy"
                            ],
                            "computeResources": {
                                "limits": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "KBC_LOG_LEVEL",
                                    "value": "info"
                                },
                                {
                                    "name": "DEFAULT_HTTP_PROXY",
                                    "value": "squid.caching.svc.cluster.local:3128"
                                },
                                {
                                    "name": "DEFAULT_NO_PROXY",
                                    "value": "brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai"
                                },
                                {
                                    "name": "HTTP_PROXY_RESULTS_PATH",
                                    "value": "/tekton/results/http-proxy"
                                },
                                {
                                    "name": "NO_PROXY_RESULTS_PATH",
                                    "value": "/tekton/results/no-proxy"
                                }
                            ],
                            "image": "quay.io/konflux-ci/konflux-build-cli@sha256:59f2ea93fa4d47342b54acb434422ee07ebccd927a06a00d3f3eca70f8356ddf",
                            "name": "init"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.openshift.io/repo": "https://github.com/rhads-tsf-qe/testrepo?rev=c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "build.appstudio.redhat.com/commit_sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "build.appstudio.redhat.com/target_branch": "base-uovnpl",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=13",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "pipelinesascode.tekton.dev/branch": "base-uovnpl",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552388922",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-ahlxga",
                    "pipelinesascode.tekton.dev/git-provider": "github",
                    "pipelinesascode.tekton.dev/installation-id": "112348674",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-push-8m9zl",
                    "pipelinesascode.tekton.dev/max-keep-runs": "3",
                    "pipelinesascode.tekton.dev/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-uovnpl\"",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-ci-tests-bot",
                    "pipelinesascode.tekton.dev/sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pipelinesascode.tekton.dev/sha-title": "Merge pull request #180 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pipelinesascode.tekton.dev/source-branch": "refs/heads/base-uovnpl",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-tenant/results/3a69c030-be51-40ae-9a05-5b5733b01f62/records/5b31867d-8678-4ad1-b9c9-05112059476f",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"testrepo\",\"commit\":\"c4481f5e1453d8c204c7bae0f626b245e6bf6525\",\"eventType\":\"push\"}",
                    "results.tekton.dev/result": "default-tenant/results/3a69c030-be51-40ae-9a05-5b5733b01f62",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "image-build, konflux"
                },
                "creationTimestamp": "2026-04-15T23:17:12Z",
                "finalizers": [
                    "chains.tekton.dev",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/version": "v0.37.7",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/component": "tsf-demo-comp",
                    "build.appstudio.redhat.com/build_type": "docker",
                    "pipelines.appstudio.openshift.io/type": "build",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552388922",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "tsf-demo-comp-on-push-8m9zl",
                    "tekton.dev/pipelineRun": "tsf-demo-comp-on-push-8m9zl",
                    "tekton.dev/pipelineRunUID": "3a69c030-be51-40ae-9a05-5b5733b01f62",
                    "tekton.dev/pipelineTask": "build-container",
                    "tekton.dev/task": "buildah-oci-ta-min"
                },
                "name": "tsf-demo-comp-on-push-8m9zl-build-container",
                "namespace": "default-tenant",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "tsf-demo-comp-on-push-8m9zl",
                        "uid": "3a69c030-be51-40ae-9a05-5b5733b01f62"
                    }
                ],
                "resourceVersion": "36354",
                "uid": "5b31867d-8678-4ad1-b9c9-05112059476f"
            },
            "spec": {
                "params": [
                    {
                        "name": "IMAGE",
                        "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525"
                    },
                    {
                        "name": "DOCKERFILE",
                        "value": "Dockerfile"
                    },
                    {
                        "name": "CONTEXT",
                        "value": "."
                    },
                    {
                        "name": "HERMETIC",
                        "value": "false"
                    },
                    {
                        "name": "PREFETCH_INPUT",
                        "value": ""
                    },
                    {
                        "name": "IMAGE_EXPIRES_AFTER",
                        "value": ""
                    },
                    {
                        "name": "COMMIT_SHA",
                        "value": "c4481f5e1453d8c204c7bae0f626b245e6bf6525"
                    },
                    {
                        "name": "BUILD_ARGS",
                        "value": []
                    },
                    {
                        "name": "BUILD_ARGS_FILE",
                        "value": ""
                    },
                    {
                        "name": "PRIVILEGED_NESTED",
                        "value": "false"
                    },
                    {
                        "name": "SOURCE_URL",
                        "value": "https://github.com/rhads-tsf-qe/testrepo"
                    },
                    {
                        "name": "BUILDAH_FORMAT",
                        "value": "docker"
                    },
                    {
                        "name": "HTTP_PROXY",
                        "value": ""
                    },
                    {
                        "name": "NO_PROXY",
                        "value": ""
                    },
                    {
                        "name": "SOURCE_ARTIFACT",
                        "value": "oci:quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:38b4edb1fa7f1c0f510d8d0e9f686ae7fa450d96e478098c517e31b6a0a35953"
                    },
                    {
                        "name": "CACHI2_ARTIFACT",
                        "value": ""
                    }
                ],
                "serviceAccountName": "build-pipeline-tsf-demo-comp",
                "taskRef": {
                    "params": [
                        {
                            "name": "name",
                            "value": "buildah-oci-ta-min"
                        },
                        {
                            "name": "bundle",
                            "value": "quay.io/konflux-ci/tekton-catalog/task-buildah-oci-ta-min:0.9@sha256:95c1b5a8b454e19bd4eb28bf90ee0247467743d0e0f5737d952dce1a99108d2f"
                        },
                        {
                            "name": "kind",
                            "value": "task"
                        }
                    ],
                    "resolver": "bundles"
                },
                "timeout": "1h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:19:53Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:19:53Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "tsf-demo-comp-on-push-8m9zl-build-container-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha256": "95c1b5a8b454e19bd4eb28bf90ee0247467743d0e0f5737d952dce1a99108d2f"
                        },
                        "entryPoint": "buildah-oci-ta-min",
                        "uri": "quay.io/konflux-ci/tekton-catalog/task-buildah-oci-ta-min"
                    }
                },
                "results": [
                    {
                        "name": "IMAGE_DIGEST",
                        "type": "string",
                        "value": "sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6"
                    },
                    {
                        "name": "IMAGE_REF",
                        "type": "string",
                        "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525@sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6"
                    },
                    {
                        "name": "IMAGE_URL",
                        "type": "string",
                        "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525"
                    },
                    {
                        "name": "SBOM_BLOB_URL",
                        "type": "string",
                        "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:fb0b614b58f0abe064b2faf142a1529eb26fc4ad67cd28d0abb07acd260be643"
                    }
                ],
                "startTime": "2026-04-15T23:17:13Z",
                "steps": [
                    {
                        "container": "step-use-trusted-artifact",
                        "imageID": "quay.io/konflux-ci/build-trusted-artifacts@sha256:15d7dc86012e41b10d1eb37679ec03ee75c96436224fadd0938a49dc537aa4ad",
                        "name": "use-trusted-artifact",
                        "terminated": {
                            "containerID": "cri-o://0444e974ce40a3848c3fdf8f2a9155b73f6ec9c2490867bae7882f19fd46d827",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:17:45Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:17:45Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-build",
                        "imageID": "quay.io/konflux-ci/buildah-task@sha256:3bd8b2c9f2b809bd86457cbe8411051b5a000f312b5e48cab63ab288bf6bf330",
                        "name": "build",
                        "terminated": {
                            "containerID": "cri-o://759843787efc90feed28a0b9041bedc6817219f9640e3ed3b17d9d87bc72017e",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:18:28Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:17:45Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-push",
                        "imageID": "quay.io/konflux-ci/buildah-task@sha256:3bd8b2c9f2b809bd86457cbe8411051b5a000f312b5e48cab63ab288bf6bf330",
                        "name": "push",
                        "terminated": {
                            "containerID": "cri-o://2ee60b30afe8f372ea10912b0b44cb8dab6e93ea93ae6a99ae352d5d10725f8c",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:18:44Z",
                            "message": "[{\"key\":\"IMAGE_DIGEST\",\"value\":\"sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6\",\"type\":1},{\"key\":\"IMAGE_REF\",\"value\":\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525@sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6\",\"type\":1},{\"key\":\"IMAGE_URL\",\"value\":\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:18:29Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-sbom-syft-generate",
                        "imageID": "quay.io/konflux-ci/task-runner@sha256:b22b989da3c95cb0af862eeb82531ed4f687e948ca5fb6b965d1ea8fbd5054ce",
                        "name": "sbom-syft-generate",
                        "terminated": {
                            "containerID": "cri-o://81351918a42d7954459f52e3b38424a4082e64ba7bd1da7bc1baf831fb4dc562",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:19:23Z",
                            "message": "[{\"key\":\"IMAGE_DIGEST\",\"value\":\"sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6\",\"type\":1},{\"key\":\"IMAGE_REF\",\"value\":\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525@sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6\",\"type\":1},{\"key\":\"IMAGE_URL\",\"value\":\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:18:44Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-prepare-sboms",
                        "imageID": "quay.io/konflux-ci/mobster@sha256:2e00c2f0aeff55713150b51822013327ea0e0d75b8164a52f837fb297c17703d",
                        "name": "prepare-sboms",
                        "terminated": {
                            "containerID": "cri-o://5624f72b1987d804b96da2ad498d20a2391df9b2b24aa4f2763a6f6095a968bf",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:19:45Z",
                            "message": "[{\"key\":\"IMAGE_DIGEST\",\"value\":\"sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6\",\"type\":1},{\"key\":\"IMAGE_REF\",\"value\":\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525@sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6\",\"type\":1},{\"key\":\"IMAGE_URL\",\"value\":\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:19:23Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-upload-sbom",
                        "imageID": "quay.io/konflux-ci/task-runner@sha256:b22b989da3c95cb0af862eeb82531ed4f687e948ca5fb6b965d1ea8fbd5054ce",
                        "name": "upload-sbom",
                        "terminated": {
                            "containerID": "cri-o://aa1b7378c09909af56fb3649fb1355402d0023bc5fe31f98c564fdeac1b7ffbe",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:19:52Z",
                            "message": "[{\"key\":\"IMAGE_DIGEST\",\"value\":\"sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6\",\"type\":1},{\"key\":\"IMAGE_REF\",\"value\":\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525@sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6\",\"type\":1},{\"key\":\"IMAGE_URL\",\"value\":\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525\",\"type\":1},{\"key\":\"SBOM_BLOB_URL\",\"value\":\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:fb0b614b58f0abe064b2faf142a1529eb26fc4ad67cd28d0abb07acd260be643\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:19:45Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Buildah task builds source code into a container image and pushes the image into container registry using buildah tool.\nIn addition, it generates a SBOM file, injects the SBOM file into final container image and pushes the SBOM file as separate image using cosign tool.\nWhen prefetch-dependencies task is activated it is using its artifacts to run build in hermetic environment.",
                    "params": [
                        {
                            "default": "activation-key",
                            "description": "Name of secret which contains subscription activation key",
                            "name": "ACTIVATION_KEY",
                            "type": "string"
                        },
                        {
                            "default": [],
                            "description": "Additional base image references to include to the SBOM. Array of image_reference_with_digest strings",
                            "name": "ADDITIONAL_BASE_IMAGES",
                            "type": "array"
                        },
                        {
                            "default": "does-not-exist",
                            "description": "Name of a secret which will be made available to the build with 'buildah build --secret' at /run/secrets/$ADDITIONAL_SECRET",
                            "name": "ADDITIONAL_SECRET",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Comma separated list of extra capabilities to add when running 'buildah build'",
                            "name": "ADD_CAPABILITIES",
                            "type": "string"
                        },
                        {
                            "default": [],
                            "description": "Additional key=value annotations that should be applied to the image",
                            "name": "ANNOTATIONS",
                            "type": "array"
                        },
                        {
                            "default": "",
                            "description": "Path to a file with additional key=value annotations that should be applied to the image",
                            "name": "ANNOTATIONS_FILE",
                            "type": "string"
                        },
                        {
                            "default": "oci",
                            "description": "The format for the resulting image's mediaType. Valid values are oci (default) or docker.",
                            "name": "BUILDAH_FORMAT",
                            "type": "string"
                        },
                        {
                            "default": [],
                            "description": "Array of --build-arg values (\"arg=value\" strings)",
                            "name": "BUILD_ARGS",
                            "type": "array"
                        },
                        {
                            "default": "",
                            "description": "Path to a file with build arguments, see https://www.mankier.com/1/buildah-build#--build-arg-file",
                            "name": "BUILD_ARGS_FILE",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Defines the single build time for all buildah builds in seconds since UNIX epoch. Conflicts with SOURCE_DATE_EPOCH.",
                            "name": "BUILD_TIMESTAMP",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "The Trusted Artifact URI pointing to the artifact with the prefetched dependencies.",
                            "name": "CACHI2_ARTIFACT",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "The image is built from this commit.",
                            "name": "COMMIT_SHA",
                            "type": "string"
                        },
                        {
                            "default": ".",
                            "description": "Path to the directory to use as context.",
                            "name": "CONTEXT",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Determines if SBOM will be contextualized.",
                            "name": "CONTEXTUALIZE_SBOM",
                            "type": "string"
                        },
                        {
                            "default": "./Dockerfile",
                            "description": "Path to the Dockerfile to build.",
                            "name": "DOCKERFILE",
                            "type": "string"
                        },
                        {
                            "default": "etc-pki-entitlement",
                            "description": "Name of secret which contains the entitlement certificates",
                            "name": "ENTITLEMENT_SECRET",
                            "type": "string"
                        },
                        {
                            "default": [],
                            "description": "Array of --env values (\"env=value\" strings)",
                            "name": "ENV_VARS",
                            "type": "array"
                        },
                        {
                            "default": "false",
                            "description": "Determines if build will be executed without network access.",
                            "name": "HERMETIC",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "HTTP/HTTPS proxy to use for the buildah pull and build operations. Will not be passed through to the container during the build process.",
                            "name": "HTTP_PROXY",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Whether to keep compatibility location at /root/buildinfo/ for ICM injection",
                            "name": "ICM_KEEP_COMPAT_LOCATION",
                            "type": "string"
                        },
                        {
                            "description": "Reference of the image buildah will produce.",
                            "name": "IMAGE",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Delete image tag after specified time. Empty means to keep the image tag. Time values could be something like 1h, 2d, 3w for hours, days, and weeks, respectively.",
                            "name": "IMAGE_EXPIRES_AFTER",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Determines if the image inherits the base image labels.",
                            "name": "INHERIT_BASE_IMAGE_LABELS",
                            "type": "string"
                        },
                        {
                            "default": [],
                            "description": "Additional key=value labels that should be applied to the image",
                            "name": "LABELS",
                            "type": "array"
                        },
                        {
                            "default": "",
                            "description": "Comma separated list of hosts or domains which should bypass the HTTP/HTTPS proxy.",
                            "name": "NO_PROXY",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Omit build history information from the resulting image. Improves reproducibility by excluding timestamps and layer metadata.",
                            "name": "OMIT_HISTORY",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "In case it is not empty, the prefetched content should be made available to the build.",
                            "name": "PREFETCH_INPUT",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Whether to enable privileged mode, should be used only with remote VMs",
                            "name": "PRIVILEGED_NESTED",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the proxy CA bundle data.",
                            "name": "PROXY_CA_TRUST_CONFIG_MAP_KEY",
                            "type": "string"
                        },
                        {
                            "default": "caching-ca-bundle",
                            "description": "The name of the ConfigMap to read proxy CA bundle data from.",
                            "name": "PROXY_CA_TRUST_CONFIG_MAP_NAME",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Clamp mtime of all files to at most SOURCE_DATE_EPOCH. Does nothing if SOURCE_DATE_EPOCH is not defined.",
                            "name": "REWRITE_TIMESTAMP",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Flag to enable or disable SBOM validation before save. Validation is optional - use this if you are experiencing performance issues.",
                            "name": "SBOM_SKIP_VALIDATION",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Flag to enable or disable SBOM generation from source code. The scanner of the source code is enabled only for non-hermetic builds and can be disabled if the SBOM_SYFT_SELECT_CATALOGERS can't turn off catalogers that cause false positives on source code scanning.",
                            "name": "SBOM_SOURCE_SCAN_ENABLED",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Extra option to customize Syft's default catalogers when generating SBOMs. The value corresponds to Syft's CLI flag --select-catalogers. The details about available catalogers can be found here: https://github.com/anchore/syft/wiki/Package-Cataloger-Selection",
                            "name": "SBOM_SYFT_SELECT_CATALOGERS",
                            "type": "string"
                        },
                        {
                            "default": "spdx",
                            "description": "Select the SBOM format to generate. Valid values: spdx, cyclonedx. Note: the SBOM from the prefetch task - if there is one - must be in the same format.",
                            "name": "SBOM_TYPE",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Don't inject a content-sets.json or a labels.json file. This requires that the canonical Containerfile takes care of this itself.",
                            "name": "SKIP_INJECTIONS",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Skip SBOM-related operations. This will likely cause EC policies to fail if enabled",
                            "name": "SKIP_SBOM_GENERATION",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Whether to skip stages in Containerfile that seem unused by subsequent stages",
                            "name": "SKIP_UNUSED_STAGES",
                            "type": "string"
                        },
                        {
                            "description": "The Trusted Artifact URI pointing to the artifact with the application source code.",
                            "name": "SOURCE_ARTIFACT",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Timestamp in seconds since Unix epoch for reproducible builds. Sets image created time and SOURCE_DATE_EPOCH build arg. Conflicts with BUILD_TIMESTAMP.",
                            "name": "SOURCE_DATE_EPOCH",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "The image is built from this URL.",
                            "name": "SOURCE_URL",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Squash all new and previous layers added as a part of this build, as per --squash",
                            "name": "SQUASH",
                            "type": "string"
                        },
                        {
                            "default": "overlay",
                            "description": "Storage driver to configure for buildah",
                            "name": "STORAGE_DRIVER",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Target stage in Dockerfile to build. If not specified, the Dockerfile is processed entirely to (and including) its last stage.",
                            "name": "TARGET_STAGE",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Verify the TLS on the registry endpoint (for push/pull to a non-TLS registry)",
                            "name": "TLSVERIFY",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Mount the current working directory into the build using --volume $PWD:/$WORKINGDIR_MOUNT. Note that the $PWD will be the context directory for the build (see the CONTEXT param).",
                            "name": "WORKINGDIR_MOUNT",
                            "type": "string"
                        },
                        {
                            "default": "fetched.repos.d",
                            "description": "Path in source workspace where dynamically-fetched repos are present",
                            "name": "YUM_REPOS_D_FETCHED",
                            "type": "string"
                        },
                        {
                            "default": "repos.d",
                            "description": "Path in the git repository in which yum repository files are stored",
                            "name": "YUM_REPOS_D_SRC",
                            "type": "string"
                        },
                        {
                            "default": "/etc/yum.repos.d",
                            "description": "Target path on the container in which yum repository files should be made available",
                            "name": "YUM_REPOS_D_TARGET",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data.",
                            "name": "caTrustConfigMapKey",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from.",
                            "name": "caTrustConfigMapName",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Digest of the image just built",
                            "name": "IMAGE_DIGEST",
                            "type": "string"
                        },
                        {
                            "description": "Image reference of the built image",
                            "name": "IMAGE_REF",
                            "type": "string"
                        },
                        {
                            "description": "Image repository and tag where the built image was pushed",
                            "name": "IMAGE_URL",
                            "type": "string"
                        },
                        {
                            "description": "Reference of SBOM blob digest to enable digest-based verification from provenance",
                            "name": "SBOM_BLOB_URL",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {
                            "limits": {
                                "memory": "256Mi"
                            },
                            "requests": {
                                "cpu": "100m",
                                "memory": "256Mi"
                            }
                        },
                        "env": [
                            {
                                "name": "ACTIVATION_KEY",
                                "value": "activation-key"
                            },
                            {
                                "name": "ADDITIONAL_SECRET",
                                "value": "does-not-exist"
                            },
                            {
                                "name": "ADD_CAPABILITIES"
                            },
                            {
                                "name": "ANNOTATIONS_FILE"
                            },
                            {
                                "name": "BUILD_ARGS_FILE"
                            },
                            {
                                "name": "BUILD_TIMESTAMP"
                            },
                            {
                                "name": "CONTEXT",
                                "value": "."
                            },
                            {
                                "name": "CONTEXTUALIZE_SBOM",
                                "value": "true"
                            },
                            {
                                "name": "ENTITLEMENT_SECRET",
                                "value": "etc-pki-entitlement"
                            },
                            {
                                "name": "HERMETIC",
                                "value": "false"
                            },
                            {
                                "name": "IMAGE",
                                "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525"
                            },
                            {
                                "name": "IMAGE_EXPIRES_AFTER"
                            },
                            {
                                "name": "INHERIT_BASE_IMAGE_LABELS",
                                "value": "true"
                            },
                            {
                                "name": "PRIVILEGED_NESTED",
                                "value": "false"
                            },
                            {
                                "name": "SBOM_SKIP_VALIDATION",
                                "value": "true"
                            },
                            {
                                "name": "SBOM_SOURCE_SCAN_ENABLED",
                                "value": "true"
                            },
                            {
                                "name": "SBOM_SYFT_SELECT_CATALOGERS"
                            },
                            {
                                "name": "SBOM_TYPE",
                                "value": "spdx"
                            },
                            {
                                "name": "SKIP_INJECTIONS",
                                "value": "false"
                            },
                            {
                                "name": "SKIP_SBOM_GENERATION",
                                "value": "false"
                            },
                            {
                                "name": "SKIP_UNUSED_STAGES",
                                "value": "true"
                            },
                            {
                                "name": "SOURCE_CODE_DIR",
                                "value": "source"
                            },
                            {
                                "name": "SQUASH",
                                "value": "false"
                            },
                            {
                                "name": "STORAGE_DRIVER",
                                "value": "overlay"
                            },
                            {
                                "name": "TARGET_STAGE"
                            },
                            {
                                "name": "TLSVERIFY",
                                "value": "true"
                            },
                            {
                                "name": "WORKINGDIR_MOUNT"
                            },
                            {
                                "name": "YUM_REPOS_D_FETCHED",
                                "value": "fetched.repos.d"
                            },
                            {
                                "name": "YUM_REPOS_D_SRC",
                                "value": "repos.d"
                            },
                            {
                                "name": "YUM_REPOS_D_TARGET",
                                "value": "/etc/yum.repos.d"
                            }
                        ],
                        "imagePullPolicy": "IfNotPresent",
                        "volumeMounts": [
                            {
                                "mountPath": "/shared",
                                "name": "shared"
                            },
                            {
                                "mountPath": "/var/workdir",
                                "name": "workdir"
                            }
                        ]
                    },
                    "steps": [
                        {
                            "args": [
                                "use",
                                "oci:quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:38b4edb1fa7f1c0f510d8d0e9f686ae7fa450d96e478098c517e31b6a0a35953=/var/workdir/source",
                                "=/var/workdir/cachi2"
                            ],
                            "computeResources": {},
                            "image": "quay.io/konflux-ci/build-trusted-artifacts:latest@sha256:15d7dc86012e41b10d1eb37679ec03ee75c96436224fadd0938a49dc537aa4ad",
                            "name": "use-trusted-artifact",
                            "volumeMounts": [
                                {
                                    "mountPath": "/etc/pki/tls/certs/ca-custom-bundle.crt",
                                    "name": "trusted-ca",
                                    "readOnly": true,
                                    "subPath": "ca-bundle.crt"
                                }
                            ]
                        },
                        {
                            "args": [
                                "--build-args",
                                "--env",
                                "--labels",
                                "--annotations"
                            ],
                            "computeResources": {
                                "limits": {
                                    "cpu": "500m",
                                    "memory": "1Gi"
                                },
                                "requests": {
                                    "cpu": "500m",
                                    "memory": "1Gi"
                                }
                            },
                            "env": [
                                {
                                    "name": "HOME",
                                    "value": "/root"
                                },
                                {
                                    "name": "COMMIT_SHA",
                                    "value": "c4481f5e1453d8c204c7bae0f626b245e6bf6525"
                                },
                                {
                                    "name": "SOURCE_URL",
                                    "value": "https://github.com/rhads-tsf-qe/testrepo"
                                },
                                {
                                    "name": "DOCKERFILE",
                                    "value": "Dockerfile"
                                },
                                {
                                    "name": "BUILDAH_HTTP_PROXY"
                                },
                                {
                                    "name": "BUILDAH_NO_PROXY"
                                },
                                {
                                    "name": "ICM_KEEP_COMPAT_LOCATION",
                                    "value": "true"
                                },
                                {
                                    "name": "BUILDAH_OMIT_HISTORY",
                                    "value": "false"
                                },
                                {
                                    "name": "BUILDAH_SOURCE_DATE_EPOCH"
                                },
                                {
                                    "name": "BUILDAH_REWRITE_TIMESTAMP",
                                    "value": "false"
                                }
                            ],
                            "image": "quay.io/konflux-ci/buildah-task:latest@sha256:4c470b5a153c4acd14bf4f8731b5e36c61d7faafe09c2bf376bb81ce84aa5709",
                            "name": "build",
                            "script": "#!/bin/bash\nset -euo pipefail\n\nfunction set_proxy {\n  if [ -n \"${BUILDAH_HTTP_PROXY}\" ]; then\n    echo \"[$(date --utc -Ins)] Setting proxy to ${BUILDAH_HTTP_PROXY}\"\n    export HTTP_PROXY=\"${BUILDAH_HTTP_PROXY}\"\n    export HTTPS_PROXY=\"${BUILDAH_HTTP_PROXY}\"\n    export ALL_PROXY=\"${BUILDAH_HTTP_PROXY}\"\n    if [ -n \"${BUILDAH_NO_PROXY}\" ]; then\n      echo \"[$(date --utc -Ins)] Bypassing proxy for ${BUILDAH_NO_PROXY}\"\n      export NO_PROXY=\"${BUILDAH_NO_PROXY}\"\n    fi\n  fi\n}\n\nfunction unset_proxy {\n  echo \"[$(date --utc -Ins)] Unsetting proxy\"\n  unset HTTP_PROXY HTTPS_PROXY ALL_PROXY NO_PROXY\n}\n\necho \"[$(date --utc -Ins)] Validate context path\"\n\nif [ -z \"$CONTEXT\" ]; then\n  echo \"WARNING: CONTEXT is empty. Defaulting to '.' (the source directory).\" \u003e\u00262\n  CONTEXT=\".\"\nfi\n\nsource_dir_path=$(realpath \"$SOURCE_CODE_DIR\")\ncontext_dir_path=$(realpath \"$SOURCE_CODE_DIR/$CONTEXT\")\n\ncase \"$context_dir_path\" in\n\"$source_dir_path\" | \"$source_dir_path/\"*)\n  # path is valid, do nothing\n  ;;\n*)\n  echo \"ERROR: The CONTEXT parameter ('$CONTEXT') is invalid because it escapes the source directory.\" \u003e\u00262\n  echo \"Source path: $source_dir_path\" \u003e\u00262\n  echo \"Resolved path: $context_dir_path\" \u003e\u00262\n  exit 1\n  ;;\nesac\n\necho \"[$(date --utc -Ins)] Update CA trust\"\n\nca_bundle=/mnt/trusted-ca/ca-bundle.crt\nproxy_ca_bundle=/mnt/proxy-ca-bundle/ca-bundle.crt\nupdate_ca_trust=false\n\nif [ -f \"$ca_bundle\" ]; then\n  echo \"[$(date --utc -Ins)] Using mounted CA bundle: $ca_bundle\"\n  cp -vf $ca_bundle /etc/pki/ca-trust/source/anchors/ca-bundle.crt\n  update_ca_trust=true\nfi\n\nif [ -f \"$proxy_ca_bundle\" ] \u0026\u0026 [ -n \"${BUILDAH_HTTP_PROXY}\" ]; then\n  echo \"[$(date --utc -Ins)] Using mounted proxy CA bundle: $proxy_ca_bundle\"\n  cp -vf $proxy_ca_bundle /etc/pki/ca-trust/source/anchors/proxy-ca-bundle.crt\n  update_ca_trust=true\nfi\n\nif [ \"$update_ca_trust\" = \"true\" ]; then\n  update-ca-trust\nfi\n\necho \"[$(date --utc -Ins)] Prepare Dockerfile\"\n\nif [ -e \"$SOURCE_CODE_DIR/$CONTEXT/$DOCKERFILE\" ]; then\n  dockerfile_path=\"$(pwd)/$SOURCE_CODE_DIR/$CONTEXT/$DOCKERFILE\"\nelif [ -e \"$SOURCE_CODE_DIR/$DOCKERFILE\" ]; then\n  dockerfile_path=\"$(pwd)/$SOURCE_CODE_DIR/$DOCKERFILE\"\nelif [ -e \"$DOCKERFILE\" ]; then\n  # Instrumented builds (SAST) use this custom dockerfile step as their base\n  dockerfile_path=\"$DOCKERFILE\"\nelse\n  echo \"Cannot find Dockerfile $DOCKERFILE\"\n  exit 1\nfi\n\ndockerfile_copy=$(mktemp --tmpdir \"$(basename \"$dockerfile_path\").XXXXXX\")\ncp \"$dockerfile_path\" \"$dockerfile_copy\"\n\n# Inject the image content manifest into the container we are producing.\n# This will generate the content-sets.json file and copy it by appending a COPY\n# instruction to the Containerfile.\nicm_opts=()\nif [ \"${ICM_KEEP_COMPAT_LOCATION}\" = \"true\" ]; then\n  icm_opts+=(-c)\nfi\nif [ \"${SKIP_INJECTIONS}\" = \"false\" ]; then\n  inject-icm-to-containerfile \"${icm_opts[@]}\" \"$dockerfile_copy\" \"/var/workdir/cachi2/output/bom.json\" \"$SOURCE_CODE_DIR/$CONTEXT\"\nfi\n\necho \"[$(date --utc -Ins)] Prepare system (architecture: $(uname -m))\"\n\n# Fixing group permission on /var/lib/containers\nchown root:root /var/lib/containers\n\nsed -i 's/^\\s*short-name-mode\\s*=\\s*.*/short-name-mode = \"disabled\"/' /etc/containers/registries.conf\n\n# Setting new namespace to run buildah - 2^32-2\necho 'root:1:4294967294' | tee -a /etc/subuid \u003e\u003e/etc/subgid\n\nbuild_args=()\nenv_vars=()\n\nLABELS=()\nANNOTATIONS=()\n# Append any annotations from the specified file\nif [ -n \"${ANNOTATIONS_FILE}\" ] \u0026\u0026 [ -f \"${SOURCE_CODE_DIR}/${ANNOTATIONS_FILE}\" ]; then\n  echo \"Reading annotations from file: ${SOURCE_CODE_DIR}/${ANNOTATIONS_FILE}\"\n  while IFS= read -r line || [[ -n \"$line\" ]]; do\n    # Skip empty lines and comments\n    if [[ -n \"$line\" \u0026\u0026 ! \"$line\" =~ ^[[:space:]]*# ]]; then\n      ANNOTATIONS+=(\"--annotation\" \"$line\")\n    fi\n  done \u003c\"${SOURCE_CODE_DIR}/${ANNOTATIONS_FILE}\"\nfi\n\n# Split `args` into two sets of arguments.\nwhile [[ $# -gt 0 ]]; do\n  case $1 in\n  --build-args)\n    shift\n    # Note: this may result in multiple --build-arg=KEY=value flags with the same KEY being\n    # passed to buildah. In that case, the *last* occurrence takes precedence. This is why\n    # we append BUILD_ARGS after the content of the BUILD_ARGS_FILE\n    while [[ $# -gt 0 \u0026\u0026 $1 != --* ]]; do\n      build_args+=(\"$1\")\n      shift\n    done\n    ;;\n  --env)\n    shift\n    # Collect env entries of the form KEY=value\n    while [[ $# -gt 0 \u0026\u0026 $1 != --* ]]; do\n      env_vars+=(\"$1\")\n      shift\n    done\n    ;;\n  --labels)\n    shift\n    while [[ $# -gt 0 \u0026\u0026 $1 != --* ]]; do\n      LABELS+=(\"--label\" \"$1\")\n      shift\n    done\n    ;;\n  --annotations)\n    shift\n    while [[ $# -gt 0 \u0026\u0026 $1 != --* ]]; do\n      ANNOTATIONS+=(\"--annotation\" \"$1\")\n      shift\n    done\n    ;;\n  *)\n    echo \"unexpected argument: $1\" \u003e\u00262\n    exit 2\n    ;;\n  esac\ndone\n\nBUILD_ARG_FLAGS=()\nfor build_arg in \"${build_args[@]}\"; do\n  BUILD_ARG_FLAGS+=(\"--build-arg=$build_arg\")\ndone\n\nENV_FLAGS=()\nfor env_var in \"${env_vars[@]}\"; do\n  ENV_FLAGS+=(\"--env=$env_var\")\ndone\n\nDOCKERFILE_ARG_FLAGS=()\nDOCKERFILE_ARG_FLAGS+=(\"${BUILD_ARG_FLAGS[@]}\")\nDOCKERFILE_ARG_FLAGS+=(\"${ENV_FLAGS[@]}\")\n\nif [ -n \"${BUILD_ARGS_FILE}\" ]; then\n  DOCKERFILE_ARG_FLAGS+=(\"--build-arg-file=${SOURCE_CODE_DIR}/${BUILD_ARGS_FILE}\")\nfi\n\ndockerfile-json \"${DOCKERFILE_ARG_FLAGS[@]}\" \"$dockerfile_copy\" \u003e/shared/parsed_dockerfile.json\nBASE_IMAGES=$(\n  jq -r '.Stages[] | select(.From | .Stage or .Scratch | not) | .BaseName | select(test(\"^oci-archive:\") | not)' /shared/parsed_dockerfile.json |\n    tr -d '\"' |\n    tr -d \"'\"\n)\n\nBUILDAH_ARGS=()\nUNSHARE_ARGS=()\n\nif [ \"${HERMETIC}\" == \"true\" ]; then\n  BUILDAH_ARGS+=(\"--pull=never\")\n  UNSHARE_ARGS+=(\"--net\")\n  buildah_retries=3\n\n  set_proxy\n\n  for image in $BASE_IMAGES; do\n    if ! retry unshare -Ufp --keep-caps -r --map-users 1,1,65536 --map-groups 1,1,65536 --mount -- buildah pull --retry \"$buildah_retries\" \"$image\"; then\n      echo \"Failed to pull base image ${image}\"\n      exit 1\n    fi\n  done\n\n  unset_proxy\n\n  echo \"Build will be executed with network isolation\"\nfi\n\nif [ -n \"${TARGET_STAGE}\" ]; then\n  BUILDAH_ARGS+=(\"--target=${TARGET_STAGE}\")\nfi\n\nBUILDAH_ARGS+=(\"${BUILD_ARG_FLAGS[@]}\")\nBUILDAH_ARGS+=(\"${ENV_FLAGS[@]}\")\n\nif [ -n \"${BUILD_ARGS_FILE}\" ]; then\n  BUILDAH_ARGS+=(\"--build-arg-file=$(realpath \"${SOURCE_CODE_DIR}/${BUILD_ARGS_FILE}\")\")\nfi\n\n# Necessary for newer version of buildah if the host system does not contain up to date version of container-selinux\n# TODO remove the option once all hosts were updated\nBUILDAH_ARGS+=(\"--security-opt=unmask=/proc/interrupts\")\n\nif [ \"${PRIVILEGED_NESTED}\" == \"true\" ]; then\n  BUILDAH_ARGS+=(\"--security-opt=label=disable\")\n  BUILDAH_ARGS+=(\"--cap-add=all\")\n  BUILDAH_ARGS+=(\"--device=/dev/fuse\")\nfi\n\nif [ -n \"${ADD_CAPABILITIES}\" ]; then\n  BUILDAH_ARGS+=(\"--cap-add=${ADD_CAPABILITIES}\")\nfi\n\nif [ \"${SQUASH}\" == \"true\" ]; then\n  BUILDAH_ARGS+=(\"--squash\")\nfi\n\nif [ \"${SKIP_UNUSED_STAGES}\" != \"true\" ]; then\n  BUILDAH_ARGS+=(\"--skip-unused-stages=false\")\nfi\n\nif [ \"${INHERIT_BASE_IMAGE_LABELS}\" != \"true\" ]; then\n  BUILDAH_ARGS+=(\"--inherit-labels=false\")\nfi\n\nif [ -n \"${BUILDAH_SOURCE_DATE_EPOCH}\" ]; then\n  BUILDAH_ARGS+=(\"--source-date-epoch=${BUILDAH_SOURCE_DATE_EPOCH}\")\n  if [ \"${BUILDAH_REWRITE_TIMESTAMP}\" = \"true\" ]; then\n    BUILDAH_ARGS+=(\"--rewrite-timestamp\")\n  fi\n  if [ -n \"$BUILD_TIMESTAMP\" ]; then\n    echo \"ERROR: cannot use both BUILD_TIMESTAMP and SOURCE_DATE_EPOCH\"\n    exit 1\n  fi\n  # but do set it so that we get all the labels/annotations associated with it\n  BUILD_TIMESTAMP=\"$BUILDAH_SOURCE_DATE_EPOCH\"\nfi\n\nif [ \"${BUILDAH_OMIT_HISTORY}\" == \"true\" ]; then\n  BUILDAH_ARGS+=(\"--omit-history\")\nfi\n\nVOLUME_MOUNTS=()\n\necho \"[$(date --utc -Ins)] Setup prefetched\"\n\nif [ -f \"/var/workdir/cachi2/cachi2.env\" ]; then\n  # Identify the current arch to filter the prefetched content\n  PREFETCH_ARCH=\"$(uname -m)\"\n  echo \"$PREFETCH_ARCH\" \u003e/shared/prefetch-arch\n\n  echo \"Prefetched content will be made available\"\n\n  cp -r \"/var/workdir/cachi2\" /tmp/\n  chmod -R go+rwX /tmp/cachi2\n\n  # In case RPMs were prefetched and this is a multi-arch build,\n  # clean up the packages that do not match the architecture being built\n  RPM_PREFETCH_DIR=\"/tmp/cachi2/output/deps/rpm\"\n  if [ -d \"$RPM_PREFETCH_DIR\" ] \u0026\u0026 [ \"$(find $RPM_PREFETCH_DIR | wc -l)\" -gt 1 ]; then\n    echo \"Removing prefetched RPMs from non-matching architectures\"\n    PREFETCH_ARCH=\"$(uname -m)\"\n    for path in \"$RPM_PREFETCH_DIR\"/*; do\n      if [ \"$(basename \"$path\")\" != \"$PREFETCH_ARCH\" ]; then\n        echo \"Removing: $path\"\n        rm -rf \"$path\"\n      else\n        echo \"Keeping: $path\"\n      fi\n    done\n  fi\n\n  VOLUME_MOUNTS+=(--volume /tmp/cachi2:/cachi2)\n  # Read in the whole file (https://unix.stackexchange.com/questions/533277), then\n  # for each RUN ... line insert the cachi2.env command *after* any options like --mount\n  sed -E -i \\\n    -e 'H;1h;$!d;x' \\\n    -e 's@^\\s*(run((\\s|\\\\\\n)+-\\S+)*(\\s|\\\\\\n)+)@\\1. /cachi2/cachi2.env \\\u0026\\\u0026 \\\\\\n    @igM' \\\n    \"$dockerfile_copy\"\n\n  prefetched_repo_for_my_arch=\"/tmp/cachi2/output/deps/rpm/$(uname -m)/repos.d/cachi2.repo\"\n  if [ -f \"$prefetched_repo_for_my_arch\" ]; then\n    echo \"Adding $prefetched_repo_for_my_arch to $YUM_REPOS_D_FETCHED\"\n    mkdir -p \"$YUM_REPOS_D_FETCHED\"\n    if [ ! -f \"${YUM_REPOS_D_FETCHED}/cachi2.repo\" ]; then\n      cp \"$prefetched_repo_for_my_arch\" \"$YUM_REPOS_D_FETCHED\"\n    fi\n  fi\nfi\n\n# if yum repofiles stored in git, copy them to mount point outside the source dir\nif [ -d \"${SOURCE_CODE_DIR}/${YUM_REPOS_D_SRC}\" ]; then\n  mkdir -p \"${YUM_REPOS_D_FETCHED}\"\n  cp -r \"${SOURCE_CODE_DIR}/${YUM_REPOS_D_SRC}\"/* \"${YUM_REPOS_D_FETCHED}\"\nfi\n\n# if anything in the repofiles mount point (either fetched or from git), mount it\nif [ -d \"${YUM_REPOS_D_FETCHED}\" ]; then\n  chmod -R go+rwX \"${YUM_REPOS_D_FETCHED}\"\n  mount_point=$(realpath \"${YUM_REPOS_D_FETCHED}\")\n  VOLUME_MOUNTS+=(--volume \"${mount_point}:${YUM_REPOS_D_TARGET}\")\nfi\n\nDEFAULT_LABELS=(\n  \"--label\" \"architecture=$(uname -m)\"\n  \"--label\" \"vcs-type=git\"\n)\nif [ -n \"$COMMIT_SHA\" ]; then\n  DEFAULT_LABELS+=(\"--label\" \"vcs-ref=${COMMIT_SHA}\" \"--label\" \"org.opencontainers.image.revision=${COMMIT_SHA}\")\n  ANNOTATIONS+=(\"--annotation\" \"org.opencontainers.image.revision=${COMMIT_SHA}\")\nfi\nif [ -n \"$SOURCE_URL\" ]; then\n  DEFAULT_LABELS+=(\"--label\" \"org.opencontainers.image.source=${SOURCE_URL}\")\n  ANNOTATIONS+=(\"--annotation\" \"org.opencontainers.image.source=${SOURCE_URL}\")\nfi\n[ -n \"$IMAGE_EXPIRES_AFTER\" ] \u0026\u0026 DEFAULT_LABELS+=(\"--label\" \"quay.expires-after=$IMAGE_EXPIRES_AFTER\")\n\nBUILD_TIMESTAMP_RFC3339=\"\"\nif [ -n \"$BUILD_TIMESTAMP\" ]; then\n  BUILD_TIMESTAMP_RFC3339=$(date -u -d \"@$BUILD_TIMESTAMP\" +'%Y-%m-%dT%H:%M:%SZ')\nelse\n  BUILD_TIMESTAMP_RFC3339=$(date -u +'%Y-%m-%dT%H:%M:%SZ')\nfi\n\nDEFAULT_LABELS+=(\"--label\" \"build-date=${BUILD_TIMESTAMP_RFC3339}\")\nDEFAULT_LABELS+=(\"--label\" \"org.opencontainers.image.created=${BUILD_TIMESTAMP_RFC3339}\")\nANNOTATIONS+=(\"--annotation\" \"org.opencontainers.image.created=${BUILD_TIMESTAMP_RFC3339}\")\n\nlabel_pairs=()\n# If INHERIT_BASE_IMAGE_LABELS is true, get the labels from the final base image only\ntouch base_images_labels.json\nif [[ \"$INHERIT_BASE_IMAGE_LABELS\" == \"true\" ]] \u0026\u0026 [[ -n \"$BASE_IMAGES\" ]]; then\n  FINAL_BASE_IMAGE=$(\n    # Get the base image of the final stage\n    # The final stage can refer to a previous `FROM xxx AS yyy` stage, for example 'FROM bar AS foo; ... ; FROM foo; ...'\n    # Define a function that keeps nesting recursively into the parent stages until it finds the original base image\n    # Run the find_root_stage() function on the final stage\n    # If the final stage is scratch or oci-archive, return empty\n    jq -r '.Stages as $all_stages |\n      def find_root_stage($stage):\n        if $stage.From.Stage then\n          find_root_stage($all_stages[$stage.From.Stage.Index])\n        else\n          $stage\n        end;\n\n        find_root_stage(.Stages[-1]) |\n        if .From.Scratch or (.BaseName | test(\"^oci-archive:\")) then\n          empty\n        else\n          .BaseName\n        end' /shared/parsed_dockerfile.json |\n      tr -d '\"' |\n      tr -d \"'\"\n  )\n  if [[ -n \"$FINAL_BASE_IMAGE\" ]]; then\n    set_proxy\n    buildah pull \"$FINAL_BASE_IMAGE\" \u003e/dev/null$()\n    unset_proxy\n    buildah inspect \"$FINAL_BASE_IMAGE\" | jq '.OCIv1.config.Labels' \u003e\"base_images_labels.json\"\n  fi\nfi\n\n# Concatenate defaults and explicit labels. If a label appears twice, the last one wins.\nLABELS=(\"${DEFAULT_LABELS[@]}\" \"${LABELS[@]}\")\n\n# Get all the default and explicit labels so that they can be written into labels.json\nfor label in \"${LABELS[@]}\"; do\n  if [[ \"$label\" != \"--label\" ]]; then\n    label_pairs+=(\"$label\")\n  fi\ndone\n\n# Labels that we explicitly add to the image\nlabel_pairs+=(\"org.opencontainers.image.created=${BUILD_TIMESTAMP_RFC3339}\")\nlabel_pairs+=(\"io.buildah.version=$(buildah version --json | jq -r '.version')\")\n\nwhile IFS= read -r label; do\n  label_pairs+=(\"$label\")\ndone \u003c \u003c(jq -r '.Stages[].Commands[] | select(.Name == \"LABEL\") | .Labels[] | \"\\(.Key)=\\(.Value)\"' /shared/parsed_dockerfile.json | sed 's/\"//g')\n\nprintf '%s\\n' \"${label_pairs[@]}\" | jq -Rn '\n  [ inputs | select(length\u003e0) ]\n| map( split(\"=\") | {(.[0]): (.[1] // \"\")} )\n  | add' \u003e\"image_labels.json\"\n\njq -s '(.[0] // {}) * (.[1] // {})' \"base_images_labels.json\" \"image_labels.json\" \u003e\"$SOURCE_CODE_DIR/$CONTEXT/labels.json\"\n\njq '.' \"$SOURCE_CODE_DIR/$CONTEXT/labels.json\"\n\nif [ \"${SKIP_INJECTIONS}\" = \"false\" ]; then\n  echo \"\" \u003e\u003e\"$dockerfile_copy\"\n  # Always write labels.json to the new standard location\n  echo 'COPY labels.json /usr/share/buildinfo/labels.json' \u003e\u003e\"$dockerfile_copy\"\n  # Conditionally write to the old location for backward compatibility\n  if [ \"${ICM_KEEP_COMPAT_LOCATION}\" = \"true\" ]; then\n    echo 'COPY labels.json /root/buildinfo/labels.json' \u003e\u003e\"$dockerfile_copy\"\n  fi\nfi\n\n# Make sure our labels.json file isn't filtered out\ncontainerignore=\"\"\nif [ -f \"$SOURCE_CODE_DIR/$CONTEXT/.containerignore\" ]; then\n  containerignore=\"$SOURCE_CODE_DIR/$CONTEXT/.containerignore\"\nelif [ -f \"$SOURCE_CODE_DIR/$CONTEXT/.dockerignore\" ]; then\n  containerignore=\"$SOURCE_CODE_DIR/$CONTEXT/.dockerignore\"\nfi\n\nif [ -n \"$containerignore\" ]; then\n  ignorefile_copy=$(mktemp --tmpdir \"$(basename \"$containerignore\").XXXXXX\")\n  cp \"$containerignore\" \"$ignorefile_copy\"\n  {\n    echo \"\"\n    echo \"!/labels.json\"\n    echo \"!/content-sets.json\"\n  } \u003e\u003e\"$ignorefile_copy\"\n  BUILDAH_ARGS+=(--ignorefile \"$ignorefile_copy\")\nfi\n\necho \"[$(date --utc -Ins)] Register sub-man\"\n\nACTIVATION_KEY_PATH=\"/activation-key\"\nENTITLEMENT_PATH=\"/entitlement\"\n\n# 0. if hermetic=true, skip all subscription related stuff\n# 1. do not enable activation key and entitlement at same time. If both vars are provided, prefer activation key.\n# 2. Activation-keys will be used when the key 'org' exists in the activation key secret.\n# 3. try to pre-register and mount files to the correct location so that users do no need to modify Dockerfiles.\n# 3. If the Dockerfile contains the string \"subcription-manager register\", add the activation-keys volume\n#    to buildah but don't pre-register for backwards compatibility. Mount an empty directory on\n#    shared emptydir volume to \"/etc/pki/entitlement\" to prevent certificates from being included\n\nif [ \"${HERMETIC}\" != \"true\" ] \u0026\u0026 [ -e /activation-key/org ]; then\n  cp -r --preserve=mode \"$ACTIVATION_KEY_PATH\" /tmp/activation-key\n  mkdir -p /shared/rhsm/etc/pki/entitlement\n  mkdir -p /shared/rhsm/etc/pki/consumer\n\n  VOLUME_MOUNTS+=(-v /tmp/activation-key:/activation-key\n    -v /shared/rhsm/etc/pki/entitlement:/etc/pki/entitlement:Z\n    -v /shared/rhsm/etc/pki/consumer:/etc/pki/consumer:Z)\n  echo \"Adding activation key to the build\"\n\n  if ! grep -E \"^[^#]*subscription-manager.[^#]*register\" \"$dockerfile_path\"; then\n    # user is not running registration in the Containerfile: pre-register.\n    echo \"Pre-registering with subscription manager.\"\n    export RETRY_MAX_TRIES=6\n    if ! retry subscription-manager register --org \"$(cat /tmp/activation-key/org)\" --activationkey \"$(cat /tmp/activation-key/activationkey)\"; then\n      echo \"Subscription-manager register failed\"\n      exit 1\n    fi\n    unset RETRY_MAX_TRIES\n    trap 'subscription-manager unregister || true' EXIT\n\n    # copy generated certificates to /shared volume\n    cp /etc/pki/entitlement/*.pem /shared/rhsm/etc/pki/entitlement\n    cp /etc/pki/consumer/*.pem /shared/rhsm/etc/pki/consumer\n\n    # and then mount get /etc/rhsm/ca/redhat-uep.pem into /run/secrets/rhsm/ca\n    VOLUME_MOUNTS+=(--volume /etc/rhsm/ca/redhat-uep.pem:/etc/rhsm/ca/redhat-uep.pem:Z)\n  fi\n\nelif [ \"${HERMETIC}\" != \"true\" ] \u0026\u0026 find /entitlement -name \"*.pem\" \u003e/dev/null; then\n  cp -r --preserve=mode \"$ENTITLEMENT_PATH\" /tmp/entitlement\n  VOLUME_MOUNTS+=(--volume /tmp/entitlement:/etc/pki/entitlement)\n  echo \"Adding the entitlement to the build\"\nfi\n\nif [ -n \"$WORKINGDIR_MOUNT\" ]; then\n  if [[ \"$WORKINGDIR_MOUNT\" == *:* ]]; then\n    echo \"WORKINGDIR_MOUNT contains ':'\" \u003e\u00262\n    echo \"Refusing to proceed in case this is an attempt to set unexpected mount options.\" \u003e\u00262\n    exit 1\n  fi\n  # ${SOURCE_CODE_DIR}/${CONTEXT} will be the $PWD when we call 'buildah build'\n  # (we set the workdir using 'unshare -w')\n  context_dir=$(realpath \"${SOURCE_CODE_DIR}/${CONTEXT}\")\n  VOLUME_MOUNTS+=(--volume \"$context_dir:${WORKINGDIR_MOUNT}\")\nfi\n\nif [ -n \"${ADDITIONAL_VOLUME_MOUNTS-}\" ]; then\n  # ADDITIONAL_VOLUME_MOUNTS allows to specify more volumes for the build.\n  # Instrumented builds (SAST) use this step as their base and add some other tools.\n  while read -r volume_mount; do\n    VOLUME_MOUNTS+=(\"--volume=$volume_mount\")\n  done \u003c\u003c\u003c\"$ADDITIONAL_VOLUME_MOUNTS\"\nfi\n\necho \"[$(date --utc -Ins)] Add secrets\"\n\nADDITIONAL_SECRET_PATH=\"/additional-secret\"\nADDITIONAL_SECRET_TMP=\"/tmp/additional-secret\"\nif [ -d \"$ADDITIONAL_SECRET_PATH\" ]; then\n  cp -r --preserve=mode -L \"$ADDITIONAL_SECRET_PATH\" $ADDITIONAL_SECRET_TMP\n  while read -r filename; do\n    echo \"Adding the secret ${ADDITIONAL_SECRET}/${filename} to the build, available at /run/secrets/${ADDITIONAL_SECRET}/${filename}\"\n    BUILDAH_ARGS+=(\"--secret=id=${ADDITIONAL_SECRET}/${filename},src=$ADDITIONAL_SECRET_TMP/${filename}\")\n  done \u003c \u003c(find $ADDITIONAL_SECRET_TMP -maxdepth 1 -type f -exec basename {} \\;)\nfi\n\n# Prevent ShellCheck from giving a warning because 'image' is defined and 'IMAGE' is not.\ndeclare IMAGE\n\nbuildah_cmd_array=(\n  buildah build\n  \"${VOLUME_MOUNTS[@]}\"\n  \"${BUILDAH_ARGS[@]}\"\n  \"${LABELS[@]}\"\n  \"${ANNOTATIONS[@]}\"\n  --tls-verify=\"$TLSVERIFY\" --no-cache\n  --ulimit nofile=4096:4096\n  --http-proxy=false\n  -f \"$dockerfile_copy\" -t \"$IMAGE\" .\n)\nbuildah_cmd=$(printf \"%q \" \"${buildah_cmd_array[@]}\")\n\nif [ \"${HERMETIC}\" == \"true\" ]; then\n  # enabling loopback adapter enables Bazel builds to work in hermetic mode.\n  command=\"ip link set lo up \u0026\u0026 $buildah_cmd\"\nelse\n  command=\"$buildah_cmd\"\nfi\n\n# disable host subcription manager integration\nfind /usr/share/rhel/secrets -type l -exec unlink {} \\;\n\nset_proxy\n\necho \"[$(date --utc -Ins)] Run buildah build\"\necho \"[$(date --utc -Ins)] ${command}\"\n\nunshare -Uf \"${UNSHARE_ARGS[@]}\" --keep-caps -r --map-users 1,1,65536 --map-groups 1,1,65536 -w \"${SOURCE_CODE_DIR}/$CONTEXT\" --mount -- sh -c \"$command\"\n\nunset_proxy\n\necho \"[$(date --utc -Ins)] Add metadata\"\n\n# Save the SBOM produced in prefetch so it can be merged into the final SBOM later\nif [ -f \"/tmp/cachi2/output/bom.json\" ]; then\n  echo \"Making copy of sbom-prefetch.json\"\n  cp /tmp/cachi2/output/bom.json ./sbom-prefetch.json\nfi\n\ntouch /shared/base_images_digests\necho \"Recording base image digests used\"\nfor image in $BASE_IMAGES; do\n  # Get the image pullspec and filter out a tag if it is not set\n  # Use head -n 1 to ensure we only get one result even if multiple images match the filter\n  base_image_digest=$(buildah images --format '{{ .Name }}{{ if ne .Tag \"\u003cnone\u003e\" }}:{{ .Tag }}{{ end }}@{{ .Digest }}' --filter reference=\"$image\" | head -n 1)\n  # In some cases, there might be BASE_IMAGES, but not any associated digest. This happens\n  # if buildah did not use that particular image during build because it was skipped\n  if [ -n \"$base_image_digest\" ]; then\n    echo \"$image $base_image_digest\" | tee -a /shared/base_images_digests\n  fi\ndone\n\nimage_name=$(echo \"${IMAGE##*/}\" | tr ':' '-')\nbuildah push \"$IMAGE\" oci:\"/shared/$image_name.oci\"\necho \"/shared/$image_name.oci\" \u003e/shared/container_path\n\necho \"[$(date --utc -Ins)] End build\"\n",
                            "securityContext": {
                                "capabilities": {
                                    "add": [
                                        "SETFCAP"
                                    ]
                                }
                            },
                            "volumeMounts": [
                                {
                                    "mountPath": "/var/lib/containers",
                                    "name": "varlibcontainers"
                                },
                                {
                                    "mountPath": "/entitlement",
                                    "name": "etc-pki-entitlement"
                                },
                                {
                                    "mountPath": "/activation-key",
                                    "name": "activation-key"
                                },
                                {
                                    "mountPath": "/additional-secret",
                                    "name": "additional-secret"
                                },
                                {
                                    "mountPath": "/mnt/trusted-ca",
                                    "name": "trusted-ca",
                                    "readOnly": true
                                },
                                {
                                    "mountPath": "/mnt/proxy-ca-bundle",
                                    "name": "proxy-ca-bundle",
                                    "readOnly": true
                                }
                            ],
                            "workingDir": "/var/workdir"
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "HOME",
                                    "value": "/root"
                                },
                                {
                                    "name": "BUILDAH_FORMAT",
                                    "value": "docker"
                                },
                                {
                                    "name": "TASKRUN_NAME",
                                    "value": "tsf-demo-comp-on-push-8m9zl-build-container"
                                }
                            ],
                            "image": "quay.io/konflux-ci/buildah-task:latest@sha256:4c470b5a153c4acd14bf4f8731b5e36c61d7faafe09c2bf376bb81ce84aa5709",
                            "name": "push",
                            "script": "#!/bin/bash\nset -e\n\necho \"[$(date --utc -Ins)] Update CA trust\"\n\nca_bundle=/mnt/trusted-ca/ca-bundle.crt\nif [ -f \"$ca_bundle\" ]; then\n  echo \"INFO: Using mounted CA bundle: $ca_bundle\"\n  cp -vf $ca_bundle /etc/pki/ca-trust/source/anchors\n  update-ca-trust\nfi\n\necho \"[$(date --utc -Ins)] Convert image\"\n\n# While we can build images with the desired format, we will simplify any local\n# and remote build differences by just performing any necessary conversions at\n# push time.\npush_format=oci\nif [ \"${BUILDAH_FORMAT}\" == \"docker\" ]; then\n  push_format=docker\nfi\n\necho \"[$(date --utc -Ins)] Push image with unique tag\"\n\nbuildah_retries=3\n\n# Push to a unique tag based on the TaskRun name to avoid race conditions\necho \"Pushing to ${IMAGE%:*}:${TASKRUN_NAME}\"\nif ! retry buildah push \\\n  --format=\"$push_format\" \\\n  --retry \"$buildah_retries\" \\\n  --tls-verify=\"$TLSVERIFY\" \\\n  \"$IMAGE\" \\\n  \"docker://${IMAGE%:*}:${TASKRUN_NAME}\"; then\n  echo \"Failed to push sbom image to ${IMAGE%:*}:${TASKRUN_NAME}\"\n  exit 1\nfi\n\necho \"[$(date --utc -Ins)] Push image with git revision\"\n\n# Push to a tag based on the git revision\necho \"Pushing to ${IMAGE}\"\nif ! retry buildah push \\\n  --format=\"$push_format\" \\\n  --retry \"$buildah_retries\" \\\n  --tls-verify=\"$TLSVERIFY\" \\\n  --digestfile \"/var/workdir/image-digest\" \"$IMAGE\" \\\n  \"docker://$IMAGE\"; then\n  echo \"Failed to push sbom image to $IMAGE\"\n  exit 1\nfi\n\ntee \"/tekton/results/IMAGE_DIGEST\" \u003c\"/var/workdir\"/image-digest\necho -n \"$IMAGE\" | tee /tekton/results/IMAGE_URL\n{\n  echo -n \"${IMAGE}@\"\n  cat \"/var/workdir/image-digest\"\n} \u003e\"/tekton/results/IMAGE_REF\"\necho\n\n# detect if keyless signing is required\nSIGNING_CONFIG='{}'\nKFLX_CONFIG_PATH='/tmp/konflux_config.json'\nif ! RETRY_STOP_IF_STDERR_MATCHES='configmaps \"cluster-config\" not found' retry kubectl get configmap cluster-config -n konflux-info -o json \u003e\"${KFLX_CONFIG_PATH}\"; then\n  echo \"Failed to fetch konflux cluster-config, default values will be used\" \u003e\u00262\nelse\n  SIGNING_CONFIG=\"$(cat ${KFLX_CONFIG_PATH})\"\nfi\n\n# configmap key -\u003e variable name mapping\ndeclare -A SIGNING_KEY_MAP=(\n   [defaultOIDCIssuer]=SIGSTORE_OIDC_ISSUER\n   [rekorInternalUrl]=REKOR_URL\n   [fulcioInternalUrl]=SIGSTORE_FULCIO_URL\n   [tufInternalUrl]=TUF_URL\n)\n\n# fallback keys when internal URL is not available\ndeclare -A SIGNING_FALLBACK_MAP=(\n   [rekorInternalUrl]=rekorExternalUrl\n   [fulcioInternalUrl]=fulcioExternalUrl\n   [tufInternalUrl]=tufExternalUrl\n)\n\nmissing=\"\"\nconfigured=0\nfor key in \"${!SIGNING_KEY_MAP[@]}\"; do\n  val=$(echo \"${SIGNING_CONFIG}\" | jq -r \".data.${key} // empty\")\n  if [ -z \"${val}\" ] \u0026\u0026 [ -n \"${SIGNING_FALLBACK_MAP[$key]+x}\" ]; then\n    fallback_key=\"${SIGNING_FALLBACK_MAP[$key]}\"\n    val=$(echo \"${SIGNING_CONFIG}\" | jq -r \".data.${fallback_key} // empty\")\n    if [ -n \"${val}\" ]; then\n      echo \"Using fallback ${fallback_key} instead of ${key}\"\n    fi\n  fi\n  if [ -z \"${val}\" ]; then\n    missing=\"${missing:+${missing}, }${key}\"\n  else\n    declare \"${SIGNING_KEY_MAP[$key]}=${val}\"\n    configured=$((configured + 1))\n  fi\ndone\n\nif [ \"${configured}\" -eq \"${#SIGNING_KEY_MAP[@]}\" ]; then\n  echo \"Keyless signing is enabled\"\n\n  # Save signing config for upload-sbom step\n  for key in \"${!SIGNING_KEY_MAP[@]}\"; do\n    envvar=\"${SIGNING_KEY_MAP[$key]}\"\n    printf '%s=%q\\n' \"${envvar}\" \"${!envvar}\"\n  done \u003e/shared/signing-config.env\n\n  echo \"Using Rekor URL: ${REKOR_URL}\"\n  echo \"Using Fulcio URL: ${SIGSTORE_FULCIO_URL}\"\n  echo \"Using OIDC issuer: ${SIGSTORE_OIDC_ISSUER}\"\n\n  echo \"Initializing TUF root from ${TUF_URL}\"\n  if ! retry cosign initialize --root \"${TUF_URL}/root.json\" --mirror \"${TUF_URL}\"; then\n    echo \"Failed to initialize TUF root\" \u003e\u00262\n    exit 1\n  fi\n\n  # env var consumed by cosign\n  SIGSTORE_ID_TOKEN=\"$(cat /var/run/sigstore/cosign/oidc-token)\"\n  export SIGSTORE_ID_TOKEN\n\n  IMAGE_REF=\"$(cat \"/tekton/results/IMAGE_REF\")\"\n\n  # Pre-select the correct credentials to work around cosign not supporting the containers-auth.json spec\n  mkdir -p /tmp/auth \u0026\u0026 select-oci-auth \"${IMAGE_REF}\" \u003e/tmp/auth/config.json\n  export DOCKER_CONFIG=/tmp/auth\n\n  echo \"[$(date --utc -Ins)] Sign image\"\n  echo \"Signing image ${IMAGE_REF} using keyless signing\"\n  if ! retry cosign sign -y \\\n    --rekor-url=\"${REKOR_URL}\" \\\n    --fulcio-url=\"${SIGSTORE_FULCIO_URL}\" \\\n    --oidc-issuer=\"${SIGSTORE_OIDC_ISSUER}\" \\\n    \"${IMAGE_REF}\"; then\n    echo \"Failed to sign image\" \u003e\u00262\n    exit 1\n  fi\nelif [ \"${configured}\" -eq 0 ]; then\n  echo \"Keyless signing is disabled (none of ${missing} are configured in the konflux-info/cluster-config configmap)\"\nelse\n  echo \"ERROR: Incomplete keyless signing configuration in konflux-info/cluster-config configmap. Missing: ${missing}\" \u003e\u00262\n  exit 1\nfi\n\necho \"[$(date --utc -Ins)] End push\"\n",
                            "securityContext": {
                                "capabilities": {
                                    "add": [
                                        "SETFCAP"
                                    ]
                                },
                                "runAsUser": 0
                            },
                            "volumeMounts": [
                                {
                                    "mountPath": "/var/lib/containers",
                                    "name": "varlibcontainers"
                                },
                                {
                                    "mountPath": "/mnt/trusted-ca",
                                    "name": "trusted-ca",
                                    "readOnly": true
                                },
                                {
                                    "mountPath": "/var/run/sigstore/cosign",
                                    "name": "oidc-token",
                                    "readOnly": true
                                }
                            ],
                            "workingDir": "/var/workdir"
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "cpu": "256m",
                                    "memory": "512Mi"
                                },
                                "requests": {
                                    "cpu": "256m",
                                    "memory": "512Mi"
                                }
                            },
                            "image": "quay.io/konflux-ci/task-runner:1.4.1@sha256:d9feec6f2ce9b10cfb76b45ea14f83b5ed9f231de7d6083291550aebe8eb09ea",
                            "name": "sbom-syft-generate",
                            "script": "#!/bin/bash\nset -euo pipefail\necho \"[$(date --utc -Ins)] Generate SBOM\"\n\nif [ \"${SKIP_SBOM_GENERATION}\" = \"true\" ]; then\n  echo \"Skipping SBOM generation\"\n  exit 0\nfi\n\ncase $SBOM_TYPE in\ncyclonedx)\n  syft_sbom_type=cyclonedx-json@1.5\n  ;;\nspdx)\n  syft_sbom_type=spdx-json@2.3\n  ;;\n*)\n  echo \"Invalid SBOM type: $SBOM_TYPE. Valid: cyclonedx, spdx\" \u003e\u00262\n  exit 1\n  ;;\nesac\n\nOCI_DIR=\"$(cat /shared/container_path)\"\n\nsyft_oci_args=(\n  oci-dir:\"${OCI_DIR}\"\n  --output \"$syft_sbom_type=/var/workdir/sbom-image.json\"\n)\nsyft_source_args=(\n  dir:\"/var/workdir/$SOURCE_CODE_DIR/$CONTEXT\"\n  --output \"$syft_sbom_type=/var/workdir/sbom-source.json\"\n)\n\nif [ \"${SBOM_SYFT_SELECT_CATALOGERS}\" != \"\" ]; then\n  syft_oci_args+=(--select-catalogers \"${SBOM_SYFT_SELECT_CATALOGERS}\")\n  syft_source_args+=(--select-catalogers \"${SBOM_SYFT_SELECT_CATALOGERS}\")\nfi\n\necho \"Running syft on the image\"\nsyft \"${syft_oci_args[@]}\"\nif [[ \"${HERMETIC}\" == \"false\" \u0026\u0026 \"${SBOM_SOURCE_SCAN_ENABLED}\" == \"true\" ]]; then\n  echo \"Running syft on the source code\"\n  syft \"${syft_source_args[@]}\"\nelse\n  echo \"Skipping syft on source code.\"\nfi\n\necho \"[$(date --utc -Ins)] End sbom-syft-generate\"\n",
                            "securityContext": {
                                "runAsUser": 0
                            },
                            "volumeMounts": [
                                {
                                    "mountPath": "/var/lib/containers",
                                    "name": "varlibcontainers"
                                },
                                {
                                    "mountPath": "/shared",
                                    "name": "shared"
                                },
                                {
                                    "mountPath": "/etc/pki/tls/certs/ca-custom-bundle.crt",
                                    "name": "trusted-ca",
                                    "readOnly": true,
                                    "subPath": "ca-bundle.crt"
                                }
                            ],
                            "workingDir": "/var/workdir/source"
                        },
                        {
                            "args": [
                                "--additional-base-images"
                            ],
                            "computeResources": {
                                "limits": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "image": "quay.io/konflux-ci/mobster:1.2.0-1774868067@sha256:2e00c2f0aeff55713150b51822013327ea0e0d75b8164a52f837fb297c17703d",
                            "name": "prepare-sboms",
                            "script": "#!/bin/bash\nset -euo pipefail\n\necho \"[$(date --utc -Ins)] Prepare SBOM\"\n\nif [ \"${SKIP_SBOM_GENERATION}\" = \"true\" ]; then\n  echo \"Skipping SBOM generation\"\n  exit 0\nfi\n\n# Convert Tekton array params into Mobster params\nADDITIONAL_BASE_IMAGES=()\nwhile [[ $# -gt 0 ]]; do\n  case $1 in\n  --additional-base-images)\n    shift\n    while [[ $# -gt 0 \u0026\u0026 $1 != --* ]]; do\n      ADDITIONAL_BASE_IMAGES+=(\"$1\")\n      shift\n    done\n    ;;\n  *)\n    echo \"unexpected argument: $1\" \u003e\u00262\n    exit 2\n    ;;\n  esac\ndone\n\nIMAGE_URL=\"$(cat \"/tekton/results/IMAGE_URL\")\"\nIMAGE_DIGEST=\"$(cat \"/tekton/results/IMAGE_DIGEST\")\"\n\necho \"[$(date --utc -Ins)] Generate SBOM with mobster\"\n\nmobster_args=(\n  generate\n  --output sbom.json\n)\n\n# Validation is a flag for `generate`, not `oci-image`, so we need to\n# handle it before the oci-image arguments\nif [ \"${SBOM_SKIP_VALIDATION}\" == \"true\" ]; then\n  echo \"Skipping SBOM validation\"\n  mobster_args+=(--skip-validation)\nfi\n\nmobster_args+=(\n  oci-image\n  --from-syft \"/var/workdir/sbom-image.json\"\n  --image-pullspec \"$IMAGE_URL\"\n  --image-digest \"$IMAGE_DIGEST\"\n  --parsed-dockerfile-path \"/shared/parsed_dockerfile.json\"\n  --base-image-digest-file \"/shared/base_images_digests\"\n)\n\nif [ -f \"/var/workdir/sbom-source.json\" ]; then\n  mobster_args+=(--from-syft \"/var/workdir/sbom-source.json\")\nfi\n\nif [ -f \"/var/workdir/sbom-prefetch.json\" ]; then\n  mobster_args+=(--from-hermeto \"/var/workdir/sbom-prefetch.json\")\nfi\n\nif [ -n \"${TARGET_STAGE}\" ]; then\n  mobster_args+=(--dockerfile-target \"${TARGET_STAGE}\")\nfi\n\nfor ADDITIONAL_BASE_IMAGE in \"${ADDITIONAL_BASE_IMAGES[@]}\"; do\n  mobster_args+=(--additional-base-image \"$ADDITIONAL_BASE_IMAGE\")\ndone\n\nif [ \"${CONTEXTUALIZE_SBOM}\" == \"true\" ] \u0026\u0026 [ \"${HERMETIC}\" == \"false\" ]; then\n  mobster_args+=(--contextualize)\nfi\n\nif [ -f \"/shared/prefetch-arch\" ]; then\n  mobster_args+=(--arch \"$(cat /shared/prefetch-arch)\")\nfi\n\nmobster \"${mobster_args[@]}\"\n\necho \"[$(date --utc -Ins)] End prepare-sboms\"\n",
                            "securityContext": {
                                "runAsUser": 0
                            },
                            "workingDir": "/var/workdir"
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "cpu": "100m",
                                    "memory": "512Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "512Mi"
                                }
                            },
                            "image": "quay.io/konflux-ci/task-runner:1.4.1@sha256:d9feec6f2ce9b10cfb76b45ea14f83b5ed9f231de7d6083291550aebe8eb09ea",
                            "name": "upload-sbom",
                            "script": "#!/bin/bash\nset -euo pipefail\n\necho \"[$(date --utc -Ins)] Upload SBOM\"\n\nif [ \"${SKIP_SBOM_GENERATION}\" = \"true\" ]; then\n  echo \"Skipping SBOM generation\"\n  exit 0\nfi\n\nca_bundle=/mnt/trusted-ca/ca-bundle.crt\nif [ -f \"$ca_bundle\" ]; then\n  echo \"INFO: Using mounted CA bundle: $ca_bundle\"\n  cp -vf $ca_bundle /etc/pki/ca-trust/source/anchors\n  update-ca-trust\nfi\n\n# Pre-select the correct credentials to work around cosign not supporting the containers-auth.json spec\nmkdir -p /tmp/auth \u0026\u0026 select-oci-auth \"$(cat \"/tekton/results/IMAGE_REF\")\" \u003e/tmp/auth/config.json\nexport DOCKER_CONFIG=/tmp/auth\necho \"Pushing sbom to registry\"\nif ! retry cosign attach sbom --sbom sbom.json --type \"$SBOM_TYPE\" \"$(cat \"/tekton/results/IMAGE_REF\")\"; then\n  echo \"Failed to push sbom to registry\"\n  exit 1\nfi\n\n# Remove tag from IMAGE while allowing registry to contain a port number.\nsbom_repo=\"${IMAGE%:*}\"\nsbom_digest=\"$(sha256sum sbom.json | cut -d' ' -f1)\"\n# The SBOM_BLOB_URL is created by `cosign attach sbom`.\necho -n \"${sbom_repo}@sha256:${sbom_digest}\" | tee \"/tekton/results/SBOM_BLOB_URL\"\n\nif [ -f \"/shared/signing-config.env\" ]; then\n  # shellcheck source=/dev/null\n  source /shared/signing-config.env\n\n  echo \"Initializing TUF root from ${TUF_URL}\"\n  if ! retry cosign initialize --root \"${TUF_URL}/root.json\" --mirror \"${TUF_URL}\"; then\n    echo \"Failed to initialize TUF root\" \u003e\u00262\n    exit 1\n  fi\n\n  # env var consumed by cosign\n  SIGSTORE_ID_TOKEN=\"$(cat /var/run/sigstore/cosign/oidc-token)\"\n  export SIGSTORE_ID_TOKEN\n\n  IMAGE_REF=\"$(cat \"/tekton/results/IMAGE_REF\")\"\n\n  ATT_SBOM_TYPE=\"${SBOM_TYPE}\"\n  if [ \"${ATT_SBOM_TYPE}\" = \"spdx\" ]; then\n    # for format cossistency with cyclonedx format, we want to use spdxjson instad of spdx\n    # spdx export data as rawstring, we want structured json as cyclonedx\n    ATT_SBOM_TYPE=\"spdxjson\"\n  fi\n\n  echo \"[$(date --utc -Ins)] Sign SBOM\"\n  echo \"Signing and attaching SBOM to ${IMAGE_REF} using keyless signing\"\n  if ! retry cosign attest -y --type \"${ATT_SBOM_TYPE}\" --predicate sbom.json \\\n    --rekor-url=\"${REKOR_URL}\" \\\n    --fulcio-url=\"${SIGSTORE_FULCIO_URL}\" \\\n    --oidc-issuer=\"${SIGSTORE_OIDC_ISSUER}\" \\\n    \"${IMAGE_REF}\"; then\n    echo \"Failed to sign SBOM\" \u003e\u00262\n    exit 1\n  fi\nfi\n\necho\necho \"[$(date --utc -Ins)] End upload-sbom\"\n",
                            "securityContext": {
                                "runAsNonRoot": false,
                                "runAsUser": 0
                            },
                            "volumeMounts": [
                                {
                                    "mountPath": "/mnt/trusted-ca",
                                    "name": "trusted-ca",
                                    "readOnly": true
                                },
                                {
                                    "mountPath": "/var/run/sigstore/cosign",
                                    "name": "oidc-token",
                                    "readOnly": true
                                }
                            ],
                            "workingDir": "/var/workdir"
                        }
                    ],
                    "volumes": [
                        {
                            "name": "activation-key",
                            "secret": {
                                "optional": true,
                                "secretName": "activation-key"
                            }
                        },
                        {
                            "name": "additional-secret",
                            "secret": {
                                "optional": true,
                                "secretName": "does-not-exist"
                            }
                        },
                        {
                            "name": "etc-pki-entitlement",
                            "secret": {
                                "optional": true,
                                "secretName": "etc-pki-entitlement"
                            }
                        },
                        {
                            "name": "oidc-token",
                            "projected": {
                                "sources": [
                                    {
                                        "serviceAccountToken": {
                                            "audience": "sigstore",
                                            "expirationSeconds": 600,
                                            "path": "oidc-token"
                                        }
                                    }
                                ]
                            }
                        },
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "caching-ca-bundle",
                                "optional": true
                            },
                            "name": "proxy-ca-bundle"
                        },
                        {
                            "emptyDir": {},
                            "name": "shared"
                        },
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        },
                        {
                            "emptyDir": {},
                            "name": "varlibcontainers"
                        },
                        {
                            "emptyDir": {},
                            "name": "workdir"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.openshift.io/repo": "https://github.com/rhads-tsf-qe/testrepo?rev=c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "build.appstudio.redhat.com/commit_sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "build.appstudio.redhat.com/target_branch": "base-uovnpl",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=16",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "pipelinesascode.tekton.dev/branch": "base-uovnpl",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552388922",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-ahlxga",
                    "pipelinesascode.tekton.dev/git-provider": "github",
                    "pipelinesascode.tekton.dev/installation-id": "112348674",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-push-8m9zl",
                    "pipelinesascode.tekton.dev/max-keep-runs": "3",
                    "pipelinesascode.tekton.dev/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-uovnpl\"",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-ci-tests-bot",
                    "pipelinesascode.tekton.dev/sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pipelinesascode.tekton.dev/sha-title": "Merge pull request #180 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pipelinesascode.tekton.dev/source-branch": "refs/heads/base-uovnpl",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-tenant/results/3a69c030-be51-40ae-9a05-5b5733b01f62/records/5c63fa3c-783f-4fb7-8035-1704ae10858e",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"testrepo\",\"commit\":\"c4481f5e1453d8c204c7bae0f626b245e6bf6525\",\"eventType\":\"push\"}",
                    "results.tekton.dev/result": "default-tenant/results/3a69c030-be51-40ae-9a05-5b5733b01f62",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "image-build, konflux"
                },
                "creationTimestamp": "2026-04-15T23:19:53Z",
                "finalizers": [
                    "results.tekton.dev/taskrun",
                    "chains.tekton.dev"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/version": "v0.37.7",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/component": "tsf-demo-comp",
                    "build.appstudio.redhat.com/build_type": "docker",
                    "pipelines.appstudio.openshift.io/type": "build",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552388922",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "tsf-demo-comp-on-push-8m9zl",
                    "tekton.dev/pipelineRun": "tsf-demo-comp-on-push-8m9zl",
                    "tekton.dev/pipelineRunUID": "3a69c030-be51-40ae-9a05-5b5733b01f62",
                    "tekton.dev/pipelineTask": "build-image-index",
                    "tekton.dev/task": "build-image-index-min"
                },
                "name": "tsf-demo-comp-on-push-8m9zl-build-image-index",
                "namespace": "default-tenant",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "tsf-demo-comp-on-push-8m9zl",
                        "uid": "3a69c030-be51-40ae-9a05-5b5733b01f62"
                    }
                ],
                "resourceVersion": "36692",
                "uid": "5c63fa3c-783f-4fb7-8035-1704ae10858e"
            },
            "spec": {
                "params": [
                    {
                        "name": "IMAGE",
                        "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525"
                    },
                    {
                        "name": "COMMIT_SHA",
                        "value": "c4481f5e1453d8c204c7bae0f626b245e6bf6525"
                    },
                    {
                        "name": "IMAGE_EXPIRES_AFTER",
                        "value": ""
                    },
                    {
                        "name": "ALWAYS_BUILD_INDEX",
                        "value": "false"
                    },
                    {
                        "name": "IMAGES",
                        "value": [
                            "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525@sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6"
                        ]
                    },
                    {
                        "name": "BUILDAH_FORMAT",
                        "value": "docker"
                    }
                ],
                "serviceAccountName": "build-pipeline-tsf-demo-comp",
                "taskRef": {
                    "params": [
                        {
                            "name": "name",
                            "value": "build-image-index-min"
                        },
                        {
                            "name": "bundle",
                            "value": "quay.io/konflux-ci/tekton-catalog/task-build-image-index-min:0.2@sha256:79b412747e07caf80cace222ef8ee7e7955676f7928b893ed39c107f4ec62bf3"
                        },
                        {
                            "name": "kind",
                            "value": "task"
                        }
                    ],
                    "resolver": "bundles"
                },
                "timeout": "1h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:19:59Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:19:59Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "tsf-demo-comp-on-push-8m9zl-build-image-index-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha256": "79b412747e07caf80cace222ef8ee7e7955676f7928b893ed39c107f4ec62bf3"
                        },
                        "entryPoint": "build-image-index-min",
                        "uri": "quay.io/konflux-ci/tekton-catalog/task-build-image-index-min"
                    }
                },
                "results": [
                    {
                        "name": "IMAGES",
                        "type": "string",
                        "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6"
                    },
                    {
                        "name": "IMAGE_DIGEST",
                        "type": "string",
                        "value": "sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6"
                    },
                    {
                        "name": "IMAGE_URL",
                        "type": "string",
                        "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525"
                    }
                ],
                "startTime": "2026-04-15T23:19:53Z",
                "steps": [
                    {
                        "container": "step-build",
                        "imageID": "quay.io/konflux-ci/buildah-task@sha256:3bd8b2c9f2b809bd86457cbe8411051b5a000f312b5e48cab63ab288bf6bf330",
                        "name": "build",
                        "terminated": {
                            "containerID": "cri-o://dd2e388992185c18e24a266c8bd202462ccb7aef130460ad6c543d8c946dde88",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:19:58Z",
                            "message": "[{\"key\":\"IMAGES\",\"value\":\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6\",\"type\":1},{\"key\":\"IMAGE_DIGEST\",\"value\":\"sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6\",\"type\":1},{\"key\":\"IMAGE_URL\",\"value\":\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:19:58Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-create-sbom",
                        "imageID": "quay.io/konflux-ci/mobster@sha256:2e00c2f0aeff55713150b51822013327ea0e0d75b8164a52f837fb297c17703d",
                        "name": "create-sbom",
                        "terminated": {
                            "containerID": "cri-o://23280b1fd152a6caba41f995557044d404e8d2ac4e9d2240d0398b352b596001",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:19:58Z",
                            "message": "[{\"key\":\"IMAGES\",\"value\":\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6\",\"type\":1},{\"key\":\"IMAGE_DIGEST\",\"value\":\"sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6\",\"type\":1},{\"key\":\"IMAGE_URL\",\"value\":\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:19:58Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-upload-sbom",
                        "imageID": "quay.io/konflux-ci/task-runner@sha256:b22b989da3c95cb0af862eeb82531ed4f687e948ca5fb6b965d1ea8fbd5054ce",
                        "name": "upload-sbom",
                        "terminated": {
                            "containerID": "cri-o://90402d0c2c17011a8337c96ff77b9248cb5221641b634efdce44f2bdc1a58e80",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:19:59Z",
                            "message": "[{\"key\":\"IMAGES\",\"value\":\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6\",\"type\":1},{\"key\":\"IMAGE_DIGEST\",\"value\":\"sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6\",\"type\":1},{\"key\":\"IMAGE_URL\",\"value\":\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:19:59Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "This takes existing Image Manifests and combines them in an Image Index.",
                    "params": [
                        {
                            "description": "The target image and tag where the image will be pushed to.",
                            "name": "IMAGE",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Verify the TLS on the registry endpoint (for push/pull to a non-TLS registry)",
                            "name": "TLSVERIFY",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "The commit the image is built from.",
                            "name": "COMMIT_SHA",
                            "type": "string"
                        },
                        {
                            "description": "List of Image Manifests to be referenced by the Image Index",
                            "name": "IMAGES",
                            "type": "array"
                        },
                        {
                            "default": "",
                            "description": "Delete image tag after specified time resulting in garbage collection of the digest. Empty means to keep the image tag. Time values could be something like 1h, 2d, 3w for hours, days, and weeks, respectively.",
                            "name": "IMAGE_EXPIRES_AFTER",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Build an image index even if IMAGES is of length 1. Default true. If the image index generation is skipped, the task will forward values for params.IMAGES[0] to results.IMAGE_*. In order to properly set all results, use the repository:tag@sha256:digest format for the IMAGES parameter.",
                            "name": "ALWAYS_BUILD_INDEX",
                            "type": "string"
                        },
                        {
                            "default": "vfs",
                            "description": "Storage driver to configure for buildah",
                            "name": "STORAGE_DRIVER",
                            "type": "string"
                        },
                        {
                            "default": "oci",
                            "description": "The format for the resulting image's mediaType. Valid values are oci (default) or docker.",
                            "name": "BUILDAH_FORMAT",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Flag to enable or disable SBOM validation before save. Validation is optional - use this if you are experiencing performance issues.",
                            "name": "SBOM_SKIP_VALIDATION",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from",
                            "name": "caTrustConfigMapName",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data",
                            "name": "caTrustConfigMapKey",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Digest of the image just built",
                            "name": "IMAGE_DIGEST",
                            "type": "string"
                        },
                        {
                            "description": "Image repository and tag where the built image was pushed",
                            "name": "IMAGE_URL",
                            "type": "string"
                        },
                        {
                            "description": "List of all referenced image manifests",
                            "name": "IMAGES",
                            "type": "string"
                        },
                        {
                            "description": "Image reference of the built image containing both the repository and the digest",
                            "name": "IMAGE_REF",
                            "type": "string"
                        },
                        {
                            "description": "Reference of SBOM blob digest to enable digest-based verification from provenance",
                            "name": "SBOM_BLOB_URL",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "BUILDAH_FORMAT",
                                "value": "docker"
                            },
                            {
                                "name": "COMMIT_SHA",
                                "value": "c4481f5e1453d8c204c7bae0f626b245e6bf6525"
                            },
                            {
                                "name": "IMAGE",
                                "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525"
                            },
                            {
                                "name": "TLSVERIFY",
                                "value": "true"
                            },
                            {
                                "name": "ALWAYS_BUILD_INDEX",
                                "value": "false"
                            },
                            {
                                "name": "STORAGE_DRIVER",
                                "value": "vfs"
                            }
                        ],
                        "volumeMounts": [
                            {
                                "mountPath": "/index-build-data",
                                "name": "shared-dir"
                            },
                            {
                                "mountPath": "/mnt/trusted-ca",
                                "name": "trusted-ca",
                                "readOnly": true
                            }
                        ]
                    },
                    "steps": [
                        {
                            "args": [
                                "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525@sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6"
                            ],
                            "computeResources": {
                                "limits": {
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "image": "quay.io/konflux-ci/buildah-task:latest@sha256:4c470b5a153c4acd14bf4f8731b5e36c61d7faafe09c2bf376bb81ce84aa5709",
                            "name": "build",
                            "script": "#!/bin/bash\n# Fixing group permission on /var/lib/containers\nset -eu\nset -o pipefail\nchown root:root /var/lib/containers\n\nsed -i 's/^\\s*short-name-mode\\s*=\\s*.*/short-name-mode = \"disabled\"/' /etc/containers/registries.conf\n\necho \"[$(date --utc -Ins)] Update CA trust\"\n\nca_bundle=/mnt/trusted-ca/ca-bundle.crt\nif [ -f \"$ca_bundle\" ]; then\n  echo \"INFO: Using mounted CA bundle: $ca_bundle\"\n  cp -vf $ca_bundle /etc/pki/ca-trust/source/anchors\n  update-ca-trust\nfi\n\nif [[ $# -ne 1 \u0026\u0026 \"$ALWAYS_BUILD_INDEX\" != \"true\" ]]; then\n  echo \"Skipping image index generation while supplying multiple image inputs is unsupported.\"\n  exit 2\nfi\n\nbuildah manifest create \"$IMAGE\"\nfor i in $@\ndo\n  TOADD=\"$i\"\n  TOADD_URL=\"$(echo \"$i\" | cut -d@ -f1)\"\n  TOADD_DIGEST=\"$(echo \"$i\" | cut -d@ -f2)\"\n  if [[ $(echo \"$i\" | tr -cd \":\" | wc -c) == 2 ]]; then\n    #format is repository:tag@sha256:digest\n    #we need to remove the tag, and just reference the digest\n    #as tag + digest is not supported\n    TOADD_REPOSITORY=\"$(echo \"$i\" | cut -d: -f1)\"\n    TOADD=\"${TOADD_REPOSITORY}@${TOADD_DIGEST}\"\n  fi\n  if [[ \"$ALWAYS_BUILD_INDEX\" != \"true\" ]]; then\n    echo \"Skipping image index generation. Returning results for $TOADD.\"\n    echo -n \"${TOADD_URL}\" \u003e \"/tekton/results/IMAGE_URL\"\n    echo -n \"${TOADD_DIGEST}\" \u003e \"/tekton/results/IMAGE_DIGEST\"\n    echo -n \"${TOADD}\" \u003e \"/tekton/results/IMAGES\"\n    exit 0\n  fi\n\n  echo \"Adding $TOADD\"\n  buildah manifest add $IMAGE \"docker://$TOADD\" --all\ndone\n\necho \"Validating format consistency\"\nINCOMPATIBLE_STRING=\"vnd.oci.image.manifest\"\nINCOMPATIBLE_NAME=\"oci\"\nif [ \"$BUILDAH_FORMAT\" == \"oci\" ]; then\n  INCOMPATIBLE_STRING=\"vnd.docker.distribution.manifest\"\n  INCOMPATIBLE_NAME=\"docker\"\nfi\n\n# If mismatched formats (e.g., Docker manifests within an OCI index) exist locally, 'buildah push'\n# converts the inner manifests to match the target BUILDAH_FORMAT.\n# This alters the digests and breaks the link to the attached SBOMs.\nMANIFEST_MEDIA_TYPES=$(buildah manifest inspect \"$IMAGE\" | jq -er '.manifests[].mediaType')\nif echo \"$MANIFEST_MEDIA_TYPES\" | grep -q \"$INCOMPATIBLE_STRING\"; then\n  echo \"ERROR: Platform image contains $INCOMPATIBLE_NAME format, but index will be $BUILDAH_FORMAT\"\n  echo \"This will cause digest changes and break SBOM accessibility.\"\n  echo \"Ensure all platform images are built with buildah-format: $BUILDAH_FORMAT\"\n  exit 1\nfi\n\n# While the BUILDAH_FORMAT environment variable can define the push\n# format, lets be explicit about the format that we want when we push.\npush_format=oci\nif [ \"${BUILDAH_FORMAT}\" == \"docker\" ]; then\n  push_format=docker\nfi\n\nbuildah_retries=3\n\necho \"Pushing image to registry\"\nif ! retry buildah manifest push \\\n  --format=\"$push_format\" \\\n  --retry \"$buildah_retries\" \\\n  --tls-verify=\"$TLSVERIFY\" \\\n  --digestfile image-digest \\\n  \"$IMAGE\" \\\n  \"docker://$IMAGE\"\nthen\n    echo \"Failed to push image ${IMAGE} to registry\"\n    exit 1\nfi\n\necho \"Pushing image to registry\"\nif ! retry buildah manifest push \\\n  --format=\"$push_format\" \\\n  --retry \"$buildah_retries\" \\\n  --tls-verify=\"$TLSVERIFY\" \\\n  --digestfile image-digest \\\n  \"$IMAGE\" \\\n  \"docker://${IMAGE%:*}:tsf-demo-comp-on-push-8m9zl-build-image-index\"\nthen\n    echo \"Failed to push image ${IMAGE%:*}:tsf-demo-comp-on-push-8m9zl-build-image-index to registry\"\n    exit 1\nfi\n\nINDEX_REPOSITORY=\"$(echo \"$IMAGE\" | cut -d@ -f1 | cut -d: -f1)\"\nMANIFEST_DIGESTS=$(buildah manifest inspect \"$IMAGE\" | jq -er \".manifests[].digest\")\nimage_manifests=\"\"\nfor i in $MANIFEST_DIGESTS\ndo\n  image_manifests=\"${image_manifests} ${INDEX_REPOSITORY}@${i},\"\ndone\n\ntee \"/tekton/results/IMAGE_DIGEST\" \u003c image-digest\necho -n \"$IMAGE\" | tee \"/tekton/results/IMAGE_URL\"\n{\n  echo -n \"${IMAGE}@\"\n  cat \"image-digest\"\n} \u003e \"/tekton/results/IMAGE_REF\"\necho -n \"${image_manifests:1:-1}\" \u003e \"/tekton/results/IMAGES\"\n\n# buildah manifest inspect will always give precedence to the local image.\n# Since we built this image in the same place as we are inspecting it, we can\n# just inspect it instead of finding the digest and inspecting the remote image.\nbuildah manifest inspect \"$IMAGE\" \u003e /index-build-data/manifest_data.json\n",
                            "securityContext": {
                                "capabilities": {
                                    "add": [
                                        "SETFCAP"
                                    ]
                                }
                            }
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "image": "quay.io/konflux-ci/mobster:1.2.0-1774868067@sha256:2e00c2f0aeff55713150b51822013327ea0e0d75b8164a52f837fb297c17703d",
                            "name": "create-sbom",
                            "script": "#!/bin/bash\nset -e\n\nMANIFEST_DATA_FILE=\"/index-build-data/manifest_data.json\"\nif [ ! -f \"$MANIFEST_DATA_FILE\" ]; then\n  echo \"The manifest_data.json file does not exist. Skipping the SBOM creation...\"\n  exit 0\nfi\n\nIMAGE_URL=\"$(cat \"/tekton/results/IMAGE_URL\")\"\nIMAGE_DIGEST=\"$(cat \"/tekton/results/IMAGE_DIGEST\")\"\necho \"Creating SBOM result file...\"\nmobster_args=(generate --output /index-build-data/index.spdx.json)\n\nif [ \"${SBOM_SKIP_VALIDATION}\" == \"true\" ]; then\n  echo \"Skipping SBOM validation\"\n  mobster_args+=(--skip-validation)\nfi\n\nmobster_args+=(\n  oci-index\n  --index-image-pullspec \"$IMAGE_URL\"\n  --index-image-digest \"$IMAGE_DIGEST\"\n  --index-manifest-path \"$MANIFEST_DATA_FILE\"\n)\nmobster \"${mobster_args[@]}\"\n"
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "image": "quay.io/konflux-ci/task-runner:1.4.1@sha256:d9feec6f2ce9b10cfb76b45ea14f83b5ed9f231de7d6083291550aebe8eb09ea",
                            "name": "upload-sbom",
                            "script": "#!/bin/bash\nset -e\n\necho \"[$(date --utc -Ins)] Update CA trust\"\n\nca_bundle=/mnt/trusted-ca/ca-bundle.crt\nif [ -f \"$ca_bundle\" ]; then\n  echo \"INFO: Using mounted CA bundle: $ca_bundle\"\n  cp -vf $ca_bundle /etc/pki/ca-trust/source/anchors\n  update-ca-trust\nfi\n\nSBOM_RESULT_FILE=\"/index-build-data/index.spdx.json\"\nif [ ! -f \"$SBOM_RESULT_FILE\" ]; then\n  echo \"The index.spdx.json file does not exists. Skipping the SBOM upload...\"\n  exit 0\nfi\n\n# Pre-select the correct credentials to work around cosign not supporting the containers-auth.json spec\nmkdir -p /tmp/auth \u0026\u0026 select-oci-auth \"$(cat \"/tekton/results/IMAGE_REF\")\" \u003e /tmp/auth/config.json\nexport DOCKER_CONFIG=/tmp/auth\n\necho \"Pushing sbom to registry\"\nif ! retry cosign attach sbom --sbom \"$SBOM_RESULT_FILE\" --type spdx \"$(cat \"/tekton/results/IMAGE_REF\")\"\nthen\n    echo \"Failed to push sbom to registry\"\n    exit 1\nfi\n\n# Remove tag from IMAGE while allowing registry to contain a port number.\nsbom_repo=\"${IMAGE%:*}\"\nsbom_digest=\"$(sha256sum \"$SBOM_RESULT_FILE\" | cut -d' ' -f1)\"\n# The SBOM_BLOB_URL is created by `cosign attach sbom`.\necho -n \"${sbom_repo}@sha256:${sbom_digest}\" | tee \"/tekton/results/SBOM_BLOB_URL\"\n",
                            "securityContext": {
                                "runAsNonRoot": false,
                                "runAsUser": 0
                            }
                        }
                    ],
                    "volumes": [
                        {
                            "emptyDir": {},
                            "name": "shared-dir"
                        },
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.openshift.io/repo": "https://github.com/rhads-tsf-qe/testrepo?rev=c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "build.appstudio.redhat.com/commit_sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "build.appstudio.redhat.com/target_branch": "base-uovnpl",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=34",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "pipelinesascode.tekton.dev/branch": "base-uovnpl",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552388922",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-ahlxga",
                    "pipelinesascode.tekton.dev/git-provider": "github",
                    "pipelinesascode.tekton.dev/installation-id": "112348674",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-push-8m9zl",
                    "pipelinesascode.tekton.dev/max-keep-runs": "3",
                    "pipelinesascode.tekton.dev/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-uovnpl\"",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-ci-tests-bot",
                    "pipelinesascode.tekton.dev/sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pipelinesascode.tekton.dev/sha-title": "Merge pull request #180 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pipelinesascode.tekton.dev/source-branch": "refs/heads/base-uovnpl",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-tenant/results/3a69c030-be51-40ae-9a05-5b5733b01f62/records/2bb64ce0-c5cb-4e5f-b327-44959bd7f8c8",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"testrepo\",\"commit\":\"c4481f5e1453d8c204c7bae0f626b245e6bf6525\",\"eventType\":\"push\"}",
                    "results.tekton.dev/result": "default-tenant/results/3a69c030-be51-40ae-9a05-5b5733b01f62",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "konflux"
                },
                "creationTimestamp": "2026-04-15T23:19:59Z",
                "finalizers": [
                    "chains.tekton.dev",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/version": "v0.37.7",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/component": "tsf-demo-comp",
                    "pipelines.appstudio.openshift.io/type": "build",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552388922",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "tsf-demo-comp-on-push-8m9zl",
                    "tekton.dev/pipelineRun": "tsf-demo-comp-on-push-8m9zl",
                    "tekton.dev/pipelineRunUID": "3a69c030-be51-40ae-9a05-5b5733b01f62",
                    "tekton.dev/pipelineTask": "clair-scan",
                    "tekton.dev/task": "clair-scan-min"
                },
                "name": "tsf-demo-comp-on-push-8m9zl-clair-scan",
                "namespace": "default-tenant",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "tsf-demo-comp-on-push-8m9zl",
                        "uid": "3a69c030-be51-40ae-9a05-5b5733b01f62"
                    }
                ],
                "resourceVersion": "40253",
                "uid": "2bb64ce0-c5cb-4e5f-b327-44959bd7f8c8"
            },
            "spec": {
                "params": [
                    {
                        "name": "image-digest",
                        "value": "sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6"
                    },
                    {
                        "name": "image-url",
                        "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525"
                    }
                ],
                "serviceAccountName": "build-pipeline-tsf-demo-comp",
                "taskRef": {
                    "params": [
                        {
                            "name": "name",
                            "value": "clair-scan-min"
                        },
                        {
                            "name": "bundle",
                            "value": "quay.io/konflux-ci/tekton-catalog/task-clair-scan-min:0.3@sha256:c117d0fd0b5413b5addb014027f06b1ea2c39c8e962876810c40c7baf5b54e72"
                        },
                        {
                            "name": "kind",
                            "value": "task"
                        }
                    ],
                    "resolver": "bundles"
                },
                "timeout": "1h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:24:51Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:24:51Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "tsf-demo-comp-on-push-8m9zl-clair-scan-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha256": "c117d0fd0b5413b5addb014027f06b1ea2c39c8e962876810c40c7baf5b54e72"
                        },
                        "entryPoint": "clair-scan-min",
                        "uri": "quay.io/konflux-ci/tekton-catalog/task-clair-scan-min"
                    }
                },
                "results": [
                    {
                        "name": "IMAGES_PROCESSED",
                        "type": "string",
                        "value": "{\"image\": {\"pullspec\": \"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525\", \"digests\": [\"sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6\"]}}\n"
                    },
                    {
                        "name": "REPORTS",
                        "type": "string",
                        "value": "{\"sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6\":\"sha256:03b6cd2a96a1ef320065634c09244d657000283ba583654c26508eed2174c0b8\"}\n"
                    },
                    {
                        "name": "SCAN_OUTPUT",
                        "type": "string",
                        "value": "{\"vulnerabilities\":{\"critical\":0,\"high\":0,\"medium\":0,\"low\":0,\"unknown\":0},\"unpatched_vulnerabilities\":{\"critical\":0,\"high\":10,\"medium\":180,\"low\":284,\"unknown\":0}}\n"
                    },
                    {
                        "name": "TEST_OUTPUT",
                        "type": "string",
                        "value": "{\"result\":\"SUCCESS\",\"timestamp\":\"2026-04-15T23:24:50+00:00\",\"note\":\"Task clair-scan-min completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by Clair.\",\"namespace\":\"default\",\"successes\":0,\"failures\":0,\"warnings\":0}\n"
                    }
                ],
                "startTime": "2026-04-15T23:19:59Z",
                "steps": [
                    {
                        "container": "step-get-image-manifests",
                        "imageID": "quay.io/konflux-ci/konflux-test@sha256:169f73f80fbde8d54f42416c5de8cc9214ecc7e8c89c70a3385285bbac32ad0a",
                        "name": "get-image-manifests",
                        "terminated": {
                            "containerID": "cri-o://0b95f92b5a0f32c4a0293f5030c037ae33b36659e75e95959212fef677454f73",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:22:30Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:22:24Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-get-vulnerabilities",
                        "imageID": "quay.io/konflux-ci/clair-in-ci@sha256:feaf078e7d05a64d329c082a36aed696751ec2e34fec8beb7d3e4cda47e166ec",
                        "name": "get-vulnerabilities",
                        "terminated": {
                            "containerID": "cri-o://dd3d2b8d20bb09225cbe02b6950905dd4183f7828a7c7879a3ad2c18d56c705e",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:24:40Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:22:31Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-oci-attach-report",
                        "imageID": "quay.io/konflux-ci/task-runner@sha256:200019314a50be5b6dd06f362c794c92a700583a522c5eee9a41e3eab7f706c5",
                        "name": "oci-attach-report",
                        "terminated": {
                            "containerID": "cri-o://b07842154103ce30ecbf888a6bbda8c37fbcc1e30fd6b07b9090feb080b080d3",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:24:43Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:24:40Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-conftest-vulnerabilities",
                        "imageID": "quay.io/konflux-ci/konflux-test@sha256:169f73f80fbde8d54f42416c5de8cc9214ecc7e8c89c70a3385285bbac32ad0a",
                        "name": "conftest-vulnerabilities",
                        "terminated": {
                            "containerID": "cri-o://48fb6625d5a209be9c41a5cbb33677bd60f672a4e817c4bb45a396b28bfb7312",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:24:50Z",
                            "message": "[{\"key\":\"IMAGES_PROCESSED\",\"value\":\"{\\\"image\\\": {\\\"pullspec\\\": \\\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525\\\", \\\"digests\\\": [\\\"sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6\\\"]}}\\n\",\"type\":1},{\"key\":\"REPORTS\",\"value\":\"{\\\"sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6\\\":\\\"sha256:03b6cd2a96a1ef320065634c09244d657000283ba583654c26508eed2174c0b8\\\"}\\n\",\"type\":1},{\"key\":\"SCAN_OUTPUT\",\"value\":\"{\\\"vulnerabilities\\\":{\\\"critical\\\":0,\\\"high\\\":0,\\\"medium\\\":0,\\\"low\\\":0,\\\"unknown\\\":0},\\\"unpatched_vulnerabilities\\\":{\\\"critical\\\":0,\\\"high\\\":10,\\\"medium\\\":180,\\\"low\\\":284,\\\"unknown\\\":0}}\\n\",\"type\":1},{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"result\\\":\\\"SUCCESS\\\",\\\"timestamp\\\":\\\"2026-04-15T23:24:50+00:00\\\",\\\"note\\\":\\\"Task clair-scan-min completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by Clair.\\\",\\\"namespace\\\":\\\"default\\\",\\\"successes\\\":0,\\\"failures\\\":0,\\\"warnings\\\":0}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:24:44Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Scans container images for vulnerabilities using Clair, by comparing the components of container image against Clair's vulnerability databases.",
                    "params": [
                        {
                            "description": "Image digest to scan.",
                            "name": "image-digest",
                            "type": "string"
                        },
                        {
                            "description": "Image URL.",
                            "name": "image-url",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "The platform built by.",
                            "name": "image-platform",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "unused, should be removed in next task version.",
                            "name": "docker-auth",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from.",
                            "name": "ca-trust-config-map-name",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data.",
                            "name": "ca-trust-config-map-key",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "If true, skips uploading the results to the image registry. Useful for read-only tests.",
                            "name": "skip-oci-attach-report",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Tekton task test output.",
                            "name": "TEST_OUTPUT",
                            "type": "string"
                        },
                        {
                            "description": "Clair scan result.",
                            "name": "SCAN_OUTPUT",
                            "type": "string"
                        },
                        {
                            "description": "Images processed in the task.",
                            "name": "IMAGES_PROCESSED",
                            "type": "string"
                        },
                        {
                            "description": "Mapping of image digests to report digests",
                            "name": "REPORTS",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "RETRY_COUNT",
                                "value": "5"
                            }
                        ],
                        "volumeMounts": [
                            {
                                "mountPath": "/etc/pki/tls/certs/ca-custom-bundle.crt",
                                "name": "trusted-ca",
                                "readOnly": true,
                                "subPath": "ca-bundle.crt"
                            }
                        ]
                    },
                    "steps": [
                        {
                            "computeResources": {
                                "limits": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "IMAGE_URL",
                                    "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525"
                                },
                                {
                                    "name": "IMAGE_DIGEST",
                                    "value": "sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6"
                                }
                            ],
                            "image": "quay.io/konflux-ci/konflux-test:v1.4.51@sha256:169f73f80fbde8d54f42416c5de8cc9214ecc7e8c89c70a3385285bbac32ad0a",
                            "name": "get-image-manifests",
                            "script": "#!/usr/bin/env bash\nset -euo pipefail\n# shellcheck source=/dev/null\n. /utils.sh\n\nimagewithouttag=$(echo -n $IMAGE_URL | sed \"s/\\(.*\\):.*/\\1/\")\n# strip new-line escape symbol from parameter and save it to variable\nimageanddigest=$(echo $imagewithouttag@$IMAGE_DIGEST)\necho \"Inspecting raw image manifest $imageanddigest.\"\n\n# Get the arch and image manifests by inspecting the image. This is mainly for identifying image indexes\nmkdir -p /tmp/auth \u0026\u0026 select-oci-auth \"$IMAGE_URL\" \u003e /tmp/auth/config.json\nexport DOCKER_CONFIG=/tmp/auth\nimage_manifests=$(get_image_manifests -i \"${imageanddigest}\")\nif [ -n \"$image_manifests\" ]; then\n  echo \"$image_manifests\" | jq -r 'to_entries[] | \"\\(.key) \\(.value)\"' | while read -r arch arch_sha; do\n    echo \"$arch_sha\" \u003e /tekton/home/image-manifest-$arch.sha\n  done\nelse\n  echo \"Failed to get image manifests from image \\\"$imageanddigest\\\"\"\n  note=\"Task clair-scan-min failed: Failed to get image manifests from image \\\"$imageanddigest\\\". For details, check Tekton task log.\"\n  ERROR_OUTPUT=$(make_result_json -r \"ERROR\" -t \"$note\")\n  echo \"${ERROR_OUTPUT}\" | tee \"/tekton/results/TEST_OUTPUT\"\n  exit 0\nfi\n",
                            "securityContext": {
                                "capabilities": {
                                    "add": [
                                        "SETFCAP"
                                    ]
                                }
                            }
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "cpu": "100m",
                                    "memory": "512Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "512Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "IMAGE_URL",
                                    "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525"
                                },
                                {
                                    "name": "IMAGE_DIGEST",
                                    "value": "sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6"
                                },
                                {
                                    "name": "IMAGE_PLATFORM"
                                }
                            ],
                            "image": "quay.io/konflux-ci/clair-in-ci:v1",
                            "imagePullPolicy": "Always",
                            "name": "get-vulnerabilities",
                            "script": "#!/usr/bin/env bash\n\nset -o errexit\nset -o nounset\nset -o pipefail\n# shellcheck source=/utils.sh\n. /utils.sh\n\nmkdir -p /tmp/auth \u0026\u0026 select-oci-auth \"$IMAGE_URL\" \u003e /tmp/auth/config.json\nexport DOCKER_CONFIG=/tmp/auth\n\nimagewithouttag=$(echo -n $IMAGE_URL | sed \"s/\\(.*\\):.*/\\1/\")\nimages_processed_template='{\"image\": {\"pullspec\": \"'\"$IMAGE_URL\"'\", \"digests\": [%s]}}'\ndigests_processed=()\n\n# the quay report format used by the Conftest rules in the\n# conftest-vulnerabilities step doesn't contain the \"issued\" date which\n# we require in the policy rules, so we resort to running clair-action\n# twice to produce both quay and clair formatted output\nclair_report() {\n  { retry clair-action report --image-ref=\"$1\" --db-path=/tmp/matcher.db --docker-config-dir=/tmp/auth --format=clair | tee  \"clair-report-$2.json\"; } \u0026\u0026 \\\n  { retry clair-action convert  --file-path=\"clair-report-$2.json\" --format=quay \u003e \"clair-result-$2.json\"; }\n}\n\nrun_clair_on_arch() {\n  local arch=\"$1\"\n  local sha_file=\"image-manifest-$arch.sha\"\n\n  if [ -e \"$sha_file\" ]; then\n    local arch_sha\n    arch_sha=$(\u003c\"$sha_file\")\n    local digest=\"${imagewithouttag}@${arch_sha}\"\n\n    echo \"Running clair-action on $arch image manifest...\"\n    clair_report \"$digest\" \"$arch\" || true\n\n    digests_processed+=(\"\\\"$arch_sha\\\"\")\n   fi\n}\n\nplatform=\"${IMAGE_PLATFORM}\"\n\n# If a platform is specified, extract the architecture and run clair-action on the corresponding image manifest\nif [ -n \"$platform\" ]; then\n  arch=\"${platform#*/}\"\n  if [ \"$arch\" = \"x86_64\" ] || [ \"$arch\" = \"local\" ] || [ \"$arch\" = \"localhost\" ]; then\n    arch=\"amd64\"\n  fi\n  # Validate against supported arch list. If it's not a known arch, fallback to amd64\n  case \"$arch\" in\n    amd64|ppc64le|arm64|s390x)\n      ;;\n    *)\n      echo \"Error: Unsupported or malformed architecture: '$arch' (parsed from platform: '$platform')\"\n      exit 0\n      ;;\n  esac\n\n  run_clair_on_arch \"$arch\"\n\n# If no platform is specified, run clair-action on all available image manifests\nelse\n  for sha_file in image-manifest-*.sha; do\n    if [ -e \"$sha_file\" ]; then\n      arch=$(basename \"$sha_file\" | sed 's/image-manifest-//;s/.sha//')\n      run_clair_on_arch \"$arch\"\n    fi\n  done\nfi\n\n# If the image is an Image Index, also add the Image Index digest to the list.\nif [[ \"${digests_processed[*]}\" != *\"$IMAGE_DIGEST\"* ]]; then\n  digests_processed+=(\"\\\"$IMAGE_DIGEST\\\"\")\nfi\ndigests_processed_string=$(IFS=,; echo \"${digests_processed[*]}\")\n\nimages_processed=$(echo \"${images_processed_template/\\[%s]/[$digests_processed_string]}\")\necho \"$images_processed\" \u003e images-processed.json\n",
                            "workingDir": "/tekton/home"
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "SKIP_OCI_ATTACH_REPORT",
                                    "value": "false"
                                },
                                {
                                    "name": "IMAGE_URL",
                                    "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525"
                                }
                            ],
                            "image": "quay.io/konflux-ci/task-runner:1.5.0@sha256:200019314a50be5b6dd06f362c794c92a700583a522c5eee9a41e3eab7f706c5",
                            "name": "oci-attach-report",
                            "script": "#!/usr/bin/env bash\n\nset -o errexit\nset -o nounset\nset -o pipefail\n\nif [ \"$SKIP_OCI_ATTACH_REPORT\" = \"true\" ]; then\n  echo 'OCI attach report skipped by parameter.'\n  echo '{}' \u003e reports.json\n  exit 0\nfi\n\nif ! compgen -G \"clair-report-*.json\" \u003e /dev/null; then\n  echo 'No Clair reports generated. Skipping upload.'\n  echo '{}' \u003e reports.json\n  exit 0\nfi\n\necho \"Selecting auth\"\nselect-oci-auth \"$IMAGE_URL\" \u003e \"$HOME/auth.json\"\n\nrepository=\"${IMAGE_URL/:*/}\"\n\narch() {\n  report_file=\"$1\"\n  arch=\"${report_file/*-}\"\n  echo \"${arch/.json/}\"\n}\n\nMEDIA_TYPE='application/vnd.redhat.clair-report+json'\n\nreports_json=\"\"\nfor f in clair-report-*.json; do\n  digest=$(cat \"image-manifest-$(arch \"$f\").sha\")\n  image_ref=\"${repository}@${digest}\"\n  echo \"Attaching $f to ${image_ref}\"\n  if ! report_digest=\"$(retry oras attach --no-tty --format go-template='{{.digest}}' --registry-config \\\n    \"$HOME/auth.json\" --artifact-type \"${MEDIA_TYPE}\" \"${image_ref}\" \"$f:${MEDIA_TYPE}\")\"\n  then\n    echo \"Failed to attach ${f} to ${image_ref}\"\n    exit 1\n  fi\n  # shellcheck disable=SC2016\n  reports_json=\"$(yq --output-format json --indent=0 eval-all '. as $i ireduce ({}; . * $i)' \u003c(echo \"${reports_json}\") \u003c(echo \"${digest}: ${report_digest}\"))\"\ndone\necho \"${reports_json}\" \u003e reports.json\n",
                            "workingDir": "/tekton/home"
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "image": "quay.io/konflux-ci/konflux-test:v1.4.51@sha256:169f73f80fbde8d54f42416c5de8cc9214ecc7e8c89c70a3385285bbac32ad0a",
                            "name": "conftest-vulnerabilities",
                            "script": "#!/usr/bin/env bash\nset -euo pipefail\n. /utils.sh\ntrap 'handle_error /tekton/results/TEST_OUTPUT' EXIT\n\nclair_result_files=$(ls /tekton/home/clair-result-*.json)\nif [ -z \"$clair_result_files\" ]; then\n  echo \"Previous step [get-vulnerabilities] failed: No clair-result files found in /tekton/home.\"\nfi\n\nmissing_vulnerabilities_files=\"\"\nfor file in $clair_result_files; do\n  file_suffix=$(basename \"$file\" | sed 's/clair-result-//;s/.json//')\n  if [ ! -s \"$file\" ]; then\n    echo \"Previous step [get-vulnerabilities] failed: $file is empty.\"\n  else\n    /usr/bin/conftest test --no-fail $file \\\n    --policy /project/clair/vulnerabilities-check.rego --namespace required_checks \\\n    --output=json | tee /tekton/home/clair-vulnerabilities-$file_suffix.json || true\n  fi\n\n  #check for missing \"clair-vulnerabilities-\u003carch\u003e/image-index\" file and create a string\n  if [ ! -f \"/tekton/home/clair-vulnerabilities-$file_suffix.json\" ]; then\n    missing_vulnerabilities_files+=\"${missing_vulnerabilities_files:+, }/tekton/home/clair-vulnerabilities-$file_suffix.json\"\n  fi\ndone\n\nif [ -n \"$missing_vulnerabilities_files\" ]; then\n  note=\"Task clair-scan-min failed: $missing_vulnerabilities_files did not generate. For details, check Tekton task log.\"\n  TEST_OUTPUT=$(make_result_json -r \"ERROR\" -t \"$note\")\n  echo \"$missing_vulnerabilities_files did not generate correctly. For details, check conftest command in Tekton task log.\"\n  echo \"${TEST_OUTPUT}\" | tee /tekton/results/TEST_OUTPUT\n  exit 0\nfi\n\nscan_result='{\"vulnerabilities\":{\"critical\":0, \"high\":0, \"medium\":0, \"low\":0, \"unknown\":0}, \"unpatched_vulnerabilities\":{\"critical\":0, \"high\":0, \"medium\":0, \"low\":0, \"unknown\":0}}'\nfor file in /tekton/home/clair-vulnerabilities-*.json; do\n    result=$(jq -rce \\\n        '{\n            vulnerabilities:{\n              critical: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"clair_critical_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0),\n              high: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"clair_high_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0),\n              medium: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"clair_medium_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0),\n              low: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"clair_low_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0),\n              unknown: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"clair_unknown_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0)\n            },\n            unpatched_vulnerabilities:{\n              critical: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"clair_unpatched_critical_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0),\n              high: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"clair_unpatched_high_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0),\n              medium: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"clair_unpatched_medium_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0),\n              low: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"clair_unpatched_low_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0),\n              unknown: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"clair_unpatched_unknown_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0)\n            }\n        }' \"$file\")\n\n    scan_result=$(jq -s -rce \\\n          '.[0].vulnerabilities.critical += .[1].vulnerabilities.critical |\n          .[0].vulnerabilities.high += .[1].vulnerabilities.high |\n          .[0].vulnerabilities.medium += .[1].vulnerabilities.medium |\n          .[0].vulnerabilities.low += .[1].vulnerabilities.low |\n          .[0].vulnerabilities.unknown += .[1].vulnerabilities.unknown |\n          .[0].unpatched_vulnerabilities.critical += .[1].unpatched_vulnerabilities.critical |\n          .[0].unpatched_vulnerabilities.high += .[1].unpatched_vulnerabilities.high |\n          .[0].unpatched_vulnerabilities.medium += .[1].unpatched_vulnerabilities.medium |\n          .[0].unpatched_vulnerabilities.low += .[1].unpatched_vulnerabilities.low |\n          .[0].unpatched_vulnerabilities.unknown += .[1].unpatched_vulnerabilities.unknown |\n          .[0]' \u003c\u003c\u003c\"$scan_result $result\")\ndone\n\necho \"$scan_result\" | tee \"/tekton/results/SCAN_OUTPUT\"\n\ncat /tekton/home/images-processed.json | tee /tekton/results/IMAGES_PROCESSED\n# shellcheck disable=SC2154\ncat /tekton/home/reports.json \u003e \"/tekton/results/REPORTS\"\n\nnote=\"Task clair-scan-min completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by Clair.\"\nTEST_OUTPUT=$(make_result_json -r \"SUCCESS\" -t \"$note\")\necho \"${TEST_OUTPUT}\" | tee /tekton/results/TEST_OUTPUT\n",
                            "securityContext": {
                                "capabilities": {
                                    "add": [
                                        "SETFCAP"
                                    ]
                                }
                            }
                        }
                    ],
                    "volumes": [
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.openshift.io/repo": "https://github.com/rhads-tsf-qe/testrepo?rev=c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "build.appstudio.redhat.com/commit_sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "build.appstudio.redhat.com/target_branch": "base-uovnpl",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=35",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "pipelinesascode.tekton.dev/branch": "base-uovnpl",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552388922",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-ahlxga",
                    "pipelinesascode.tekton.dev/git-provider": "github",
                    "pipelinesascode.tekton.dev/installation-id": "112348674",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-push-8m9zl",
                    "pipelinesascode.tekton.dev/max-keep-runs": "3",
                    "pipelinesascode.tekton.dev/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-uovnpl\"",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-ci-tests-bot",
                    "pipelinesascode.tekton.dev/sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pipelinesascode.tekton.dev/sha-title": "Merge pull request #180 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pipelinesascode.tekton.dev/source-branch": "refs/heads/base-uovnpl",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-tenant/results/3a69c030-be51-40ae-9a05-5b5733b01f62/records/c1595132-05de-4022-bf1a-07cec0ab038b",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"testrepo\",\"commit\":\"c4481f5e1453d8c204c7bae0f626b245e6bf6525\",\"eventType\":\"push\"}",
                    "results.tekton.dev/result": "default-tenant/results/3a69c030-be51-40ae-9a05-5b5733b01f62",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "virus, konflux"
                },
                "creationTimestamp": "2026-04-15T23:19:59Z",
                "finalizers": [
                    "chains.tekton.dev",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/version": "v0.37.7",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/component": "tsf-demo-comp",
                    "pipelines.appstudio.openshift.io/type": "build",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552388922",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "tsf-demo-comp-on-push-8m9zl",
                    "tekton.dev/pipelineRun": "tsf-demo-comp-on-push-8m9zl",
                    "tekton.dev/pipelineRunUID": "3a69c030-be51-40ae-9a05-5b5733b01f62",
                    "tekton.dev/pipelineTask": "clamav-scan",
                    "tekton.dev/task": "clamav-scan-min"
                },
                "name": "tsf-demo-comp-on-push-8m9zl-clamav-scan",
                "namespace": "default-tenant",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "tsf-demo-comp-on-push-8m9zl",
                        "uid": "3a69c030-be51-40ae-9a05-5b5733b01f62"
                    }
                ],
                "resourceVersion": "40438",
                "uid": "c1595132-05de-4022-bf1a-07cec0ab038b"
            },
            "spec": {
                "params": [
                    {
                        "name": "image-digest",
                        "value": "sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6"
                    },
                    {
                        "name": "image-url",
                        "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525"
                    }
                ],
                "serviceAccountName": "build-pipeline-tsf-demo-comp",
                "taskRef": {
                    "params": [
                        {
                            "name": "name",
                            "value": "clamav-scan-min"
                        },
                        {
                            "name": "bundle",
                            "value": "quay.io/konflux-ci/tekton-catalog/task-clamav-scan-min:0.3@sha256:589e34f73d310aa993c9761d8b78265a904a121028bda2809d8a2d0500454bd8"
                        },
                        {
                            "name": "kind",
                            "value": "task"
                        }
                    ],
                    "resolver": "bundles"
                },
                "timeout": "1h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:25:11Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:25:11Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "tsf-demo-comp-on-push-8m9zl-clamav-scan-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha256": "589e34f73d310aa993c9761d8b78265a904a121028bda2809d8a2d0500454bd8"
                        },
                        "entryPoint": "clamav-scan-min",
                        "uri": "quay.io/konflux-ci/tekton-catalog/task-clamav-scan-min"
                    }
                },
                "results": [
                    {
                        "name": "IMAGES_PROCESSED",
                        "type": "string",
                        "value": "{\"image\": {\"pullspec\": \"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525\", \"digests\": [\"sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6\"]}}\n"
                    },
                    {
                        "name": "TEST_OUTPUT",
                        "type": "string",
                        "value": "{\"timestamp\":\"1776295507\",\"namespace\":\"required_checks\",\"successes\":2,\"failures\":0,\"warnings\":0,\"result\":\"SUCCESS\",\"note\":\"All checks passed successfully\"}\n"
                    }
                ],
                "startTime": "2026-04-15T23:19:59Z",
                "steps": [
                    {
                        "container": "step-extract-and-scan-image",
                        "imageID": "quay.io/konflux-ci/clamav-db@sha256:0a1e1b24fc16108d2049a816f4bc1c59484d2acf8415f490a078113f1bc0bdd4",
                        "name": "extract-and-scan-image",
                        "terminated": {
                            "containerID": "cri-o://b92483bc6643b3b862db84c284d3c6eda259ed4471bb8d43f496d5a692898ff5",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:25:07Z",
                            "message": "[{\"key\":\"IMAGES_PROCESSED\",\"value\":\"{\\\"image\\\": {\\\"pullspec\\\": \\\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525\\\", \\\"digests\\\": [\\\"sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6\\\"]}}\\n\",\"type\":1},{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"timestamp\\\":\\\"1776295507\\\",\\\"namespace\\\":\\\"required_checks\\\",\\\"successes\\\":2,\\\"failures\\\":0,\\\"warnings\\\":0,\\\"result\\\":\\\"SUCCESS\\\",\\\"note\\\":\\\"All checks passed successfully\\\"}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:21:30Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-upload",
                        "imageID": "quay.io/konflux-ci/task-runner@sha256:200019314a50be5b6dd06f362c794c92a700583a522c5eee9a41e3eab7f706c5",
                        "name": "upload",
                        "terminated": {
                            "containerID": "cri-o://868ed1c31f3e3b4c8de5fb804c4fc386a40d40ee6f840285ab5d0490fdebfe4a",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:25:11Z",
                            "message": "[{\"key\":\"IMAGES_PROCESSED\",\"value\":\"{\\\"image\\\": {\\\"pullspec\\\": \\\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525\\\", \\\"digests\\\": [\\\"sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6\\\"]}}\\n\",\"type\":1},{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"timestamp\\\":\\\"1776295507\\\",\\\"namespace\\\":\\\"required_checks\\\",\\\"successes\\\":2,\\\"failures\\\":0,\\\"warnings\\\":0,\\\"result\\\":\\\"SUCCESS\\\",\\\"note\\\":\\\"All checks passed successfully\\\"}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:25:08Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Scans the content of container images and OCI artifacts for viruses, malware, and other malicious content using ClamAV antivirus scanner.",
                    "params": [
                        {
                            "description": "Image digest to scan.",
                            "name": "image-digest",
                            "type": "string"
                        },
                        {
                            "description": "Image URL.",
                            "name": "image-url",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Image arch.",
                            "name": "image-arch",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "unused",
                            "name": "docker-auth",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from.",
                            "name": "ca-trust-config-map-name",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data.",
                            "name": "ca-trust-config-map-key",
                            "type": "string"
                        },
                        {
                            "default": "8",
                            "description": "Maximum number of threads clamd runs.",
                            "name": "clamd-max-threads",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "If true, skips uploading the results to the image registry. Useful for read-only tests.",
                            "name": "skip-upload",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Tekton task test output.",
                            "name": "TEST_OUTPUT",
                            "type": "string"
                        },
                        {
                            "description": "Images processed in the task.",
                            "name": "IMAGES_PROCESSED",
                            "type": "string"
                        }
                    ],
                    "steps": [
                        {
                            "computeResources": {
                                "limits": {
                                    "cpu": "512m",
                                    "memory": "3Gi"
                                },
                                "requests": {
                                    "cpu": "512m",
                                    "memory": "3Gi"
                                }
                            },
                            "env": [
                                {
                                    "name": "HOME",
                                    "value": "/work"
                                },
                                {
                                    "name": "IMAGE_URL",
                                    "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525"
                                },
                                {
                                    "name": "IMAGE_DIGEST",
                                    "value": "sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6"
                                },
                                {
                                    "name": "IMAGE_ARCH"
                                },
                                {
                                    "name": "MAX_THREADS",
                                    "value": "8"
                                }
                            ],
                            "image": "quay.io/konflux-ci/clamav-db:latest",
                            "name": "extract-and-scan-image",
                            "script": "#!/usr/bin/env bash\nset -euo pipefail\n. /utils.sh\ntrap 'handle_error /tekton/results/TEST_OUTPUT' EXIT\n\n# Start clamd in background\n/start-clamd.sh\n\n# Bootstrap .docker config in overridden HOME.\n# This prevents 'oc' CLI failures in clean environments where ~/.docker does not exist.\nif [ ! -d ~/.docker ]; then\n    mkdir -p ~/.docker\n    echo '{}' \u003e ~/.docker/config.json\nfi\n\nimagewithouttag=$(echo $IMAGE_URL | sed \"s/\\(.*\\):.*/\\1/\" | tr -d '\\n')\n\n# strip new-line escape symbol from parameter and save it to variable\nimageanddigest=$(echo $imagewithouttag@$IMAGE_DIGEST)\n\n# check if image is attestation one, skip the clamav scan in such case\nif [[ $imageanddigest == *.att ]]\nthen\n    echo \"$imageanddigest is an attestation image. Skipping ClamAV scan.\"\n    exit 0\nfi\n\nimages_processed_template='{\"image\": {\"pullspec\": \"'\"$IMAGE_URL\"'\", \"digests\": [%s]}}'\ndigests_processed=()\nmkdir logs\nmkdir content\ncd content\necho \"Detecting artifact type for ${imageanddigest}.\"\necho '{\"artifact\":{\"pullspec\":\"'\"${imageanddigest}\"'\",\"type\":\"unknown\",\"mediaType\":\"\"}}' \u003e /work/logs/artifact-meta.json\n\n# Function to scan content and process results with ClamAV and EC\n# Parameters:\n#   $1: destination - path to the content to scan\n#   $2: suffix - suffix for log file names (e.g., \"oci\", \"amd64\")\n#   $3: digest - digest to add to digests_processed array\n#   $4: scan_message - optional message describing what is being scanned\nscan_and_process() {\n  local destination=\"$1\"\n  local suffix=\"$2\"\n  local digest=\"$3\"\n  local scan_message=\"${4:-Scanning content}\"\n\n  db_version=$(clamdscan --version | sed 's|.*/\\(.*\\)/.*|\\1|')\n\n  echo \"$scan_message. This operation may take a while.\"\n  clamdscan \"${destination}\" -vi --multiscan --fdpass \\\n    | tee \"/work/logs/clamscan-result-${suffix}.log\" || true\n\n  echo \"Executed-on: Scan was executed on clamsdcan version - $(clamdscan --version) Database version: $db_version\" | tee -a \"/work/logs/clamscan-result-${suffix}.log\"\n\n  digests_processed+=(\"\\\"$digest\\\"\")\n\n  if [[ -e \"/work/logs/clamscan-result-${suffix}.log\" ]]; then\n    # OPA/EC requires structured data input, add clamAV log into json\n    jq -Rs '{ output: . }' \"/work/logs/clamscan-result-${suffix}.log\" \u003e \"/work/logs/clamscan-result-log-${suffix}.json\"\n\n    EC_EXPERIMENTAL=1 ec test \\\n      --namespace required_checks \\\n      --policy /project/clamav/virus-check.rego \\\n      -o json \\\n      \"/work/logs/clamscan-result-log-${suffix}.json\" || true\n\n    # workaround: due to a bug in ec-cli, we cannot generate json and appstudio output at the same time, running it again\n    EC_EXPERIMENTAL=1 ec test \\\n      --namespace required_checks \\\n      --policy /project/clamav/virus-check.rego \\\n      -o appstudio \\\n      \"/work/logs/clamscan-result-log-${suffix}.json\" | tee \"/work/logs/clamscan-ec-test-${suffix}.json\" || true\n\n    cat \"/work/logs/clamscan-ec-test-${suffix}.json\"\n  fi\n}\n\n# Detect artifact type: container image vs OCI artifact\n# First, try to get image manifests (works for container images)\n# Use subshell to prevent get_image_manifests() from exiting the main script if it fails\n# (get_image_manifests uses exit 1 when Architecture field is missing, which happens for OCI artifacts)\nimage_manifests=$(bash -c '. /utils.sh; get_image_manifests -i \"'\"${imageanddigest}\"'\"' 2\u003e/dev/null || echo \"\")\n\n# If get_image_manifests failed, check if it's an OCI artifact by inspecting manifest media type\nif [ -z \"$image_manifests\" ]; then\n  echo \"get_image_manifests returned empty, checking if this is an OCI artifact...\"\n  raw_manifest=$(skopeo inspect --raw --authfile ~/.docker/config.json \"docker://${imageanddigest}\" 2\u003e/dev/null || true)\n  if [ -s /work/logs/artifact-meta.json ]; then\n    tmp=$(mktemp)\n    if jq '.artifact.type = \"inspected\"' /work/logs/artifact-meta.json \u003e \"$tmp\"; then\n      mv \"$tmp\" /work/logs/artifact-meta.json || true\n    fi\n  fi\n\n  if [ -n \"$raw_manifest\" ]; then\n    media_type=$(echo \"$raw_manifest\" | jq -r '.mediaType // .config.mediaType // empty' 2\u003e/dev/null || echo \"\")\n    artifact_type=$(echo \"$raw_manifest\" | jq -r '.artifactType // empty' 2\u003e/dev/null || echo \"\")\n    config_media_type=$(echo \"$raw_manifest\" | jq -r '.config.mediaType // empty' 2\u003e/dev/null || echo \"\")\n\n    # Determine if this is an OCI artifact (not a container image)\n    # OCI artifacts typically have:\n    # - An empty/scratch config (config.mediaType contains \"empty\" or \"scratch\")\n    # - An explicit artifactType field that is not a container image type\n    is_oci_artifact=false\n\n    # Check if config is empty/scratch (typical for OCI artifacts like python wheels, helm charts, etc.)\n    if echo \"$config_media_type\" | grep -qiE \"(empty|scratch)\"; then\n      is_oci_artifact=true\n    fi\n\n    # Check if artifactType is set and is not a container image type\n    if [ -n \"$artifact_type\" ] \u0026\u0026 ! echo \"$artifact_type\" | grep -qE \"application/vnd\\.(oci|docker)\\.(image|container)\"; then\n      is_oci_artifact=true\n    fi\n\n    if [ \"$is_oci_artifact\" = true ]; then\n      # This is an OCI artifact (e.g., python wheels, helm charts, etc.)\n      echo \"Detected OCI artifact (artifactType: ${artifact_type:-unset}, config.mediaType: ${config_media_type:-unset}). Downloading for scanning...\"\n      if [ -s /work/logs/artifact-meta.json ]; then\n        tmp=$(mktemp)\n        if jq '.artifact.mediaType = '\"\\\"${media_type:-unknown}\\\"\"' | .artifact.artifactType = '\"\\\"${artifact_type:-unknown}\\\"\"' | .artifact.type = \"oci\"' /work/logs/artifact-meta.json \u003e \"$tmp\"; then\n          mv \"$tmp\" /work/logs/artifact-meta.json || true\n        fi\n      fi\n      destination=\"content-oci\"\n      mkdir -p \"$destination\"\n\n      # Download OCI artifact using skopeo copy\n      echo \"Downloading OCI artifact using skopeo copy\"\n      if ! retry skopeo copy --authfile ~/.docker/config.json \"docker://${imageanddigest}\" \"dir:${destination}\" 2\u003e\u00261; then\n        echo \"Failed to download OCI artifact \\\"$imageanddigest\\\". Skipping ClamAV scan!\"\n        note=\"Task clamav-scan-min failed: Failed to download OCI artifact \\\"$imageanddigest\\\". For details, check Tekton task log.\"\n        ERROR_OUTPUT=$(make_result_json -r \"ERROR\" -t \"$note\")\n        echo \"${ERROR_OUTPUT}\" | tee \"/tekton/results/TEST_OUTPUT\"\n        exit 0\n      fi\n\n      # Scan and process OCI artifact\n      scan_and_process \"${destination}\" \"oci\" \"$IMAGE_DIGEST\" \"Scanning OCI artifact\"\n\n      # Skip the container image processing path\n      image_manifests=\"\"\n    elif echo \"$media_type\" | grep -qE \"(application/vnd\\.(docker|oci)\\.(distribution|image)\\.manifest|application/vnd\\.docker\\.distribution\\.manifest)\"; then\n      # This looks like a container image manifest, but get_image_manifests failed\n      echo \"Detected container image manifest type: $media_type, but get_image_manifests failed. This may indicate an error.\"\n      if [ -s /work/logs/artifact-meta.json ]; then\n        tmp=$(mktemp)\n        if jq '.artifact.mediaType = '\"\\\"$media_type\\\"\"' | .artifact.type = \"image\"' /work/logs/artifact-meta.json \u003e \"$tmp\"; then\n          mv \"$tmp\" /work/logs/artifact-meta.json || true\n        fi\n      fi\n      note=\"Task clamav-scan-min failed: Failed to get image manifests from image \\\"$imageanddigest\\\". For details, check Tekton task log.\"\n      ERROR_OUTPUT=$(make_result_json -r \"ERROR\" -t \"$note\")\n      echo \"${ERROR_OUTPUT}\" | tee \"/tekton/results/TEST_OUTPUT\"\n      exit 0\n    else\n      # Likely an OCI artifact with non-standard media type\n      echo \"Detected OCI artifact (media type: ${media_type:-unknown}). Downloading for scanning...\"\n      if [ -s /work/logs/artifact-meta.json ]; then\n        tmp=$(mktemp)\n        if jq '.artifact.mediaType = '\"\\\"${media_type:-unknown}\\\"\"' | .artifact.type = \"oci\"' /work/logs/artifact-meta.json \u003e \"$tmp\"; then\n          mv \"$tmp\" /work/logs/artifact-meta.json || true\n        fi\n      fi\n      destination=\"content-oci\"\n      mkdir -p \"$destination\"\n\n      # Download OCI artifact using skopeo copy\n      echo \"Downloading OCI artifact using skopeo copy\"\n      if ! retry skopeo copy --authfile ~/.docker/config.json \"docker://${imageanddigest}\" \"dir:${destination}\" 2\u003e\u00261; then\n        echo \"Failed to download OCI artifact \\\"$imageanddigest\\\". Skipping ClamAV scan!\"\n        note=\"Task clamav-scan-min failed: Failed to download OCI artifact \\\"$imageanddigest\\\". For details, check Tekton task log.\"\n        ERROR_OUTPUT=$(make_result_json -r \"ERROR\" -t \"$note\")\n        echo \"${ERROR_OUTPUT}\" | tee \"/tekton/results/TEST_OUTPUT\"\n        exit 0\n      fi\n\n      # Scan and process OCI artifact\n      scan_and_process \"${destination}\" \"oci\" \"$IMAGE_DIGEST\" \"Scanning OCI artifact\"\n\n      # Skip the container image processing path\n      image_manifests=\"\"\n    fi\n  else\n    echo \"Failed to inspect artifact \\\"$imageanddigest\\\". Unable to determine type.\"\n    note=\"Task clamav-scan-min failed: Failed to inspect artifact \\\"$imageanddigest\\\". For details, check Tekton task log.\"\n    ERROR_OUTPUT=$(make_result_json -r \"ERROR\" -t \"$note\")\n    echo \"${ERROR_OUTPUT}\" | tee \"/tekton/results/TEST_OUTPUT\"\n    exit 0\n  fi\nfi\n\n# Process container images (existing logic)\nif [ -n \"$image_manifests\" ]; then\n  echo \"Detected container image. Processing image manifests.\"\n  if [ -s /work/logs/artifact-meta.json ]; then\n    tmp=$(mktemp)\n    if jq '.artifact.type = \"image\"' /work/logs/artifact-meta.json \u003e \"$tmp\"; then\n      mv \"$tmp\" /work/logs/artifact-meta.json || true\n    fi\n  fi\n  # Proceed only if a specific arch is provided.\n  # This typically occurs when using Tekton Matrix to launch multiple TaskRuns to scan all architectures of a multi-arch image in parallel.\n  if [ -n \"$IMAGE_ARCH\" ]; then\n    arch=\"${IMAGE_ARCH#*/}\"\n    if [ \"${arch}\" = \"x86_64\" ]; then\n      arch=\"amd64\"\n    fi\n\n    # Check if arch is supported; if not (e.g., it's 'local', see link below), default to amd64.\n    # https://github.com/redhat-appstudio/infra-deployments/blob/main/components/multi-platform-controller/production/stone-prd-rh01/host-config.yaml#L9-L14\n    case \"$arch\" in\n      amd64|ppc64le|arm64|s390x)\n        ;;\n      *)\n        arch=\"amd64\"\n        ;;\n    esac\n\n    image_manifests=$(echo \"$image_manifests\" | jq -c --arg arch \"$arch\" '{($arch): .[$arch]}')\n  fi\n\n  while read -r arch arch_sha; do\n    destination=$(echo content-$arch)\n    mkdir -p \"$destination\"\n    arch_imageanddigest=$(echo $imagewithouttag@$arch_sha)\n\n    echo \"Running \\\"oc image extract\\\" on image of arch $arch\"\n    retry oc image extract --only-files=true --registry-config ~/.docker/config.json \"$arch_imageanddigest\" --path=\"/:${destination}\" --filter-by-os=\"linux/${arch}\"\n    if [ $? -ne 0 ]; then\n      echo \"Unable to extract image for arch $arch. Skipping ClamAV scan!\"\n      exit 0\n    fi\n\n    # Scan and process container image for this architecture\n    scan_and_process \"${destination}\" \"$arch\" \"$arch_sha\" \"Scanning image for arch $arch\"\n  done \u003c \u003c(echo \"$image_manifests\" | jq -r 'to_entries[] | \"\\(.key) \\(.value)\"')\nfi\n\njq -s -rce '\n  reduce .[] as $item ({\"timestamp\":\"0\",\"namespace\":\"\",\"successes\":0,\"failures\":0,\"warnings\":0,\"result\":\"\",\"note\":\"\"};\n    {\n    \"timestamp\" : (if .timestamp \u003c $item.timestamp then $item.timestamp else .timestamp end),\n    \"namespace\" : $item.namespace,\n    \"successes\" : (.successes + $item.successes),\n    \"failures\" : (.failures + $item.failures),\n    \"warnings\" : (.warnings + $item.warnings),\n    \"result\" : (if .result == \"\" or ($item.result == \"SKIPPED\" and .result == \"SUCCESS\") or ($item.result == \"WARNING\" and (.result == \"SUCCESS\" or .result == \"SKIPPED\")) or ($item.result == \"FAILURE\" and .result != \"ERROR\") or $item.result == \"ERROR\" then $item.result else .result end),\n    \"note\" : (if .result == \"\" or ($item.result == \"SKIPPED\" and .result == \"SUCCESS\") or ($item.result == \"WARNING\" and (.result == \"SUCCESS\" or .result == \"SKIPPED\")) or ($item.result == \"FAILURE\" and .result != \"ERROR\") or $item.result == \"ERROR\" then $item.note else .note end)\n    })' /work/logs/clamscan-ec-test-*.json | tee /tekton/results/TEST_OUTPUT\n\n# If the image is an Image Index, also add the Image Index digest to the list.\nif [[ \"${digests_processed[*]}\" != *\"$IMAGE_DIGEST\"* ]]; then\n  digests_processed+=(\"\\\"$IMAGE_DIGEST\\\"\")\nfi\n\ndigests_processed_string=$(IFS=,; echo \"${digests_processed[*]}\")\necho \"${images_processed_template/\\[%s]/[$digests_processed_string]}\" | tee /tekton/results/IMAGES_PROCESSED\n",
                            "securityContext": {
                                "capabilities": {
                                    "add": [
                                        "SETFCAP"
                                    ]
                                }
                            },
                            "volumeMounts": [
                                {
                                    "mountPath": "/work",
                                    "name": "work"
                                },
                                {
                                    "mountPath": "/etc/pki/tls/certs/ca-custom-bundle.crt",
                                    "name": "trusted-ca",
                                    "readOnly": true,
                                    "subPath": "ca-bundle.crt"
                                }
                            ],
                            "workingDir": "/work"
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "SKIP_UPLOAD",
                                    "value": "false"
                                },
                                {
                                    "name": "IMAGE_URL",
                                    "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525"
                                },
                                {
                                    "name": "IMAGE_DIGEST",
                                    "value": "sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6"
                                }
                            ],
                            "image": "quay.io/konflux-ci/task-runner:1.5.0@sha256:200019314a50be5b6dd06f362c794c92a700583a522c5eee9a41e3eab7f706c5",
                            "name": "upload",
                            "script": "#!/usr/bin/env bash\nset -e\n\n# Skip upload if requested e.g. read-only CI tests where push access is denied\nif [ \"$SKIP_UPLOAD\" == \"true\" ]; then\n  echo \"Upload skipped by parameter.\"\n  exit 0\nfi\n\n# Don't return a glob expression when no matches are found\nshopt -s nullglob\n\ncd logs\n\nfor UPLOAD_FILE in clamscan-result*.log; do\n  MEDIA_TYPE=text/vnd.clamav\n  args+=(\"${UPLOAD_FILE}:${MEDIA_TYPE}\")\ndone\nfor UPLOAD_FILE in clamscan-ec-test*.json; do\n  MEDIA_TYPE=application/vnd.konflux.test_output+json\n  args+=(\"${UPLOAD_FILE}:${MEDIA_TYPE}\")\ndone\n\nif [ -z \"${args}\" ]; then\n  echo \"No files found. Skipping upload.\"\n  exit 0;\nfi\n\necho \"Selecting auth\"\nselect-oci-auth $IMAGE_URL \u003e $HOME/auth.json\necho \"Attaching to ${IMAGE_URL}\"\n retry oras attach --no-tty --registry-config \"$HOME/auth.json\" --artifact-type application/vnd.clamav \"${IMAGE_URL}@${IMAGE_DIGEST}\" \"${args[@]}\"\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/work",
                                    "name": "work"
                                },
                                {
                                    "mountPath": "/etc/pki/tls/certs/ca-custom-bundle.crt",
                                    "name": "trusted-ca",
                                    "readOnly": true,
                                    "subPath": "ca-bundle.crt"
                                }
                            ],
                            "workingDir": "/work"
                        }
                    ],
                    "volumes": [
                        {
                            "emptyDir": {},
                            "name": "dbfolder"
                        },
                        {
                            "emptyDir": {},
                            "name": "work"
                        },
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.openshift.io/repo": "https://github.com/rhads-tsf-qe/testrepo?rev=c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "build.appstudio.redhat.com/commit_sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "build.appstudio.redhat.com/target_branch": "base-uovnpl",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=1",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "pipelinesascode.tekton.dev/branch": "base-uovnpl",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552388922",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-ahlxga",
                    "pipelinesascode.tekton.dev/git-provider": "github",
                    "pipelinesascode.tekton.dev/installation-id": "112348674",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-push-8m9zl",
                    "pipelinesascode.tekton.dev/max-keep-runs": "3",
                    "pipelinesascode.tekton.dev/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-uovnpl\"",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-ci-tests-bot",
                    "pipelinesascode.tekton.dev/sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pipelinesascode.tekton.dev/sha-title": "Merge pull request #180 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pipelinesascode.tekton.dev/source-branch": "refs/heads/base-uovnpl",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-tenant/results/3a69c030-be51-40ae-9a05-5b5733b01f62/records/6468e943-ded1-489e-90fd-95a894cb1e09",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"testrepo\",\"commit\":\"c4481f5e1453d8c204c7bae0f626b245e6bf6525\",\"eventType\":\"push\"}",
                    "results.tekton.dev/result": "default-tenant/results/3a69c030-be51-40ae-9a05-5b5733b01f62",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/categories": "Git",
                    "tekton.dev/displayName": "git clone oci trusted artifacts",
                    "tekton.dev/pipelines.minVersion": "0.21.0",
                    "tekton.dev/platforms": "linux/amd64,linux/s390x,linux/ppc64le,linux/arm64",
                    "tekton.dev/tags": "git"
                },
                "creationTimestamp": "2026-04-15T23:16:12Z",
                "finalizers": [
                    "chains.tekton.dev",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/version": "v0.37.7",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/component": "tsf-demo-comp",
                    "pipelines.appstudio.openshift.io/type": "build",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552388922",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "tsf-demo-comp-on-push-8m9zl",
                    "tekton.dev/pipelineRun": "tsf-demo-comp-on-push-8m9zl",
                    "tekton.dev/pipelineRunUID": "3a69c030-be51-40ae-9a05-5b5733b01f62",
                    "tekton.dev/pipelineTask": "clone-repository",
                    "tekton.dev/task": "git-clone-oci-ta-min"
                },
                "name": "tsf-demo-comp-on-push-8m9zl-clone-repository",
                "namespace": "default-tenant",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "tsf-demo-comp-on-push-8m9zl",
                        "uid": "3a69c030-be51-40ae-9a05-5b5733b01f62"
                    }
                ],
                "resourceVersion": "33750",
                "uid": "6468e943-ded1-489e-90fd-95a894cb1e09"
            },
            "spec": {
                "params": [
                    {
                        "name": "url",
                        "value": "https://github.com/rhads-tsf-qe/testrepo"
                    },
                    {
                        "name": "revision",
                        "value": "c4481f5e1453d8c204c7bae0f626b245e6bf6525"
                    },
                    {
                        "name": "ociStorage",
                        "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525.git"
                    },
                    {
                        "name": "ociArtifactExpiresAfter",
                        "value": ""
                    }
                ],
                "serviceAccountName": "build-pipeline-tsf-demo-comp",
                "taskRef": {
                    "params": [
                        {
                            "name": "name",
                            "value": "git-clone-oci-ta-min"
                        },
                        {
                            "name": "bundle",
                            "value": "quay.io/konflux-ci/tekton-catalog/task-git-clone-oci-ta-min:0.1@sha256:2fff50eaed7d278c3ed82375d28241eaf6eecbc389ec4d44992721786a0dfa68"
                        },
                        {
                            "name": "kind",
                            "value": "task"
                        }
                    ],
                    "resolver": "bundles"
                },
                "timeout": "1h0m0s",
                "workspaces": [
                    {
                        "name": "basic-auth",
                        "secret": {
                            "secretName": "pac-gitauth-ahlxga"
                        }
                    }
                ]
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:16:28Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:16:28Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "tsf-demo-comp-on-push-8m9zl-clone-repository-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha256": "2fff50eaed7d278c3ed82375d28241eaf6eecbc389ec4d44992721786a0dfa68"
                        },
                        "entryPoint": "git-clone-oci-ta-min",
                        "uri": "quay.io/konflux-ci/tekton-catalog/task-git-clone-oci-ta-min"
                    }
                },
                "results": [
                    {
                        "name": "CHAINS-GIT_COMMIT",
                        "type": "string",
                        "value": "c4481f5e1453d8c204c7bae0f626b245e6bf6525"
                    },
                    {
                        "name": "CHAINS-GIT_URL",
                        "type": "string",
                        "value": "https://github.com/rhads-tsf-qe/testrepo"
                    },
                    {
                        "name": "commit",
                        "type": "string",
                        "value": "c4481f5e1453d8c204c7bae0f626b245e6bf6525"
                    },
                    {
                        "name": "commit-timestamp",
                        "type": "string",
                        "value": "1776294944"
                    },
                    {
                        "name": "short-commit",
                        "type": "string",
                        "value": "c4481f5"
                    },
                    {
                        "name": "url",
                        "type": "string",
                        "value": "https://github.com/rhads-tsf-qe/testrepo"
                    },
                    {
                        "name": "SOURCE_ARTIFACT",
                        "type": "string",
                        "value": "oci:quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:38b4edb1fa7f1c0f510d8d0e9f686ae7fa450d96e478098c517e31b6a0a35953"
                    }
                ],
                "startTime": "2026-04-15T23:16:12Z",
                "steps": [
                    {
                        "container": "step-clone",
                        "imageID": "quay.io/konflux-ci/git-clone@sha256:09ac9c14392b5c2b8057f66cc4abfb8ce5d7214706318959d00908923a754434",
                        "name": "clone",
                        "terminated": {
                            "containerID": "cri-o://462d70ab648b38c9007fd5e6c3e497040813a6bd34c1da74e586497f5ae2a303",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:16:24Z",
                            "message": "[{\"key\":\"CHAINS-GIT_COMMIT\",\"value\":\"c4481f5e1453d8c204c7bae0f626b245e6bf6525\",\"type\":1},{\"key\":\"CHAINS-GIT_URL\",\"value\":\"https://github.com/rhads-tsf-qe/testrepo\",\"type\":1},{\"key\":\"commit\",\"value\":\"c4481f5e1453d8c204c7bae0f626b245e6bf6525\",\"type\":1},{\"key\":\"commit-timestamp\",\"value\":\"1776294944\",\"type\":1},{\"key\":\"short-commit\",\"value\":\"c4481f5\",\"type\":1},{\"key\":\"url\",\"value\":\"https://github.com/rhads-tsf-qe/testrepo\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:16:24Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-symlink-check",
                        "imageID": "quay.io/konflux-ci/git-clone@sha256:09ac9c14392b5c2b8057f66cc4abfb8ce5d7214706318959d00908923a754434",
                        "name": "symlink-check",
                        "terminated": {
                            "containerID": "cri-o://9504699a9c5b0a59dc3552529c15f8cc711f92c5a2c24b717828fe46b2014f80",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:16:25Z",
                            "message": "[{\"key\":\"CHAINS-GIT_COMMIT\",\"value\":\"c4481f5e1453d8c204c7bae0f626b245e6bf6525\",\"type\":1},{\"key\":\"CHAINS-GIT_URL\",\"value\":\"https://github.com/rhads-tsf-qe/testrepo\",\"type\":1},{\"key\":\"commit\",\"value\":\"c4481f5e1453d8c204c7bae0f626b245e6bf6525\",\"type\":1},{\"key\":\"commit-timestamp\",\"value\":\"1776294944\",\"type\":1},{\"key\":\"short-commit\",\"value\":\"c4481f5\",\"type\":1},{\"key\":\"url\",\"value\":\"https://github.com/rhads-tsf-qe/testrepo\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:16:25Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-create-trusted-artifact",
                        "imageID": "quay.io/konflux-ci/build-trusted-artifacts@sha256:15d7dc86012e41b10d1eb37679ec03ee75c96436224fadd0938a49dc537aa4ad",
                        "name": "create-trusted-artifact",
                        "terminated": {
                            "containerID": "cri-o://94b8b8ad44c6bae1c9fee7dfc7fcff8f6fdfbf2de32e64d5f0badf16bc649f31",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:16:28Z",
                            "message": "[{\"key\":\"CHAINS-GIT_COMMIT\",\"value\":\"c4481f5e1453d8c204c7bae0f626b245e6bf6525\",\"type\":1},{\"key\":\"CHAINS-GIT_URL\",\"value\":\"https://github.com/rhads-tsf-qe/testrepo\",\"type\":1},{\"key\":\"SOURCE_ARTIFACT\",\"value\":\"oci:quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:38b4edb1fa7f1c0f510d8d0e9f686ae7fa450d96e478098c517e31b6a0a35953\",\"type\":1},{\"key\":\"commit\",\"value\":\"c4481f5e1453d8c204c7bae0f626b245e6bf6525\",\"type\":1},{\"key\":\"commit-timestamp\",\"value\":\"1776294944\",\"type\":1},{\"key\":\"short-commit\",\"value\":\"c4481f5\",\"type\":1},{\"key\":\"url\",\"value\":\"https://github.com/rhads-tsf-qe/testrepo\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:16:25Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "The git-clone-oci-ta Task will clone a repo from the provided url and store it as a trusted artifact in the provided OCI repository.",
                    "params": [
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data.",
                            "name": "caTrustConfigMapKey",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from.",
                            "name": "caTrustConfigMapName",
                            "type": "string"
                        },
                        {
                            "default": "1",
                            "description": "Perform a shallow clone, fetching only the most recent N commits.",
                            "name": "depth",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Check symlinks in the repo. If they're pointing outside of the repo, the build will fail.\n",
                            "name": "enableSymlinkCheck",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Fetch all tags for the repo.",
                            "name": "fetchTags",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "HTTP proxy server for non-SSL requests.",
                            "name": "httpProxy",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "HTTPS proxy server for SSL requests.",
                            "name": "httpsProxy",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Perform a shallow fetch of the target branch, fetching only the most recent N commits.\nIf empty, fetches the full history of the target branch.\n",
                            "name": "mergeSourceDepth",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "URL of the repository to fetch the target branch from when mergeTargetBranch is true.\nIf empty, uses the same repository (origin). This allows merging a branch from a different repository.\n",
                            "name": "mergeSourceRepoUrl",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Set to \"true\" to merge the targetBranch into the checked-out revision.",
                            "name": "mergeTargetBranch",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Opt out of proxying HTTP/HTTPS requests.",
                            "name": "noProxy",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Expiration date for the trusted artifacts created in the OCI repository. An empty string means the artifacts do not expire.",
                            "name": "ociArtifactExpiresAfter",
                            "type": "string"
                        },
                        {
                            "description": "The OCI repository where the Trusted Artifacts are stored.",
                            "name": "ociStorage",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Refspec to fetch before checking out revision.",
                            "name": "refspec",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Revision to checkout. (branch, tag, sha, ref, etc...)",
                            "name": "revision",
                            "type": "string"
                        },
                        {
                            "default": "7",
                            "description": "Length of short commit SHA",
                            "name": "shortCommitLength",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Define the directory patterns to match or exclude when performing a sparse checkout.",
                            "name": "sparseCheckoutDirectories",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Set the `http.sslVerify` global git config. Setting this to `false` is not advised unless you are sure that you trust your git remote.",
                            "name": "sslVerify",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Comma-separated list of specific submodule paths to initialize and fetch. Only submodules in the specified directories and their subdirectories will be fetched.\nEmpty string fetches all submodules. Parameter \"submodules\" must be set to \"true\" to make this parameter applicable.\n",
                            "name": "submodulePaths",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Initialize and fetch git submodules.",
                            "name": "submodules",
                            "type": "string"
                        },
                        {
                            "default": "main",
                            "description": "The target branch to merge into the revision (if mergeTargetBranch is true).",
                            "name": "targetBranch",
                            "type": "string"
                        },
                        {
                            "description": "Repository URL to clone from.",
                            "name": "url",
                            "type": "string"
                        },
                        {
                            "default": "/tekton/home",
                            "description": "Absolute path to the user's home directory. Set this explicitly if you are running the image as a non-root user.\n",
                            "name": "userHome",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Log the commands that are executed during `git-clone`'s operation.",
                            "name": "verbose",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "The precise commit SHA that was fetched by this Task. This result uses Chains type hinting to include in the provenance.",
                            "name": "CHAINS-GIT_COMMIT",
                            "type": "string"
                        },
                        {
                            "description": "The precise URL that was fetched by this Task. This result uses Chains type hinting to include in the provenance.",
                            "name": "CHAINS-GIT_URL",
                            "type": "string"
                        },
                        {
                            "description": "The Trusted Artifact URI pointing to the artifact with the application source code.",
                            "name": "SOURCE_ARTIFACT",
                            "type": "string"
                        },
                        {
                            "description": "The precise commit SHA that was fetched by this Task.",
                            "name": "commit",
                            "type": "string"
                        },
                        {
                            "description": "The commit timestamp of the checkout",
                            "name": "commit-timestamp",
                            "type": "string"
                        },
                        {
                            "description": "The SHA of the commit after merging the target branch (if the param mergeTargetBranch is true).",
                            "name": "merged_sha",
                            "type": "string"
                        },
                        {
                            "description": "The commit SHA that was fetched by this Task limited to params.shortCommitLength number of characters",
                            "name": "short-commit",
                            "type": "string"
                        },
                        {
                            "description": "The precise URL that was fetched by this Task.",
                            "name": "url",
                            "type": "string"
                        }
                    ],
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "HOME",
                                    "value": "/tekton/home"
                                },
                                {
                                    "name": "PARAM_URL",
                                    "value": "https://github.com/rhads-tsf-qe/testrepo"
                                },
                                {
                                    "name": "PARAM_REVISION",
                                    "value": "c4481f5e1453d8c204c7bae0f626b245e6bf6525"
                                },
                                {
                                    "name": "PARAM_REFSPEC"
                                },
                                {
                                    "name": "PARAM_SUBMODULES",
                                    "value": "true"
                                },
                                {
                                    "name": "PARAM_SUBMODULE_PATHS"
                                },
                                {
                                    "name": "PARAM_DEPTH",
                                    "value": "1"
                                },
                                {
                                    "name": "PARAM_SHORT_COMMIT_LENGTH",
                                    "value": "7"
                                },
                                {
                                    "name": "PARAM_SSL_VERIFY",
                                    "value": "true"
                                },
                                {
                                    "name": "PARAM_HTTP_PROXY"
                                },
                                {
                                    "name": "PARAM_HTTPS_PROXY"
                                },
                                {
                                    "name": "PARAM_NO_PROXY"
                                },
                                {
                                    "name": "PARAM_VERBOSE",
                                    "value": "false"
                                },
                                {
                                    "name": "PARAM_SPARSE_CHECKOUT_DIRECTORIES"
                                },
                                {
                                    "name": "PARAM_USER_HOME",
                                    "value": "/tekton/home"
                                },
                                {
                                    "name": "PARAM_FETCH_TAGS",
                                    "value": "false"
                                },
                                {
                                    "name": "PARAM_MERGE_TARGET_BRANCH",
                                    "value": "false"
                                },
                                {
                                    "name": "PARAM_TARGET_BRANCH",
                                    "value": "main"
                                },
                                {
                                    "name": "PARAM_MERGE_SOURCE_REPO_URL"
                                },
                                {
                                    "name": "PARAM_MERGE_SOURCE_DEPTH"
                                },
                                {
                                    "name": "WORKSPACE_SSH_DIRECTORY_BOUND",
                                    "value": "false"
                                },
                                {
                                    "name": "WORKSPACE_SSH_DIRECTORY_PATH"
                                },
                                {
                                    "name": "WORKSPACE_BASIC_AUTH_DIRECTORY_BOUND",
                                    "value": "true"
                                },
                                {
                                    "name": "WORKSPACE_BASIC_AUTH_DIRECTORY_PATH",
                                    "value": "/workspace/basic-auth"
                                },
                                {
                                    "name": "CHECKOUT_DIR",
                                    "value": "/var/workdir/source"
                                }
                            ],
                            "image": "quay.io/konflux-ci/git-clone@sha256:09ac9c14392b5c2b8057f66cc4abfb8ce5d7214706318959d00908923a754434",
                            "name": "clone",
                            "script": "#!/usr/bin/env sh\nset -eu\n\nif [ \"${PARAM_VERBOSE}\" = \"true\" ]; then\n  set -x\nfi\n\nif [ \"${WORKSPACE_BASIC_AUTH_DIRECTORY_BOUND}\" = \"true\" ]; then\n  if [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.git-credentials\" ] \u0026\u0026 [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.gitconfig\" ]; then\n    cp \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.git-credentials\" \"${PARAM_USER_HOME}/.git-credentials\"\n    cp \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.gitconfig\" \"${PARAM_USER_HOME}/.gitconfig\"\n  # Compatibility with kubernetes.io/basic-auth secrets\n  elif [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/username\" ] \u0026\u0026 [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/password\" ]; then\n    HOSTNAME=$(echo $PARAM_URL | awk -F/ '{print $3}')\n    echo \"https://$(cat ${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/username):$(cat ${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/password)@$HOSTNAME\" \u003e\"${PARAM_USER_HOME}/.git-credentials\"\n    echo -e \"[credential \\\"https://$HOSTNAME\\\"]\\n  helper = store\" \u003e\"${PARAM_USER_HOME}/.gitconfig\"\n  else\n    echo \"Unknown basic-auth workspace format\"\n    exit 1\n  fi\n  chmod 400 \"${PARAM_USER_HOME}/.git-credentials\"\n  chmod 400 \"${PARAM_USER_HOME}/.gitconfig\"\nfi\n\n# Should be called after the gitconfig is copied from the repository secret\nca_bundle=/mnt/trusted-ca/ca-bundle.crt\nif [ -f \"$ca_bundle\" ]; then\n  echo \"INFO: Using mounted CA bundle: $ca_bundle\"\n  git config --global http.sslCAInfo \"$ca_bundle\"\nfi\n\nif [ \"${WORKSPACE_SSH_DIRECTORY_BOUND}\" = \"true\" ]; then\n  cp -R \"${WORKSPACE_SSH_DIRECTORY_PATH}\" \"${PARAM_USER_HOME}\"/.ssh\n  chmod 700 \"${PARAM_USER_HOME}\"/.ssh\n  chmod -R 400 \"${PARAM_USER_HOME}\"/.ssh/*\nfi\n\ntest -z \"${PARAM_HTTP_PROXY}\" || export HTTP_PROXY=\"${PARAM_HTTP_PROXY}\"\ntest -z \"${PARAM_HTTPS_PROXY}\" || export HTTPS_PROXY=\"${PARAM_HTTPS_PROXY}\"\ntest -z \"${PARAM_NO_PROXY}\" || export NO_PROXY=\"${PARAM_NO_PROXY}\"\n\n/ko-app/git-init \\\n  -url=\"${PARAM_URL}\" \\\n  -revision=\"${PARAM_REVISION}\" \\\n  -refspec=\"${PARAM_REFSPEC}\" \\\n  -path=\"${CHECKOUT_DIR}\" \\\n  -sslVerify=\"${PARAM_SSL_VERIFY}\" \\\n  -submodules=\"${PARAM_SUBMODULES}\" \\\n  -submodulePaths=\"${PARAM_SUBMODULE_PATHS}\" \\\n  -depth=\"${PARAM_DEPTH}\" \\\n  -sparseCheckoutDirectories=\"${PARAM_SPARSE_CHECKOUT_DIRECTORIES}\" \\\n  -retryMaxAttempts=10\ncd \"${CHECKOUT_DIR}\"\nRESULT_SHA=\"$(git rev-parse HEAD)\"\nRESULT_SHA_SHORT=\"$(git rev-parse --short=\"${PARAM_SHORT_COMMIT_LENGTH}\" HEAD)\"\n\nif [ \"${PARAM_MERGE_TARGET_BRANCH}\" = \"true\" ]; then\n  echo \"Merge option enabled. Attempting to merge target branch '${PARAM_TARGET_BRANCH}' into HEAD (${RESULT_SHA}).\"\n\n  if [ \"${PARAM_DEPTH}\" = \"1\" ]; then\n    echo \"WARNING: Shallow clone with depth=1 may cause merge conflicts due to insufficient commit history.\" \u003e\u00262\n  fi\n\n  if [ \"${PARAM_MERGE_SOURCE_DEPTH}\" = \"1\" ]; then\n    echo \"WARNING: Shallow fetch with mergeSourceDepth=1 may cause merge conflicts due to insufficient commit history.\" \u003e\u00262\n  fi\n\n  # Determine if merging from a different repository or the same one\n  if [ -n \"${PARAM_MERGE_SOURCE_REPO_URL}\" ]; then\n    # Normalize URLs for comparison (remove trailing slashes and .git suffix)\n    normalize_url() {\n      echo \"$1\" | sed -e 's#/$##' -e 's#\\.git$##'\n    }\n\n    NORMALIZED_ORIGIN_URL=$(normalize_url \"${PARAM_URL}\")\n    NORMALIZED_MERGE_URL=$(normalize_url \"${PARAM_MERGE_SOURCE_REPO_URL}\")\n\n    if [ \"${NORMALIZED_ORIGIN_URL}\" = \"${NORMALIZED_MERGE_URL}\" ]; then\n      echo \"Merge source URL is the same as origin. Using existing 'origin' remote.\"\n      MERGE_REMOTE=\"origin\"\n    else\n      echo \"Merging from different repository: ${PARAM_MERGE_SOURCE_REPO_URL}\"\n      echo \"Adding remote 'merge-source'...\"\n      git remote add merge-source \"${PARAM_MERGE_SOURCE_REPO_URL}\"\n      MERGE_REMOTE=\"merge-source\"\n    fi\n  else\n    echo \"Merging from the same repository (origin)\"\n    MERGE_REMOTE=\"origin\"\n  fi\n\n  echo \"Fetching target branch '${PARAM_TARGET_BRANCH}' from ${MERGE_REMOTE}...\"\n  if [ -n \"${PARAM_MERGE_SOURCE_DEPTH}\" ]; then\n    retry git fetch --depth=\"${PARAM_MERGE_SOURCE_DEPTH}\" ${MERGE_REMOTE} \"${PARAM_TARGET_BRANCH}\"\n  else\n    retry git fetch ${MERGE_REMOTE} \"${PARAM_TARGET_BRANCH}\"\n  fi\n\n  echo \"Merging ${MERGE_REMOTE}/${PARAM_TARGET_BRANCH} into current HEAD...\"\n  git config --global user.email \"tekton-git-clone@tekton.dev\"\n  git config --global user.name \"Tekton Git Clone Task\"\n\n  if ! git merge FETCH_HEAD --no-commit --no-ff --allow-unrelated-histories; then\n    echo \"ERROR: Merge conflict detected or merge failed before commit.\" \u003e\u00262\n    echo \"--- Git Status ---\"\n    git status\n    echo \"------------------\"\n    exit 1\n  fi\n\n  # Check if there are changes staged for commit\n  if git diff --staged --quiet; then\n    echo \"No diff was found, skipping merge...\" \u003e\u00262\n  else\n    echo \"Merge successful (no conflicts found), committing...\"\n    if ! git commit -m \"Merge branch '${PARAM_TARGET_BRANCH}' from ${MERGE_REMOTE} into ${RESULT_SHA}\"; then\n      echo \"ERROR: Failed to commit merge.\" \u003e\u00262\n      exit 1\n    fi\n    MERGED_SHA=$(git rev-parse HEAD)\n    echo \"New HEAD after merge: ${MERGED_SHA}\"\n    echo \"${MERGED_SHA}\" \u003e\"/tekton/results/merged_sha\"\n  fi\n\nelse\n  echo \"Merge option disabled. Using checked-out revision ${RESULT_SHA} directly.\"\nfi\nprintf \"%s\" \"${RESULT_SHA}\" \u003e\"/tekton/results/commit\"\nprintf \"%s\" \"${RESULT_SHA}\" \u003e\"/tekton/results/CHAINS-GIT_COMMIT\"\nprintf \"%s\" \"${RESULT_SHA_SHORT}\" \u003e\"/tekton/results/short-commit\"\nprintf \"%s\" \"${PARAM_URL}\" \u003e\"/tekton/results/url\"\nprintf \"%s\" \"${PARAM_URL}\" \u003e\"/tekton/results/CHAINS-GIT_URL\"\nprintf \"%s\" \"$(git log -1 --pretty=%ct)\" \u003e\"/tekton/results/commit-timestamp\"\n\nif [ \"${PARAM_FETCH_TAGS}\" = \"true\" ]; then\n  echo \"Fetching tags\"\n  retry git fetch --tags\nfi\n",
                            "securityContext": {
                                "runAsUser": 0
                            },
                            "volumeMounts": [
                                {
                                    "mountPath": "/mnt/trusted-ca",
                                    "name": "trusted-ca",
                                    "readOnly": true
                                },
                                {
                                    "mountPath": "/var/workdir",
                                    "name": "workdir"
                                }
                            ]
                        },
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "PARAM_ENABLE_SYMLINK_CHECK",
                                    "value": "true"
                                },
                                {
                                    "name": "CHECKOUT_DIR",
                                    "value": "/var/workdir/source"
                                }
                            ],
                            "image": "quay.io/konflux-ci/git-clone@sha256:09ac9c14392b5c2b8057f66cc4abfb8ce5d7214706318959d00908923a754434",
                            "name": "symlink-check",
                            "script": "#!/usr/bin/env bash\nset -euo pipefail\n\ncheck_symlinks() {\n  FOUND_SYMLINK_POINTING_OUTSIDE_OF_REPO=false\n  while read -r symlink; do\n    target=$(readlink -m \"$symlink\")\n    if ! [[ \"$target\" =~ ^$CHECKOUT_DIR ]]; then\n      echo \"The cloned repository contains symlink pointing outside of the cloned repository: $symlink\"\n      FOUND_SYMLINK_POINTING_OUTSIDE_OF_REPO=true\n    fi\n  done \u003c \u003c(find $CHECKOUT_DIR -type l -print)\n  if [ \"$FOUND_SYMLINK_POINTING_OUTSIDE_OF_REPO\" = true ]; then\n    return 1\n  fi\n}\n\nif [ \"${PARAM_ENABLE_SYMLINK_CHECK}\" = \"true\" ]; then\n  echo \"Running symlink check\"\n  check_symlinks\nfi\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/var/workdir",
                                    "name": "workdir"
                                }
                            ]
                        },
                        {
                            "args": [
                                "create",
                                "--store",
                                "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525.git",
                                "/tekton/results/SOURCE_ARTIFACT=/var/workdir/source"
                            ],
                            "computeResources": {
                                "limits": {
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "IMAGE_EXPIRES_AFTER"
                                }
                            ],
                            "image": "quay.io/konflux-ci/build-trusted-artifacts:latest@sha256:15d7dc86012e41b10d1eb37679ec03ee75c96436224fadd0938a49dc537aa4ad",
                            "name": "create-trusted-artifact",
                            "volumeMounts": [
                                {
                                    "mountPath": "/var/workdir",
                                    "name": "workdir"
                                },
                                {
                                    "mountPath": "/etc/pki/tls/certs/ca-custom-bundle.crt",
                                    "name": "trusted-ca",
                                    "readOnly": true,
                                    "subPath": "ca-bundle.crt"
                                }
                            ]
                        }
                    ],
                    "volumes": [
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        },
                        {
                            "emptyDir": {},
                            "name": "workdir"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "A Workspace containing a .gitconfig and .git-credentials file or username and password.\nThese will be copied to the user's home before any git commands are run. Any\nother files in this Workspace are ignored. It is strongly recommended\nto use ssh-directory over basic-auth whenever possible and to bind a\nSecret to this Workspace over other volume types.\n",
                            "name": "basic-auth",
                            "optional": true
                        },
                        {
                            "description": "A .ssh directory with private key, known_hosts, config, etc. Copied to\nthe user's home before git commands are executed. Used to authenticate\nwith the git remote when performing the clone. Binding a Secret to this\nWorkspace is strongly recommended over other volume types.\n",
                            "name": "ssh-directory",
                            "optional": true
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.openshift.io/repo": "https://github.com/rhads-tsf-qe/testrepo?rev=c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "build.appstudio.redhat.com/commit_sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "build.appstudio.redhat.com/target_branch": "base-uovnpl",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=27",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "pipelinesascode.tekton.dev/branch": "base-uovnpl",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552388922",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-ahlxga",
                    "pipelinesascode.tekton.dev/git-provider": "github",
                    "pipelinesascode.tekton.dev/installation-id": "112348674",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-push-8m9zl",
                    "pipelinesascode.tekton.dev/max-keep-runs": "3",
                    "pipelinesascode.tekton.dev/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-uovnpl\"",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-ci-tests-bot",
                    "pipelinesascode.tekton.dev/sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pipelinesascode.tekton.dev/sha-title": "Merge pull request #180 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pipelinesascode.tekton.dev/source-branch": "refs/heads/base-uovnpl",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-tenant/results/3a69c030-be51-40ae-9a05-5b5733b01f62/records/37f090b6-7219-4807-89c8-e6981892de56",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"testrepo\",\"commit\":\"c4481f5e1453d8c204c7bae0f626b245e6bf6525\",\"eventType\":\"push\"}",
                    "results.tekton.dev/result": "default-tenant/results/3a69c030-be51-40ae-9a05-5b5733b01f62",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "konflux"
                },
                "creationTimestamp": "2026-04-15T23:19:59Z",
                "finalizers": [
                    "chains.tekton.dev",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/version": "v0.37.7",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/component": "tsf-demo-comp",
                    "pipelines.appstudio.openshift.io/type": "build",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552388922",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "tsf-demo-comp-on-push-8m9zl",
                    "tekton.dev/pipelineRun": "tsf-demo-comp-on-push-8m9zl",
                    "tekton.dev/pipelineRunUID": "3a69c030-be51-40ae-9a05-5b5733b01f62",
                    "tekton.dev/pipelineTask": "deprecated-base-image-check",
                    "tekton.dev/task": "deprecated-image-check"
                },
                "name": "tsf-demo-comp-on-push-8m9zl-deprecated-base-image-check",
                "namespace": "default-tenant",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "tsf-demo-comp-on-push-8m9zl",
                        "uid": "3a69c030-be51-40ae-9a05-5b5733b01f62"
                    }
                ],
                "resourceVersion": "38326",
                "uid": "37f090b6-7219-4807-89c8-e6981892de56"
            },
            "spec": {
                "params": [
                    {
                        "name": "IMAGE_URL",
                        "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525"
                    },
                    {
                        "name": "IMAGE_DIGEST",
                        "value": "sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6"
                    }
                ],
                "serviceAccountName": "build-pipeline-tsf-demo-comp",
                "taskRef": {
                    "params": [
                        {
                            "name": "name",
                            "value": "deprecated-image-check"
                        },
                        {
                            "name": "bundle",
                            "value": "quay.io/konflux-ci/tekton-catalog/task-deprecated-image-check:0.5@sha256:3457a4ca93f8d55f14ebd407532b1223c689eacc34f0abb3003db4111667bdae"
                        },
                        {
                            "name": "kind",
                            "value": "task"
                        }
                    ],
                    "resolver": "bundles"
                },
                "timeout": "1h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:21:40Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:21:40Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "tsf-demo-comp-on-push-8m9zl-deprecated-base-image-check-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha256": "3457a4ca93f8d55f14ebd407532b1223c689eacc34f0abb3003db4111667bdae"
                        },
                        "entryPoint": "deprecated-image-check",
                        "uri": "quay.io/konflux-ci/tekton-catalog/task-deprecated-image-check"
                    }
                },
                "results": [
                    {
                        "name": "IMAGES_PROCESSED",
                        "type": "string",
                        "value": "{\"image\": {\"pullspec\": \"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525\", \"digests\": [\"sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6\"]}}\n"
                    },
                    {
                        "name": "TEST_OUTPUT",
                        "type": "string",
                        "value": "{\"result\":\"SUCCESS\",\"timestamp\":\"2026-04-15T23:21:39+00:00\",\"note\":\"Task deprecated-image-check completed: Check result for task result.\",\"namespace\":\"required_checks\",\"successes\":1,\"failures\":0,\"warnings\":0}\n"
                    }
                ],
                "startTime": "2026-04-15T23:19:59Z",
                "steps": [
                    {
                        "container": "step-check-images",
                        "imageID": "quay.io/konflux-ci/konflux-test@sha256:3bba1fe5ad96bd3811f34b367487192683aa9b1ba343da4885dda565b0a7207e",
                        "name": "check-images",
                        "terminated": {
                            "containerID": "cri-o://3072612adf0bafaac7f9f570cc30a62b4bd5a0e22d85230768bada61d73e4d0b",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:21:40Z",
                            "message": "[{\"key\":\"IMAGES_PROCESSED\",\"value\":\"{\\\"image\\\": {\\\"pullspec\\\": \\\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525\\\", \\\"digests\\\": [\\\"sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6\\\"]}}\\n\",\"type\":1},{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"result\\\":\\\"SUCCESS\\\",\\\"timestamp\\\":\\\"2026-04-15T23:21:39+00:00\\\",\\\"note\\\":\\\"Task deprecated-image-check completed: Check result for task result.\\\",\\\"namespace\\\":\\\"required_checks\\\",\\\"successes\\\":1,\\\"failures\\\":0,\\\"warnings\\\":0}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:21:31Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Identifies the unmaintained and potentially insecure deprecated base images. Pyxis API collects metadata from image repository, and Conftest applies supplied policy to identify the deprecated images using that metadata.",
                    "params": [
                        {
                            "default": "/project/repository/",
                            "description": "Path to directory containing Conftest policies.",
                            "name": "POLICY_DIR",
                            "type": "string"
                        },
                        {
                            "default": "required_checks",
                            "description": "Namespace for Conftest policy.",
                            "name": "POLICY_NAMESPACE",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Digests of base build images.",
                            "name": "BASE_IMAGES_DIGESTS",
                            "type": "string"
                        },
                        {
                            "description": "Fully qualified image name.",
                            "name": "IMAGE_URL",
                            "type": "string"
                        },
                        {
                            "description": "Image digest.",
                            "name": "IMAGE_DIGEST",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from.",
                            "name": "CA_TRUST_CONFIG_MAP_NAME",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data.",
                            "name": "CA_TRUST_CONFIG_MAP_KEY",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Tekton task test output.",
                            "name": "TEST_OUTPUT",
                            "type": "string"
                        },
                        {
                            "description": "Images processed in the task.",
                            "name": "IMAGES_PROCESSED",
                            "type": "string"
                        }
                    ],
                    "steps": [
                        {
                            "computeResources": {
                                "limits": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "POLICY_DIR",
                                    "value": "/project/repository/"
                                },
                                {
                                    "name": "POLICY_NAMESPACE",
                                    "value": "required_checks"
                                },
                                {
                                    "name": "BASE_IMAGES_DIGESTS"
                                },
                                {
                                    "name": "IMAGE_URL",
                                    "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525"
                                },
                                {
                                    "name": "IMAGE_DIGEST",
                                    "value": "sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6"
                                }
                            ],
                            "image": "quay.io/konflux-ci/konflux-test:v1.4.49@sha256:74899c7a3dde27548e1ad9c665055bfef56c227251bd9224885f4bbd7addebd9",
                            "name": "check-images",
                            "script": "#!/usr/bin/env bash\nset -euo pipefail\nsource /utils.sh\ntrap 'handle_error /tekton/results/TEST_OUTPUT' EXIT\n\nIMAGES_TO_BE_PROCESSED_PATH=\"/tmp/images_to_be_processed.txt\"\ntouch /tmp/images_to_be_processed.txt\n\nsuccess_counter=0\nfailure_counter=0\nerror_counter=0\nwarnings_counter=0\n\nimages_processed_template='{\"image\": {\"pullspec\": \"'\"$IMAGE_URL\"'\", \"digests\": [%s]}}'\ndigests_processed=()\n\nimagewithouttag=$(echo -n $IMAGE_URL | sed \"s/\\(.*\\):.*/\\1/\")\n# strip new-line escape symbol from parameter and save it to variable\nimageanddigest=$(echo -n $imagewithouttag@$IMAGE_DIGEST)\n\n# Get the arch and image manifests by inspecting the image. This is mainly for identifying image indexes\nimage_manifests=$(get_image_manifests -i \"${imageanddigest}\")\nif [ -n \"$image_manifests\" ]; then\n  while read -r arch arch_sha; do\n    SBOM_FILE_PATH=$(echo \"/tmp/sbom-$arch.json\")\n    arch_imageanddigest=$(echo $imagewithouttag@$arch_sha)\n\n    # Get base images from SBOM\n    cosign download sbom $arch_imageanddigest \u003e ${SBOM_FILE_PATH}\n    if [ $? -ne 0 ]; then\n      echo \"Unable to download sbom for arch $arch.\"\n      continue\n    fi\n\n    \u003c \"${SBOM_FILE_PATH}\" jq -r '\n        if .bomFormat == \"CycloneDX\" then\n            .formulation[]?\n            | .components[]?\n            | select(any(.properties[]?; .name | test(\"^konflux:container:is_(base|builder)_image\")))\n            | (\n                .purl\n                | capture(\"^pkg:oci/.*?@(?\u003cdigest\u003e[a-z0-9]+:[a-f0-9]+)(?:\\\\?[^#]*repository_url=(?\u003crepository_url\u003e[^\u0026#]*))?\")\n              ) as $matched\n            | $matched.repository_url\n        else\n            .packages[]\n            | select(any(.annotations[]?.comment; (fromjson?).name? | test(\"^konflux:container:is_(base|builder)_image\")?))\n            | [.externalRefs[]? | select(.referenceType == \"purl\").referenceLocator] as $purls\n            | (\n                $purls | first\n                | capture(\"^pkg:oci/.*?@(?\u003cdigest\u003e[a-z0-9]+:[a-f0-9]+)(?:\\\\?[^#]*repository_url=(?\u003crepository_url\u003e[^\u0026#]*))?\")\n              ) as $matched\n            | $matched.repository_url\n        end\n    ' \u003e\u003e \"${IMAGES_TO_BE_PROCESSED_PATH}\"\n    echo \"Detected base images from $arch SBOM:\"\n    cat \"${IMAGES_TO_BE_PROCESSED_PATH}\"\n    echo \"\"\n\n    digests_processed+=(\"\\\"$arch_sha\\\"\")\n  done \u003c \u003c(echo \"$image_manifests\" | jq -r 'to_entries[] | \"\\(.key) \\(.value)\"')\nelse\n  echo \"Failed to get image manifests from image \\\"$imageanddigest\\\"\"\n  note=\"Task deprecated-image-check failed: Failed to get image manifests from image \\\"$imageanddigest\\\". For details, check Tekton task log.\"\n  ERROR_OUTPUT=$(make_result_json -r \"ERROR\" -t \"$note\")\n  echo \"${ERROR_OUTPUT}\" | tee \"/tekton/results/TEST_OUTPUT\"\n  exit 0\nfi\n\n# If the image is an Image Index, also add the Image Index digest to the list.\nif [[ \"${digests_processed[*]}\" != *\"$IMAGE_DIGEST\"* ]]; then\n  digests_processed+=(\"\\\"$IMAGE_DIGEST\\\"\")\nfi\n\ndigests_processed_string=$(IFS=,; echo \"${digests_processed[*]}\")\n\nif [ -n \"${BASE_IMAGES_DIGESTS}\" ];\nthen\n  echo \"Base images passed by param BASE_IMAGES_DIGESTS: $BASE_IMAGES_DIGESTS\"\n  # Get images from the parameter\n  for IMAGE_WITH_TAG in $(echo -n \"$BASE_IMAGES_DIGESTS\" | sed 's/\\\\n/\\'$'\\n''/g' );\n  do\n    echo $IMAGE_WITH_TAG | cut -d \":\" -f1 \u003e\u003e ${IMAGES_TO_BE_PROCESSED_PATH}\n  done\nfi\n\n# we want to remove duplicated entries\nBASE_IMAGES=$(sort -u \"${IMAGES_TO_BE_PROCESSED_PATH}\")\n\necho \"Images to be checked:\"\necho \"$BASE_IMAGES\"\necho \"\"\n\nfor BASE_IMAGE in ${BASE_IMAGES};\ndo\n  IFS=:'/' read -r IMAGE_REGISTRY IMAGE_REPOSITORY\u003c\u003c\u003c $BASE_IMAGE\n\n  # Red Hat Catalog hack: registry.redhat.io must be queried as registry.access.redhat.com in Red Hat catalog\n  IMAGE_REGISTRY_CATALOG=$(echo \"${IMAGE_REGISTRY}\" | sed 's/^registry.redhat.io$/registry.access.redhat.com/')\n\n  export IMAGE_REPO_PATH=/tmp/${IMAGE_REPOSITORY}\n  mkdir -p ${IMAGE_REPO_PATH}\n  echo \"Querying Red Hat Catalog for $BASE_IMAGE.\"\n  http_code=$(curl -s -o ${IMAGE_REPO_PATH}/repository_data.json -w '%{http_code}' \"https://catalog.redhat.com/api/containers/v1/repositories/registry/${IMAGE_REGISTRY_CATALOG}/repository/${IMAGE_REPOSITORY}\")\n\n  if [ \"$http_code\" == \"200\" ];\n  then\n    echo \"Running conftest using $POLICY_DIR policy, $POLICY_NAMESPACE namespace.\"\n    /usr/bin/conftest test --no-fail ${IMAGE_REPO_PATH}/repository_data.json \\\n    --policy $POLICY_DIR --namespace $POLICY_NAMESPACE \\\n    --output=json | tee ${IMAGE_REPO_PATH}/deprecated_image_check_output.json\n\n    failures_num=$(jq -r '.[].failures|length' ${IMAGE_REPO_PATH}/deprecated_image_check_output.json)\n    if [[ \"${failures_num}\" -gt 0 ]]; then\n      echo \"[FAILURE] Image ${IMAGE_REGISTRY}/${IMAGE_REPOSITORY} has been deprecated\"\n    fi\n    failure_counter=$((failure_counter+failures_num))\n\n    successes_num=$(jq -r '.[].successes' ${IMAGE_REPO_PATH}/deprecated_image_check_output.json)\n    if [[ \"${successes_num}\" -gt 0 ]]; then\n      echo \"[SUCCESS] Image ${IMAGE_REGISTRY}/${IMAGE_REPOSITORY} is valid\"\n    fi\n    success_counter=$((success_counter+successes_num))\n\n  elif [ \"$http_code\" == \"404\" ];\n  then\n    echo \"[WARNING] Registry/image ${IMAGE_REGISTRY}/${IMAGE_REPOSITORY} not found in Red Hat Catalog. Task cannot provide results if image is deprecated.\"\n    warnings_counter=$((warnings_counter+1))\n  else\n    echo \"[ERROR] Unexpected error (HTTP code: ${http_code}) occurred for registry/image ${IMAGE_REGISTRY}/${IMAGE_REPOSITORY}.\"\n    error_counter=$((error_counter+1))\n  fi\ndone\n\nnote=\"Task deprecated-image-check failed: Command conftest failed. For details, check Tekton task log.\"\nERROR_OUTPUT=$(make_result_json -r ERROR -n \"$POLICY_NAMESPACE\" -t \"$note\")\n\nnote=\"Task deprecated-image-check completed: Check result for task result.\"\nif [[ \"$error_counter\" == 0 ]];\nthen\n  if [[ \"${failure_counter}\" -gt 0 ]]; then\n    RES=\"FAILURE\"\n  elif [[ \"${warnings_counter}\" -gt 0 ]]; then\n    RES=\"WARNING\"\n  elif [[ \"${success_counter}\" -eq 0 ]]; then\n    # when all counters are 0, there are no base images to check\n    note=\"Task deprecated-image-check success: No base images to check.\"\n    RES=\"SUCCESS\"\n  else\n    RES=\"SUCCESS\"\n  fi\n  TEST_OUTPUT=$(make_result_json \\\n    -r \"${RES}\" -n \"$POLICY_NAMESPACE\" \\\n    -s \"${success_counter}\" -f \"${failure_counter}\" -w \"${warnings_counter}\" -t \"$note\")\nfi\necho \"${TEST_OUTPUT:-${ERROR_OUTPUT}}\" | tee /tekton/results/TEST_OUTPUT\n\necho \"${images_processed_template/\\[%s]/[$digests_processed_string]}\" | tee /tekton/results/IMAGES_PROCESSED\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/etc/pki/tls/certs/ca-custom-bundle.crt",
                                    "name": "trusted-ca",
                                    "readOnly": true,
                                    "subPath": "ca-bundle.crt"
                                }
                            ]
                        }
                    ],
                    "volumes": [
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.openshift.io/repo": "https://github.com/rhads-tsf-qe/testrepo?rev=c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "build.appstudio.redhat.com/commit_sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "build.appstudio.redhat.com/target_branch": "base-uovnpl",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=0",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "pipelinesascode.tekton.dev/branch": "base-uovnpl",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552388922",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-ahlxga",
                    "pipelinesascode.tekton.dev/git-provider": "github",
                    "pipelinesascode.tekton.dev/installation-id": "112348674",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-push-8m9zl",
                    "pipelinesascode.tekton.dev/max-keep-runs": "3",
                    "pipelinesascode.tekton.dev/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-uovnpl\"",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-ci-tests-bot",
                    "pipelinesascode.tekton.dev/sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pipelinesascode.tekton.dev/sha-title": "Merge pull request #180 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pipelinesascode.tekton.dev/source-branch": "refs/heads/base-uovnpl",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-tenant/results/3a69c030-be51-40ae-9a05-5b5733b01f62/records/24eef811-b86e-4848-b0bf-1515355dd6c9",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"testrepo\",\"commit\":\"c4481f5e1453d8c204c7bae0f626b245e6bf6525\",\"eventType\":\"push\"}",
                    "results.tekton.dev/result": "default-tenant/results/3a69c030-be51-40ae-9a05-5b5733b01f62",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "konflux"
                },
                "creationTimestamp": "2026-04-15T23:15:54Z",
                "finalizers": [
                    "results.tekton.dev/taskrun",
                    "chains.tekton.dev"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/version": "v0.37.7",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/component": "tsf-demo-comp",
                    "pipelines.appstudio.openshift.io/type": "build",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552388922",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "tsf-demo-comp-on-push-8m9zl",
                    "tekton.dev/pipelineRun": "tsf-demo-comp-on-push-8m9zl",
                    "tekton.dev/pipelineRunUID": "3a69c030-be51-40ae-9a05-5b5733b01f62",
                    "tekton.dev/pipelineTask": "init",
                    "tekton.dev/task": "init"
                },
                "name": "tsf-demo-comp-on-push-8m9zl-init",
                "namespace": "default-tenant",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "tsf-demo-comp-on-push-8m9zl",
                        "uid": "3a69c030-be51-40ae-9a05-5b5733b01f62"
                    }
                ],
                "resourceVersion": "33530",
                "uid": "24eef811-b86e-4848-b0bf-1515355dd6c9"
            },
            "spec": {
                "params": [
                    {
                        "name": "enable-cache-proxy",
                        "value": "false"
                    }
                ],
                "serviceAccountName": "build-pipeline-tsf-demo-comp",
                "taskRef": {
                    "params": [
                        {
                            "name": "name",
                            "value": "init"
                        },
                        {
                            "name": "bundle",
                            "value": "quay.io/konflux-ci/tekton-catalog/task-init:0.4@sha256:288f3106118edc1d0f0c79a89c960abf5841a4dd8bc3f38feb10527253105b19"
                        },
                        {
                            "name": "kind",
                            "value": "task"
                        }
                    ],
                    "resolver": "bundles"
                },
                "timeout": "1h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:16:12Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:16:12Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "tsf-demo-comp-on-push-8m9zl-init-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha256": "288f3106118edc1d0f0c79a89c960abf5841a4dd8bc3f38feb10527253105b19"
                        },
                        "entryPoint": "init",
                        "uri": "quay.io/konflux-ci/tekton-catalog/task-init"
                    }
                },
                "results": [
                    {
                        "name": "http-proxy",
                        "type": "string",
                        "value": ""
                    },
                    {
                        "name": "no-proxy",
                        "type": "string",
                        "value": ""
                    }
                ],
                "startTime": "2026-04-15T23:15:54Z",
                "steps": [
                    {
                        "container": "step-init",
                        "imageID": "quay.io/konflux-ci/konflux-build-cli@sha256:2d1039b614888ca46d5d771ca886a5843e56ac9acf7210040a61075371338247",
                        "name": "init",
                        "terminated": {
                            "containerID": "cri-o://ece75e2144629edad2ca327e17e21aa035f3299a00946e0ef0a96a3f3243345c",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:16:11Z",
                            "message": "[{\"key\":\"http-proxy\",\"value\":\"\",\"type\":1},{\"key\":\"no-proxy\",\"value\":\"\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:16:11Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Initialize Pipeline Task, enables configuration for cache-proxy if required during the PipelineRun.",
                    "params": [
                        {
                            "default": "false",
                            "description": "Enable cache proxy configuration",
                            "name": "enable-cache-proxy",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "HTTP proxy URL for cache proxy (when enable-cache-proxy is true)",
                            "name": "http-proxy",
                            "type": "string"
                        },
                        {
                            "description": "NO_PROXY value for cache proxy (when enable-cache-proxy is true)",
                            "name": "no-proxy",
                            "type": "string"
                        }
                    ],
                    "steps": [
                        {
                            "args": [
                                "--enable",
                                "false"
                            ],
                            "command": [
                                "konflux-build-cli",
                                "config",
                                "cache-proxy"
                            ],
                            "computeResources": {
                                "limits": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "KBC_LOG_LEVEL",
                                    "value": "info"
                                },
                                {
                                    "name": "DEFAULT_HTTP_PROXY",
                                    "value": "squid.caching.svc.cluster.local:3128"
                                },
                                {
                                    "name": "DEFAULT_NO_PROXY",
                                    "value": "brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai"
                                },
                                {
                                    "name": "HTTP_PROXY_RESULTS_PATH",
                                    "value": "/tekton/results/http-proxy"
                                },
                                {
                                    "name": "NO_PROXY_RESULTS_PATH",
                                    "value": "/tekton/results/no-proxy"
                                }
                            ],
                            "image": "quay.io/konflux-ci/konflux-build-cli@sha256:59f2ea93fa4d47342b54acb434422ee07ebccd927a06a00d3f3eca70f8356ddf",
                            "name": "init"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.openshift.io/repo": "https://github.com/rhads-tsf-qe/testrepo?rev=c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "build.appstudio.redhat.com/commit_sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "build.appstudio.redhat.com/target_branch": "base-uovnpl",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=6",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "pipelinesascode.tekton.dev/branch": "base-uovnpl",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552388922",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-ahlxga",
                    "pipelinesascode.tekton.dev/git-provider": "github",
                    "pipelinesascode.tekton.dev/installation-id": "112348674",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-push-8m9zl",
                    "pipelinesascode.tekton.dev/max-keep-runs": "3",
                    "pipelinesascode.tekton.dev/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-uovnpl\"",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-ci-tests-bot",
                    "pipelinesascode.tekton.dev/sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pipelinesascode.tekton.dev/sha-title": "Merge pull request #180 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pipelinesascode.tekton.dev/source-branch": "refs/heads/base-uovnpl",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-tenant/results/3a69c030-be51-40ae-9a05-5b5733b01f62/records/e3135a10-60be-4438-8bac-ab8dbe56323c",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"testrepo\",\"commit\":\"c4481f5e1453d8c204c7bae0f626b245e6bf6525\",\"eventType\":\"push\"}",
                    "results.tekton.dev/result": "default-tenant/results/3a69c030-be51-40ae-9a05-5b5733b01f62",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "image-build, konflux"
                },
                "creationTimestamp": "2026-04-15T23:16:29Z",
                "finalizers": [
                    "results.tekton.dev/taskrun",
                    "chains.tekton.dev"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/version": "v0.37.7",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/component": "tsf-demo-comp",
                    "pipelines.appstudio.openshift.io/type": "build",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552388922",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "tsf-demo-comp-on-push-8m9zl",
                    "tekton.dev/pipelineRun": "tsf-demo-comp-on-push-8m9zl",
                    "tekton.dev/pipelineRunUID": "3a69c030-be51-40ae-9a05-5b5733b01f62",
                    "tekton.dev/pipelineTask": "prefetch-dependencies",
                    "tekton.dev/task": "prefetch-dependencies-oci-ta-min"
                },
                "name": "tsf-demo-comp-on-push-8m9zl-prefetch-dependencies",
                "namespace": "default-tenant",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "tsf-demo-comp-on-push-8m9zl",
                        "uid": "3a69c030-be51-40ae-9a05-5b5733b01f62"
                    }
                ],
                "resourceVersion": "34717",
                "uid": "e3135a10-60be-4438-8bac-ab8dbe56323c"
            },
            "spec": {
                "params": [
                    {
                        "name": "input",
                        "value": ""
                    },
                    {
                        "name": "SOURCE_ARTIFACT",
                        "value": "oci:quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:38b4edb1fa7f1c0f510d8d0e9f686ae7fa450d96e478098c517e31b6a0a35953"
                    },
                    {
                        "name": "ociStorage",
                        "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525.prefetch"
                    },
                    {
                        "name": "ociArtifactExpiresAfter",
                        "value": ""
                    }
                ],
                "serviceAccountName": "build-pipeline-tsf-demo-comp",
                "taskRef": {
                    "params": [
                        {
                            "name": "name",
                            "value": "prefetch-dependencies-oci-ta-min"
                        },
                        {
                            "name": "bundle",
                            "value": "quay.io/konflux-ci/tekton-catalog/task-prefetch-dependencies-oci-ta-min:0.3@sha256:1a41e7ee19f9e02874b4ef1f74e6f588a7601deaf5b30ca0862808e5760cea5d"
                        },
                        {
                            "name": "kind",
                            "value": "task"
                        }
                    ],
                    "resolver": "bundles"
                },
                "timeout": "1h0m0s",
                "workspaces": [
                    {
                        "name": "git-basic-auth",
                        "secret": {
                            "secretName": "pac-gitauth-ahlxga"
                        }
                    }
                ]
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:17:12Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:17:12Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "tsf-demo-comp-on-push-8m9zl-prefetch-dependencies-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha256": "1a41e7ee19f9e02874b4ef1f74e6f588a7601deaf5b30ca0862808e5760cea5d"
                        },
                        "entryPoint": "prefetch-dependencies-oci-ta-min",
                        "uri": "quay.io/konflux-ci/tekton-catalog/task-prefetch-dependencies-oci-ta-min"
                    }
                },
                "results": [
                    {
                        "name": "CACHI2_ARTIFACT",
                        "type": "string",
                        "value": ""
                    },
                    {
                        "name": "SOURCE_ARTIFACT",
                        "type": "string",
                        "value": "oci:quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:38b4edb1fa7f1c0f510d8d0e9f686ae7fa450d96e478098c517e31b6a0a35953"
                    }
                ],
                "startTime": "2026-04-15T23:16:29Z",
                "steps": [
                    {
                        "container": "step-skip-ta",
                        "imageID": "registry.access.redhat.com/ubi9/ubi-minimal@sha256:83006d535923fcf1345067873524a3980316f51794f01d8655be55d6e9387183",
                        "name": "skip-ta",
                        "terminated": {
                            "containerID": "cri-o://15d93e9ceea2cc812e3620e3a632160d18c2dbc2feae214bb21c6fe577bd3f13",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:16:50Z",
                            "message": "[{\"key\":\"CACHI2_ARTIFACT\",\"value\":\"\",\"type\":1},{\"key\":\"SOURCE_ARTIFACT\",\"value\":\"oci:quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:38b4edb1fa7f1c0f510d8d0e9f686ae7fa450d96e478098c517e31b6a0a35953\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:16:50Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-use-trusted-artifact",
                        "imageID": "quay.io/konflux-ci/build-trusted-artifacts@sha256:6ee5ae7d29b718eb3c69e55f1ec3a3264bc1a03ba398b2e1f34c7a20af1720d1",
                        "name": "use-trusted-artifact",
                        "terminated": {
                            "containerID": "cri-o://739a360796cc734a1325aa0d32517a70e451596ce0fec0ea906c9d78dff50270",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:16:50Z",
                            "message": "[{\"key\":\"CACHI2_ARTIFACT\",\"value\":\"\",\"type\":1},{\"key\":\"SOURCE_ARTIFACT\",\"value\":\"oci:quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:38b4edb1fa7f1c0f510d8d0e9f686ae7fa450d96e478098c517e31b6a0a35953\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:16:50Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-prefetch-dependencies",
                        "imageID": "quay.io/konflux-ci/hermeto@sha256:0101888c066cc428dbbe87f91752e6208cdfdce5e68f6d7b1a773ec281870784",
                        "name": "prefetch-dependencies",
                        "terminated": {
                            "containerID": "cri-o://fe3038bc970029b7185a958b04645dabc90cd8b08be3243ac5910de4a3d55446",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:17:11Z",
                            "message": "[{\"key\":\"CACHI2_ARTIFACT\",\"value\":\"\",\"type\":1},{\"key\":\"SOURCE_ARTIFACT\",\"value\":\"oci:quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:38b4edb1fa7f1c0f510d8d0e9f686ae7fa450d96e478098c517e31b6a0a35953\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:16:50Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-create-trusted-artifact",
                        "imageID": "quay.io/konflux-ci/build-trusted-artifacts@sha256:6ee5ae7d29b718eb3c69e55f1ec3a3264bc1a03ba398b2e1f34c7a20af1720d1",
                        "name": "create-trusted-artifact",
                        "terminated": {
                            "containerID": "cri-o://153eee4ce3d166df786da314f1303f62c3a275519e894c680c8fab133c3ac79a",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:17:12Z",
                            "message": "[{\"key\":\"CACHI2_ARTIFACT\",\"value\":\"\",\"type\":1},{\"key\":\"SOURCE_ARTIFACT\",\"value\":\"oci:quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:38b4edb1fa7f1c0f510d8d0e9f686ae7fa450d96e478098c517e31b6a0a35953\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:17:11Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Task that prefetches project dependencies for hermetic build.",
                    "params": [
                        {
                            "default": "activation-key",
                            "description": "Name of secret which contains subscription activation key",
                            "name": "ACTIVATION_KEY",
                            "type": "string"
                        },
                        {
                            "description": "The Trusted Artifact URI pointing to the artifact with the application source code.",
                            "name": "SOURCE_ARTIFACT",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data.",
                            "name": "caTrustConfigMapKey",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from.",
                            "name": "caTrustConfigMapName",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Pass configuration to the prefetch tool.\nNote this needs to be passed as a YAML-formatted config dump, not as a file path!\n",
                            "name": "config-file-content",
                            "type": "string"
                        },
                        {
                            "description": "Configures project packages that will have their dependencies prefetched.",
                            "name": "input",
                            "type": "string"
                        },
                        {
                            "default": "debug",
                            "description": "Set the logging level (debug, info, warn, error, fatal).",
                            "name": "log-level",
                            "type": "string"
                        },
                        {
                            "default": "strict",
                            "description": "Control how input requirement violations are handled: strict (errors) or permissive (warnings).",
                            "name": "mode",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Expiration date for the trusted artifacts created in the OCI repository. An empty string means the artifacts do not expire.",
                            "name": "ociArtifactExpiresAfter",
                            "type": "string"
                        },
                        {
                            "description": "The OCI repository where the Trusted Artifacts are stored.",
                            "name": "ociStorage",
                            "type": "string"
                        },
                        {
                            "default": "spdx",
                            "description": "Select the SBOM format to generate. Valid values: spdx, cyclonedx.",
                            "name": "sbom-type",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "The Trusted Artifact URI pointing to the artifact with the prefetched dependencies.",
                            "name": "CACHI2_ARTIFACT",
                            "type": "string"
                        },
                        {
                            "description": "The Trusted Artifact URI pointing to the artifact with the application source code.",
                            "name": "SOURCE_ARTIFACT",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "volumeMounts": [
                            {
                                "mountPath": "/var/workdir",
                                "name": "workdir"
                            }
                        ]
                    },
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "INPUT"
                                },
                                {
                                    "name": "SOURCE_ARTIFACT",
                                    "value": "oci:quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:38b4edb1fa7f1c0f510d8d0e9f686ae7fa450d96e478098c517e31b6a0a35953"
                                }
                            ],
                            "image": "registry.access.redhat.com/ubi9/ubi-minimal:9.7-1773939694@sha256:83006d535923fcf1345067873524a3980316f51794f01d8655be55d6e9387183",
                            "name": "skip-ta",
                            "script": "#!/bin/bash\n\nif [ -z \"${INPUT}\" ]; then\n  mkdir -p /var/workdir/source\n  mkdir -p /var/workdir/cachi2\n  echo \"true\" \u003e/var/workdir/source/.skip-trusted-artifacts\n  echo \"true\" \u003e/var/workdir/cachi2/.skip-trusted-artifacts\n  echo -n \"${SOURCE_ARTIFACT}\" \u003e\"/tekton/results/SOURCE_ARTIFACT\"\n  echo -n \"\" \u003e\"/tekton/results/CACHI2_ARTIFACT\"\nfi\n"
                        },
                        {
                            "args": [
                                "use",
                                "oci:quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:38b4edb1fa7f1c0f510d8d0e9f686ae7fa450d96e478098c517e31b6a0a35953=/var/workdir/source"
                            ],
                            "computeResources": {},
                            "image": "quay.io/konflux-ci/build-trusted-artifacts:latest@sha256:6ee5ae7d29b718eb3c69e55f1ec3a3264bc1a03ba398b2e1f34c7a20af1720d1",
                            "name": "use-trusted-artifact"
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "KBC_LOG_LEVEL",
                                    "value": "debug"
                                },
                                {
                                    "name": "KBC_PD_INPUT"
                                },
                                {
                                    "name": "KBC_PD_SOURCE_DIR",
                                    "value": "/var/workdir/source"
                                },
                                {
                                    "name": "KBC_PD_OUTPUT_DIR",
                                    "value": "/var/workdir/cachi2/output"
                                },
                                {
                                    "name": "KBC_PD_SBOM_FORMAT",
                                    "value": "spdx"
                                },
                                {
                                    "name": "KBC_PD_MODE",
                                    "value": "strict"
                                },
                                {
                                    "name": "KBC_PD_OUTPUT_DIR_MOUNT_POINT",
                                    "value": "/cachi2/output"
                                },
                                {
                                    "name": "KBC_PD_ENV_FILE",
                                    "value": "/var/workdir/cachi2/cachi2.env"
                                },
                                {
                                    "name": "KBC_PD_GIT_AUTH_DIRECTORY",
                                    "value": "/workspace/git-basic-auth"
                                },
                                {
                                    "name": "WORKSPACE_NETRC_PATH"
                                },
                                {
                                    "name": "CONFIG_FILE_CONTENT"
                                }
                            ],
                            "image": "quay.io/konflux-ci/hermeto:0.48.0@sha256:105b953463a203b82223cc54fb466ee0395ae9cca67bcdbbcbec4c340d511f26",
                            "name": "prefetch-dependencies",
                            "script": "#!/bin/bash\n\nif [ -n \"${WORKSPACE_NETRC_PATH}\" ]; then\n  export NETRC=\"${WORKSPACE_NETRC_PATH}/.netrc\"\nfi\n\nCA_BUNDLE_PATH=/mnt/trusted-ca/ca-bundle.crt\nif [ -f \"$CA_BUNDLE_PATH\" ]; then\n  cp -vf \"$CA_BUNDLE_PATH\" /etc/pki/ca-trust/source/anchors\n  update-ca-trust\nfi\n\nif [ -e /activation-key/org ] \u0026\u0026 [ -e /activation-key/activationkey ]; then\n  export KBC_PD_RHSM_ORG=/activation-key/org\n  export KBC_PD_RHSM_ACTIVATION_KEY=/activation-key/activationkey\nfi\n\nif [ -n \"${CONFIG_FILE_CONTENT}\" ]; then\n  echo \"${CONFIG_FILE_CONTENT}\" \u003e/mnt/config/config.yaml\n  export KBC_PD_CONFIG_FILE=/mnt/config/config.yaml\nfi\n\nkonflux-build-cli prefetch-dependencies\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/activation-key",
                                    "name": "activation-key"
                                },
                                {
                                    "mountPath": "/mnt/config",
                                    "name": "config"
                                },
                                {
                                    "mountPath": "/mnt/trusted-ca",
                                    "name": "trusted-ca",
                                    "readOnly": true
                                }
                            ]
                        },
                        {
                            "args": [
                                "create",
                                "--store",
                                "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525.prefetch",
                                "/tekton/results/SOURCE_ARTIFACT=/var/workdir/source",
                                "/tekton/results/CACHI2_ARTIFACT=/var/workdir/cachi2"
                            ],
                            "computeResources": {
                                "limits": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "IMAGE_EXPIRES_AFTER"
                                }
                            ],
                            "image": "quay.io/konflux-ci/build-trusted-artifacts:latest@sha256:6ee5ae7d29b718eb3c69e55f1ec3a3264bc1a03ba398b2e1f34c7a20af1720d1",
                            "name": "create-trusted-artifact"
                        }
                    ],
                    "volumes": [
                        {
                            "name": "activation-key",
                            "secret": {
                                "optional": true,
                                "secretName": "activation-key"
                            }
                        },
                        {
                            "emptyDir": {},
                            "name": "config"
                        },
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        },
                        {
                            "emptyDir": {},
                            "name": "workdir"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "A Workspace containing a .gitconfig and .git-credentials file or username and password.\nThese will be copied to the user's home before prefetch is run. Any\nother files in this Workspace are ignored. It is strongly recommended\nto bind a Secret to this Workspace over other volume types.\n",
                            "name": "git-basic-auth",
                            "optional": true
                        },
                        {
                            "description": "Workspace containing a .netrc file. Prefetch will use the credentials in this file when\nperforming http(s) requests.\n",
                            "name": "netrc",
                            "optional": true
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.openshift.io/repo": "https://github.com/rhads-tsf-qe/testrepo?rev=c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "build.appstudio.redhat.com/commit_sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "build.appstudio.redhat.com/target_branch": "base-uovnpl",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=28",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "pipelinesascode.tekton.dev/branch": "base-uovnpl",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552388922",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-ahlxga",
                    "pipelinesascode.tekton.dev/git-provider": "github",
                    "pipelinesascode.tekton.dev/installation-id": "112348674",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-push-8m9zl",
                    "pipelinesascode.tekton.dev/max-keep-runs": "3",
                    "pipelinesascode.tekton.dev/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-uovnpl\"",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-ci-tests-bot",
                    "pipelinesascode.tekton.dev/sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pipelinesascode.tekton.dev/sha-title": "Merge pull request #180 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pipelinesascode.tekton.dev/source-branch": "refs/heads/base-uovnpl",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-tenant/results/3a69c030-be51-40ae-9a05-5b5733b01f62/records/8e83b57f-bd05-4fe7-bb81-f29c3a5f9860",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"testrepo\",\"commit\":\"c4481f5e1453d8c204c7bae0f626b245e6bf6525\",\"eventType\":\"push\"}",
                    "results.tekton.dev/result": "default-tenant/results/3a69c030-be51-40ae-9a05-5b5733b01f62",
                    "results.tekton.dev/stored": "true"
                },
                "creationTimestamp": "2026-04-15T23:19:59Z",
                "finalizers": [
                    "chains.tekton.dev",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/version": "v0.37.7",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/component": "tsf-demo-comp",
                    "pipelines.appstudio.openshift.io/type": "build",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552388922",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "tsf-demo-comp-on-push-8m9zl",
                    "tekton.dev/pipelineRun": "tsf-demo-comp-on-push-8m9zl",
                    "tekton.dev/pipelineRunUID": "3a69c030-be51-40ae-9a05-5b5733b01f62",
                    "tekton.dev/pipelineTask": "rpms-signature-scan",
                    "tekton.dev/task": "rpms-signature-scan"
                },
                "name": "tsf-demo-comp-on-push-8m9zl-rpms-signature-scan",
                "namespace": "default-tenant",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "tsf-demo-comp-on-push-8m9zl",
                        "uid": "3a69c030-be51-40ae-9a05-5b5733b01f62"
                    }
                ],
                "resourceVersion": "38424",
                "uid": "8e83b57f-bd05-4fe7-bb81-f29c3a5f9860"
            },
            "spec": {
                "params": [
                    {
                        "name": "image-url",
                        "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525"
                    },
                    {
                        "name": "image-digest",
                        "value": "sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6"
                    }
                ],
                "serviceAccountName": "build-pipeline-tsf-demo-comp",
                "taskRef": {
                    "params": [
                        {
                            "name": "name",
                            "value": "rpms-signature-scan"
                        },
                        {
                            "name": "bundle",
                            "value": "quay.io/konflux-ci/tekton-catalog/task-rpms-signature-scan:0.2@sha256:47b81d6b3d752649eddfbb8b3fd8f6522c4bb07f6d1946f9bc45dae3f92e2c9a"
                        },
                        {
                            "name": "kind",
                            "value": "task"
                        }
                    ],
                    "resolver": "bundles"
                },
                "timeout": "1h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:21:50Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:21:50Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "tsf-demo-comp-on-push-8m9zl-rpms-signature-scan-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha256": "47b81d6b3d752649eddfbb8b3fd8f6522c4bb07f6d1946f9bc45dae3f92e2c9a"
                        },
                        "entryPoint": "rpms-signature-scan",
                        "uri": "quay.io/konflux-ci/tekton-catalog/task-rpms-signature-scan"
                    }
                },
                "results": [
                    {
                        "name": "IMAGES_PROCESSED",
                        "type": "string",
                        "value": "{\"image\": {\"pullspec\": \"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525\", \"digests\": [\"sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6\"]}}\n"
                    },
                    {
                        "name": "RPMS_DATA",
                        "type": "string",
                        "value": "{\"keys\": {\"199e2f91fd431d51\": 183, \"unsigned\": 0}}\n"
                    },
                    {
                        "name": "TEST_OUTPUT",
                        "type": "string",
                        "value": "{\"result\":\"SUCCESS\",\"timestamp\":\"2026-04-15T23:21:49+00:00\",\"note\":\"Task rpms-signature-scan completed successfully\",\"namespace\":\"default\",\"successes\":0,\"failures\":0,\"warnings\":0}\n"
                    }
                ],
                "startTime": "2026-04-15T23:20:01Z",
                "steps": [
                    {
                        "container": "step-rpms-signature-scan",
                        "imageID": "quay.io/konflux-ci/tools@sha256:c677979dbad26c7b95e502ef62548beaf805607b691ba0d26ff488fd394fb215",
                        "name": "rpms-signature-scan",
                        "terminated": {
                            "containerID": "cri-o://a4ad2f1d98a7f37aab654d21fe0e32b37dc8f9b54c675b83f34f51159fc7e6cf",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:21:48Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:21:32Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-output-results",
                        "imageID": "quay.io/konflux-ci/konflux-test@sha256:c7e2099ad87d4c65284cba5df8488eae64d16ea0baff344c549ed7ca2415ebce",
                        "name": "output-results",
                        "terminated": {
                            "containerID": "cri-o://407f241924683c0373e0cfd18f936832b8cff3b25145fea52dd8d3d3e4b962ad",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:21:49Z",
                            "message": "[{\"key\":\"IMAGES_PROCESSED\",\"value\":\"{\\\"image\\\": {\\\"pullspec\\\": \\\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525\\\", \\\"digests\\\": [\\\"sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6\\\"]}}\\n\",\"type\":1},{\"key\":\"RPMS_DATA\",\"value\":\"{\\\"keys\\\": {\\\"199e2f91fd431d51\\\": 183, \\\"unsigned\\\": 0}}\\n\",\"type\":1},{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"result\\\":\\\"SUCCESS\\\",\\\"timestamp\\\":\\\"2026-04-15T23:21:49+00:00\\\",\\\"note\\\":\\\"Task rpms-signature-scan completed successfully\\\",\\\"namespace\\\":\\\"default\\\",\\\"successes\\\":0,\\\"failures\\\":0,\\\"warnings\\\":0}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:21:48Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Scans RPMs in an image and provide information about RPMs signatures.",
                    "params": [
                        {
                            "description": "Image URL",
                            "name": "image-url",
                            "type": "string"
                        },
                        {
                            "description": "Image digest to scan",
                            "name": "image-digest",
                            "type": "string"
                        },
                        {
                            "default": "/tmp",
                            "description": "Directory that will be used for storing temporary\nfiles produced by this task.\n",
                            "name": "workdir",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from.",
                            "name": "ca-trust-config-map-name",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data.",
                            "name": "ca-trust-config-map-key",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Tekton task test output.",
                            "name": "TEST_OUTPUT",
                            "type": "string"
                        },
                        {
                            "description": "Information about signed and unsigned RPMs",
                            "name": "RPMS_DATA",
                            "type": "string"
                        },
                        {
                            "description": "Images processed in the task.",
                            "name": "IMAGES_PROCESSED",
                            "type": "string"
                        }
                    ],
                    "steps": [
                        {
                            "computeResources": {
                                "limits": {
                                    "cpu": "200m",
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "200m",
                                    "memory": "256Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "IMAGE_URL",
                                    "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525"
                                },
                                {
                                    "name": "IMAGE_DIGEST",
                                    "value": "sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6"
                                },
                                {
                                    "name": "WORKDIR",
                                    "value": "/tmp"
                                }
                            ],
                            "image": "quay.io/konflux-ci/tools@sha256:c677979dbad26c7b95e502ef62548beaf805607b691ba0d26ff488fd394fb215",
                            "name": "rpms-signature-scan",
                            "script": "#!/bin/bash\nset -ex\nset -o pipefail\n\nrpm_verifier \\\n  --image-url \"${IMAGE_URL}\" \\\n  --image-digest \"${IMAGE_DIGEST}\" \\\n  --workdir \"${WORKDIR}\" \\\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/tmp",
                                    "name": "workdir"
                                },
                                {
                                    "mountPath": "/etc/pki/tls/certs/ca-custom-bundle.crt",
                                    "name": "trusted-ca",
                                    "readOnly": true,
                                    "subPath": "ca-bundle.crt"
                                }
                            ]
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "cpu": "50m",
                                    "memory": "32Mi"
                                },
                                "requests": {
                                    "cpu": "50m",
                                    "memory": "32Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "WORKDIR",
                                    "value": "/tmp"
                                }
                            ],
                            "image": "quay.io/konflux-ci/konflux-test:v1.4.46@sha256:c7e2099ad87d4c65284cba5df8488eae64d16ea0baff344c549ed7ca2415ebce",
                            "name": "output-results",
                            "script": "#!/bin/bash\nset -ex\n\nsource /utils.sh\nstatus=$(cat \"${WORKDIR}\"/status)\nrpms_data=$(cat \"${WORKDIR}\"/results)\nimages_processed=$(cat \"${WORKDIR}\"/images_processed)\n\nif [ \"$status\" == \"ERROR\" ]; then\n  note=\"Task rpms-signature-scan failed to scan images. Refer to Tekton task output for details\"\nelse\n  note=\"Task rpms-signature-scan completed successfully\"\nfi\n\nTEST_OUTPUT=$(make_result_json -r \"$status\" -t \"$note\")\n\necho \"${TEST_OUTPUT}\" | tee \"/tekton/results/TEST_OUTPUT\"\necho \"${rpms_data}\" | tee \"/tekton/results/RPMS_DATA\"\necho \"${images_processed}\" | tee \"/tekton/results/IMAGES_PROCESSED\"\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/tmp",
                                    "name": "workdir"
                                }
                            ]
                        }
                    ],
                    "volumes": [
                        {
                            "emptyDir": {},
                            "name": "workdir"
                        },
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.openshift.io/repo": "https://github.com/rhads-tsf-qe/testrepo?rev=c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "build.appstudio.redhat.com/commit_sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "build.appstudio.redhat.com/target_branch": "base-uovnpl",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=24",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "pipelinesascode.tekton.dev/branch": "base-uovnpl",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552388922",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-ahlxga",
                    "pipelinesascode.tekton.dev/git-provider": "github",
                    "pipelinesascode.tekton.dev/installation-id": "112348674",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-push-8m9zl",
                    "pipelinesascode.tekton.dev/max-keep-runs": "3",
                    "pipelinesascode.tekton.dev/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-uovnpl\"",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-ci-tests-bot",
                    "pipelinesascode.tekton.dev/sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pipelinesascode.tekton.dev/sha-title": "Merge pull request #180 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pipelinesascode.tekton.dev/source-branch": "refs/heads/base-uovnpl",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-tenant/results/3a69c030-be51-40ae-9a05-5b5733b01f62/records/4552c5fe-bc75-4695-83fc-51db6c319f79",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"testrepo\",\"commit\":\"c4481f5e1453d8c204c7bae0f626b245e6bf6525\",\"eventType\":\"push\"}",
                    "results.tekton.dev/result": "default-tenant/results/3a69c030-be51-40ae-9a05-5b5733b01f62",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "konflux"
                },
                "creationTimestamp": "2026-04-15T23:19:59Z",
                "finalizers": [
                    "chains.tekton.dev",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/version": "v0.37.7",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/component": "tsf-demo-comp",
                    "pipelines.appstudio.openshift.io/type": "build",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552388922",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "tsf-demo-comp-on-push-8m9zl",
                    "tekton.dev/pipelineRun": "tsf-demo-comp-on-push-8m9zl",
                    "tekton.dev/pipelineRunUID": "3a69c030-be51-40ae-9a05-5b5733b01f62",
                    "tekton.dev/pipelineTask": "sast-shell-check",
                    "tekton.dev/task": "sast-shell-check-oci-ta-min"
                },
                "name": "tsf-demo-comp-on-push-8m9zl-sast-shell-check",
                "namespace": "default-tenant",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "tsf-demo-comp-on-push-8m9zl",
                        "uid": "3a69c030-be51-40ae-9a05-5b5733b01f62"
                    }
                ],
                "resourceVersion": "37948",
                "uid": "4552c5fe-bc75-4695-83fc-51db6c319f79"
            },
            "spec": {
                "params": [
                    {
                        "name": "image-digest",
                        "value": "sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6"
                    },
                    {
                        "name": "image-url",
                        "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525"
                    },
                    {
                        "name": "SOURCE_ARTIFACT",
                        "value": "oci:quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:38b4edb1fa7f1c0f510d8d0e9f686ae7fa450d96e478098c517e31b6a0a35953"
                    },
                    {
                        "name": "CACHI2_ARTIFACT",
                        "value": ""
                    }
                ],
                "serviceAccountName": "build-pipeline-tsf-demo-comp",
                "taskRef": {
                    "params": [
                        {
                            "name": "name",
                            "value": "sast-shell-check-oci-ta-min"
                        },
                        {
                            "name": "bundle",
                            "value": "quay.io/konflux-ci/tekton-catalog/task-sast-shell-check-oci-ta-min:0.1@sha256:fa19753f59288a397aab2ddb9459f35f0ec1b89f43c36e944a3958db72becb5a"
                        },
                        {
                            "name": "kind",
                            "value": "task"
                        }
                    ],
                    "resolver": "bundles"
                },
                "timeout": "1h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:20:54Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:20:54Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "tsf-demo-comp-on-push-8m9zl-sast-shell-check-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha256": "fa19753f59288a397aab2ddb9459f35f0ec1b89f43c36e944a3958db72becb5a"
                        },
                        "entryPoint": "sast-shell-check-oci-ta-min",
                        "uri": "quay.io/konflux-ci/tekton-catalog/task-sast-shell-check-oci-ta-min"
                    }
                },
                "results": [
                    {
                        "name": "TEST_OUTPUT",
                        "type": "string",
                        "value": "{\"result\":\"SUCCESS\",\"timestamp\":\"2026-04-15T23:20:52+00:00\",\"note\":\"For details, check Tekton task log.\",\"namespace\":\"default\",\"successes\":0,\"failures\":0,\"warnings\":0}\n"
                    }
                ],
                "startTime": "2026-04-15T23:19:59Z",
                "steps": [
                    {
                        "container": "step-use-trusted-artifact",
                        "imageID": "quay.io/konflux-ci/build-trusted-artifacts@sha256:ab064e9763b62d99da5ee9653370da86ffd9d3e770e1aad7a935e88b64a0b6ac",
                        "name": "use-trusted-artifact",
                        "terminated": {
                            "containerID": "cri-o://bd913652a616475b5d83966491451a9dbe34fde578daa62c30678b110109dc58",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:20:46Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:20:46Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-sast-shell-check",
                        "imageID": "quay.io/konflux-ci/konflux-test@sha256:169f73f80fbde8d54f42416c5de8cc9214ecc7e8c89c70a3385285bbac32ad0a",
                        "name": "sast-shell-check",
                        "terminated": {
                            "containerID": "cri-o://55948bf28c58be0849ebbc28a882e8144c351f9eaacd3ea65fbc8392f45d94ae",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:20:52Z",
                            "message": "[{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"result\\\":\\\"SUCCESS\\\",\\\"timestamp\\\":\\\"2026-04-15T23:20:52+00:00\\\",\\\"note\\\":\\\"For details, check Tekton task log.\\\",\\\"namespace\\\":\\\"default\\\",\\\"successes\\\":0,\\\"failures\\\":0,\\\"warnings\\\":0}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:20:47Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-upload",
                        "imageID": "quay.io/konflux-ci/oras@sha256:180b50c7be50c20e3349a79df8dd6062fee0e0dd01aa30e9a09d1d07d9ebd0c2",
                        "name": "upload",
                        "terminated": {
                            "containerID": "cri-o://be8920b46715f786faa83dc5f5a4b45af3c3395c8e527b401af845b001558ff9",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:20:54Z",
                            "message": "[{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"result\\\":\\\"SUCCESS\\\",\\\"timestamp\\\":\\\"2026-04-15T23:20:52+00:00\\\",\\\"note\\\":\\\"For details, check Tekton task log.\\\",\\\"namespace\\\":\\\"default\\\",\\\"successes\\\":0,\\\"failures\\\":0,\\\"warnings\\\":0}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:20:52Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "The sast-shell-check task uses [shellcheck](https://www.shellcheck.net/) tool to perform Static Application Security Testing (SAST), a popular cloud-native application security platform. This task leverages the shellcheck wrapper (csmock-plugin-shellcheck-core) to run shellcheck on a directory tree.\nShellCheck is a static analysis tool, gives warnings and suggestions for bash/sh shell scripts. This task can run on x86 and arm.",
                    "params": [
                        {
                            "default": "",
                            "description": "The Trusted Artifact URI pointing to the artifact with the prefetched dependencies.",
                            "name": "CACHI2_ARTIFACT",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Whether to include important findings only",
                            "name": "IMP_FINDINGS_ONLY",
                            "type": "string"
                        },
                        {
                            "default": "SITE_DEFAULT",
                            "description": "Known False Positives (KFP) git URL (optionally taking a revision delimited by \\#). Defaults to \"SITE_DEFAULT\", which means the default value \"https://gitlab.cee.redhat.com/osh/known-false-positives.git\" for internal Konflux instance and empty string for external Konflux instance. If set to an empty string, the KFP filtering is disabled.",
                            "name": "KFP_GIT_URL",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Name of the scanned project, used to find path exclusions. By default, the Konflux component name will be used.",
                            "name": "PROJECT_NAME",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Whether to record the excluded findings (default to false).\nIf `true`, the excluded findings will be stored in `excluded-findings.json`.\n",
                            "name": "RECORD_EXCLUDED",
                            "type": "string"
                        },
                        {
                            "description": "The Trusted Artifact URI pointing to the artifact with the application source code.",
                            "name": "SOURCE_ARTIFACT",
                            "type": "string"
                        },
                        {
                            "default": ".",
                            "description": "Target directories in component's source code. Multiple values should be separated with commas.",
                            "name": "TARGET_DIRS",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data.",
                            "name": "caTrustConfigMapKey",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from.",
                            "name": "caTrustConfigMapName",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Image digest to report findings for.",
                            "name": "image-digest",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Image URL.",
                            "name": "image-url",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Tekton task test output.",
                            "name": "TEST_OUTPUT",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "volumeMounts": [
                            {
                                "mountPath": "/var/workdir",
                                "name": "workdir"
                            }
                        ]
                    },
                    "steps": [
                        {
                            "args": [
                                "use",
                                "oci:quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:38b4edb1fa7f1c0f510d8d0e9f686ae7fa450d96e478098c517e31b6a0a35953=/var/workdir/source",
                                "=/var/workdir/cachi2"
                            ],
                            "computeResources": {},
                            "image": "quay.io/konflux-ci/build-trusted-artifacts:latest@sha256:ab064e9763b62d99da5ee9653370da86ffd9d3e770e1aad7a935e88b64a0b6ac",
                            "name": "use-trusted-artifact",
                            "volumeMounts": [
                                {
                                    "mountPath": "/etc/pki/tls/certs/ca-custom-bundle.crt",
                                    "name": "trusted-ca",
                                    "readOnly": true,
                                    "subPath": "ca-bundle.crt"
                                }
                            ]
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "cpu": "128m",
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "128m",
                                    "memory": "256Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "KFP_GIT_URL",
                                    "value": "SITE_DEFAULT"
                                },
                                {
                                    "name": "PROJECT_NAME"
                                },
                                {
                                    "name": "RECORD_EXCLUDED",
                                    "value": "false"
                                },
                                {
                                    "name": "IMP_FINDINGS_ONLY",
                                    "value": "true"
                                },
                                {
                                    "name": "TARGET_DIRS",
                                    "value": "."
                                },
                                {
                                    "name": "COMPONENT_LABEL",
                                    "valueFrom": {
                                        "fieldRef": {
                                            "fieldPath": "metadata.labels['appstudio.openshift.io/component']"
                                        }
                                    }
                                },
                                {
                                    "name": "BUILD_PLR_LOG_URL",
                                    "valueFrom": {
                                        "fieldRef": {
                                            "fieldPath": "metadata.annotations['pipelinesascode.tekton.dev/log-url']"
                                        }
                                    }
                                }
                            ],
                            "image": "quay.io/konflux-ci/konflux-test:v1.4.51@sha256:169f73f80fbde8d54f42416c5de8cc9214ecc7e8c89c70a3385285bbac32ad0a",
                            "name": "sast-shell-check",
                            "script": "#!/usr/bin/env bash\nset -x\n# shellcheck source=/dev/null\nsource /utils.sh\ntrap 'handle_error /tekton/results/TEST_OUTPUT' EXIT\n\nif [[ -z \"${PROJECT_NAME}\" ]]; then\n  PROJECT_NAME=${COMPONENT_LABEL}\nfi\n\necho \"INFO: The PROJECT_NAME used is: ${PROJECT_NAME}\"\n\nca_bundle=/mnt/trusted-ca/ca-bundle.crt\nif [ -f \"$ca_bundle\" ]; then\n  echo \"INFO: Using mounted CA bundle: $ca_bundle\"\n  cp -vf $ca_bundle /etc/pki/ca-trust/source/anchors\n  update-ca-trust\nfi\n\nPACKAGE_VERSION=$(rpm -q --queryformat '%{NAME}-%{VERSION}-%{RELEASE}\\n' ShellCheck)\n\nOUTPUT_FILE=\"shellcheck-results.json\"\nSOURCE_CODE_DIR=/var/workdir/source\n\n# generate full path for each dirname separated by comma\ndeclare -a ALL_TARGETS\nIFS=\",\" read -ra TARGET_ARRAY \u003c\u003c\u003c\"$TARGET_DIRS\"\nfor d in \"${TARGET_ARRAY[@]}\"; do\n  potential_path=\"${SOURCE_CODE_DIR}/${d}\"\n\n  resolved_path=$(realpath -m \"$potential_path\")\n\n  # ensure resolved path is still within SOURCE_CODE_DIR\n  if [[ \"$resolved_path\" == \"$SOURCE_CODE_DIR\"* ]]; then\n    ALL_TARGETS+=(\"$resolved_path\")\n  else\n    echo \"Error: path traversal attempt, '$potential_path' is outside '$SOURCE_CODE_DIR'\"\n    exit 1\n  fi\ndone\n\n# determine number of available CPU cores for shellcheck based on container cgroup v2 CPU limits\n# this calculates the ceiling, so if the cpu limit is 0.5, the number of jobs will be 1.\nif [ -z \"$SC_JOBS\" ] \u0026\u0026 [ -r \"/sys/fs/cgroup/cpu.max\" ]; then\n  read -r quota period \u003c/sys/fs/cgroup/cpu.max\n  if [ \"$quota\" != \"max\" ] \u0026\u0026 [ -n \"$period\" ] \u0026\u0026 [ \"$period\" -gt 0 ]; then\n    export SC_JOBS=$(((quota + period - 1) / period))\n    echo \"INFO: Setting SC_JOBS=${SC_JOBS} based on cgroups v2 max for run-shellcheck.sh\"\n  fi\nfi\n\n# generate all shellcheck result JSON files to $SC_RESULTS_DIR, which defaults to ./shellcheck-results/\n/usr/share/csmock/scripts/run-shellcheck.sh \"${ALL_TARGETS[@]}\"\n\nCSGREP_OPTS=(\n  --mode=json\n  --strip-path-prefix=\"$SOURCE_CODE_DIR\"/\n  --remove-duplicates\n  --embed-context=3\n  --set-scan-prop=\"ShellCheck:${PACKAGE_VERSION}\"\n)\nif [[ \"$IMP_FINDINGS_ONLY\" == \"true\" ]]; then\n  # predefined list of shellcheck important findings\n  CSGREP_EVENT_FILTER='\\[SC(1020|1035|1054|1066|1068|1073|1080|1083|1099|1113|1115|1127|1128|1143|2043|2050|'\n  CSGREP_EVENT_FILTER+='2055|2057|2066|2069|2071|2077|2078|2091|2092|2157|2171|2193|2194|2195|2215|2216|'\n  CSGREP_EVENT_FILTER+='2218|2224|2225|2242|2256|2258|2261)\\]$'\n  CSGREP_OPTS+=(\n    --event=\"$CSGREP_EVENT_FILTER\"\n  )\nelse\n  CSGREP_OPTS+=(\n    --event=\"error|warning\"\n  )\nfi\n\nif ! csgrep \"${CSGREP_OPTS[@]}\" ./shellcheck-results/*.json \u003e\"$OUTPUT_FILE\"; then\n  echo \"Error occurred while running 'run-shellcheck.sh'\"\n  note=\"Task sast-shell-check-oci-ta-min failed: For details, check Tekton task log.\"\n  ERROR_OUTPUT=$(make_result_json -r ERROR -t \"$note\")\n  echo \"${ERROR_OUTPUT}\" | tee \"/tekton/results/TEST_OUTPUT\"\n  exit 1\nfi\n\nif [[ \"${KFP_GIT_URL}\" == \"SITE_DEFAULT\" ]]; then\n  KFP_GIT_URL=\"https://gitlab.cee.redhat.com/osh/known-false-positives.git\"\nfi\nPROBE_URL=\"${KFP_GIT_URL%.git}\" # trims '.git' suffix\n\n# create the KFP clone directory regardless\nKFP_DIR=\"known-false-positives\"\nKFP_CLONED=\"0\"\nmkdir \"${KFP_DIR}\"\n\n# We check if the KFP_GIT_URL variable is set to clone and apply the filters or not\nif [[ -n \"${KFP_GIT_URL}\" ]]; then\n  # Default location only reachable from internal Konflux instances, check reachable first\n  echo -n \"INFO: Probing ${PROBE_URL}... \"\n  if curl --fail --head --max-time 60 --no-progress-meter \"${PROBE_URL}\" \u003e \u003e(head -1); then\n    echo \"INFO: Trying to clone known-false-positives..\"\n    git clone \"${KFP_GIT_URL}\" \"${KFP_DIR}\" \u0026\u0026 KFP_CLONED=\"1\"\n  fi\nfi\n\nif [[ \"${KFP_CLONED}\" -eq \"0\" ]]; then\n  echo \"WARN: Failed to clone known-false-positives at ${KFP_GIT_URL}, scan results will not be filtered\"\nelse\n  echo \"INFO: Filtering false positives in results files using csfilter-kfp...\"\n\n  # build initial csfilter-kfp command\n  csfilter_kfp_cmd=(\n    csfilter-kfp\n    --verbose\n    --kfp-dir=\"${KFP_DIR}\"\n    --project-nvr=\"${PROJECT_NAME}\"\n  )\n\n  if [[ \"${RECORD_EXCLUDED}\" == \"true\" ]]; then\n    csfilter_kfp_cmd+=(--record-excluded=\"excluded-findings.json\")\n  fi\n\n  # Execute the command and capture any errors\n  set +e\n  \"${csfilter_kfp_cmd[@]}\" \"${OUTPUT_FILE}\" \u003e\"${OUTPUT_FILE}.filtered\" 2\u003e\"${OUTPUT_FILE}.error\"\n  status=$?\n  set -e\n  if [ \"$status\" -ne 0 ]; then\n    echo \"WARN: failed to filter known false positives\" \u003e\u00262\n  else\n    mv \"${OUTPUT_FILE}.filtered\" \"$OUTPUT_FILE\"\n    echo \"INFO: Succeeded filtering known false positives\" \u003e\u00262\n  fi\nfi\n\necho \"ShellCheck results have been saved to $OUTPUT_FILE\"\n\ncsgrep --mode=evtstat \"$OUTPUT_FILE\"\ncsgrep --mode=sarif \"$OUTPUT_FILE\" \u003eshellcheck-results.sarif\n\nTEST_OUTPUT=\nparse_test_output \"sast-shell-check-oci-ta-min\" sarif shellcheck-results.sarif || true\necho \"${TEST_OUTPUT}\" | tee \"/tekton/results/TEST_OUTPUT\"\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/mnt/trusted-ca",
                                    "name": "trusted-ca",
                                    "readOnly": true
                                }
                            ],
                            "workingDir": "/var/workdir/source"
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "IMAGE_URL",
                                    "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525"
                                },
                                {
                                    "name": "IMAGE_DIGEST",
                                    "value": "sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6"
                                }
                            ],
                            "image": "quay.io/konflux-ci/oras:latest@sha256:180b50c7be50c20e3349a79df8dd6062fee0e0dd01aa30e9a09d1d07d9ebd0c2",
                            "name": "upload",
                            "script": "#!/usr/bin/env bash\nset -e\n\nif [ -z \"${IMAGE_URL}\" ] || [ -z \"${IMAGE_DIGEST}\" ]; then\n  echo 'No image-url or image-digest param provided. Skipping upload.'\n  exit 0\nfi\n\nUPLOAD_FILES=\"shellcheck-results.sarif excluded-findings.json\"\n\nfor UPLOAD_FILE in ${UPLOAD_FILES}; do\n  if [ ! -f \"${UPLOAD_FILE}\" ]; then\n    echo \"No ${UPLOAD_FILE} exists. Skipping upload.\"\n    continue\n  fi\n\n  # Determine the media type based on the file extension\n  if [[ \"${UPLOAD_FILE}\" == *.json ]]; then\n    MEDIA_TYPE=\"application/json\"\n  else\n    MEDIA_TYPE=\"application/sarif+json\"\n  fi\n\n  echo \"Selecting auth\"\n  select-oci-auth \"$IMAGE_URL\" \u003e\"$HOME/auth.json\"\n  echo \"Attaching to ${IMAGE_URL}\"\n  if ! retry oras attach --no-tty --registry-config \"$HOME/auth.json\" --artifact-type \"${MEDIA_TYPE}\" \"${IMAGE_URL}@${IMAGE_DIGEST}\" \"${UPLOAD_FILE}:${MEDIA_TYPE}\"; then\n    echo \"Failed to attach ${UPLOAD_FILE} to ${IMAGE_URL}\"\n    exit 1\n  fi\ndone\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/etc/pki/tls/certs/ca-custom-bundle.crt",
                                    "name": "trusted-ca",
                                    "readOnly": true,
                                    "subPath": "ca-bundle.crt"
                                }
                            ],
                            "workingDir": "/var/workdir/source"
                        }
                    ],
                    "volumes": [
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        },
                        {
                            "emptyDir": {},
                            "name": "workdir"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.openshift.io/repo": "https://github.com/rhads-tsf-qe/testrepo?rev=c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "build.appstudio.redhat.com/commit_sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "build.appstudio.redhat.com/target_branch": "base-uovnpl",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=21",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "pipelinesascode.tekton.dev/branch": "base-uovnpl",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552388922",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-ahlxga",
                    "pipelinesascode.tekton.dev/git-provider": "github",
                    "pipelinesascode.tekton.dev/installation-id": "112348674",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-push-8m9zl",
                    "pipelinesascode.tekton.dev/max-keep-runs": "3",
                    "pipelinesascode.tekton.dev/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-uovnpl\"",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-ci-tests-bot",
                    "pipelinesascode.tekton.dev/sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pipelinesascode.tekton.dev/sha-title": "Merge pull request #180 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pipelinesascode.tekton.dev/source-branch": "refs/heads/base-uovnpl",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-tenant/results/3a69c030-be51-40ae-9a05-5b5733b01f62/records/764bfbd0-f27b-408d-a26c-85e8998a7cfc",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"testrepo\",\"commit\":\"c4481f5e1453d8c204c7bae0f626b245e6bf6525\",\"eventType\":\"push\"}",
                    "results.tekton.dev/result": "default-tenant/results/3a69c030-be51-40ae-9a05-5b5733b01f62",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "konflux"
                },
                "creationTimestamp": "2026-04-15T23:19:59Z",
                "finalizers": [
                    "chains.tekton.dev",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/version": "v0.37.7",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/component": "tsf-demo-comp",
                    "pipelines.appstudio.openshift.io/type": "build",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552388922",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "tsf-demo-comp-on-push-8m9zl",
                    "tekton.dev/pipelineRun": "tsf-demo-comp-on-push-8m9zl",
                    "tekton.dev/pipelineRunUID": "3a69c030-be51-40ae-9a05-5b5733b01f62",
                    "tekton.dev/pipelineTask": "sast-unicode-check",
                    "tekton.dev/task": "sast-unicode-check-oci-ta-min"
                },
                "name": "tsf-demo-comp-on-push-8m9zl-sast-unicode-check",
                "namespace": "default-tenant",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "tsf-demo-comp-on-push-8m9zl",
                        "uid": "3a69c030-be51-40ae-9a05-5b5733b01f62"
                    }
                ],
                "resourceVersion": "37490",
                "uid": "764bfbd0-f27b-408d-a26c-85e8998a7cfc"
            },
            "spec": {
                "params": [
                    {
                        "name": "image-digest",
                        "value": "sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6"
                    },
                    {
                        "name": "image-url",
                        "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525"
                    },
                    {
                        "name": "SOURCE_ARTIFACT",
                        "value": "oci:quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:38b4edb1fa7f1c0f510d8d0e9f686ae7fa450d96e478098c517e31b6a0a35953"
                    },
                    {
                        "name": "CACHI2_ARTIFACT",
                        "value": ""
                    }
                ],
                "serviceAccountName": "build-pipeline-tsf-demo-comp",
                "taskRef": {
                    "params": [
                        {
                            "name": "name",
                            "value": "sast-unicode-check-oci-ta-min"
                        },
                        {
                            "name": "bundle",
                            "value": "quay.io/konflux-ci/tekton-catalog/task-sast-unicode-check-oci-ta-min:0.4@sha256:624d9ed6d461b59a16d8c1578276626c02fa6d56e0ee4bcd752f7859055f21ab"
                        },
                        {
                            "name": "kind",
                            "value": "task"
                        }
                    ],
                    "resolver": "bundles"
                },
                "timeout": "1h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:20:50Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:20:50Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "tsf-demo-comp-on-push-8m9zl-sast-unicode-check-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha256": "624d9ed6d461b59a16d8c1578276626c02fa6d56e0ee4bcd752f7859055f21ab"
                        },
                        "entryPoint": "sast-unicode-check-oci-ta-min",
                        "uri": "quay.io/konflux-ci/tekton-catalog/task-sast-unicode-check-oci-ta-min"
                    }
                },
                "results": [
                    {
                        "name": "TEST_OUTPUT",
                        "type": "string",
                        "value": "{\"result\":\"SUCCESS\",\"timestamp\":\"2026-04-15T23:20:47+00:00\",\"note\":\"Task sast-unicode-check-oci-ta-min success: No finding was detected\",\"namespace\":\"default\",\"successes\":0,\"failures\":0,\"warnings\":0}\n"
                    }
                ],
                "startTime": "2026-04-15T23:20:00Z",
                "steps": [
                    {
                        "container": "step-use-trusted-artifact",
                        "imageID": "quay.io/konflux-ci/build-trusted-artifacts@sha256:ab064e9763b62d99da5ee9653370da86ffd9d3e770e1aad7a935e88b64a0b6ac",
                        "name": "use-trusted-artifact",
                        "terminated": {
                            "containerID": "cri-o://2c242dd6ce072656343c3c899da5faa501960ae320c73c586da995406a9a799a",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:20:46Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:20:46Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-sast-unicode-check",
                        "imageID": "quay.io/konflux-ci/konflux-test@sha256:169f73f80fbde8d54f42416c5de8cc9214ecc7e8c89c70a3385285bbac32ad0a",
                        "name": "sast-unicode-check",
                        "terminated": {
                            "containerID": "cri-o://05667e6b15684cef1a6ce3b4d2bae9a6f7b394c6c4891f9612c3efbac5bed02b",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:20:47Z",
                            "message": "[{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"result\\\":\\\"SUCCESS\\\",\\\"timestamp\\\":\\\"2026-04-15T23:20:47+00:00\\\",\\\"note\\\":\\\"Task sast-unicode-check-oci-ta-min success: No finding was detected\\\",\\\"namespace\\\":\\\"default\\\",\\\"successes\\\":0,\\\"failures\\\":0,\\\"warnings\\\":0}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:20:47Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-upload",
                        "imageID": "quay.io/konflux-ci/oras@sha256:180b50c7be50c20e3349a79df8dd6062fee0e0dd01aa30e9a09d1d07d9ebd0c2",
                        "name": "upload",
                        "terminated": {
                            "containerID": "cri-o://2dd85124eebf8938384ff891b5002836eaed793ee74bd4a160b1c6673e1f8eec",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:20:48Z",
                            "message": "[{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"result\\\":\\\"SUCCESS\\\",\\\"timestamp\\\":\\\"2026-04-15T23:20:47+00:00\\\",\\\"note\\\":\\\"Task sast-unicode-check-oci-ta-min success: No finding was detected\\\",\\\"namespace\\\":\\\"default\\\",\\\"successes\\\":0,\\\"failures\\\":0,\\\"warnings\\\":0}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:20:47Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Scans source code for non-printable unicode characters in all text files.",
                    "params": [
                        {
                            "default": "",
                            "description": "The Trusted Artifact URI pointing to the artifact with the prefetched dependencies.",
                            "name": "CACHI2_ARTIFACT",
                            "type": "string"
                        },
                        {
                            "default": "-p bidi -v -d -t",
                            "description": "arguments for find-unicode-control command.",
                            "name": "FIND_UNICODE_CONTROL_ARGS",
                            "type": "string"
                        },
                        {
                            "default": "SITE_DEFAULT",
                            "description": "Known False Positives (KFP) git URL (optionally taking a revision delimited by \\#). Defaults to \"SITE_DEFAULT\", which means the default value \"https://gitlab.cee.redhat.com/osh/known-false-positives.git\" for internal Konflux instance and empty string for external Konflux instance. If set to an empty string, the KFP filtering is disabled.",
                            "name": "KFP_GIT_URL",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Name of the scanned project, used to find path exclusions. By default, the Konflux component name will be used.",
                            "name": "PROJECT_NAME",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Whether to record the excluded findings (defaults to false).\nIf `true`, the excluded findings will be stored in `excluded-findings.json`.\n",
                            "name": "RECORD_EXCLUDED",
                            "type": "string"
                        },
                        {
                            "description": "The Trusted Artifact URI pointing to the artifact with the application source code.",
                            "name": "SOURCE_ARTIFACT",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data.",
                            "name": "caTrustConfigMapKey",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from.",
                            "name": "caTrustConfigMapName",
                            "type": "string"
                        },
                        {
                            "description": "Image digest used for ORAS upload.",
                            "name": "image-digest",
                            "type": "string"
                        },
                        {
                            "description": "Image URL used for ORAS upload.",
                            "name": "image-url",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Tekton task test output.",
                            "name": "TEST_OUTPUT",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "volumeMounts": [
                            {
                                "mountPath": "/var/workdir",
                                "name": "workdir"
                            }
                        ]
                    },
                    "steps": [
                        {
                            "args": [
                                "use",
                                "oci:quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:38b4edb1fa7f1c0f510d8d0e9f686ae7fa450d96e478098c517e31b6a0a35953=/var/workdir/source",
                                "=/var/workdir/cachi2"
                            ],
                            "computeResources": {},
                            "image": "quay.io/konflux-ci/build-trusted-artifacts:latest@sha256:ab064e9763b62d99da5ee9653370da86ffd9d3e770e1aad7a935e88b64a0b6ac",
                            "name": "use-trusted-artifact",
                            "volumeMounts": [
                                {
                                    "mountPath": "/etc/pki/tls/certs/ca-custom-bundle.crt",
                                    "name": "trusted-ca",
                                    "readOnly": true,
                                    "subPath": "ca-bundle.crt"
                                }
                            ]
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "128m",
                                    "memory": "256Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "KFP_GIT_URL",
                                    "value": "SITE_DEFAULT"
                                },
                                {
                                    "name": "PROJECT_NAME"
                                },
                                {
                                    "name": "FIND_UNICODE_CONTROL_ARGS",
                                    "value": "-p bidi -v -d -t"
                                },
                                {
                                    "name": "RECORD_EXCLUDED",
                                    "value": "false"
                                },
                                {
                                    "name": "SOURCE_CODE_DIR",
                                    "value": "/var/workdir"
                                },
                                {
                                    "name": "COMPONENT_LABEL",
                                    "valueFrom": {
                                        "fieldRef": {
                                            "fieldPath": "metadata.labels['appstudio.openshift.io/component']"
                                        }
                                    }
                                },
                                {
                                    "name": "BUILD_PLR_LOG_URL",
                                    "valueFrom": {
                                        "fieldRef": {
                                            "fieldPath": "metadata.annotations['pipelinesascode.tekton.dev/log-url']"
                                        }
                                    }
                                }
                            ],
                            "image": "quay.io/konflux-ci/konflux-test:v1.4.51@sha256:169f73f80fbde8d54f42416c5de8cc9214ecc7e8c89c70a3385285bbac32ad0a",
                            "name": "sast-unicode-check",
                            "script": "#!/usr/bin/env bash\nset -exuo pipefail\n\n# shellcheck source=/dev/null\n. /utils.sh\ntrap 'handle_error /tekton/results/TEST_OUTPUT' EXIT\n\nif [[ -z \"${PROJECT_NAME}\" ]]; then\n  PROJECT_NAME=${COMPONENT_LABEL}\nfi\n\necho \"INFO: The PROJECT_NAME used is: ${PROJECT_NAME}\"\n\nca_bundle=/mnt/trusted-ca/ca-bundle.crt\nif [ -f \"$ca_bundle\" ]; then\n  echo \"INFO: Using mounted CA bundle: $ca_bundle\"\n  cp -vf $ca_bundle /etc/pki/ca-trust/source/anchors\n  update-ca-trust\nfi\n\nSCAN_PROP=\"https://github.com/siddhesh/find-unicode-control.git#c2accbfbba7553a8bc1ebd97089ae08ad8347e58\"\nFUC_EXIT_CODE=0\n\n# shellcheck disable=SC2086\nLANG=en_US.utf8 find_unicode_control.py ${FIND_UNICODE_CONTROL_ARGS} \"${SOURCE_CODE_DIR}/source\" \\\n  \u003eraw_sast_unicode_check_out.txt \\\n  2\u003eraw_sast_unicode_check_out.log ||\n  FUC_EXIT_CODE=$?\nif [[ \"${FUC_EXIT_CODE}\" -ne 0 ]] \u0026\u0026 [[ \"${FUC_EXIT_CODE}\" -ne 1 ]]; then\n  echo \"Failed to run find-unicode-control command\" \u003e\u00262\n  cat raw_sast_unicode_check_out.log\n  note=\"Task sast-unicode-check-oci-ta-min failed: For details, check Tekton task log.\"\n  ERROR_OUTPUT=$(make_result_json -r ERROR -t \"$note\")\n  echo \"${ERROR_OUTPUT}\" | tee \"/tekton/results/TEST_OUTPUT\"\n  exit 1\nfi\n\n# Translate the output format\nif ! sed -i raw_sast_unicode_check_out.txt -E -e 's|(.*:[0-9]+)(.*)|\\1: warning:\\2|' -e 's|^|Error: UNICONTROL_WARNING:\\n|'; then\n  echo \"Error: failed to translate the unicontrol output format\" \u003e\u00262\n  note=\"Task sast-unicode-check-oci-ta-min failed: For details, check Tekton task log.\"\n  ERROR_OUTPUT=$(make_result_json -r ERROR -t \"$note\")\n  echo \"${ERROR_OUTPUT}\" | tee \"/tekton/results/TEST_OUTPUT\"\n  exit 1\nfi\n\n# Process all results as configured with CSGERP_OPTS\nCSGERP_OPTS=(\n  --mode=json\n  --remove-duplicates\n  --embed-context=3\n  --set-scan-prop=\"${SCAN_PROP}\"\n  --strip-path-prefix=\"${SOURCE_CODE_DIR}\"/source/\n)\n# In order to generate csdiff/v1, we need to add the whole path of the source code as\n# sast-unicode-check only provides an URI to embed the context\nif ! csgrep \"${CSGERP_OPTS[@]}\" raw_sast_unicode_check_out.txt \u003eprocessed_sast_unicode_check_out.json 2\u003eprocessed_sast_unicode_check_out.err; then\n  echo \"Error occurred while running csgrep with CSGERP_OPTS:\"\n  cat processed_sast_unicode_check_out.err\n  note=\"Task sast-unicode-check-oci-ta-min failed: For details, check Tekton task log.\"\n  ERROR_OUTPUT=$(make_result_json -r ERROR -t \"$note\")\n  echo \"${ERROR_OUTPUT}\" | tee \"/tekton/results/TEST_OUTPUT\"\n  exit 1\nfi\n\ncsgrep --mode=evtstat processed_sast_unicode_check_out.json\n\nif [[ \"${KFP_GIT_URL}\" == \"SITE_DEFAULT\" ]]; then\n  KFP_GIT_URL=\"https://gitlab.cee.redhat.com/osh/known-false-positives.git\"\nfi\nPROBE_URL=\"${KFP_GIT_URL%.git}\" # trims '.git' suffix\n\n# create the KFP clone directory regardless\nKFP_DIR=\"known-false-positives\"\nKFP_CLONED=\"0\"\nmkdir \"${KFP_DIR}\"\n\n# We check if the KFP_GIT_URL variable is set to clone and apply the filters or not\nif [[ -n \"${KFP_GIT_URL}\" ]]; then\n  # Default location only reachable from internal Konflux instances, check reachable first\n  echo -n \"INFO: Probing ${PROBE_URL}... \"\n  if curl --fail --head --max-time 60 --no-progress-meter \"${PROBE_URL}\" \u003e \u003e(head -1); then\n    echo \"INFO: Trying to clone known-false-positives..\"\n    git clone \"${KFP_GIT_URL}\" \"${KFP_DIR}\" \u0026\u0026 KFP_CLONED=\"1\"\n  fi\nfi\n\n# If KFP clone failed, use the unfiltered results\nif [[ \"${KFP_CLONED}\" -eq \"0\" ]]; then\n  echo \"WARN: Failed to clone known-false-positives at ${KFP_GIT_URL}, scan results will not be filtered\"\n  mv processed_sast_unicode_check_out.json sast_unicode_check_out.json\nelse\n  echo \"INFO: Filtering false positives in results files using csfilter-kfp...\"\n\n  # Build initial csfilter-kfp command\n  csfilter_kfp_cmd=(\n    csfilter-kfp\n    --verbose\n    --kfp-dir=\"${KFP_DIR}\"\n    --project-nvr=\"${PROJECT_NAME}\"\n  )\n\n  # Append --record-excluded option if RECORD_EXCLUDED is true\n  if [[ \"${RECORD_EXCLUDED}\" == \"true\" ]]; then\n    csfilter_kfp_cmd+=(--record-excluded=\"excluded-findings.json\")\n  fi\n\n  # Execute the command and capture any errors\n  set +e\n  \"${csfilter_kfp_cmd[@]}\" processed_sast_unicode_check_out.json \u003esast_unicode_check_out.json 2\u003esast_unicode_check_out.error\n  status=$?\n  set -e\n  if [ \"$status\" -ne 0 ]; then\n    echo \"WARN: failed to filter known false positives\" \u003e\u00262\n    mv processed_sast_unicode_check_out.json sast_unicode_check_out.json\n  else\n    echo \"INFO: Succeeded filtering known false positives\" \u003e\u00262\n  fi\nfi\n\n# Generate sarif report\ncsgrep --mode=sarif sast_unicode_check_out.json \u003esast_unicode_check_out.sarif\nif [[ \"${FUC_EXIT_CODE}\" -eq 0 ]]; then\n  note=\"Task sast-unicode-check-oci-ta-min success: No finding was detected\"\n  ERROR_OUTPUT=$(make_result_json -r SUCCESS -t \"$note\")\nelif [[ \"${FUC_EXIT_CODE}\" -eq 1 ]] \u0026\u0026 [[ ! -s sast_unicode_check_out.sarif ]]; then\n  note=\"Task sast-unicode-check-oci-ta-min success: Some findings were detected, but filtered by known false positive\"\n  ERROR_OUTPUT=$(make_result_json -r SUCCESS -t \"$note\")\nelse\n  echo \"sast-unicode-check test failed because of the following issues:\"\n  cat sast_unicode_check_out.json\n  TEST_OUTPUT=\n  parse_test_output \"sast-unicode-check-oci-ta-min\" sarif sast_unicode_check_out.sarif || true\n  note=\"Task sast-unicode-check-oci-ta-min failed: For details, check Tekton task log.\"\n  ERROR_OUTPUT=$(make_result_json -r ERROR -t \"$note\")\nfi\necho \"${TEST_OUTPUT:-${ERROR_OUTPUT}}\" | tee \"/tekton/results/TEST_OUTPUT\"\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/mnt/trusted-ca",
                                    "name": "trusted-ca",
                                    "readOnly": true
                                }
                            ],
                            "workingDir": "/var/workdir/source"
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "IMAGE_URL",
                                    "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525"
                                },
                                {
                                    "name": "IMAGE_DIGEST",
                                    "value": "sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6"
                                }
                            ],
                            "image": "quay.io/konflux-ci/oras:latest@sha256:180b50c7be50c20e3349a79df8dd6062fee0e0dd01aa30e9a09d1d07d9ebd0c2",
                            "name": "upload",
                            "script": "#!/usr/bin/env bash\n\nif [ -z \"${IMAGE_URL}\" ]; then\n  echo 'No image-url param provided. Skipping upload.'\n  exit 0\nfi\n\nUPLOAD_FILES=\"sast_unicode_check_out.sarif excluded-findings.json\"\nfor UPLOAD_FILE in ${UPLOAD_FILES}; do\n  if [ ! -f \"${UPLOAD_FILE}\" ]; then\n    echo \"No ${UPLOAD_FILE} exists. Skipping upload.\"\n    continue\n  fi\n\n  if [ \"${UPLOAD_FILE}\" == \"excluded-findings.json\" ]; then\n    MEDIA_TYPE=application/json\n  else\n    MEDIA_TYPE=application/sarif+json\n  fi\n\n  echo \"Selecting auth\"\n  select-oci-auth \"${IMAGE_URL}\" \u003e\"${HOME}/auth.json\"\n  echo \"Attaching to ${IMAGE_URL}\"\n  retry oras attach --no-tty --registry-config \"$HOME/auth.json\" --artifact-type \"${MEDIA_TYPE}\" \"${IMAGE_URL}@${IMAGE_DIGEST}\" \"${UPLOAD_FILE}:${MEDIA_TYPE}\"\ndone\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/etc/pki/tls/certs/ca-custom-bundle.crt",
                                    "name": "trusted-ca",
                                    "readOnly": true,
                                    "subPath": "ca-bundle.crt"
                                }
                            ],
                            "workingDir": "/var/workdir/source"
                        }
                    ],
                    "volumes": [
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        },
                        {
                            "emptyDir": {},
                            "name": "workdir"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.openshift.io/repo": "https://github.com/rhads-tsf-qe/testrepo?rev=c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "build.appstudio.redhat.com/commit_sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "build.appstudio.redhat.com/target_branch": "base-uovnpl",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=30",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "pipelinesascode.tekton.dev/branch": "base-uovnpl",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552388922",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-ahlxga",
                    "pipelinesascode.tekton.dev/git-provider": "github",
                    "pipelinesascode.tekton.dev/installation-id": "112348674",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-push-8m9zl",
                    "pipelinesascode.tekton.dev/max-keep-runs": "3",
                    "pipelinesascode.tekton.dev/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-uovnpl\"",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-ci-tests-bot",
                    "pipelinesascode.tekton.dev/sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pipelinesascode.tekton.dev/sha-title": "Merge pull request #180 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pipelinesascode.tekton.dev/source-branch": "refs/heads/base-uovnpl",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-tenant/results/3a69c030-be51-40ae-9a05-5b5733b01f62/records/52f504d6-7781-4571-97c3-a1d0414e0038",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"testrepo\",\"commit\":\"c4481f5e1453d8c204c7bae0f626b245e6bf6525\",\"eventType\":\"push\"}",
                    "results.tekton.dev/result": "default-tenant/results/3a69c030-be51-40ae-9a05-5b5733b01f62",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "konflux"
                },
                "creationTimestamp": "2026-04-15T23:19:59Z",
                "finalizers": [
                    "chains.tekton.dev",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/version": "v0.37.7",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/component": "tsf-demo-comp",
                    "pipelines.appstudio.openshift.io/type": "build",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552388922",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha": "c4481f5e1453d8c204c7bae0f626b245e6bf6525",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "tsf-demo-comp-on-push-8m9zl",
                    "tekton.dev/pipelineRun": "tsf-demo-comp-on-push-8m9zl",
                    "tekton.dev/pipelineRunUID": "3a69c030-be51-40ae-9a05-5b5733b01f62",
                    "tekton.dev/pipelineTask": "tpa-scan",
                    "tekton.dev/task": "tpa-scan"
                },
                "name": "tsf-demo-comp-on-push-8m9zl-tpa-scan",
                "namespace": "default-tenant",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "tsf-demo-comp-on-push-8m9zl",
                        "uid": "3a69c030-be51-40ae-9a05-5b5733b01f62"
                    }
                ],
                "resourceVersion": "38524",
                "uid": "52f504d6-7781-4571-97c3-a1d0414e0038"
            },
            "spec": {
                "params": [
                    {
                        "name": "image-digest",
                        "value": "sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6"
                    },
                    {
                        "name": "image-url",
                        "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525"
                    }
                ],
                "serviceAccountName": "build-pipeline-tsf-demo-comp",
                "taskRef": {
                    "params": [
                        {
                            "name": "name",
                            "value": "tpa-scan"
                        },
                        {
                            "name": "bundle",
                            "value": "quay.io/konflux-ci/tekton-catalog/task-tpa-scan:0.1@sha256:68b6e188f742da92af9c40a794fd021a65d49b419d1e36096277b2d9ebbe1afc"
                        },
                        {
                            "name": "kind",
                            "value": "task"
                        }
                    ],
                    "resolver": "bundles"
                },
                "timeout": "1h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:21:52Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:21:52Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "tsf-demo-comp-on-push-8m9zl-tpa-scan-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha256": "68b6e188f742da92af9c40a794fd021a65d49b419d1e36096277b2d9ebbe1afc"
                        },
                        "entryPoint": "tpa-scan",
                        "uri": "quay.io/konflux-ci/tekton-catalog/task-tpa-scan"
                    }
                },
                "results": [
                    {
                        "name": "IMAGES_PROCESSED",
                        "type": "string",
                        "value": "{\"image\": {\"pullspec\": \"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525\", \"digests\": [\"sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6\"]}}\n"
                    },
                    {
                        "name": "REPORTS",
                        "type": "string",
                        "value": "{\"sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6\":\"sha256:ab2fcef16c9676c4f150525c314c9518eb4a1c8b35b5c30983176eccaa27312a\"}\n"
                    },
                    {
                        "name": "SCAN_OUTPUT",
                        "type": "string",
                        "value": "{\"vulnerabilities\":{\"critical\":6,\"high\":155,\"medium\":182,\"low\":15,\"unknown\":0},\"unpatched_vulnerabilities\":{\"critical\":0,\"high\":0,\"medium\":0,\"low\":0,\"unknown\":0}}\n"
                    },
                    {
                        "name": "TEST_OUTPUT",
                        "type": "string",
                        "value": "{\"result\":\"SUCCESS\",\"timestamp\":\"2026-04-15T23:21:51+00:00\",\"note\":\"Task tpa-scan completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by TPA.\",\"namespace\":\"default\",\"successes\":0,\"failures\":0,\"warnings\":0}\n"
                    }
                ],
                "startTime": "2026-04-15T23:20:01Z",
                "steps": [
                    {
                        "container": "step-get-vulnerabilities",
                        "imageID": "quay.io/konflux-ci/konflux-test@sha256:aa2c97da9bb73a4e8d1c6b41950f8d902b74461be0e042debe89277fdc4ebe49",
                        "name": "get-vulnerabilities",
                        "terminated": {
                            "containerID": "cri-o://6d20ef590be4bd1bf4de3d8034bf1d40a72e214f57e3a0bf3075921a5d9acd35",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:21:35Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:21:32Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-oci-attach-report",
                        "imageID": "quay.io/konflux-ci/task-runner@sha256:200019314a50be5b6dd06f362c794c92a700583a522c5eee9a41e3eab7f706c5",
                        "name": "oci-attach-report",
                        "terminated": {
                            "containerID": "cri-o://2c7569229ee80ad3b91dc93f56345f47f3d50afb2e63020fcbb8ee462bb0e21a",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:21:39Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:21:35Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-conftest-vulnerabilities",
                        "imageID": "quay.io/konflux-ci/konflux-test@sha256:aa2c97da9bb73a4e8d1c6b41950f8d902b74461be0e042debe89277fdc4ebe49",
                        "name": "conftest-vulnerabilities",
                        "terminated": {
                            "containerID": "cri-o://4906521b82daaa6283250507eb0557e1dad47ea31abc188f8fb3418861a07b6a",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:21:52Z",
                            "message": "[{\"key\":\"IMAGES_PROCESSED\",\"value\":\"{\\\"image\\\": {\\\"pullspec\\\": \\\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525\\\", \\\"digests\\\": [\\\"sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6\\\"]}}\\n\",\"type\":1},{\"key\":\"REPORTS\",\"value\":\"{\\\"sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6\\\":\\\"sha256:ab2fcef16c9676c4f150525c314c9518eb4a1c8b35b5c30983176eccaa27312a\\\"}\\n\",\"type\":1},{\"key\":\"SCAN_OUTPUT\",\"value\":\"{\\\"vulnerabilities\\\":{\\\"critical\\\":6,\\\"high\\\":155,\\\"medium\\\":182,\\\"low\\\":15,\\\"unknown\\\":0},\\\"unpatched_vulnerabilities\\\":{\\\"critical\\\":0,\\\"high\\\":0,\\\"medium\\\":0,\\\"low\\\":0,\\\"unknown\\\":0}}\\n\",\"type\":1},{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"result\\\":\\\"SUCCESS\\\",\\\"timestamp\\\":\\\"2026-04-15T23:21:51+00:00\\\",\\\"note\\\":\\\"Task tpa-scan completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by TPA.\\\",\\\"namespace\\\":\\\"default\\\",\\\"successes\\\":0,\\\"failures\\\":0,\\\"warnings\\\":0}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:21:39Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Scans container images for vulnerabilities using the TPA vulnerability scanner, by comparing the components of container image against the vulnerability databases.",
                    "params": [
                        {
                            "description": "Image digest to scan.",
                            "name": "image-digest",
                            "type": "string"
                        },
                        {
                            "description": "Image URL.",
                            "name": "image-url",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "The platform which will be scanned by this task.",
                            "name": "image-platform",
                            "type": "string"
                        },
                        {
                            "default": "https://exhort.stage.devshift.net/api/v5/analysis",
                            "description": "The url of the TPA instance which will be used for scanning.",
                            "name": "tpa-url",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from.",
                            "name": "ca-trust-config-map-name",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data.",
                            "name": "ca-trust-config-map-key",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "If true, skips uploading the results to the image registry. Useful for read-only tests.",
                            "name": "skip-oci-attach-report",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Tekton task test output.",
                            "name": "TEST_OUTPUT",
                            "type": "string"
                        },
                        {
                            "description": "TPA scan result.",
                            "name": "SCAN_OUTPUT",
                            "type": "string"
                        },
                        {
                            "description": "Images processed in the task.",
                            "name": "IMAGES_PROCESSED",
                            "type": "string"
                        },
                        {
                            "description": "Mapping of image digests to report digests",
                            "name": "REPORTS",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "volumeMounts": [
                            {
                                "mountPath": "/etc/pki/tls/certs/ca-custom-bundle.crt",
                                "name": "trusted-ca",
                                "readOnly": true,
                                "subPath": "ca-bundle.crt"
                            }
                        ]
                    },
                    "steps": [
                        {
                            "computeResources": {
                                "limits": {
                                    "cpu": "800m",
                                    "memory": "2Gi"
                                },
                                "requests": {
                                    "cpu": "800m",
                                    "memory": "2Gi"
                                }
                            },
                            "env": [
                                {
                                    "name": "IMAGE_URL",
                                    "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525"
                                },
                                {
                                    "name": "IMAGE_DIGEST",
                                    "value": "sha256:913010d8b5ce8f6e482e6a3a6d5e70eb7f2115890c668381e21fa01776e573c6"
                                },
                                {
                                    "name": "IMAGE_PLATFORM"
                                },
                                {
                                    "name": "TPA_URL",
                                    "value": "https://exhort.stage.devshift.net/api/v5/analysis"
                                }
                            ],
                            "image": "quay.io/konflux-ci/konflux-test:v1.4.52@sha256:deabe80a01dca3a8a0edb709324e30cbf0baa176f7a181bbb695323f506f7aac",
                            "imagePullPolicy": "Always",
                            "name": "get-vulnerabilities",
                            "script": "#!/usr/bin/env bash\n\nset -o nounset\nset -o pipefail\n# shellcheck source=/utils.sh\n. /utils.sh\n\ntrap 'handle_error /tekton/results/TEST_OUTPUT' EXIT\n\nimagewithouttag=$(echo -n $IMAGE_URL | sed \"s/\\(.*\\):.*/\\1/\")\n# strip new-line escape symbol from parameter and save it to variable\nimageanddigest=$(echo $imagewithouttag@$IMAGE_DIGEST)\nimages_processed_template='{\"image\": {\"pullspec\": \"'\"$IMAGE_URL\"'\", \"digests\": [%s]}}'\ndigests_processed=()\n\necho \"Inspecting raw image manifest $imageanddigest.\"\n# Get the arch and image manifests by inspecting the image. This is mainly for identifying image indexes\necho \"Selecting auth\"\nmkdir -p /tmp/auth \u0026\u0026 select-oci-auth \"${imageanddigest}\" \u003e/tmp/auth/config.json\nexport DOCKER_CONFIG=/tmp/auth\nimage_manifests=$(get_image_manifests -i \"${imageanddigest}\")\nif [ -n \"$image_manifests\" ]; then\n  echo \"$image_manifests\" | jq -r 'to_entries[] | \"\\(.key) \\(.value)\"' | while read -r arch arch_sha; do\n    echo \"$arch_sha\" \u003e /tekton/home/image-manifest-$arch.sha\n  done\nelse\n  echo \"Failed to get image manifests from image \\\"$imageanddigest\\\"\"\n  note=\"Task tpa-scan failed: Failed to get image manifests from image \\\"$imageanddigest\\\". For details, check Tekton task log.\"\n  ERROR_OUTPUT=$(make_result_json -r \"ERROR\" -t \"$note\")\n  echo \"${ERROR_OUTPUT}\" | tee \"/tekton/results/TEST_OUTPUT\"\n  exit 0\nfi\n\n\ntpa_scan() {\n  local sbom_file=${1}\n  local arch=${2}\n  local sbom_format\n\n  sbom_format=$(jq -r 'if .bomFormat == \"CycloneDX\" then \"cyclonedx\" else \"spdx\" end' \u003c \"${sbom_file}\")\n  retry curl -f --show-error -L -X POST -T \"${sbom_file}\" -H \"Content-Type:application/vnd.${sbom_format}+json\" \"${TPA_URL}\" | tee  \"tpa-report-${arch}.json\";\n}\n\nrun_tpa_on_arch() {\n  local arch=\"$1\"\n  local sha_file=\"image-manifest-${arch}.sha\"\n  local sbom_file_path=\"/tmp/sbom-${arch}.json\"\n  local arch_sha=\"\"\n\n  if [ -e \"${sha_file}\" ]; then\n    arch_sha=$(\u003c\"${sha_file}\")\n    arch_imageanddigest=$(echo -n \"${imagewithouttag}@${arch_sha}\")\n  else\n    echo \"Couldn't find the SHA file for the requested architecture.\"\n    exit 1\n  fi\n\n  echo \"Selecting auth\"\n  mkdir -p /tmp/auth \u0026\u0026 select-oci-auth \"${arch_imageanddigest}\" \u003e/tmp/auth/config.json\n  export DOCKER_CONFIG=/tmp/auth\n\n  # Attempt to download the SBOM file via cosign\n\n  if ! retry cosign download sbom \"${arch_imageanddigest}\" \u003e \"${sbom_file_path}\"; then\n    echo \"Unable to download SBOM for the architecture ${arch}.\"\n    exit 1\n  fi\n\n  if [ -e \"${sbom_file_path}\" ]; then\n    local arch_sha\n    arch_sha=$(\u003c\"$sha_file\")\n\n    echo \"Running TPA scan on $arch image manifest...\"\n    tpa_scan \"${sbom_file_path}\" \"$arch\" || true\n\n    digests_processed+=(\"\\\"$arch_sha\\\"\")\n  else\n    echo \"Couldn't find the SBOM file for the requested ${arch} architecture.\"\n    exit 1\n  fi\n}\n\nplatform=\"${IMAGE_PLATFORM}\"\n\n# If a platform is specified, extract the architecture and run the tpa scan on the corresponding image manifest\nif [ -n \"$platform\" ]; then\n  arch=\"${platform#*/}\"\n  if [ \"$arch\" = \"x86_64\" ] || [ \"$arch\" = \"local\" ] || [ \"$arch\" = \"localhost\" ]; then\n    arch=\"amd64\"\n  fi\n  # Validate against supported arch list. If it's not a known arch, fallback to amd64\n  case \"$arch\" in\n    amd64|ppc64le|arm64|s390x)\n      ;;\n    *)\n      echo \"Error: Unsupported or malformed architecture: '$arch' (parsed from platform: '$platform')\"\n      exit 1\n      ;;\n  esac\n\n  run_tpa_on_arch \"$arch\"\n\n# If no platform is specified, run TPA scan on all available image manifests\nelse\n  for sha_file in image-manifest-*.sha; do\n    if [ -e \"$sha_file\" ]; then\n      arch=$(basename \"$sha_file\" | sed 's/image-manifest-//;s/.sha//')\n      run_tpa_on_arch \"$arch\"\n    fi\n  done\nfi\n\n# If the image is an Image Index, also add the Image Index digest to the list.\nif [[ \"${digests_processed[*]}\" != *\"$IMAGE_DIGEST\"* ]]; then\n  digests_processed+=(\"\\\"$IMAGE_DIGEST\\\"\")\nfi\ndigests_processed_string=$(IFS=,; echo \"${digests_processed[*]}\")\n\nimages_processed=$(echo \"${images_processed_template/\\[%s]/[$digests_processed_string]}\")\necho \"$images_processed\" \u003e images-processed.json\n",
                            "workingDir": "/tekton/home"
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "SKIP_OCI_ATTACH_REPORT",
                                    "value": "false"
                                },
                                {
                                    "name": "IMAGE_URL",
                                    "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:c4481f5e1453d8c204c7bae0f626b245e6bf6525"
                                }
                            ],
                            "image": "quay.io/konflux-ci/task-runner:1.5.0@sha256:200019314a50be5b6dd06f362c794c92a700583a522c5eee9a41e3eab7f706c5",
                            "name": "oci-attach-report",
                            "script": "#!/usr/bin/env bash\n\nset -o errexit\nset -o nounset\nset -o pipefail\n\nif [ \"$SKIP_OCI_ATTACH_REPORT\" = \"true\" ]; then\n  echo 'OCI attach report skipped by parameter.'\n  echo '{}' \u003e reports.json\n  exit 0\nfi\n\nif ! compgen -G \"tpa-report-*.json\" \u003e /dev/null; then\n  echo 'No TPA reports generated. Skipping upload.'\n  echo '{}' \u003e reports.json\n  exit 0\nfi\n\nrepository=\"${IMAGE_URL/:*/}\"\n\narch() {\n  report_file=\"$1\"\n  arch=\"${report_file/*-}\"\n  echo \"${arch/.json/}\"\n}\n\nMEDIA_TYPE='application/vnd.redhat.tpa-report+json'\n\nreports_json=\"{}\"\nfor f in tpa-report-*.json; do\n  digest=$(cat \"image-manifest-$(arch \"$f\").sha\")\n  image_ref=\"${repository}@${digest}\"\n  mkdir -p /tmp/auth \u0026\u0026 select-oci-auth \"${image_ref}\" \u003e/tmp/auth/config.json\n  export DOCKER_CONFIG=/tmp/auth\n  echo \"Attaching $f to ${image_ref}\"\n  if ! report_digest=\"$(retry oras attach --no-tty --format go-template='{{.digest}}' --registry-config \\\n    \"/tmp/auth/config.json\" --artifact-type \"${MEDIA_TYPE}\" \"${image_ref}\" \"$f:${MEDIA_TYPE}\")\"\n  then\n    echo \"Failed to attach ${f} to ${image_ref}\"\n    exit 1\n  fi\n  # shellcheck disable=SC2016\n  reports_json=\"$(yq --output-format json --indent=0 eval-all '. as $i ireduce ({}; . * $i)' \u003c(echo \"${reports_json}\") \u003c(echo \"${digest}: ${report_digest}\"))\"\ndone\necho \"${reports_json}\" \u003e reports.json\n",
                            "workingDir": "/tekton/home"
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "image": "quay.io/redhat-user-workloads/rhtap-integration-tenant/konflux-test:v1.4.52@sha256:deabe80a01dca3a8a0edb709324e30cbf0baa176f7a181bbb695323f506f7aac",
                            "name": "conftest-vulnerabilities",
                            "script": "#!/usr/bin/env bash\nset -euo pipefail\n. /utils.sh\ntrap 'handle_error /tekton/results/TEST_OUTPUT' EXIT\n\ntpa_result_files=$(ls /tekton/home/tpa-report-*.json 2\u003e/dev/null || true)\nif [ -z \"$tpa_result_files\" ]; then\n  echo \"Previous step [get-vulnerabilities] failed: No tpa-report files found in /tekton/home.\"\n  exit 1\nfi\n\nmissing_vulnerabilities_files=\"\"\nfor file in $tpa_result_files; do\n  file_suffix=$(basename \"$file\" | sed 's/tpa-report-//;s/.json//')\n  if [ ! -s \"$file\" ]; then\n    echo \"Previous step [get-vulnerabilities] failed: $file is empty.\"\n  else\n    /usr/bin/conftest test --no-fail $file \\\n    --policy /project/rhtpa/vulnerabilities-check.rego --namespace required_checks \\\n    --output=json | tee /tekton/home/tpa-vulnerabilities-\"${file_suffix}\".json || true\n  fi\n\n  #check for missing \"tpa-vulnerabilities-\u003carch\u003e/image-index\" file and create a string\n  if [ ! -f \"/tekton/home/tpa-vulnerabilities-$file_suffix.json\" ]; then\n    missing_vulnerabilities_files+=\"${missing_vulnerabilities_files:+, }/tekton/home/tpa-vulnerabilities-$file_suffix.json\"\n  fi\ndone\n\nif [ -n \"$missing_vulnerabilities_files\" ]; then\n  note=\"Task tpa-scan failed: $missing_vulnerabilities_files did not generate. For details, check Tekton task log.\"\n  TEST_OUTPUT=$(make_result_json -r \"ERROR\" -t \"$note\")\n  echo \"$missing_vulnerabilities_files did not generate correctly. For details, check conftest command in Tekton task log.\"\n  echo \"${TEST_OUTPUT}\" | tee /tekton/results/TEST_OUTPUT\n  exit 0\nfi\n\nscan_result='{\"vulnerabilities\":{\"critical\":0, \"high\":0, \"medium\":0, \"low\":0, \"unknown\":0}, \"unpatched_vulnerabilities\":{\"critical\":0, \"high\":0, \"medium\":0, \"low\":0, \"unknown\":0}}'\nfor file in /tekton/home/tpa-vulnerabilities-*.json; do\n    result=$(jq -rce \\\n        '{\n            vulnerabilities:{\n              critical: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"rhtpa_critical_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0),\n              high: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"rhtpa_high_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0),\n              medium: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"rhtpa_medium_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0),\n              low: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"rhtpa_low_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0),\n              unknown: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"rhtpa_unknown_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0)\n            },\n            unpatched_vulnerabilities:{\n              critical: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"rhtpa_unpatched_critical_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0),\n              high: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"rhtpa_unpatched_high_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0),\n              medium: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"rhtpa_unpatched_medium_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0),\n              low: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"rhtpa_unpatched_low_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0),\n              unknown: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"rhtpa_unpatched_unknown_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0)\n            }\n        }' \"$file\")\n\n    scan_result=$(jq -s -rce \\\n          '.[0].vulnerabilities.critical += .[1].vulnerabilities.critical |\n          .[0].vulnerabilities.high += .[1].vulnerabilities.high |\n          .[0].vulnerabilities.medium += .[1].vulnerabilities.medium |\n          .[0].vulnerabilities.low += .[1].vulnerabilities.low |\n          .[0].vulnerabilities.unknown += .[1].vulnerabilities.unknown |\n          .[0].unpatched_vulnerabilities.critical += .[1].unpatched_vulnerabilities.critical |\n          .[0].unpatched_vulnerabilities.high += .[1].unpatched_vulnerabilities.high |\n          .[0].unpatched_vulnerabilities.medium += .[1].unpatched_vulnerabilities.medium |\n          .[0].unpatched_vulnerabilities.low += .[1].unpatched_vulnerabilities.low |\n          .[0].unpatched_vulnerabilities.unknown += .[1].unpatched_vulnerabilities.unknown |\n          .[0]' \u003c\u003c\u003c\"$scan_result $result\")\ndone\n\necho \"$scan_result\" | tee \"/tekton/results/SCAN_OUTPUT\"\n\ncat /tekton/home/images-processed.json | tee /tekton/results/IMAGES_PROCESSED\n# shellcheck disable=SC2154\ncat /tekton/home/reports.json \u003e \"/tekton/results/REPORTS\"\n\nnote=\"Task tpa-scan completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by TPA.\"\nTEST_OUTPUT=$(make_result_json -r \"SUCCESS\" -t \"$note\")\necho \"${TEST_OUTPUT}\" | tee /tekton/results/TEST_OUTPUT\n",
                            "securityContext": {
                                "capabilities": {
                                    "add": [
                                        "SETFCAP"
                                    ]
                                }
                            }
                        }
                    ],
                    "volumes": [
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.openshift.io/repo": "https://github.com/rhads-tsf-qe/testrepo?rev=8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "build.appstudio.redhat.com/commit_sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "build.appstudio.redhat.com/target_branch": "base-miwkfv",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=19",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "pipelinesascode.tekton.dev/branch": "base-miwkfv",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552493202",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-ojyaao",
                    "pipelinesascode.tekton.dev/git-provider": "github",
                    "pipelinesascode.tekton.dev/installation-id": "112348674",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-push-cttl8",
                    "pipelinesascode.tekton.dev/max-keep-runs": "3",
                    "pipelinesascode.tekton.dev/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-miwkfv\"",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-ci-tests-bot",
                    "pipelinesascode.tekton.dev/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pipelinesascode.tekton.dev/sha-title": "Merge pull request #181 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pipelinesascode.tekton.dev/source-branch": "refs/heads/base-miwkfv",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-tenant/results/61ce9ab9-21e3-414b-b0da-d05b30fbea57/records/1a2bb3d6-c2fc-4281-b4d0-f2e9c78a029f",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"testrepo\",\"commit\":\"8a419f9b1a920375f8112c9b7477d42bbd82b6c9\",\"eventType\":\"push\"}",
                    "results.tekton.dev/result": "default-tenant/results/61ce9ab9-21e3-414b-b0da-d05b30fbea57",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "image-build, konflux"
                },
                "creationTimestamp": "2026-04-15T23:17:53Z",
                "finalizers": [
                    "chains.tekton.dev",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/version": "v0.37.7",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/component": "tsf-demo-comp",
                    "build.appstudio.redhat.com/build_type": "docker",
                    "pipelines.appstudio.openshift.io/type": "build",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552493202",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "tsf-demo-comp-on-push-cttl8",
                    "tekton.dev/pipelineRun": "tsf-demo-comp-on-push-cttl8",
                    "tekton.dev/pipelineRunUID": "61ce9ab9-21e3-414b-b0da-d05b30fbea57",
                    "tekton.dev/pipelineTask": "build-container",
                    "tekton.dev/task": "buildah-oci-ta-min"
                },
                "name": "tsf-demo-comp-on-push-cttl8-build-container",
                "namespace": "default-tenant",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "tsf-demo-comp-on-push-cttl8",
                        "uid": "61ce9ab9-21e3-414b-b0da-d05b30fbea57"
                    }
                ],
                "resourceVersion": "36995",
                "uid": "1a2bb3d6-c2fc-4281-b4d0-f2e9c78a029f"
            },
            "spec": {
                "params": [
                    {
                        "name": "IMAGE",
                        "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9"
                    },
                    {
                        "name": "DOCKERFILE",
                        "value": "Dockerfile"
                    },
                    {
                        "name": "CONTEXT",
                        "value": "."
                    },
                    {
                        "name": "HERMETIC",
                        "value": "false"
                    },
                    {
                        "name": "PREFETCH_INPUT",
                        "value": ""
                    },
                    {
                        "name": "IMAGE_EXPIRES_AFTER",
                        "value": ""
                    },
                    {
                        "name": "COMMIT_SHA",
                        "value": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9"
                    },
                    {
                        "name": "BUILD_ARGS",
                        "value": []
                    },
                    {
                        "name": "BUILD_ARGS_FILE",
                        "value": ""
                    },
                    {
                        "name": "PRIVILEGED_NESTED",
                        "value": "false"
                    },
                    {
                        "name": "SOURCE_URL",
                        "value": "https://github.com/rhads-tsf-qe/testrepo"
                    },
                    {
                        "name": "BUILDAH_FORMAT",
                        "value": "docker"
                    },
                    {
                        "name": "HTTP_PROXY",
                        "value": ""
                    },
                    {
                        "name": "NO_PROXY",
                        "value": ""
                    },
                    {
                        "name": "SOURCE_ARTIFACT",
                        "value": "oci:quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:7098d15e5ce4e4693bb0f592ef5340eebb08977048de58dd24fcb634390ccfaa"
                    },
                    {
                        "name": "CACHI2_ARTIFACT",
                        "value": ""
                    }
                ],
                "serviceAccountName": "build-pipeline-tsf-demo-comp",
                "taskRef": {
                    "params": [
                        {
                            "name": "name",
                            "value": "buildah-oci-ta-min"
                        },
                        {
                            "name": "bundle",
                            "value": "quay.io/konflux-ci/tekton-catalog/task-buildah-oci-ta-min:0.9@sha256:95c1b5a8b454e19bd4eb28bf90ee0247467743d0e0f5737d952dce1a99108d2f"
                        },
                        {
                            "name": "kind",
                            "value": "task"
                        }
                    ],
                    "resolver": "bundles"
                },
                "timeout": "1h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:20:29Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:20:29Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "tsf-demo-comp-on-push-cttl8-build-container-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha256": "95c1b5a8b454e19bd4eb28bf90ee0247467743d0e0f5737d952dce1a99108d2f"
                        },
                        "entryPoint": "buildah-oci-ta-min",
                        "uri": "quay.io/konflux-ci/tekton-catalog/task-buildah-oci-ta-min"
                    }
                },
                "results": [
                    {
                        "name": "IMAGE_DIGEST",
                        "type": "string",
                        "value": "sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5"
                    },
                    {
                        "name": "IMAGE_REF",
                        "type": "string",
                        "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9@sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5"
                    },
                    {
                        "name": "IMAGE_URL",
                        "type": "string",
                        "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9"
                    },
                    {
                        "name": "SBOM_BLOB_URL",
                        "type": "string",
                        "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:8eb3416e96a6fe7d77235089f529fb7e9a73e478702b005e44a02181afad0e5b"
                    }
                ],
                "startTime": "2026-04-15T23:17:53Z",
                "steps": [
                    {
                        "container": "step-use-trusted-artifact",
                        "imageID": "quay.io/konflux-ci/build-trusted-artifacts@sha256:15d7dc86012e41b10d1eb37679ec03ee75c96436224fadd0938a49dc537aa4ad",
                        "name": "use-trusted-artifact",
                        "terminated": {
                            "containerID": "cri-o://6f1805bde2850c6ae2942046eef939f2b097ed3d4f058adc899d60559604c730",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:18:21Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:18:21Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-build",
                        "imageID": "quay.io/konflux-ci/buildah-task@sha256:3bd8b2c9f2b809bd86457cbe8411051b5a000f312b5e48cab63ab288bf6bf330",
                        "name": "build",
                        "terminated": {
                            "containerID": "cri-o://40ea838726fc2eed38679c751eabdd5e1edc19223ee05cb5c32d495b0baa88d9",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:19:05Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:18:22Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-push",
                        "imageID": "quay.io/konflux-ci/buildah-task@sha256:3bd8b2c9f2b809bd86457cbe8411051b5a000f312b5e48cab63ab288bf6bf330",
                        "name": "push",
                        "terminated": {
                            "containerID": "cri-o://c1b47526f84288c819d24f777c5f278353cca2b8defae961e8c987769ca45840",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:19:20Z",
                            "message": "[{\"key\":\"IMAGE_DIGEST\",\"value\":\"sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5\",\"type\":1},{\"key\":\"IMAGE_REF\",\"value\":\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9@sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5\",\"type\":1},{\"key\":\"IMAGE_URL\",\"value\":\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:19:06Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-sbom-syft-generate",
                        "imageID": "quay.io/konflux-ci/task-runner@sha256:b22b989da3c95cb0af862eeb82531ed4f687e948ca5fb6b965d1ea8fbd5054ce",
                        "name": "sbom-syft-generate",
                        "terminated": {
                            "containerID": "cri-o://59fb3be159dbb22eaf26e28342457a47fef28e6621843f6d714dc38d51fb8ab4",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:19:58Z",
                            "message": "[{\"key\":\"IMAGE_DIGEST\",\"value\":\"sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5\",\"type\":1},{\"key\":\"IMAGE_REF\",\"value\":\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9@sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5\",\"type\":1},{\"key\":\"IMAGE_URL\",\"value\":\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:19:21Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-prepare-sboms",
                        "imageID": "quay.io/konflux-ci/mobster@sha256:2e00c2f0aeff55713150b51822013327ea0e0d75b8164a52f837fb297c17703d",
                        "name": "prepare-sboms",
                        "terminated": {
                            "containerID": "cri-o://88b743e271953bcb8106297634fa2e1c2777bd653864dede45919db1cf2031a0",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:20:22Z",
                            "message": "[{\"key\":\"IMAGE_DIGEST\",\"value\":\"sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5\",\"type\":1},{\"key\":\"IMAGE_REF\",\"value\":\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9@sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5\",\"type\":1},{\"key\":\"IMAGE_URL\",\"value\":\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:19:59Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-upload-sbom",
                        "imageID": "quay.io/konflux-ci/task-runner@sha256:b22b989da3c95cb0af862eeb82531ed4f687e948ca5fb6b965d1ea8fbd5054ce",
                        "name": "upload-sbom",
                        "terminated": {
                            "containerID": "cri-o://7c5032cb14acbff7e0929889c24167a4ae57c8bfbc14c69c754991bab0c50458",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:20:29Z",
                            "message": "[{\"key\":\"IMAGE_DIGEST\",\"value\":\"sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5\",\"type\":1},{\"key\":\"IMAGE_REF\",\"value\":\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9@sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5\",\"type\":1},{\"key\":\"IMAGE_URL\",\"value\":\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9\",\"type\":1},{\"key\":\"SBOM_BLOB_URL\",\"value\":\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:8eb3416e96a6fe7d77235089f529fb7e9a73e478702b005e44a02181afad0e5b\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:20:22Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Buildah task builds source code into a container image and pushes the image into container registry using buildah tool.\nIn addition, it generates a SBOM file, injects the SBOM file into final container image and pushes the SBOM file as separate image using cosign tool.\nWhen prefetch-dependencies task is activated it is using its artifacts to run build in hermetic environment.",
                    "params": [
                        {
                            "default": "activation-key",
                            "description": "Name of secret which contains subscription activation key",
                            "name": "ACTIVATION_KEY",
                            "type": "string"
                        },
                        {
                            "default": [],
                            "description": "Additional base image references to include to the SBOM. Array of image_reference_with_digest strings",
                            "name": "ADDITIONAL_BASE_IMAGES",
                            "type": "array"
                        },
                        {
                            "default": "does-not-exist",
                            "description": "Name of a secret which will be made available to the build with 'buildah build --secret' at /run/secrets/$ADDITIONAL_SECRET",
                            "name": "ADDITIONAL_SECRET",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Comma separated list of extra capabilities to add when running 'buildah build'",
                            "name": "ADD_CAPABILITIES",
                            "type": "string"
                        },
                        {
                            "default": [],
                            "description": "Additional key=value annotations that should be applied to the image",
                            "name": "ANNOTATIONS",
                            "type": "array"
                        },
                        {
                            "default": "",
                            "description": "Path to a file with additional key=value annotations that should be applied to the image",
                            "name": "ANNOTATIONS_FILE",
                            "type": "string"
                        },
                        {
                            "default": "oci",
                            "description": "The format for the resulting image's mediaType. Valid values are oci (default) or docker.",
                            "name": "BUILDAH_FORMAT",
                            "type": "string"
                        },
                        {
                            "default": [],
                            "description": "Array of --build-arg values (\"arg=value\" strings)",
                            "name": "BUILD_ARGS",
                            "type": "array"
                        },
                        {
                            "default": "",
                            "description": "Path to a file with build arguments, see https://www.mankier.com/1/buildah-build#--build-arg-file",
                            "name": "BUILD_ARGS_FILE",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Defines the single build time for all buildah builds in seconds since UNIX epoch. Conflicts with SOURCE_DATE_EPOCH.",
                            "name": "BUILD_TIMESTAMP",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "The Trusted Artifact URI pointing to the artifact with the prefetched dependencies.",
                            "name": "CACHI2_ARTIFACT",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "The image is built from this commit.",
                            "name": "COMMIT_SHA",
                            "type": "string"
                        },
                        {
                            "default": ".",
                            "description": "Path to the directory to use as context.",
                            "name": "CONTEXT",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Determines if SBOM will be contextualized.",
                            "name": "CONTEXTUALIZE_SBOM",
                            "type": "string"
                        },
                        {
                            "default": "./Dockerfile",
                            "description": "Path to the Dockerfile to build.",
                            "name": "DOCKERFILE",
                            "type": "string"
                        },
                        {
                            "default": "etc-pki-entitlement",
                            "description": "Name of secret which contains the entitlement certificates",
                            "name": "ENTITLEMENT_SECRET",
                            "type": "string"
                        },
                        {
                            "default": [],
                            "description": "Array of --env values (\"env=value\" strings)",
                            "name": "ENV_VARS",
                            "type": "array"
                        },
                        {
                            "default": "false",
                            "description": "Determines if build will be executed without network access.",
                            "name": "HERMETIC",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "HTTP/HTTPS proxy to use for the buildah pull and build operations. Will not be passed through to the container during the build process.",
                            "name": "HTTP_PROXY",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Whether to keep compatibility location at /root/buildinfo/ for ICM injection",
                            "name": "ICM_KEEP_COMPAT_LOCATION",
                            "type": "string"
                        },
                        {
                            "description": "Reference of the image buildah will produce.",
                            "name": "IMAGE",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Delete image tag after specified time. Empty means to keep the image tag. Time values could be something like 1h, 2d, 3w for hours, days, and weeks, respectively.",
                            "name": "IMAGE_EXPIRES_AFTER",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Determines if the image inherits the base image labels.",
                            "name": "INHERIT_BASE_IMAGE_LABELS",
                            "type": "string"
                        },
                        {
                            "default": [],
                            "description": "Additional key=value labels that should be applied to the image",
                            "name": "LABELS",
                            "type": "array"
                        },
                        {
                            "default": "",
                            "description": "Comma separated list of hosts or domains which should bypass the HTTP/HTTPS proxy.",
                            "name": "NO_PROXY",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Omit build history information from the resulting image. Improves reproducibility by excluding timestamps and layer metadata.",
                            "name": "OMIT_HISTORY",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "In case it is not empty, the prefetched content should be made available to the build.",
                            "name": "PREFETCH_INPUT",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Whether to enable privileged mode, should be used only with remote VMs",
                            "name": "PRIVILEGED_NESTED",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the proxy CA bundle data.",
                            "name": "PROXY_CA_TRUST_CONFIG_MAP_KEY",
                            "type": "string"
                        },
                        {
                            "default": "caching-ca-bundle",
                            "description": "The name of the ConfigMap to read proxy CA bundle data from.",
                            "name": "PROXY_CA_TRUST_CONFIG_MAP_NAME",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Clamp mtime of all files to at most SOURCE_DATE_EPOCH. Does nothing if SOURCE_DATE_EPOCH is not defined.",
                            "name": "REWRITE_TIMESTAMP",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Flag to enable or disable SBOM validation before save. Validation is optional - use this if you are experiencing performance issues.",
                            "name": "SBOM_SKIP_VALIDATION",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Flag to enable or disable SBOM generation from source code. The scanner of the source code is enabled only for non-hermetic builds and can be disabled if the SBOM_SYFT_SELECT_CATALOGERS can't turn off catalogers that cause false positives on source code scanning.",
                            "name": "SBOM_SOURCE_SCAN_ENABLED",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Extra option to customize Syft's default catalogers when generating SBOMs. The value corresponds to Syft's CLI flag --select-catalogers. The details about available catalogers can be found here: https://github.com/anchore/syft/wiki/Package-Cataloger-Selection",
                            "name": "SBOM_SYFT_SELECT_CATALOGERS",
                            "type": "string"
                        },
                        {
                            "default": "spdx",
                            "description": "Select the SBOM format to generate. Valid values: spdx, cyclonedx. Note: the SBOM from the prefetch task - if there is one - must be in the same format.",
                            "name": "SBOM_TYPE",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Don't inject a content-sets.json or a labels.json file. This requires that the canonical Containerfile takes care of this itself.",
                            "name": "SKIP_INJECTIONS",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Skip SBOM-related operations. This will likely cause EC policies to fail if enabled",
                            "name": "SKIP_SBOM_GENERATION",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Whether to skip stages in Containerfile that seem unused by subsequent stages",
                            "name": "SKIP_UNUSED_STAGES",
                            "type": "string"
                        },
                        {
                            "description": "The Trusted Artifact URI pointing to the artifact with the application source code.",
                            "name": "SOURCE_ARTIFACT",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Timestamp in seconds since Unix epoch for reproducible builds. Sets image created time and SOURCE_DATE_EPOCH build arg. Conflicts with BUILD_TIMESTAMP.",
                            "name": "SOURCE_DATE_EPOCH",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "The image is built from this URL.",
                            "name": "SOURCE_URL",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Squash all new and previous layers added as a part of this build, as per --squash",
                            "name": "SQUASH",
                            "type": "string"
                        },
                        {
                            "default": "overlay",
                            "description": "Storage driver to configure for buildah",
                            "name": "STORAGE_DRIVER",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Target stage in Dockerfile to build. If not specified, the Dockerfile is processed entirely to (and including) its last stage.",
                            "name": "TARGET_STAGE",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Verify the TLS on the registry endpoint (for push/pull to a non-TLS registry)",
                            "name": "TLSVERIFY",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Mount the current working directory into the build using --volume $PWD:/$WORKINGDIR_MOUNT. Note that the $PWD will be the context directory for the build (see the CONTEXT param).",
                            "name": "WORKINGDIR_MOUNT",
                            "type": "string"
                        },
                        {
                            "default": "fetched.repos.d",
                            "description": "Path in source workspace where dynamically-fetched repos are present",
                            "name": "YUM_REPOS_D_FETCHED",
                            "type": "string"
                        },
                        {
                            "default": "repos.d",
                            "description": "Path in the git repository in which yum repository files are stored",
                            "name": "YUM_REPOS_D_SRC",
                            "type": "string"
                        },
                        {
                            "default": "/etc/yum.repos.d",
                            "description": "Target path on the container in which yum repository files should be made available",
                            "name": "YUM_REPOS_D_TARGET",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data.",
                            "name": "caTrustConfigMapKey",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from.",
                            "name": "caTrustConfigMapName",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Digest of the image just built",
                            "name": "IMAGE_DIGEST",
                            "type": "string"
                        },
                        {
                            "description": "Image reference of the built image",
                            "name": "IMAGE_REF",
                            "type": "string"
                        },
                        {
                            "description": "Image repository and tag where the built image was pushed",
                            "name": "IMAGE_URL",
                            "type": "string"
                        },
                        {
                            "description": "Reference of SBOM blob digest to enable digest-based verification from provenance",
                            "name": "SBOM_BLOB_URL",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {
                            "limits": {
                                "memory": "256Mi"
                            },
                            "requests": {
                                "cpu": "100m",
                                "memory": "256Mi"
                            }
                        },
                        "env": [
                            {
                                "name": "ACTIVATION_KEY",
                                "value": "activation-key"
                            },
                            {
                                "name": "ADDITIONAL_SECRET",
                                "value": "does-not-exist"
                            },
                            {
                                "name": "ADD_CAPABILITIES"
                            },
                            {
                                "name": "ANNOTATIONS_FILE"
                            },
                            {
                                "name": "BUILD_ARGS_FILE"
                            },
                            {
                                "name": "BUILD_TIMESTAMP"
                            },
                            {
                                "name": "CONTEXT",
                                "value": "."
                            },
                            {
                                "name": "CONTEXTUALIZE_SBOM",
                                "value": "true"
                            },
                            {
                                "name": "ENTITLEMENT_SECRET",
                                "value": "etc-pki-entitlement"
                            },
                            {
                                "name": "HERMETIC",
                                "value": "false"
                            },
                            {
                                "name": "IMAGE",
                                "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9"
                            },
                            {
                                "name": "IMAGE_EXPIRES_AFTER"
                            },
                            {
                                "name": "INHERIT_BASE_IMAGE_LABELS",
                                "value": "true"
                            },
                            {
                                "name": "PRIVILEGED_NESTED",
                                "value": "false"
                            },
                            {
                                "name": "SBOM_SKIP_VALIDATION",
                                "value": "true"
                            },
                            {
                                "name": "SBOM_SOURCE_SCAN_ENABLED",
                                "value": "true"
                            },
                            {
                                "name": "SBOM_SYFT_SELECT_CATALOGERS"
                            },
                            {
                                "name": "SBOM_TYPE",
                                "value": "spdx"
                            },
                            {
                                "name": "SKIP_INJECTIONS",
                                "value": "false"
                            },
                            {
                                "name": "SKIP_SBOM_GENERATION",
                                "value": "false"
                            },
                            {
                                "name": "SKIP_UNUSED_STAGES",
                                "value": "true"
                            },
                            {
                                "name": "SOURCE_CODE_DIR",
                                "value": "source"
                            },
                            {
                                "name": "SQUASH",
                                "value": "false"
                            },
                            {
                                "name": "STORAGE_DRIVER",
                                "value": "overlay"
                            },
                            {
                                "name": "TARGET_STAGE"
                            },
                            {
                                "name": "TLSVERIFY",
                                "value": "true"
                            },
                            {
                                "name": "WORKINGDIR_MOUNT"
                            },
                            {
                                "name": "YUM_REPOS_D_FETCHED",
                                "value": "fetched.repos.d"
                            },
                            {
                                "name": "YUM_REPOS_D_SRC",
                                "value": "repos.d"
                            },
                            {
                                "name": "YUM_REPOS_D_TARGET",
                                "value": "/etc/yum.repos.d"
                            }
                        ],
                        "imagePullPolicy": "IfNotPresent",
                        "volumeMounts": [
                            {
                                "mountPath": "/shared",
                                "name": "shared"
                            },
                            {
                                "mountPath": "/var/workdir",
                                "name": "workdir"
                            }
                        ]
                    },
                    "steps": [
                        {
                            "args": [
                                "use",
                                "oci:quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:7098d15e5ce4e4693bb0f592ef5340eebb08977048de58dd24fcb634390ccfaa=/var/workdir/source",
                                "=/var/workdir/cachi2"
                            ],
                            "computeResources": {},
                            "image": "quay.io/konflux-ci/build-trusted-artifacts:latest@sha256:15d7dc86012e41b10d1eb37679ec03ee75c96436224fadd0938a49dc537aa4ad",
                            "name": "use-trusted-artifact",
                            "volumeMounts": [
                                {
                                    "mountPath": "/etc/pki/tls/certs/ca-custom-bundle.crt",
                                    "name": "trusted-ca",
                                    "readOnly": true,
                                    "subPath": "ca-bundle.crt"
                                }
                            ]
                        },
                        {
                            "args": [
                                "--build-args",
                                "--env",
                                "--labels",
                                "--annotations"
                            ],
                            "computeResources": {
                                "limits": {
                                    "cpu": "500m",
                                    "memory": "1Gi"
                                },
                                "requests": {
                                    "cpu": "500m",
                                    "memory": "1Gi"
                                }
                            },
                            "env": [
                                {
                                    "name": "HOME",
                                    "value": "/root"
                                },
                                {
                                    "name": "COMMIT_SHA",
                                    "value": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9"
                                },
                                {
                                    "name": "SOURCE_URL",
                                    "value": "https://github.com/rhads-tsf-qe/testrepo"
                                },
                                {
                                    "name": "DOCKERFILE",
                                    "value": "Dockerfile"
                                },
                                {
                                    "name": "BUILDAH_HTTP_PROXY"
                                },
                                {
                                    "name": "BUILDAH_NO_PROXY"
                                },
                                {
                                    "name": "ICM_KEEP_COMPAT_LOCATION",
                                    "value": "true"
                                },
                                {
                                    "name": "BUILDAH_OMIT_HISTORY",
                                    "value": "false"
                                },
                                {
                                    "name": "BUILDAH_SOURCE_DATE_EPOCH"
                                },
                                {
                                    "name": "BUILDAH_REWRITE_TIMESTAMP",
                                    "value": "false"
                                }
                            ],
                            "image": "quay.io/konflux-ci/buildah-task:latest@sha256:4c470b5a153c4acd14bf4f8731b5e36c61d7faafe09c2bf376bb81ce84aa5709",
                            "name": "build",
                            "script": "#!/bin/bash\nset -euo pipefail\n\nfunction set_proxy {\n  if [ -n \"${BUILDAH_HTTP_PROXY}\" ]; then\n    echo \"[$(date --utc -Ins)] Setting proxy to ${BUILDAH_HTTP_PROXY}\"\n    export HTTP_PROXY=\"${BUILDAH_HTTP_PROXY}\"\n    export HTTPS_PROXY=\"${BUILDAH_HTTP_PROXY}\"\n    export ALL_PROXY=\"${BUILDAH_HTTP_PROXY}\"\n    if [ -n \"${BUILDAH_NO_PROXY}\" ]; then\n      echo \"[$(date --utc -Ins)] Bypassing proxy for ${BUILDAH_NO_PROXY}\"\n      export NO_PROXY=\"${BUILDAH_NO_PROXY}\"\n    fi\n  fi\n}\n\nfunction unset_proxy {\n  echo \"[$(date --utc -Ins)] Unsetting proxy\"\n  unset HTTP_PROXY HTTPS_PROXY ALL_PROXY NO_PROXY\n}\n\necho \"[$(date --utc -Ins)] Validate context path\"\n\nif [ -z \"$CONTEXT\" ]; then\n  echo \"WARNING: CONTEXT is empty. Defaulting to '.' (the source directory).\" \u003e\u00262\n  CONTEXT=\".\"\nfi\n\nsource_dir_path=$(realpath \"$SOURCE_CODE_DIR\")\ncontext_dir_path=$(realpath \"$SOURCE_CODE_DIR/$CONTEXT\")\n\ncase \"$context_dir_path\" in\n\"$source_dir_path\" | \"$source_dir_path/\"*)\n  # path is valid, do nothing\n  ;;\n*)\n  echo \"ERROR: The CONTEXT parameter ('$CONTEXT') is invalid because it escapes the source directory.\" \u003e\u00262\n  echo \"Source path: $source_dir_path\" \u003e\u00262\n  echo \"Resolved path: $context_dir_path\" \u003e\u00262\n  exit 1\n  ;;\nesac\n\necho \"[$(date --utc -Ins)] Update CA trust\"\n\nca_bundle=/mnt/trusted-ca/ca-bundle.crt\nproxy_ca_bundle=/mnt/proxy-ca-bundle/ca-bundle.crt\nupdate_ca_trust=false\n\nif [ -f \"$ca_bundle\" ]; then\n  echo \"[$(date --utc -Ins)] Using mounted CA bundle: $ca_bundle\"\n  cp -vf $ca_bundle /etc/pki/ca-trust/source/anchors/ca-bundle.crt\n  update_ca_trust=true\nfi\n\nif [ -f \"$proxy_ca_bundle\" ] \u0026\u0026 [ -n \"${BUILDAH_HTTP_PROXY}\" ]; then\n  echo \"[$(date --utc -Ins)] Using mounted proxy CA bundle: $proxy_ca_bundle\"\n  cp -vf $proxy_ca_bundle /etc/pki/ca-trust/source/anchors/proxy-ca-bundle.crt\n  update_ca_trust=true\nfi\n\nif [ \"$update_ca_trust\" = \"true\" ]; then\n  update-ca-trust\nfi\n\necho \"[$(date --utc -Ins)] Prepare Dockerfile\"\n\nif [ -e \"$SOURCE_CODE_DIR/$CONTEXT/$DOCKERFILE\" ]; then\n  dockerfile_path=\"$(pwd)/$SOURCE_CODE_DIR/$CONTEXT/$DOCKERFILE\"\nelif [ -e \"$SOURCE_CODE_DIR/$DOCKERFILE\" ]; then\n  dockerfile_path=\"$(pwd)/$SOURCE_CODE_DIR/$DOCKERFILE\"\nelif [ -e \"$DOCKERFILE\" ]; then\n  # Instrumented builds (SAST) use this custom dockerfile step as their base\n  dockerfile_path=\"$DOCKERFILE\"\nelse\n  echo \"Cannot find Dockerfile $DOCKERFILE\"\n  exit 1\nfi\n\ndockerfile_copy=$(mktemp --tmpdir \"$(basename \"$dockerfile_path\").XXXXXX\")\ncp \"$dockerfile_path\" \"$dockerfile_copy\"\n\n# Inject the image content manifest into the container we are producing.\n# This will generate the content-sets.json file and copy it by appending a COPY\n# instruction to the Containerfile.\nicm_opts=()\nif [ \"${ICM_KEEP_COMPAT_LOCATION}\" = \"true\" ]; then\n  icm_opts+=(-c)\nfi\nif [ \"${SKIP_INJECTIONS}\" = \"false\" ]; then\n  inject-icm-to-containerfile \"${icm_opts[@]}\" \"$dockerfile_copy\" \"/var/workdir/cachi2/output/bom.json\" \"$SOURCE_CODE_DIR/$CONTEXT\"\nfi\n\necho \"[$(date --utc -Ins)] Prepare system (architecture: $(uname -m))\"\n\n# Fixing group permission on /var/lib/containers\nchown root:root /var/lib/containers\n\nsed -i 's/^\\s*short-name-mode\\s*=\\s*.*/short-name-mode = \"disabled\"/' /etc/containers/registries.conf\n\n# Setting new namespace to run buildah - 2^32-2\necho 'root:1:4294967294' | tee -a /etc/subuid \u003e\u003e/etc/subgid\n\nbuild_args=()\nenv_vars=()\n\nLABELS=()\nANNOTATIONS=()\n# Append any annotations from the specified file\nif [ -n \"${ANNOTATIONS_FILE}\" ] \u0026\u0026 [ -f \"${SOURCE_CODE_DIR}/${ANNOTATIONS_FILE}\" ]; then\n  echo \"Reading annotations from file: ${SOURCE_CODE_DIR}/${ANNOTATIONS_FILE}\"\n  while IFS= read -r line || [[ -n \"$line\" ]]; do\n    # Skip empty lines and comments\n    if [[ -n \"$line\" \u0026\u0026 ! \"$line\" =~ ^[[:space:]]*# ]]; then\n      ANNOTATIONS+=(\"--annotation\" \"$line\")\n    fi\n  done \u003c\"${SOURCE_CODE_DIR}/${ANNOTATIONS_FILE}\"\nfi\n\n# Split `args` into two sets of arguments.\nwhile [[ $# -gt 0 ]]; do\n  case $1 in\n  --build-args)\n    shift\n    # Note: this may result in multiple --build-arg=KEY=value flags with the same KEY being\n    # passed to buildah. In that case, the *last* occurrence takes precedence. This is why\n    # we append BUILD_ARGS after the content of the BUILD_ARGS_FILE\n    while [[ $# -gt 0 \u0026\u0026 $1 != --* ]]; do\n      build_args+=(\"$1\")\n      shift\n    done\n    ;;\n  --env)\n    shift\n    # Collect env entries of the form KEY=value\n    while [[ $# -gt 0 \u0026\u0026 $1 != --* ]]; do\n      env_vars+=(\"$1\")\n      shift\n    done\n    ;;\n  --labels)\n    shift\n    while [[ $# -gt 0 \u0026\u0026 $1 != --* ]]; do\n      LABELS+=(\"--label\" \"$1\")\n      shift\n    done\n    ;;\n  --annotations)\n    shift\n    while [[ $# -gt 0 \u0026\u0026 $1 != --* ]]; do\n      ANNOTATIONS+=(\"--annotation\" \"$1\")\n      shift\n    done\n    ;;\n  *)\n    echo \"unexpected argument: $1\" \u003e\u00262\n    exit 2\n    ;;\n  esac\ndone\n\nBUILD_ARG_FLAGS=()\nfor build_arg in \"${build_args[@]}\"; do\n  BUILD_ARG_FLAGS+=(\"--build-arg=$build_arg\")\ndone\n\nENV_FLAGS=()\nfor env_var in \"${env_vars[@]}\"; do\n  ENV_FLAGS+=(\"--env=$env_var\")\ndone\n\nDOCKERFILE_ARG_FLAGS=()\nDOCKERFILE_ARG_FLAGS+=(\"${BUILD_ARG_FLAGS[@]}\")\nDOCKERFILE_ARG_FLAGS+=(\"${ENV_FLAGS[@]}\")\n\nif [ -n \"${BUILD_ARGS_FILE}\" ]; then\n  DOCKERFILE_ARG_FLAGS+=(\"--build-arg-file=${SOURCE_CODE_DIR}/${BUILD_ARGS_FILE}\")\nfi\n\ndockerfile-json \"${DOCKERFILE_ARG_FLAGS[@]}\" \"$dockerfile_copy\" \u003e/shared/parsed_dockerfile.json\nBASE_IMAGES=$(\n  jq -r '.Stages[] | select(.From | .Stage or .Scratch | not) | .BaseName | select(test(\"^oci-archive:\") | not)' /shared/parsed_dockerfile.json |\n    tr -d '\"' |\n    tr -d \"'\"\n)\n\nBUILDAH_ARGS=()\nUNSHARE_ARGS=()\n\nif [ \"${HERMETIC}\" == \"true\" ]; then\n  BUILDAH_ARGS+=(\"--pull=never\")\n  UNSHARE_ARGS+=(\"--net\")\n  buildah_retries=3\n\n  set_proxy\n\n  for image in $BASE_IMAGES; do\n    if ! retry unshare -Ufp --keep-caps -r --map-users 1,1,65536 --map-groups 1,1,65536 --mount -- buildah pull --retry \"$buildah_retries\" \"$image\"; then\n      echo \"Failed to pull base image ${image}\"\n      exit 1\n    fi\n  done\n\n  unset_proxy\n\n  echo \"Build will be executed with network isolation\"\nfi\n\nif [ -n \"${TARGET_STAGE}\" ]; then\n  BUILDAH_ARGS+=(\"--target=${TARGET_STAGE}\")\nfi\n\nBUILDAH_ARGS+=(\"${BUILD_ARG_FLAGS[@]}\")\nBUILDAH_ARGS+=(\"${ENV_FLAGS[@]}\")\n\nif [ -n \"${BUILD_ARGS_FILE}\" ]; then\n  BUILDAH_ARGS+=(\"--build-arg-file=$(realpath \"${SOURCE_CODE_DIR}/${BUILD_ARGS_FILE}\")\")\nfi\n\n# Necessary for newer version of buildah if the host system does not contain up to date version of container-selinux\n# TODO remove the option once all hosts were updated\nBUILDAH_ARGS+=(\"--security-opt=unmask=/proc/interrupts\")\n\nif [ \"${PRIVILEGED_NESTED}\" == \"true\" ]; then\n  BUILDAH_ARGS+=(\"--security-opt=label=disable\")\n  BUILDAH_ARGS+=(\"--cap-add=all\")\n  BUILDAH_ARGS+=(\"--device=/dev/fuse\")\nfi\n\nif [ -n \"${ADD_CAPABILITIES}\" ]; then\n  BUILDAH_ARGS+=(\"--cap-add=${ADD_CAPABILITIES}\")\nfi\n\nif [ \"${SQUASH}\" == \"true\" ]; then\n  BUILDAH_ARGS+=(\"--squash\")\nfi\n\nif [ \"${SKIP_UNUSED_STAGES}\" != \"true\" ]; then\n  BUILDAH_ARGS+=(\"--skip-unused-stages=false\")\nfi\n\nif [ \"${INHERIT_BASE_IMAGE_LABELS}\" != \"true\" ]; then\n  BUILDAH_ARGS+=(\"--inherit-labels=false\")\nfi\n\nif [ -n \"${BUILDAH_SOURCE_DATE_EPOCH}\" ]; then\n  BUILDAH_ARGS+=(\"--source-date-epoch=${BUILDAH_SOURCE_DATE_EPOCH}\")\n  if [ \"${BUILDAH_REWRITE_TIMESTAMP}\" = \"true\" ]; then\n    BUILDAH_ARGS+=(\"--rewrite-timestamp\")\n  fi\n  if [ -n \"$BUILD_TIMESTAMP\" ]; then\n    echo \"ERROR: cannot use both BUILD_TIMESTAMP and SOURCE_DATE_EPOCH\"\n    exit 1\n  fi\n  # but do set it so that we get all the labels/annotations associated with it\n  BUILD_TIMESTAMP=\"$BUILDAH_SOURCE_DATE_EPOCH\"\nfi\n\nif [ \"${BUILDAH_OMIT_HISTORY}\" == \"true\" ]; then\n  BUILDAH_ARGS+=(\"--omit-history\")\nfi\n\nVOLUME_MOUNTS=()\n\necho \"[$(date --utc -Ins)] Setup prefetched\"\n\nif [ -f \"/var/workdir/cachi2/cachi2.env\" ]; then\n  # Identify the current arch to filter the prefetched content\n  PREFETCH_ARCH=\"$(uname -m)\"\n  echo \"$PREFETCH_ARCH\" \u003e/shared/prefetch-arch\n\n  echo \"Prefetched content will be made available\"\n\n  cp -r \"/var/workdir/cachi2\" /tmp/\n  chmod -R go+rwX /tmp/cachi2\n\n  # In case RPMs were prefetched and this is a multi-arch build,\n  # clean up the packages that do not match the architecture being built\n  RPM_PREFETCH_DIR=\"/tmp/cachi2/output/deps/rpm\"\n  if [ -d \"$RPM_PREFETCH_DIR\" ] \u0026\u0026 [ \"$(find $RPM_PREFETCH_DIR | wc -l)\" -gt 1 ]; then\n    echo \"Removing prefetched RPMs from non-matching architectures\"\n    PREFETCH_ARCH=\"$(uname -m)\"\n    for path in \"$RPM_PREFETCH_DIR\"/*; do\n      if [ \"$(basename \"$path\")\" != \"$PREFETCH_ARCH\" ]; then\n        echo \"Removing: $path\"\n        rm -rf \"$path\"\n      else\n        echo \"Keeping: $path\"\n      fi\n    done\n  fi\n\n  VOLUME_MOUNTS+=(--volume /tmp/cachi2:/cachi2)\n  # Read in the whole file (https://unix.stackexchange.com/questions/533277), then\n  # for each RUN ... line insert the cachi2.env command *after* any options like --mount\n  sed -E -i \\\n    -e 'H;1h;$!d;x' \\\n    -e 's@^\\s*(run((\\s|\\\\\\n)+-\\S+)*(\\s|\\\\\\n)+)@\\1. /cachi2/cachi2.env \\\u0026\\\u0026 \\\\\\n    @igM' \\\n    \"$dockerfile_copy\"\n\n  prefetched_repo_for_my_arch=\"/tmp/cachi2/output/deps/rpm/$(uname -m)/repos.d/cachi2.repo\"\n  if [ -f \"$prefetched_repo_for_my_arch\" ]; then\n    echo \"Adding $prefetched_repo_for_my_arch to $YUM_REPOS_D_FETCHED\"\n    mkdir -p \"$YUM_REPOS_D_FETCHED\"\n    if [ ! -f \"${YUM_REPOS_D_FETCHED}/cachi2.repo\" ]; then\n      cp \"$prefetched_repo_for_my_arch\" \"$YUM_REPOS_D_FETCHED\"\n    fi\n  fi\nfi\n\n# if yum repofiles stored in git, copy them to mount point outside the source dir\nif [ -d \"${SOURCE_CODE_DIR}/${YUM_REPOS_D_SRC}\" ]; then\n  mkdir -p \"${YUM_REPOS_D_FETCHED}\"\n  cp -r \"${SOURCE_CODE_DIR}/${YUM_REPOS_D_SRC}\"/* \"${YUM_REPOS_D_FETCHED}\"\nfi\n\n# if anything in the repofiles mount point (either fetched or from git), mount it\nif [ -d \"${YUM_REPOS_D_FETCHED}\" ]; then\n  chmod -R go+rwX \"${YUM_REPOS_D_FETCHED}\"\n  mount_point=$(realpath \"${YUM_REPOS_D_FETCHED}\")\n  VOLUME_MOUNTS+=(--volume \"${mount_point}:${YUM_REPOS_D_TARGET}\")\nfi\n\nDEFAULT_LABELS=(\n  \"--label\" \"architecture=$(uname -m)\"\n  \"--label\" \"vcs-type=git\"\n)\nif [ -n \"$COMMIT_SHA\" ]; then\n  DEFAULT_LABELS+=(\"--label\" \"vcs-ref=${COMMIT_SHA}\" \"--label\" \"org.opencontainers.image.revision=${COMMIT_SHA}\")\n  ANNOTATIONS+=(\"--annotation\" \"org.opencontainers.image.revision=${COMMIT_SHA}\")\nfi\nif [ -n \"$SOURCE_URL\" ]; then\n  DEFAULT_LABELS+=(\"--label\" \"org.opencontainers.image.source=${SOURCE_URL}\")\n  ANNOTATIONS+=(\"--annotation\" \"org.opencontainers.image.source=${SOURCE_URL}\")\nfi\n[ -n \"$IMAGE_EXPIRES_AFTER\" ] \u0026\u0026 DEFAULT_LABELS+=(\"--label\" \"quay.expires-after=$IMAGE_EXPIRES_AFTER\")\n\nBUILD_TIMESTAMP_RFC3339=\"\"\nif [ -n \"$BUILD_TIMESTAMP\" ]; then\n  BUILD_TIMESTAMP_RFC3339=$(date -u -d \"@$BUILD_TIMESTAMP\" +'%Y-%m-%dT%H:%M:%SZ')\nelse\n  BUILD_TIMESTAMP_RFC3339=$(date -u +'%Y-%m-%dT%H:%M:%SZ')\nfi\n\nDEFAULT_LABELS+=(\"--label\" \"build-date=${BUILD_TIMESTAMP_RFC3339}\")\nDEFAULT_LABELS+=(\"--label\" \"org.opencontainers.image.created=${BUILD_TIMESTAMP_RFC3339}\")\nANNOTATIONS+=(\"--annotation\" \"org.opencontainers.image.created=${BUILD_TIMESTAMP_RFC3339}\")\n\nlabel_pairs=()\n# If INHERIT_BASE_IMAGE_LABELS is true, get the labels from the final base image only\ntouch base_images_labels.json\nif [[ \"$INHERIT_BASE_IMAGE_LABELS\" == \"true\" ]] \u0026\u0026 [[ -n \"$BASE_IMAGES\" ]]; then\n  FINAL_BASE_IMAGE=$(\n    # Get the base image of the final stage\n    # The final stage can refer to a previous `FROM xxx AS yyy` stage, for example 'FROM bar AS foo; ... ; FROM foo; ...'\n    # Define a function that keeps nesting recursively into the parent stages until it finds the original base image\n    # Run the find_root_stage() function on the final stage\n    # If the final stage is scratch or oci-archive, return empty\n    jq -r '.Stages as $all_stages |\n      def find_root_stage($stage):\n        if $stage.From.Stage then\n          find_root_stage($all_stages[$stage.From.Stage.Index])\n        else\n          $stage\n        end;\n\n        find_root_stage(.Stages[-1]) |\n        if .From.Scratch or (.BaseName | test(\"^oci-archive:\")) then\n          empty\n        else\n          .BaseName\n        end' /shared/parsed_dockerfile.json |\n      tr -d '\"' |\n      tr -d \"'\"\n  )\n  if [[ -n \"$FINAL_BASE_IMAGE\" ]]; then\n    set_proxy\n    buildah pull \"$FINAL_BASE_IMAGE\" \u003e/dev/null$()\n    unset_proxy\n    buildah inspect \"$FINAL_BASE_IMAGE\" | jq '.OCIv1.config.Labels' \u003e\"base_images_labels.json\"\n  fi\nfi\n\n# Concatenate defaults and explicit labels. If a label appears twice, the last one wins.\nLABELS=(\"${DEFAULT_LABELS[@]}\" \"${LABELS[@]}\")\n\n# Get all the default and explicit labels so that they can be written into labels.json\nfor label in \"${LABELS[@]}\"; do\n  if [[ \"$label\" != \"--label\" ]]; then\n    label_pairs+=(\"$label\")\n  fi\ndone\n\n# Labels that we explicitly add to the image\nlabel_pairs+=(\"org.opencontainers.image.created=${BUILD_TIMESTAMP_RFC3339}\")\nlabel_pairs+=(\"io.buildah.version=$(buildah version --json | jq -r '.version')\")\n\nwhile IFS= read -r label; do\n  label_pairs+=(\"$label\")\ndone \u003c \u003c(jq -r '.Stages[].Commands[] | select(.Name == \"LABEL\") | .Labels[] | \"\\(.Key)=\\(.Value)\"' /shared/parsed_dockerfile.json | sed 's/\"//g')\n\nprintf '%s\\n' \"${label_pairs[@]}\" | jq -Rn '\n  [ inputs | select(length\u003e0) ]\n| map( split(\"=\") | {(.[0]): (.[1] // \"\")} )\n  | add' \u003e\"image_labels.json\"\n\njq -s '(.[0] // {}) * (.[1] // {})' \"base_images_labels.json\" \"image_labels.json\" \u003e\"$SOURCE_CODE_DIR/$CONTEXT/labels.json\"\n\njq '.' \"$SOURCE_CODE_DIR/$CONTEXT/labels.json\"\n\nif [ \"${SKIP_INJECTIONS}\" = \"false\" ]; then\n  echo \"\" \u003e\u003e\"$dockerfile_copy\"\n  # Always write labels.json to the new standard location\n  echo 'COPY labels.json /usr/share/buildinfo/labels.json' \u003e\u003e\"$dockerfile_copy\"\n  # Conditionally write to the old location for backward compatibility\n  if [ \"${ICM_KEEP_COMPAT_LOCATION}\" = \"true\" ]; then\n    echo 'COPY labels.json /root/buildinfo/labels.json' \u003e\u003e\"$dockerfile_copy\"\n  fi\nfi\n\n# Make sure our labels.json file isn't filtered out\ncontainerignore=\"\"\nif [ -f \"$SOURCE_CODE_DIR/$CONTEXT/.containerignore\" ]; then\n  containerignore=\"$SOURCE_CODE_DIR/$CONTEXT/.containerignore\"\nelif [ -f \"$SOURCE_CODE_DIR/$CONTEXT/.dockerignore\" ]; then\n  containerignore=\"$SOURCE_CODE_DIR/$CONTEXT/.dockerignore\"\nfi\n\nif [ -n \"$containerignore\" ]; then\n  ignorefile_copy=$(mktemp --tmpdir \"$(basename \"$containerignore\").XXXXXX\")\n  cp \"$containerignore\" \"$ignorefile_copy\"\n  {\n    echo \"\"\n    echo \"!/labels.json\"\n    echo \"!/content-sets.json\"\n  } \u003e\u003e\"$ignorefile_copy\"\n  BUILDAH_ARGS+=(--ignorefile \"$ignorefile_copy\")\nfi\n\necho \"[$(date --utc -Ins)] Register sub-man\"\n\nACTIVATION_KEY_PATH=\"/activation-key\"\nENTITLEMENT_PATH=\"/entitlement\"\n\n# 0. if hermetic=true, skip all subscription related stuff\n# 1. do not enable activation key and entitlement at same time. If both vars are provided, prefer activation key.\n# 2. Activation-keys will be used when the key 'org' exists in the activation key secret.\n# 3. try to pre-register and mount files to the correct location so that users do no need to modify Dockerfiles.\n# 3. If the Dockerfile contains the string \"subcription-manager register\", add the activation-keys volume\n#    to buildah but don't pre-register for backwards compatibility. Mount an empty directory on\n#    shared emptydir volume to \"/etc/pki/entitlement\" to prevent certificates from being included\n\nif [ \"${HERMETIC}\" != \"true\" ] \u0026\u0026 [ -e /activation-key/org ]; then\n  cp -r --preserve=mode \"$ACTIVATION_KEY_PATH\" /tmp/activation-key\n  mkdir -p /shared/rhsm/etc/pki/entitlement\n  mkdir -p /shared/rhsm/etc/pki/consumer\n\n  VOLUME_MOUNTS+=(-v /tmp/activation-key:/activation-key\n    -v /shared/rhsm/etc/pki/entitlement:/etc/pki/entitlement:Z\n    -v /shared/rhsm/etc/pki/consumer:/etc/pki/consumer:Z)\n  echo \"Adding activation key to the build\"\n\n  if ! grep -E \"^[^#]*subscription-manager.[^#]*register\" \"$dockerfile_path\"; then\n    # user is not running registration in the Containerfile: pre-register.\n    echo \"Pre-registering with subscription manager.\"\n    export RETRY_MAX_TRIES=6\n    if ! retry subscription-manager register --org \"$(cat /tmp/activation-key/org)\" --activationkey \"$(cat /tmp/activation-key/activationkey)\"; then\n      echo \"Subscription-manager register failed\"\n      exit 1\n    fi\n    unset RETRY_MAX_TRIES\n    trap 'subscription-manager unregister || true' EXIT\n\n    # copy generated certificates to /shared volume\n    cp /etc/pki/entitlement/*.pem /shared/rhsm/etc/pki/entitlement\n    cp /etc/pki/consumer/*.pem /shared/rhsm/etc/pki/consumer\n\n    # and then mount get /etc/rhsm/ca/redhat-uep.pem into /run/secrets/rhsm/ca\n    VOLUME_MOUNTS+=(--volume /etc/rhsm/ca/redhat-uep.pem:/etc/rhsm/ca/redhat-uep.pem:Z)\n  fi\n\nelif [ \"${HERMETIC}\" != \"true\" ] \u0026\u0026 find /entitlement -name \"*.pem\" \u003e/dev/null; then\n  cp -r --preserve=mode \"$ENTITLEMENT_PATH\" /tmp/entitlement\n  VOLUME_MOUNTS+=(--volume /tmp/entitlement:/etc/pki/entitlement)\n  echo \"Adding the entitlement to the build\"\nfi\n\nif [ -n \"$WORKINGDIR_MOUNT\" ]; then\n  if [[ \"$WORKINGDIR_MOUNT\" == *:* ]]; then\n    echo \"WORKINGDIR_MOUNT contains ':'\" \u003e\u00262\n    echo \"Refusing to proceed in case this is an attempt to set unexpected mount options.\" \u003e\u00262\n    exit 1\n  fi\n  # ${SOURCE_CODE_DIR}/${CONTEXT} will be the $PWD when we call 'buildah build'\n  # (we set the workdir using 'unshare -w')\n  context_dir=$(realpath \"${SOURCE_CODE_DIR}/${CONTEXT}\")\n  VOLUME_MOUNTS+=(--volume \"$context_dir:${WORKINGDIR_MOUNT}\")\nfi\n\nif [ -n \"${ADDITIONAL_VOLUME_MOUNTS-}\" ]; then\n  # ADDITIONAL_VOLUME_MOUNTS allows to specify more volumes for the build.\n  # Instrumented builds (SAST) use this step as their base and add some other tools.\n  while read -r volume_mount; do\n    VOLUME_MOUNTS+=(\"--volume=$volume_mount\")\n  done \u003c\u003c\u003c\"$ADDITIONAL_VOLUME_MOUNTS\"\nfi\n\necho \"[$(date --utc -Ins)] Add secrets\"\n\nADDITIONAL_SECRET_PATH=\"/additional-secret\"\nADDITIONAL_SECRET_TMP=\"/tmp/additional-secret\"\nif [ -d \"$ADDITIONAL_SECRET_PATH\" ]; then\n  cp -r --preserve=mode -L \"$ADDITIONAL_SECRET_PATH\" $ADDITIONAL_SECRET_TMP\n  while read -r filename; do\n    echo \"Adding the secret ${ADDITIONAL_SECRET}/${filename} to the build, available at /run/secrets/${ADDITIONAL_SECRET}/${filename}\"\n    BUILDAH_ARGS+=(\"--secret=id=${ADDITIONAL_SECRET}/${filename},src=$ADDITIONAL_SECRET_TMP/${filename}\")\n  done \u003c \u003c(find $ADDITIONAL_SECRET_TMP -maxdepth 1 -type f -exec basename {} \\;)\nfi\n\n# Prevent ShellCheck from giving a warning because 'image' is defined and 'IMAGE' is not.\ndeclare IMAGE\n\nbuildah_cmd_array=(\n  buildah build\n  \"${VOLUME_MOUNTS[@]}\"\n  \"${BUILDAH_ARGS[@]}\"\n  \"${LABELS[@]}\"\n  \"${ANNOTATIONS[@]}\"\n  --tls-verify=\"$TLSVERIFY\" --no-cache\n  --ulimit nofile=4096:4096\n  --http-proxy=false\n  -f \"$dockerfile_copy\" -t \"$IMAGE\" .\n)\nbuildah_cmd=$(printf \"%q \" \"${buildah_cmd_array[@]}\")\n\nif [ \"${HERMETIC}\" == \"true\" ]; then\n  # enabling loopback adapter enables Bazel builds to work in hermetic mode.\n  command=\"ip link set lo up \u0026\u0026 $buildah_cmd\"\nelse\n  command=\"$buildah_cmd\"\nfi\n\n# disable host subcription manager integration\nfind /usr/share/rhel/secrets -type l -exec unlink {} \\;\n\nset_proxy\n\necho \"[$(date --utc -Ins)] Run buildah build\"\necho \"[$(date --utc -Ins)] ${command}\"\n\nunshare -Uf \"${UNSHARE_ARGS[@]}\" --keep-caps -r --map-users 1,1,65536 --map-groups 1,1,65536 -w \"${SOURCE_CODE_DIR}/$CONTEXT\" --mount -- sh -c \"$command\"\n\nunset_proxy\n\necho \"[$(date --utc -Ins)] Add metadata\"\n\n# Save the SBOM produced in prefetch so it can be merged into the final SBOM later\nif [ -f \"/tmp/cachi2/output/bom.json\" ]; then\n  echo \"Making copy of sbom-prefetch.json\"\n  cp /tmp/cachi2/output/bom.json ./sbom-prefetch.json\nfi\n\ntouch /shared/base_images_digests\necho \"Recording base image digests used\"\nfor image in $BASE_IMAGES; do\n  # Get the image pullspec and filter out a tag if it is not set\n  # Use head -n 1 to ensure we only get one result even if multiple images match the filter\n  base_image_digest=$(buildah images --format '{{ .Name }}{{ if ne .Tag \"\u003cnone\u003e\" }}:{{ .Tag }}{{ end }}@{{ .Digest }}' --filter reference=\"$image\" | head -n 1)\n  # In some cases, there might be BASE_IMAGES, but not any associated digest. This happens\n  # if buildah did not use that particular image during build because it was skipped\n  if [ -n \"$base_image_digest\" ]; then\n    echo \"$image $base_image_digest\" | tee -a /shared/base_images_digests\n  fi\ndone\n\nimage_name=$(echo \"${IMAGE##*/}\" | tr ':' '-')\nbuildah push \"$IMAGE\" oci:\"/shared/$image_name.oci\"\necho \"/shared/$image_name.oci\" \u003e/shared/container_path\n\necho \"[$(date --utc -Ins)] End build\"\n",
                            "securityContext": {
                                "capabilities": {
                                    "add": [
                                        "SETFCAP"
                                    ]
                                }
                            },
                            "volumeMounts": [
                                {
                                    "mountPath": "/var/lib/containers",
                                    "name": "varlibcontainers"
                                },
                                {
                                    "mountPath": "/entitlement",
                                    "name": "etc-pki-entitlement"
                                },
                                {
                                    "mountPath": "/activation-key",
                                    "name": "activation-key"
                                },
                                {
                                    "mountPath": "/additional-secret",
                                    "name": "additional-secret"
                                },
                                {
                                    "mountPath": "/mnt/trusted-ca",
                                    "name": "trusted-ca",
                                    "readOnly": true
                                },
                                {
                                    "mountPath": "/mnt/proxy-ca-bundle",
                                    "name": "proxy-ca-bundle",
                                    "readOnly": true
                                }
                            ],
                            "workingDir": "/var/workdir"
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "HOME",
                                    "value": "/root"
                                },
                                {
                                    "name": "BUILDAH_FORMAT",
                                    "value": "docker"
                                },
                                {
                                    "name": "TASKRUN_NAME",
                                    "value": "tsf-demo-comp-on-push-cttl8-build-container"
                                }
                            ],
                            "image": "quay.io/konflux-ci/buildah-task:latest@sha256:4c470b5a153c4acd14bf4f8731b5e36c61d7faafe09c2bf376bb81ce84aa5709",
                            "name": "push",
                            "script": "#!/bin/bash\nset -e\n\necho \"[$(date --utc -Ins)] Update CA trust\"\n\nca_bundle=/mnt/trusted-ca/ca-bundle.crt\nif [ -f \"$ca_bundle\" ]; then\n  echo \"INFO: Using mounted CA bundle: $ca_bundle\"\n  cp -vf $ca_bundle /etc/pki/ca-trust/source/anchors\n  update-ca-trust\nfi\n\necho \"[$(date --utc -Ins)] Convert image\"\n\n# While we can build images with the desired format, we will simplify any local\n# and remote build differences by just performing any necessary conversions at\n# push time.\npush_format=oci\nif [ \"${BUILDAH_FORMAT}\" == \"docker\" ]; then\n  push_format=docker\nfi\n\necho \"[$(date --utc -Ins)] Push image with unique tag\"\n\nbuildah_retries=3\n\n# Push to a unique tag based on the TaskRun name to avoid race conditions\necho \"Pushing to ${IMAGE%:*}:${TASKRUN_NAME}\"\nif ! retry buildah push \\\n  --format=\"$push_format\" \\\n  --retry \"$buildah_retries\" \\\n  --tls-verify=\"$TLSVERIFY\" \\\n  \"$IMAGE\" \\\n  \"docker://${IMAGE%:*}:${TASKRUN_NAME}\"; then\n  echo \"Failed to push sbom image to ${IMAGE%:*}:${TASKRUN_NAME}\"\n  exit 1\nfi\n\necho \"[$(date --utc -Ins)] Push image with git revision\"\n\n# Push to a tag based on the git revision\necho \"Pushing to ${IMAGE}\"\nif ! retry buildah push \\\n  --format=\"$push_format\" \\\n  --retry \"$buildah_retries\" \\\n  --tls-verify=\"$TLSVERIFY\" \\\n  --digestfile \"/var/workdir/image-digest\" \"$IMAGE\" \\\n  \"docker://$IMAGE\"; then\n  echo \"Failed to push sbom image to $IMAGE\"\n  exit 1\nfi\n\ntee \"/tekton/results/IMAGE_DIGEST\" \u003c\"/var/workdir\"/image-digest\necho -n \"$IMAGE\" | tee /tekton/results/IMAGE_URL\n{\n  echo -n \"${IMAGE}@\"\n  cat \"/var/workdir/image-digest\"\n} \u003e\"/tekton/results/IMAGE_REF\"\necho\n\n# detect if keyless signing is required\nSIGNING_CONFIG='{}'\nKFLX_CONFIG_PATH='/tmp/konflux_config.json'\nif ! RETRY_STOP_IF_STDERR_MATCHES='configmaps \"cluster-config\" not found' retry kubectl get configmap cluster-config -n konflux-info -o json \u003e\"${KFLX_CONFIG_PATH}\"; then\n  echo \"Failed to fetch konflux cluster-config, default values will be used\" \u003e\u00262\nelse\n  SIGNING_CONFIG=\"$(cat ${KFLX_CONFIG_PATH})\"\nfi\n\n# configmap key -\u003e variable name mapping\ndeclare -A SIGNING_KEY_MAP=(\n   [defaultOIDCIssuer]=SIGSTORE_OIDC_ISSUER\n   [rekorInternalUrl]=REKOR_URL\n   [fulcioInternalUrl]=SIGSTORE_FULCIO_URL\n   [tufInternalUrl]=TUF_URL\n)\n\n# fallback keys when internal URL is not available\ndeclare -A SIGNING_FALLBACK_MAP=(\n   [rekorInternalUrl]=rekorExternalUrl\n   [fulcioInternalUrl]=fulcioExternalUrl\n   [tufInternalUrl]=tufExternalUrl\n)\n\nmissing=\"\"\nconfigured=0\nfor key in \"${!SIGNING_KEY_MAP[@]}\"; do\n  val=$(echo \"${SIGNING_CONFIG}\" | jq -r \".data.${key} // empty\")\n  if [ -z \"${val}\" ] \u0026\u0026 [ -n \"${SIGNING_FALLBACK_MAP[$key]+x}\" ]; then\n    fallback_key=\"${SIGNING_FALLBACK_MAP[$key]}\"\n    val=$(echo \"${SIGNING_CONFIG}\" | jq -r \".data.${fallback_key} // empty\")\n    if [ -n \"${val}\" ]; then\n      echo \"Using fallback ${fallback_key} instead of ${key}\"\n    fi\n  fi\n  if [ -z \"${val}\" ]; then\n    missing=\"${missing:+${missing}, }${key}\"\n  else\n    declare \"${SIGNING_KEY_MAP[$key]}=${val}\"\n    configured=$((configured + 1))\n  fi\ndone\n\nif [ \"${configured}\" -eq \"${#SIGNING_KEY_MAP[@]}\" ]; then\n  echo \"Keyless signing is enabled\"\n\n  # Save signing config for upload-sbom step\n  for key in \"${!SIGNING_KEY_MAP[@]}\"; do\n    envvar=\"${SIGNING_KEY_MAP[$key]}\"\n    printf '%s=%q\\n' \"${envvar}\" \"${!envvar}\"\n  done \u003e/shared/signing-config.env\n\n  echo \"Using Rekor URL: ${REKOR_URL}\"\n  echo \"Using Fulcio URL: ${SIGSTORE_FULCIO_URL}\"\n  echo \"Using OIDC issuer: ${SIGSTORE_OIDC_ISSUER}\"\n\n  echo \"Initializing TUF root from ${TUF_URL}\"\n  if ! retry cosign initialize --root \"${TUF_URL}/root.json\" --mirror \"${TUF_URL}\"; then\n    echo \"Failed to initialize TUF root\" \u003e\u00262\n    exit 1\n  fi\n\n  # env var consumed by cosign\n  SIGSTORE_ID_TOKEN=\"$(cat /var/run/sigstore/cosign/oidc-token)\"\n  export SIGSTORE_ID_TOKEN\n\n  IMAGE_REF=\"$(cat \"/tekton/results/IMAGE_REF\")\"\n\n  # Pre-select the correct credentials to work around cosign not supporting the containers-auth.json spec\n  mkdir -p /tmp/auth \u0026\u0026 select-oci-auth \"${IMAGE_REF}\" \u003e/tmp/auth/config.json\n  export DOCKER_CONFIG=/tmp/auth\n\n  echo \"[$(date --utc -Ins)] Sign image\"\n  echo \"Signing image ${IMAGE_REF} using keyless signing\"\n  if ! retry cosign sign -y \\\n    --rekor-url=\"${REKOR_URL}\" \\\n    --fulcio-url=\"${SIGSTORE_FULCIO_URL}\" \\\n    --oidc-issuer=\"${SIGSTORE_OIDC_ISSUER}\" \\\n    \"${IMAGE_REF}\"; then\n    echo \"Failed to sign image\" \u003e\u00262\n    exit 1\n  fi\nelif [ \"${configured}\" -eq 0 ]; then\n  echo \"Keyless signing is disabled (none of ${missing} are configured in the konflux-info/cluster-config configmap)\"\nelse\n  echo \"ERROR: Incomplete keyless signing configuration in konflux-info/cluster-config configmap. Missing: ${missing}\" \u003e\u00262\n  exit 1\nfi\n\necho \"[$(date --utc -Ins)] End push\"\n",
                            "securityContext": {
                                "capabilities": {
                                    "add": [
                                        "SETFCAP"
                                    ]
                                },
                                "runAsUser": 0
                            },
                            "volumeMounts": [
                                {
                                    "mountPath": "/var/lib/containers",
                                    "name": "varlibcontainers"
                                },
                                {
                                    "mountPath": "/mnt/trusted-ca",
                                    "name": "trusted-ca",
                                    "readOnly": true
                                },
                                {
                                    "mountPath": "/var/run/sigstore/cosign",
                                    "name": "oidc-token",
                                    "readOnly": true
                                }
                            ],
                            "workingDir": "/var/workdir"
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "cpu": "256m",
                                    "memory": "512Mi"
                                },
                                "requests": {
                                    "cpu": "256m",
                                    "memory": "512Mi"
                                }
                            },
                            "image": "quay.io/konflux-ci/task-runner:1.4.1@sha256:d9feec6f2ce9b10cfb76b45ea14f83b5ed9f231de7d6083291550aebe8eb09ea",
                            "name": "sbom-syft-generate",
                            "script": "#!/bin/bash\nset -euo pipefail\necho \"[$(date --utc -Ins)] Generate SBOM\"\n\nif [ \"${SKIP_SBOM_GENERATION}\" = \"true\" ]; then\n  echo \"Skipping SBOM generation\"\n  exit 0\nfi\n\ncase $SBOM_TYPE in\ncyclonedx)\n  syft_sbom_type=cyclonedx-json@1.5\n  ;;\nspdx)\n  syft_sbom_type=spdx-json@2.3\n  ;;\n*)\n  echo \"Invalid SBOM type: $SBOM_TYPE. Valid: cyclonedx, spdx\" \u003e\u00262\n  exit 1\n  ;;\nesac\n\nOCI_DIR=\"$(cat /shared/container_path)\"\n\nsyft_oci_args=(\n  oci-dir:\"${OCI_DIR}\"\n  --output \"$syft_sbom_type=/var/workdir/sbom-image.json\"\n)\nsyft_source_args=(\n  dir:\"/var/workdir/$SOURCE_CODE_DIR/$CONTEXT\"\n  --output \"$syft_sbom_type=/var/workdir/sbom-source.json\"\n)\n\nif [ \"${SBOM_SYFT_SELECT_CATALOGERS}\" != \"\" ]; then\n  syft_oci_args+=(--select-catalogers \"${SBOM_SYFT_SELECT_CATALOGERS}\")\n  syft_source_args+=(--select-catalogers \"${SBOM_SYFT_SELECT_CATALOGERS}\")\nfi\n\necho \"Running syft on the image\"\nsyft \"${syft_oci_args[@]}\"\nif [[ \"${HERMETIC}\" == \"false\" \u0026\u0026 \"${SBOM_SOURCE_SCAN_ENABLED}\" == \"true\" ]]; then\n  echo \"Running syft on the source code\"\n  syft \"${syft_source_args[@]}\"\nelse\n  echo \"Skipping syft on source code.\"\nfi\n\necho \"[$(date --utc -Ins)] End sbom-syft-generate\"\n",
                            "securityContext": {
                                "runAsUser": 0
                            },
                            "volumeMounts": [
                                {
                                    "mountPath": "/var/lib/containers",
                                    "name": "varlibcontainers"
                                },
                                {
                                    "mountPath": "/shared",
                                    "name": "shared"
                                },
                                {
                                    "mountPath": "/etc/pki/tls/certs/ca-custom-bundle.crt",
                                    "name": "trusted-ca",
                                    "readOnly": true,
                                    "subPath": "ca-bundle.crt"
                                }
                            ],
                            "workingDir": "/var/workdir/source"
                        },
                        {
                            "args": [
                                "--additional-base-images"
                            ],
                            "computeResources": {
                                "limits": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "image": "quay.io/konflux-ci/mobster:1.2.0-1774868067@sha256:2e00c2f0aeff55713150b51822013327ea0e0d75b8164a52f837fb297c17703d",
                            "name": "prepare-sboms",
                            "script": "#!/bin/bash\nset -euo pipefail\n\necho \"[$(date --utc -Ins)] Prepare SBOM\"\n\nif [ \"${SKIP_SBOM_GENERATION}\" = \"true\" ]; then\n  echo \"Skipping SBOM generation\"\n  exit 0\nfi\n\n# Convert Tekton array params into Mobster params\nADDITIONAL_BASE_IMAGES=()\nwhile [[ $# -gt 0 ]]; do\n  case $1 in\n  --additional-base-images)\n    shift\n    while [[ $# -gt 0 \u0026\u0026 $1 != --* ]]; do\n      ADDITIONAL_BASE_IMAGES+=(\"$1\")\n      shift\n    done\n    ;;\n  *)\n    echo \"unexpected argument: $1\" \u003e\u00262\n    exit 2\n    ;;\n  esac\ndone\n\nIMAGE_URL=\"$(cat \"/tekton/results/IMAGE_URL\")\"\nIMAGE_DIGEST=\"$(cat \"/tekton/results/IMAGE_DIGEST\")\"\n\necho \"[$(date --utc -Ins)] Generate SBOM with mobster\"\n\nmobster_args=(\n  generate\n  --output sbom.json\n)\n\n# Validation is a flag for `generate`, not `oci-image`, so we need to\n# handle it before the oci-image arguments\nif [ \"${SBOM_SKIP_VALIDATION}\" == \"true\" ]; then\n  echo \"Skipping SBOM validation\"\n  mobster_args+=(--skip-validation)\nfi\n\nmobster_args+=(\n  oci-image\n  --from-syft \"/var/workdir/sbom-image.json\"\n  --image-pullspec \"$IMAGE_URL\"\n  --image-digest \"$IMAGE_DIGEST\"\n  --parsed-dockerfile-path \"/shared/parsed_dockerfile.json\"\n  --base-image-digest-file \"/shared/base_images_digests\"\n)\n\nif [ -f \"/var/workdir/sbom-source.json\" ]; then\n  mobster_args+=(--from-syft \"/var/workdir/sbom-source.json\")\nfi\n\nif [ -f \"/var/workdir/sbom-prefetch.json\" ]; then\n  mobster_args+=(--from-hermeto \"/var/workdir/sbom-prefetch.json\")\nfi\n\nif [ -n \"${TARGET_STAGE}\" ]; then\n  mobster_args+=(--dockerfile-target \"${TARGET_STAGE}\")\nfi\n\nfor ADDITIONAL_BASE_IMAGE in \"${ADDITIONAL_BASE_IMAGES[@]}\"; do\n  mobster_args+=(--additional-base-image \"$ADDITIONAL_BASE_IMAGE\")\ndone\n\nif [ \"${CONTEXTUALIZE_SBOM}\" == \"true\" ] \u0026\u0026 [ \"${HERMETIC}\" == \"false\" ]; then\n  mobster_args+=(--contextualize)\nfi\n\nif [ -f \"/shared/prefetch-arch\" ]; then\n  mobster_args+=(--arch \"$(cat /shared/prefetch-arch)\")\nfi\n\nmobster \"${mobster_args[@]}\"\n\necho \"[$(date --utc -Ins)] End prepare-sboms\"\n",
                            "securityContext": {
                                "runAsUser": 0
                            },
                            "workingDir": "/var/workdir"
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "cpu": "100m",
                                    "memory": "512Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "512Mi"
                                }
                            },
                            "image": "quay.io/konflux-ci/task-runner:1.4.1@sha256:d9feec6f2ce9b10cfb76b45ea14f83b5ed9f231de7d6083291550aebe8eb09ea",
                            "name": "upload-sbom",
                            "script": "#!/bin/bash\nset -euo pipefail\n\necho \"[$(date --utc -Ins)] Upload SBOM\"\n\nif [ \"${SKIP_SBOM_GENERATION}\" = \"true\" ]; then\n  echo \"Skipping SBOM generation\"\n  exit 0\nfi\n\nca_bundle=/mnt/trusted-ca/ca-bundle.crt\nif [ -f \"$ca_bundle\" ]; then\n  echo \"INFO: Using mounted CA bundle: $ca_bundle\"\n  cp -vf $ca_bundle /etc/pki/ca-trust/source/anchors\n  update-ca-trust\nfi\n\n# Pre-select the correct credentials to work around cosign not supporting the containers-auth.json spec\nmkdir -p /tmp/auth \u0026\u0026 select-oci-auth \"$(cat \"/tekton/results/IMAGE_REF\")\" \u003e/tmp/auth/config.json\nexport DOCKER_CONFIG=/tmp/auth\necho \"Pushing sbom to registry\"\nif ! retry cosign attach sbom --sbom sbom.json --type \"$SBOM_TYPE\" \"$(cat \"/tekton/results/IMAGE_REF\")\"; then\n  echo \"Failed to push sbom to registry\"\n  exit 1\nfi\n\n# Remove tag from IMAGE while allowing registry to contain a port number.\nsbom_repo=\"${IMAGE%:*}\"\nsbom_digest=\"$(sha256sum sbom.json | cut -d' ' -f1)\"\n# The SBOM_BLOB_URL is created by `cosign attach sbom`.\necho -n \"${sbom_repo}@sha256:${sbom_digest}\" | tee \"/tekton/results/SBOM_BLOB_URL\"\n\nif [ -f \"/shared/signing-config.env\" ]; then\n  # shellcheck source=/dev/null\n  source /shared/signing-config.env\n\n  echo \"Initializing TUF root from ${TUF_URL}\"\n  if ! retry cosign initialize --root \"${TUF_URL}/root.json\" --mirror \"${TUF_URL}\"; then\n    echo \"Failed to initialize TUF root\" \u003e\u00262\n    exit 1\n  fi\n\n  # env var consumed by cosign\n  SIGSTORE_ID_TOKEN=\"$(cat /var/run/sigstore/cosign/oidc-token)\"\n  export SIGSTORE_ID_TOKEN\n\n  IMAGE_REF=\"$(cat \"/tekton/results/IMAGE_REF\")\"\n\n  ATT_SBOM_TYPE=\"${SBOM_TYPE}\"\n  if [ \"${ATT_SBOM_TYPE}\" = \"spdx\" ]; then\n    # for format cossistency with cyclonedx format, we want to use spdxjson instad of spdx\n    # spdx export data as rawstring, we want structured json as cyclonedx\n    ATT_SBOM_TYPE=\"spdxjson\"\n  fi\n\n  echo \"[$(date --utc -Ins)] Sign SBOM\"\n  echo \"Signing and attaching SBOM to ${IMAGE_REF} using keyless signing\"\n  if ! retry cosign attest -y --type \"${ATT_SBOM_TYPE}\" --predicate sbom.json \\\n    --rekor-url=\"${REKOR_URL}\" \\\n    --fulcio-url=\"${SIGSTORE_FULCIO_URL}\" \\\n    --oidc-issuer=\"${SIGSTORE_OIDC_ISSUER}\" \\\n    \"${IMAGE_REF}\"; then\n    echo \"Failed to sign SBOM\" \u003e\u00262\n    exit 1\n  fi\nfi\n\necho\necho \"[$(date --utc -Ins)] End upload-sbom\"\n",
                            "securityContext": {
                                "runAsNonRoot": false,
                                "runAsUser": 0
                            },
                            "volumeMounts": [
                                {
                                    "mountPath": "/mnt/trusted-ca",
                                    "name": "trusted-ca",
                                    "readOnly": true
                                },
                                {
                                    "mountPath": "/var/run/sigstore/cosign",
                                    "name": "oidc-token",
                                    "readOnly": true
                                }
                            ],
                            "workingDir": "/var/workdir"
                        }
                    ],
                    "volumes": [
                        {
                            "name": "activation-key",
                            "secret": {
                                "optional": true,
                                "secretName": "activation-key"
                            }
                        },
                        {
                            "name": "additional-secret",
                            "secret": {
                                "optional": true,
                                "secretName": "does-not-exist"
                            }
                        },
                        {
                            "name": "etc-pki-entitlement",
                            "secret": {
                                "optional": true,
                                "secretName": "etc-pki-entitlement"
                            }
                        },
                        {
                            "name": "oidc-token",
                            "projected": {
                                "sources": [
                                    {
                                        "serviceAccountToken": {
                                            "audience": "sigstore",
                                            "expirationSeconds": 600,
                                            "path": "oidc-token"
                                        }
                                    }
                                ]
                            }
                        },
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "caching-ca-bundle",
                                "optional": true
                            },
                            "name": "proxy-ca-bundle"
                        },
                        {
                            "emptyDir": {},
                            "name": "shared"
                        },
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        },
                        {
                            "emptyDir": {},
                            "name": "varlibcontainers"
                        },
                        {
                            "emptyDir": {},
                            "name": "workdir"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.openshift.io/repo": "https://github.com/rhads-tsf-qe/testrepo?rev=8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "build.appstudio.redhat.com/commit_sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "build.appstudio.redhat.com/target_branch": "base-miwkfv",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=23",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "pipelinesascode.tekton.dev/branch": "base-miwkfv",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552493202",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-ojyaao",
                    "pipelinesascode.tekton.dev/git-provider": "github",
                    "pipelinesascode.tekton.dev/installation-id": "112348674",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-push-cttl8",
                    "pipelinesascode.tekton.dev/max-keep-runs": "3",
                    "pipelinesascode.tekton.dev/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-miwkfv\"",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-ci-tests-bot",
                    "pipelinesascode.tekton.dev/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pipelinesascode.tekton.dev/sha-title": "Merge pull request #181 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pipelinesascode.tekton.dev/source-branch": "refs/heads/base-miwkfv",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-tenant/results/61ce9ab9-21e3-414b-b0da-d05b30fbea57/records/d1ff2ab3-4626-4d28-b478-7686cb1cd5fd",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"testrepo\",\"commit\":\"8a419f9b1a920375f8112c9b7477d42bbd82b6c9\",\"eventType\":\"push\"}",
                    "results.tekton.dev/result": "default-tenant/results/61ce9ab9-21e3-414b-b0da-d05b30fbea57",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "image-build, konflux"
                },
                "creationTimestamp": "2026-04-15T23:20:30Z",
                "finalizers": [
                    "chains.tekton.dev",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/version": "v0.37.7",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/component": "tsf-demo-comp",
                    "build.appstudio.redhat.com/build_type": "docker",
                    "pipelines.appstudio.openshift.io/type": "build",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552493202",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "tsf-demo-comp-on-push-cttl8",
                    "tekton.dev/pipelineRun": "tsf-demo-comp-on-push-cttl8",
                    "tekton.dev/pipelineRunUID": "61ce9ab9-21e3-414b-b0da-d05b30fbea57",
                    "tekton.dev/pipelineTask": "build-image-index",
                    "tekton.dev/task": "build-image-index-min"
                },
                "name": "tsf-demo-comp-on-push-cttl8-build-image-index",
                "namespace": "default-tenant",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "tsf-demo-comp-on-push-cttl8",
                        "uid": "61ce9ab9-21e3-414b-b0da-d05b30fbea57"
                    }
                ],
                "resourceVersion": "37475",
                "uid": "d1ff2ab3-4626-4d28-b478-7686cb1cd5fd"
            },
            "spec": {
                "params": [
                    {
                        "name": "IMAGE",
                        "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9"
                    },
                    {
                        "name": "COMMIT_SHA",
                        "value": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9"
                    },
                    {
                        "name": "IMAGE_EXPIRES_AFTER",
                        "value": ""
                    },
                    {
                        "name": "ALWAYS_BUILD_INDEX",
                        "value": "false"
                    },
                    {
                        "name": "IMAGES",
                        "value": [
                            "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9@sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5"
                        ]
                    },
                    {
                        "name": "BUILDAH_FORMAT",
                        "value": "docker"
                    }
                ],
                "serviceAccountName": "build-pipeline-tsf-demo-comp",
                "taskRef": {
                    "params": [
                        {
                            "name": "name",
                            "value": "build-image-index-min"
                        },
                        {
                            "name": "bundle",
                            "value": "quay.io/konflux-ci/tekton-catalog/task-build-image-index-min:0.2@sha256:79b412747e07caf80cace222ef8ee7e7955676f7928b893ed39c107f4ec62bf3"
                        },
                        {
                            "name": "kind",
                            "value": "task"
                        }
                    ],
                    "resolver": "bundles"
                },
                "timeout": "1h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:20:47Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:20:47Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "tsf-demo-comp-on-push-cttl8-build-image-index-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha256": "79b412747e07caf80cace222ef8ee7e7955676f7928b893ed39c107f4ec62bf3"
                        },
                        "entryPoint": "build-image-index-min",
                        "uri": "quay.io/konflux-ci/tekton-catalog/task-build-image-index-min"
                    }
                },
                "results": [
                    {
                        "name": "IMAGES",
                        "type": "string",
                        "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5"
                    },
                    {
                        "name": "IMAGE_DIGEST",
                        "type": "string",
                        "value": "sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5"
                    },
                    {
                        "name": "IMAGE_URL",
                        "type": "string",
                        "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9"
                    }
                ],
                "startTime": "2026-04-15T23:20:30Z",
                "steps": [
                    {
                        "container": "step-build",
                        "imageID": "quay.io/konflux-ci/buildah-task@sha256:3bd8b2c9f2b809bd86457cbe8411051b5a000f312b5e48cab63ab288bf6bf330",
                        "name": "build",
                        "terminated": {
                            "containerID": "cri-o://82dde8620a29b167d460d2fcb5313232d6cf9fc5467fce9b9f8a14c38b86ebd7",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:20:47Z",
                            "message": "[{\"key\":\"IMAGES\",\"value\":\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5\",\"type\":1},{\"key\":\"IMAGE_DIGEST\",\"value\":\"sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5\",\"type\":1},{\"key\":\"IMAGE_URL\",\"value\":\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:20:47Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-create-sbom",
                        "imageID": "quay.io/konflux-ci/mobster@sha256:2e00c2f0aeff55713150b51822013327ea0e0d75b8164a52f837fb297c17703d",
                        "name": "create-sbom",
                        "terminated": {
                            "containerID": "cri-o://d0740a5a8e3c1e9ae071e8f030081b65231a6f8c5b5a41568ba31830d57d4233",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:20:47Z",
                            "message": "[{\"key\":\"IMAGES\",\"value\":\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5\",\"type\":1},{\"key\":\"IMAGE_DIGEST\",\"value\":\"sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5\",\"type\":1},{\"key\":\"IMAGE_URL\",\"value\":\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:20:47Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-upload-sbom",
                        "imageID": "quay.io/konflux-ci/task-runner@sha256:b22b989da3c95cb0af862eeb82531ed4f687e948ca5fb6b965d1ea8fbd5054ce",
                        "name": "upload-sbom",
                        "terminated": {
                            "containerID": "cri-o://e3b634aa02e789b5231b79e8f469a7751d14d5d739ee04814dfa7b37d8bd0c16",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:20:47Z",
                            "message": "[{\"key\":\"IMAGES\",\"value\":\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5\",\"type\":1},{\"key\":\"IMAGE_DIGEST\",\"value\":\"sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5\",\"type\":1},{\"key\":\"IMAGE_URL\",\"value\":\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:20:47Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "This takes existing Image Manifests and combines them in an Image Index.",
                    "params": [
                        {
                            "description": "The target image and tag where the image will be pushed to.",
                            "name": "IMAGE",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Verify the TLS on the registry endpoint (for push/pull to a non-TLS registry)",
                            "name": "TLSVERIFY",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "The commit the image is built from.",
                            "name": "COMMIT_SHA",
                            "type": "string"
                        },
                        {
                            "description": "List of Image Manifests to be referenced by the Image Index",
                            "name": "IMAGES",
                            "type": "array"
                        },
                        {
                            "default": "",
                            "description": "Delete image tag after specified time resulting in garbage collection of the digest. Empty means to keep the image tag. Time values could be something like 1h, 2d, 3w for hours, days, and weeks, respectively.",
                            "name": "IMAGE_EXPIRES_AFTER",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Build an image index even if IMAGES is of length 1. Default true. If the image index generation is skipped, the task will forward values for params.IMAGES[0] to results.IMAGE_*. In order to properly set all results, use the repository:tag@sha256:digest format for the IMAGES parameter.",
                            "name": "ALWAYS_BUILD_INDEX",
                            "type": "string"
                        },
                        {
                            "default": "vfs",
                            "description": "Storage driver to configure for buildah",
                            "name": "STORAGE_DRIVER",
                            "type": "string"
                        },
                        {
                            "default": "oci",
                            "description": "The format for the resulting image's mediaType. Valid values are oci (default) or docker.",
                            "name": "BUILDAH_FORMAT",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Flag to enable or disable SBOM validation before save. Validation is optional - use this if you are experiencing performance issues.",
                            "name": "SBOM_SKIP_VALIDATION",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from",
                            "name": "caTrustConfigMapName",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data",
                            "name": "caTrustConfigMapKey",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Digest of the image just built",
                            "name": "IMAGE_DIGEST",
                            "type": "string"
                        },
                        {
                            "description": "Image repository and tag where the built image was pushed",
                            "name": "IMAGE_URL",
                            "type": "string"
                        },
                        {
                            "description": "List of all referenced image manifests",
                            "name": "IMAGES",
                            "type": "string"
                        },
                        {
                            "description": "Image reference of the built image containing both the repository and the digest",
                            "name": "IMAGE_REF",
                            "type": "string"
                        },
                        {
                            "description": "Reference of SBOM blob digest to enable digest-based verification from provenance",
                            "name": "SBOM_BLOB_URL",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "BUILDAH_FORMAT",
                                "value": "docker"
                            },
                            {
                                "name": "COMMIT_SHA",
                                "value": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9"
                            },
                            {
                                "name": "IMAGE",
                                "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9"
                            },
                            {
                                "name": "TLSVERIFY",
                                "value": "true"
                            },
                            {
                                "name": "ALWAYS_BUILD_INDEX",
                                "value": "false"
                            },
                            {
                                "name": "STORAGE_DRIVER",
                                "value": "vfs"
                            }
                        ],
                        "volumeMounts": [
                            {
                                "mountPath": "/index-build-data",
                                "name": "shared-dir"
                            },
                            {
                                "mountPath": "/mnt/trusted-ca",
                                "name": "trusted-ca",
                                "readOnly": true
                            }
                        ]
                    },
                    "steps": [
                        {
                            "args": [
                                "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9@sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5"
                            ],
                            "computeResources": {
                                "limits": {
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "image": "quay.io/konflux-ci/buildah-task:latest@sha256:4c470b5a153c4acd14bf4f8731b5e36c61d7faafe09c2bf376bb81ce84aa5709",
                            "name": "build",
                            "script": "#!/bin/bash\n# Fixing group permission on /var/lib/containers\nset -eu\nset -o pipefail\nchown root:root /var/lib/containers\n\nsed -i 's/^\\s*short-name-mode\\s*=\\s*.*/short-name-mode = \"disabled\"/' /etc/containers/registries.conf\n\necho \"[$(date --utc -Ins)] Update CA trust\"\n\nca_bundle=/mnt/trusted-ca/ca-bundle.crt\nif [ -f \"$ca_bundle\" ]; then\n  echo \"INFO: Using mounted CA bundle: $ca_bundle\"\n  cp -vf $ca_bundle /etc/pki/ca-trust/source/anchors\n  update-ca-trust\nfi\n\nif [[ $# -ne 1 \u0026\u0026 \"$ALWAYS_BUILD_INDEX\" != \"true\" ]]; then\n  echo \"Skipping image index generation while supplying multiple image inputs is unsupported.\"\n  exit 2\nfi\n\nbuildah manifest create \"$IMAGE\"\nfor i in $@\ndo\n  TOADD=\"$i\"\n  TOADD_URL=\"$(echo \"$i\" | cut -d@ -f1)\"\n  TOADD_DIGEST=\"$(echo \"$i\" | cut -d@ -f2)\"\n  if [[ $(echo \"$i\" | tr -cd \":\" | wc -c) == 2 ]]; then\n    #format is repository:tag@sha256:digest\n    #we need to remove the tag, and just reference the digest\n    #as tag + digest is not supported\n    TOADD_REPOSITORY=\"$(echo \"$i\" | cut -d: -f1)\"\n    TOADD=\"${TOADD_REPOSITORY}@${TOADD_DIGEST}\"\n  fi\n  if [[ \"$ALWAYS_BUILD_INDEX\" != \"true\" ]]; then\n    echo \"Skipping image index generation. Returning results for $TOADD.\"\n    echo -n \"${TOADD_URL}\" \u003e \"/tekton/results/IMAGE_URL\"\n    echo -n \"${TOADD_DIGEST}\" \u003e \"/tekton/results/IMAGE_DIGEST\"\n    echo -n \"${TOADD}\" \u003e \"/tekton/results/IMAGES\"\n    exit 0\n  fi\n\n  echo \"Adding $TOADD\"\n  buildah manifest add $IMAGE \"docker://$TOADD\" --all\ndone\n\necho \"Validating format consistency\"\nINCOMPATIBLE_STRING=\"vnd.oci.image.manifest\"\nINCOMPATIBLE_NAME=\"oci\"\nif [ \"$BUILDAH_FORMAT\" == \"oci\" ]; then\n  INCOMPATIBLE_STRING=\"vnd.docker.distribution.manifest\"\n  INCOMPATIBLE_NAME=\"docker\"\nfi\n\n# If mismatched formats (e.g., Docker manifests within an OCI index) exist locally, 'buildah push'\n# converts the inner manifests to match the target BUILDAH_FORMAT.\n# This alters the digests and breaks the link to the attached SBOMs.\nMANIFEST_MEDIA_TYPES=$(buildah manifest inspect \"$IMAGE\" | jq -er '.manifests[].mediaType')\nif echo \"$MANIFEST_MEDIA_TYPES\" | grep -q \"$INCOMPATIBLE_STRING\"; then\n  echo \"ERROR: Platform image contains $INCOMPATIBLE_NAME format, but index will be $BUILDAH_FORMAT\"\n  echo \"This will cause digest changes and break SBOM accessibility.\"\n  echo \"Ensure all platform images are built with buildah-format: $BUILDAH_FORMAT\"\n  exit 1\nfi\n\n# While the BUILDAH_FORMAT environment variable can define the push\n# format, lets be explicit about the format that we want when we push.\npush_format=oci\nif [ \"${BUILDAH_FORMAT}\" == \"docker\" ]; then\n  push_format=docker\nfi\n\nbuildah_retries=3\n\necho \"Pushing image to registry\"\nif ! retry buildah manifest push \\\n  --format=\"$push_format\" \\\n  --retry \"$buildah_retries\" \\\n  --tls-verify=\"$TLSVERIFY\" \\\n  --digestfile image-digest \\\n  \"$IMAGE\" \\\n  \"docker://$IMAGE\"\nthen\n    echo \"Failed to push image ${IMAGE} to registry\"\n    exit 1\nfi\n\necho \"Pushing image to registry\"\nif ! retry buildah manifest push \\\n  --format=\"$push_format\" \\\n  --retry \"$buildah_retries\" \\\n  --tls-verify=\"$TLSVERIFY\" \\\n  --digestfile image-digest \\\n  \"$IMAGE\" \\\n  \"docker://${IMAGE%:*}:tsf-demo-comp-on-push-cttl8-build-image-index\"\nthen\n    echo \"Failed to push image ${IMAGE%:*}:tsf-demo-comp-on-push-cttl8-build-image-index to registry\"\n    exit 1\nfi\n\nINDEX_REPOSITORY=\"$(echo \"$IMAGE\" | cut -d@ -f1 | cut -d: -f1)\"\nMANIFEST_DIGESTS=$(buildah manifest inspect \"$IMAGE\" | jq -er \".manifests[].digest\")\nimage_manifests=\"\"\nfor i in $MANIFEST_DIGESTS\ndo\n  image_manifests=\"${image_manifests} ${INDEX_REPOSITORY}@${i},\"\ndone\n\ntee \"/tekton/results/IMAGE_DIGEST\" \u003c image-digest\necho -n \"$IMAGE\" | tee \"/tekton/results/IMAGE_URL\"\n{\n  echo -n \"${IMAGE}@\"\n  cat \"image-digest\"\n} \u003e \"/tekton/results/IMAGE_REF\"\necho -n \"${image_manifests:1:-1}\" \u003e \"/tekton/results/IMAGES\"\n\n# buildah manifest inspect will always give precedence to the local image.\n# Since we built this image in the same place as we are inspecting it, we can\n# just inspect it instead of finding the digest and inspecting the remote image.\nbuildah manifest inspect \"$IMAGE\" \u003e /index-build-data/manifest_data.json\n",
                            "securityContext": {
                                "capabilities": {
                                    "add": [
                                        "SETFCAP"
                                    ]
                                }
                            }
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "image": "quay.io/konflux-ci/mobster:1.2.0-1774868067@sha256:2e00c2f0aeff55713150b51822013327ea0e0d75b8164a52f837fb297c17703d",
                            "name": "create-sbom",
                            "script": "#!/bin/bash\nset -e\n\nMANIFEST_DATA_FILE=\"/index-build-data/manifest_data.json\"\nif [ ! -f \"$MANIFEST_DATA_FILE\" ]; then\n  echo \"The manifest_data.json file does not exist. Skipping the SBOM creation...\"\n  exit 0\nfi\n\nIMAGE_URL=\"$(cat \"/tekton/results/IMAGE_URL\")\"\nIMAGE_DIGEST=\"$(cat \"/tekton/results/IMAGE_DIGEST\")\"\necho \"Creating SBOM result file...\"\nmobster_args=(generate --output /index-build-data/index.spdx.json)\n\nif [ \"${SBOM_SKIP_VALIDATION}\" == \"true\" ]; then\n  echo \"Skipping SBOM validation\"\n  mobster_args+=(--skip-validation)\nfi\n\nmobster_args+=(\n  oci-index\n  --index-image-pullspec \"$IMAGE_URL\"\n  --index-image-digest \"$IMAGE_DIGEST\"\n  --index-manifest-path \"$MANIFEST_DATA_FILE\"\n)\nmobster \"${mobster_args[@]}\"\n"
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "image": "quay.io/konflux-ci/task-runner:1.4.1@sha256:d9feec6f2ce9b10cfb76b45ea14f83b5ed9f231de7d6083291550aebe8eb09ea",
                            "name": "upload-sbom",
                            "script": "#!/bin/bash\nset -e\n\necho \"[$(date --utc -Ins)] Update CA trust\"\n\nca_bundle=/mnt/trusted-ca/ca-bundle.crt\nif [ -f \"$ca_bundle\" ]; then\n  echo \"INFO: Using mounted CA bundle: $ca_bundle\"\n  cp -vf $ca_bundle /etc/pki/ca-trust/source/anchors\n  update-ca-trust\nfi\n\nSBOM_RESULT_FILE=\"/index-build-data/index.spdx.json\"\nif [ ! -f \"$SBOM_RESULT_FILE\" ]; then\n  echo \"The index.spdx.json file does not exists. Skipping the SBOM upload...\"\n  exit 0\nfi\n\n# Pre-select the correct credentials to work around cosign not supporting the containers-auth.json spec\nmkdir -p /tmp/auth \u0026\u0026 select-oci-auth \"$(cat \"/tekton/results/IMAGE_REF\")\" \u003e /tmp/auth/config.json\nexport DOCKER_CONFIG=/tmp/auth\n\necho \"Pushing sbom to registry\"\nif ! retry cosign attach sbom --sbom \"$SBOM_RESULT_FILE\" --type spdx \"$(cat \"/tekton/results/IMAGE_REF\")\"\nthen\n    echo \"Failed to push sbom to registry\"\n    exit 1\nfi\n\n# Remove tag from IMAGE while allowing registry to contain a port number.\nsbom_repo=\"${IMAGE%:*}\"\nsbom_digest=\"$(sha256sum \"$SBOM_RESULT_FILE\" | cut -d' ' -f1)\"\n# The SBOM_BLOB_URL is created by `cosign attach sbom`.\necho -n \"${sbom_repo}@sha256:${sbom_digest}\" | tee \"/tekton/results/SBOM_BLOB_URL\"\n",
                            "securityContext": {
                                "runAsNonRoot": false,
                                "runAsUser": 0
                            }
                        }
                    ],
                    "volumes": [
                        {
                            "emptyDir": {},
                            "name": "shared-dir"
                        },
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.openshift.io/repo": "https://github.com/rhads-tsf-qe/testrepo?rev=8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "build.appstudio.redhat.com/commit_sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "build.appstudio.redhat.com/target_branch": "base-miwkfv",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=33",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "pipelinesascode.tekton.dev/branch": "base-miwkfv",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552493202",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-ojyaao",
                    "pipelinesascode.tekton.dev/git-provider": "github",
                    "pipelinesascode.tekton.dev/installation-id": "112348674",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-push-cttl8",
                    "pipelinesascode.tekton.dev/max-keep-runs": "3",
                    "pipelinesascode.tekton.dev/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-miwkfv\"",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-ci-tests-bot",
                    "pipelinesascode.tekton.dev/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pipelinesascode.tekton.dev/sha-title": "Merge pull request #181 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pipelinesascode.tekton.dev/source-branch": "refs/heads/base-miwkfv",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-tenant/results/61ce9ab9-21e3-414b-b0da-d05b30fbea57/records/ccfee0c4-35d1-4c05-b8ed-2d434cc24826",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"testrepo\",\"commit\":\"8a419f9b1a920375f8112c9b7477d42bbd82b6c9\",\"eventType\":\"push\"}",
                    "results.tekton.dev/result": "default-tenant/results/61ce9ab9-21e3-414b-b0da-d05b30fbea57",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "konflux"
                },
                "creationTimestamp": "2026-04-15T23:20:48Z",
                "finalizers": [
                    "chains.tekton.dev",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/version": "v0.37.7",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/component": "tsf-demo-comp",
                    "pipelines.appstudio.openshift.io/type": "build",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552493202",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "tsf-demo-comp-on-push-cttl8",
                    "tekton.dev/pipelineRun": "tsf-demo-comp-on-push-cttl8",
                    "tekton.dev/pipelineRunUID": "61ce9ab9-21e3-414b-b0da-d05b30fbea57",
                    "tekton.dev/pipelineTask": "clair-scan",
                    "tekton.dev/task": "clair-scan-min"
                },
                "name": "tsf-demo-comp-on-push-cttl8-clair-scan",
                "namespace": "default-tenant",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "tsf-demo-comp-on-push-cttl8",
                        "uid": "61ce9ab9-21e3-414b-b0da-d05b30fbea57"
                    }
                ],
                "resourceVersion": "40147",
                "uid": "ccfee0c4-35d1-4c05-b8ed-2d434cc24826"
            },
            "spec": {
                "params": [
                    {
                        "name": "image-digest",
                        "value": "sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5"
                    },
                    {
                        "name": "image-url",
                        "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9"
                    }
                ],
                "serviceAccountName": "build-pipeline-tsf-demo-comp",
                "taskRef": {
                    "params": [
                        {
                            "name": "name",
                            "value": "clair-scan-min"
                        },
                        {
                            "name": "bundle",
                            "value": "quay.io/konflux-ci/tekton-catalog/task-clair-scan-min:0.3@sha256:c117d0fd0b5413b5addb014027f06b1ea2c39c8e962876810c40c7baf5b54e72"
                        },
                        {
                            "name": "kind",
                            "value": "task"
                        }
                    ],
                    "resolver": "bundles"
                },
                "timeout": "1h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:24:41Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:24:41Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "tsf-demo-comp-on-push-cttl8-clair-scan-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha256": "c117d0fd0b5413b5addb014027f06b1ea2c39c8e962876810c40c7baf5b54e72"
                        },
                        "entryPoint": "clair-scan-min",
                        "uri": "quay.io/konflux-ci/tekton-catalog/task-clair-scan-min"
                    }
                },
                "results": [
                    {
                        "name": "IMAGES_PROCESSED",
                        "type": "string",
                        "value": "{\"image\": {\"pullspec\": \"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9\", \"digests\": [\"sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5\"]}}\n"
                    },
                    {
                        "name": "REPORTS",
                        "type": "string",
                        "value": "{\"sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5\":\"sha256:2dd874847d5f73131ee165de6ec13451b6111018a018d6bd501c6a7ec9c5cf7b\"}\n"
                    },
                    {
                        "name": "SCAN_OUTPUT",
                        "type": "string",
                        "value": "{\"vulnerabilities\":{\"critical\":0,\"high\":0,\"medium\":0,\"low\":0,\"unknown\":0},\"unpatched_vulnerabilities\":{\"critical\":0,\"high\":10,\"medium\":180,\"low\":284,\"unknown\":0}}\n"
                    },
                    {
                        "name": "TEST_OUTPUT",
                        "type": "string",
                        "value": "{\"result\":\"SUCCESS\",\"timestamp\":\"2026-04-15T23:24:41+00:00\",\"note\":\"Task clair-scan-min completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by Clair.\",\"namespace\":\"default\",\"successes\":0,\"failures\":0,\"warnings\":0}\n"
                    }
                ],
                "startTime": "2026-04-15T23:20:48Z",
                "steps": [
                    {
                        "container": "step-get-image-manifests",
                        "imageID": "quay.io/konflux-ci/konflux-test@sha256:169f73f80fbde8d54f42416c5de8cc9214ecc7e8c89c70a3385285bbac32ad0a",
                        "name": "get-image-manifests",
                        "terminated": {
                            "containerID": "cri-o://78fb574b4fa42ab3616ba18f5085691b12e78cb7b901c26a04d6d84407b5a2a5",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:22:17Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:22:11Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-get-vulnerabilities",
                        "imageID": "quay.io/konflux-ci/clair-in-ci@sha256:feaf078e7d05a64d329c082a36aed696751ec2e34fec8beb7d3e4cda47e166ec",
                        "name": "get-vulnerabilities",
                        "terminated": {
                            "containerID": "cri-o://e511ee8106e614e1c36a6ed877d3e82f8af887c246a9ab529d591a198e16c0b3",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:24:30Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:22:18Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-oci-attach-report",
                        "imageID": "quay.io/konflux-ci/task-runner@sha256:200019314a50be5b6dd06f362c794c92a700583a522c5eee9a41e3eab7f706c5",
                        "name": "oci-attach-report",
                        "terminated": {
                            "containerID": "cri-o://fbbb6615ff8d97fb448832db3823eda000cae14b492348247b618502c916bbb8",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:24:34Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:24:30Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-conftest-vulnerabilities",
                        "imageID": "quay.io/konflux-ci/konflux-test@sha256:169f73f80fbde8d54f42416c5de8cc9214ecc7e8c89c70a3385285bbac32ad0a",
                        "name": "conftest-vulnerabilities",
                        "terminated": {
                            "containerID": "cri-o://971a3c8e237a7f56c239153ecbaac53f967132d19569eb8d76d112eee3f59668",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:24:41Z",
                            "message": "[{\"key\":\"IMAGES_PROCESSED\",\"value\":\"{\\\"image\\\": {\\\"pullspec\\\": \\\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9\\\", \\\"digests\\\": [\\\"sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5\\\"]}}\\n\",\"type\":1},{\"key\":\"REPORTS\",\"value\":\"{\\\"sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5\\\":\\\"sha256:2dd874847d5f73131ee165de6ec13451b6111018a018d6bd501c6a7ec9c5cf7b\\\"}\\n\",\"type\":1},{\"key\":\"SCAN_OUTPUT\",\"value\":\"{\\\"vulnerabilities\\\":{\\\"critical\\\":0,\\\"high\\\":0,\\\"medium\\\":0,\\\"low\\\":0,\\\"unknown\\\":0},\\\"unpatched_vulnerabilities\\\":{\\\"critical\\\":0,\\\"high\\\":10,\\\"medium\\\":180,\\\"low\\\":284,\\\"unknown\\\":0}}\\n\",\"type\":1},{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"result\\\":\\\"SUCCESS\\\",\\\"timestamp\\\":\\\"2026-04-15T23:24:41+00:00\\\",\\\"note\\\":\\\"Task clair-scan-min completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by Clair.\\\",\\\"namespace\\\":\\\"default\\\",\\\"successes\\\":0,\\\"failures\\\":0,\\\"warnings\\\":0}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:24:34Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Scans container images for vulnerabilities using Clair, by comparing the components of container image against Clair's vulnerability databases.",
                    "params": [
                        {
                            "description": "Image digest to scan.",
                            "name": "image-digest",
                            "type": "string"
                        },
                        {
                            "description": "Image URL.",
                            "name": "image-url",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "The platform built by.",
                            "name": "image-platform",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "unused, should be removed in next task version.",
                            "name": "docker-auth",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from.",
                            "name": "ca-trust-config-map-name",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data.",
                            "name": "ca-trust-config-map-key",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "If true, skips uploading the results to the image registry. Useful for read-only tests.",
                            "name": "skip-oci-attach-report",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Tekton task test output.",
                            "name": "TEST_OUTPUT",
                            "type": "string"
                        },
                        {
                            "description": "Clair scan result.",
                            "name": "SCAN_OUTPUT",
                            "type": "string"
                        },
                        {
                            "description": "Images processed in the task.",
                            "name": "IMAGES_PROCESSED",
                            "type": "string"
                        },
                        {
                            "description": "Mapping of image digests to report digests",
                            "name": "REPORTS",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "env": [
                            {
                                "name": "RETRY_COUNT",
                                "value": "5"
                            }
                        ],
                        "volumeMounts": [
                            {
                                "mountPath": "/etc/pki/tls/certs/ca-custom-bundle.crt",
                                "name": "trusted-ca",
                                "readOnly": true,
                                "subPath": "ca-bundle.crt"
                            }
                        ]
                    },
                    "steps": [
                        {
                            "computeResources": {
                                "limits": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "IMAGE_URL",
                                    "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9"
                                },
                                {
                                    "name": "IMAGE_DIGEST",
                                    "value": "sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5"
                                }
                            ],
                            "image": "quay.io/konflux-ci/konflux-test:v1.4.51@sha256:169f73f80fbde8d54f42416c5de8cc9214ecc7e8c89c70a3385285bbac32ad0a",
                            "name": "get-image-manifests",
                            "script": "#!/usr/bin/env bash\nset -euo pipefail\n# shellcheck source=/dev/null\n. /utils.sh\n\nimagewithouttag=$(echo -n $IMAGE_URL | sed \"s/\\(.*\\):.*/\\1/\")\n# strip new-line escape symbol from parameter and save it to variable\nimageanddigest=$(echo $imagewithouttag@$IMAGE_DIGEST)\necho \"Inspecting raw image manifest $imageanddigest.\"\n\n# Get the arch and image manifests by inspecting the image. This is mainly for identifying image indexes\nmkdir -p /tmp/auth \u0026\u0026 select-oci-auth \"$IMAGE_URL\" \u003e /tmp/auth/config.json\nexport DOCKER_CONFIG=/tmp/auth\nimage_manifests=$(get_image_manifests -i \"${imageanddigest}\")\nif [ -n \"$image_manifests\" ]; then\n  echo \"$image_manifests\" | jq -r 'to_entries[] | \"\\(.key) \\(.value)\"' | while read -r arch arch_sha; do\n    echo \"$arch_sha\" \u003e /tekton/home/image-manifest-$arch.sha\n  done\nelse\n  echo \"Failed to get image manifests from image \\\"$imageanddigest\\\"\"\n  note=\"Task clair-scan-min failed: Failed to get image manifests from image \\\"$imageanddigest\\\". For details, check Tekton task log.\"\n  ERROR_OUTPUT=$(make_result_json -r \"ERROR\" -t \"$note\")\n  echo \"${ERROR_OUTPUT}\" | tee \"/tekton/results/TEST_OUTPUT\"\n  exit 0\nfi\n",
                            "securityContext": {
                                "capabilities": {
                                    "add": [
                                        "SETFCAP"
                                    ]
                                }
                            }
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "cpu": "100m",
                                    "memory": "512Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "512Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "IMAGE_URL",
                                    "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9"
                                },
                                {
                                    "name": "IMAGE_DIGEST",
                                    "value": "sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5"
                                },
                                {
                                    "name": "IMAGE_PLATFORM"
                                }
                            ],
                            "image": "quay.io/konflux-ci/clair-in-ci:v1",
                            "imagePullPolicy": "Always",
                            "name": "get-vulnerabilities",
                            "script": "#!/usr/bin/env bash\n\nset -o errexit\nset -o nounset\nset -o pipefail\n# shellcheck source=/utils.sh\n. /utils.sh\n\nmkdir -p /tmp/auth \u0026\u0026 select-oci-auth \"$IMAGE_URL\" \u003e /tmp/auth/config.json\nexport DOCKER_CONFIG=/tmp/auth\n\nimagewithouttag=$(echo -n $IMAGE_URL | sed \"s/\\(.*\\):.*/\\1/\")\nimages_processed_template='{\"image\": {\"pullspec\": \"'\"$IMAGE_URL\"'\", \"digests\": [%s]}}'\ndigests_processed=()\n\n# the quay report format used by the Conftest rules in the\n# conftest-vulnerabilities step doesn't contain the \"issued\" date which\n# we require in the policy rules, so we resort to running clair-action\n# twice to produce both quay and clair formatted output\nclair_report() {\n  { retry clair-action report --image-ref=\"$1\" --db-path=/tmp/matcher.db --docker-config-dir=/tmp/auth --format=clair | tee  \"clair-report-$2.json\"; } \u0026\u0026 \\\n  { retry clair-action convert  --file-path=\"clair-report-$2.json\" --format=quay \u003e \"clair-result-$2.json\"; }\n}\n\nrun_clair_on_arch() {\n  local arch=\"$1\"\n  local sha_file=\"image-manifest-$arch.sha\"\n\n  if [ -e \"$sha_file\" ]; then\n    local arch_sha\n    arch_sha=$(\u003c\"$sha_file\")\n    local digest=\"${imagewithouttag}@${arch_sha}\"\n\n    echo \"Running clair-action on $arch image manifest...\"\n    clair_report \"$digest\" \"$arch\" || true\n\n    digests_processed+=(\"\\\"$arch_sha\\\"\")\n   fi\n}\n\nplatform=\"${IMAGE_PLATFORM}\"\n\n# If a platform is specified, extract the architecture and run clair-action on the corresponding image manifest\nif [ -n \"$platform\" ]; then\n  arch=\"${platform#*/}\"\n  if [ \"$arch\" = \"x86_64\" ] || [ \"$arch\" = \"local\" ] || [ \"$arch\" = \"localhost\" ]; then\n    arch=\"amd64\"\n  fi\n  # Validate against supported arch list. If it's not a known arch, fallback to amd64\n  case \"$arch\" in\n    amd64|ppc64le|arm64|s390x)\n      ;;\n    *)\n      echo \"Error: Unsupported or malformed architecture: '$arch' (parsed from platform: '$platform')\"\n      exit 0\n      ;;\n  esac\n\n  run_clair_on_arch \"$arch\"\n\n# If no platform is specified, run clair-action on all available image manifests\nelse\n  for sha_file in image-manifest-*.sha; do\n    if [ -e \"$sha_file\" ]; then\n      arch=$(basename \"$sha_file\" | sed 's/image-manifest-//;s/.sha//')\n      run_clair_on_arch \"$arch\"\n    fi\n  done\nfi\n\n# If the image is an Image Index, also add the Image Index digest to the list.\nif [[ \"${digests_processed[*]}\" != *\"$IMAGE_DIGEST\"* ]]; then\n  digests_processed+=(\"\\\"$IMAGE_DIGEST\\\"\")\nfi\ndigests_processed_string=$(IFS=,; echo \"${digests_processed[*]}\")\n\nimages_processed=$(echo \"${images_processed_template/\\[%s]/[$digests_processed_string]}\")\necho \"$images_processed\" \u003e images-processed.json\n",
                            "workingDir": "/tekton/home"
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "SKIP_OCI_ATTACH_REPORT",
                                    "value": "false"
                                },
                                {
                                    "name": "IMAGE_URL",
                                    "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9"
                                }
                            ],
                            "image": "quay.io/konflux-ci/task-runner:1.5.0@sha256:200019314a50be5b6dd06f362c794c92a700583a522c5eee9a41e3eab7f706c5",
                            "name": "oci-attach-report",
                            "script": "#!/usr/bin/env bash\n\nset -o errexit\nset -o nounset\nset -o pipefail\n\nif [ \"$SKIP_OCI_ATTACH_REPORT\" = \"true\" ]; then\n  echo 'OCI attach report skipped by parameter.'\n  echo '{}' \u003e reports.json\n  exit 0\nfi\n\nif ! compgen -G \"clair-report-*.json\" \u003e /dev/null; then\n  echo 'No Clair reports generated. Skipping upload.'\n  echo '{}' \u003e reports.json\n  exit 0\nfi\n\necho \"Selecting auth\"\nselect-oci-auth \"$IMAGE_URL\" \u003e \"$HOME/auth.json\"\n\nrepository=\"${IMAGE_URL/:*/}\"\n\narch() {\n  report_file=\"$1\"\n  arch=\"${report_file/*-}\"\n  echo \"${arch/.json/}\"\n}\n\nMEDIA_TYPE='application/vnd.redhat.clair-report+json'\n\nreports_json=\"\"\nfor f in clair-report-*.json; do\n  digest=$(cat \"image-manifest-$(arch \"$f\").sha\")\n  image_ref=\"${repository}@${digest}\"\n  echo \"Attaching $f to ${image_ref}\"\n  if ! report_digest=\"$(retry oras attach --no-tty --format go-template='{{.digest}}' --registry-config \\\n    \"$HOME/auth.json\" --artifact-type \"${MEDIA_TYPE}\" \"${image_ref}\" \"$f:${MEDIA_TYPE}\")\"\n  then\n    echo \"Failed to attach ${f} to ${image_ref}\"\n    exit 1\n  fi\n  # shellcheck disable=SC2016\n  reports_json=\"$(yq --output-format json --indent=0 eval-all '. as $i ireduce ({}; . * $i)' \u003c(echo \"${reports_json}\") \u003c(echo \"${digest}: ${report_digest}\"))\"\ndone\necho \"${reports_json}\" \u003e reports.json\n",
                            "workingDir": "/tekton/home"
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "image": "quay.io/konflux-ci/konflux-test:v1.4.51@sha256:169f73f80fbde8d54f42416c5de8cc9214ecc7e8c89c70a3385285bbac32ad0a",
                            "name": "conftest-vulnerabilities",
                            "script": "#!/usr/bin/env bash\nset -euo pipefail\n. /utils.sh\ntrap 'handle_error /tekton/results/TEST_OUTPUT' EXIT\n\nclair_result_files=$(ls /tekton/home/clair-result-*.json)\nif [ -z \"$clair_result_files\" ]; then\n  echo \"Previous step [get-vulnerabilities] failed: No clair-result files found in /tekton/home.\"\nfi\n\nmissing_vulnerabilities_files=\"\"\nfor file in $clair_result_files; do\n  file_suffix=$(basename \"$file\" | sed 's/clair-result-//;s/.json//')\n  if [ ! -s \"$file\" ]; then\n    echo \"Previous step [get-vulnerabilities] failed: $file is empty.\"\n  else\n    /usr/bin/conftest test --no-fail $file \\\n    --policy /project/clair/vulnerabilities-check.rego --namespace required_checks \\\n    --output=json | tee /tekton/home/clair-vulnerabilities-$file_suffix.json || true\n  fi\n\n  #check for missing \"clair-vulnerabilities-\u003carch\u003e/image-index\" file and create a string\n  if [ ! -f \"/tekton/home/clair-vulnerabilities-$file_suffix.json\" ]; then\n    missing_vulnerabilities_files+=\"${missing_vulnerabilities_files:+, }/tekton/home/clair-vulnerabilities-$file_suffix.json\"\n  fi\ndone\n\nif [ -n \"$missing_vulnerabilities_files\" ]; then\n  note=\"Task clair-scan-min failed: $missing_vulnerabilities_files did not generate. For details, check Tekton task log.\"\n  TEST_OUTPUT=$(make_result_json -r \"ERROR\" -t \"$note\")\n  echo \"$missing_vulnerabilities_files did not generate correctly. For details, check conftest command in Tekton task log.\"\n  echo \"${TEST_OUTPUT}\" | tee /tekton/results/TEST_OUTPUT\n  exit 0\nfi\n\nscan_result='{\"vulnerabilities\":{\"critical\":0, \"high\":0, \"medium\":0, \"low\":0, \"unknown\":0}, \"unpatched_vulnerabilities\":{\"critical\":0, \"high\":0, \"medium\":0, \"low\":0, \"unknown\":0}}'\nfor file in /tekton/home/clair-vulnerabilities-*.json; do\n    result=$(jq -rce \\\n        '{\n            vulnerabilities:{\n              critical: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"clair_critical_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0),\n              high: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"clair_high_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0),\n              medium: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"clair_medium_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0),\n              low: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"clair_low_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0),\n              unknown: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"clair_unknown_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0)\n            },\n            unpatched_vulnerabilities:{\n              critical: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"clair_unpatched_critical_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0),\n              high: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"clair_unpatched_high_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0),\n              medium: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"clair_unpatched_medium_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0),\n              low: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"clair_unpatched_low_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0),\n              unknown: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"clair_unpatched_unknown_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0)\n            }\n        }' \"$file\")\n\n    scan_result=$(jq -s -rce \\\n          '.[0].vulnerabilities.critical += .[1].vulnerabilities.critical |\n          .[0].vulnerabilities.high += .[1].vulnerabilities.high |\n          .[0].vulnerabilities.medium += .[1].vulnerabilities.medium |\n          .[0].vulnerabilities.low += .[1].vulnerabilities.low |\n          .[0].vulnerabilities.unknown += .[1].vulnerabilities.unknown |\n          .[0].unpatched_vulnerabilities.critical += .[1].unpatched_vulnerabilities.critical |\n          .[0].unpatched_vulnerabilities.high += .[1].unpatched_vulnerabilities.high |\n          .[0].unpatched_vulnerabilities.medium += .[1].unpatched_vulnerabilities.medium |\n          .[0].unpatched_vulnerabilities.low += .[1].unpatched_vulnerabilities.low |\n          .[0].unpatched_vulnerabilities.unknown += .[1].unpatched_vulnerabilities.unknown |\n          .[0]' \u003c\u003c\u003c\"$scan_result $result\")\ndone\n\necho \"$scan_result\" | tee \"/tekton/results/SCAN_OUTPUT\"\n\ncat /tekton/home/images-processed.json | tee /tekton/results/IMAGES_PROCESSED\n# shellcheck disable=SC2154\ncat /tekton/home/reports.json \u003e \"/tekton/results/REPORTS\"\n\nnote=\"Task clair-scan-min completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by Clair.\"\nTEST_OUTPUT=$(make_result_json -r \"SUCCESS\" -t \"$note\")\necho \"${TEST_OUTPUT}\" | tee /tekton/results/TEST_OUTPUT\n",
                            "securityContext": {
                                "capabilities": {
                                    "add": [
                                        "SETFCAP"
                                    ]
                                }
                            }
                        }
                    ],
                    "volumes": [
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.openshift.io/repo": "https://github.com/rhads-tsf-qe/testrepo?rev=8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "build.appstudio.redhat.com/commit_sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "build.appstudio.redhat.com/target_branch": "base-miwkfv",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=37",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "pipelinesascode.tekton.dev/branch": "base-miwkfv",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552493202",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-ojyaao",
                    "pipelinesascode.tekton.dev/git-provider": "github",
                    "pipelinesascode.tekton.dev/installation-id": "112348674",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-push-cttl8",
                    "pipelinesascode.tekton.dev/max-keep-runs": "3",
                    "pipelinesascode.tekton.dev/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-miwkfv\"",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-ci-tests-bot",
                    "pipelinesascode.tekton.dev/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pipelinesascode.tekton.dev/sha-title": "Merge pull request #181 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pipelinesascode.tekton.dev/source-branch": "refs/heads/base-miwkfv",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-tenant/results/61ce9ab9-21e3-414b-b0da-d05b30fbea57/records/9eda2739-d3a1-4150-ad4f-362db48780bd",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"testrepo\",\"commit\":\"8a419f9b1a920375f8112c9b7477d42bbd82b6c9\",\"eventType\":\"push\"}",
                    "results.tekton.dev/result": "default-tenant/results/61ce9ab9-21e3-414b-b0da-d05b30fbea57",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "virus, konflux"
                },
                "creationTimestamp": "2026-04-15T23:20:48Z",
                "finalizers": [
                    "chains.tekton.dev",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/version": "v0.37.7",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/component": "tsf-demo-comp",
                    "pipelines.appstudio.openshift.io/type": "build",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552493202",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "tsf-demo-comp-on-push-cttl8",
                    "tekton.dev/pipelineRun": "tsf-demo-comp-on-push-cttl8",
                    "tekton.dev/pipelineRunUID": "61ce9ab9-21e3-414b-b0da-d05b30fbea57",
                    "tekton.dev/pipelineTask": "clamav-scan",
                    "tekton.dev/task": "clamav-scan-min"
                },
                "name": "tsf-demo-comp-on-push-cttl8-clamav-scan",
                "namespace": "default-tenant",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "tsf-demo-comp-on-push-cttl8",
                        "uid": "61ce9ab9-21e3-414b-b0da-d05b30fbea57"
                    }
                ],
                "resourceVersion": "40815",
                "uid": "9eda2739-d3a1-4150-ad4f-362db48780bd"
            },
            "spec": {
                "params": [
                    {
                        "name": "image-digest",
                        "value": "sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5"
                    },
                    {
                        "name": "image-url",
                        "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9"
                    }
                ],
                "serviceAccountName": "build-pipeline-tsf-demo-comp",
                "taskRef": {
                    "params": [
                        {
                            "name": "name",
                            "value": "clamav-scan-min"
                        },
                        {
                            "name": "bundle",
                            "value": "quay.io/konflux-ci/tekton-catalog/task-clamav-scan-min:0.3@sha256:589e34f73d310aa993c9761d8b78265a904a121028bda2809d8a2d0500454bd8"
                        },
                        {
                            "name": "kind",
                            "value": "task"
                        }
                    ],
                    "resolver": "bundles"
                },
                "timeout": "1h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:25:27Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:25:27Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "tsf-demo-comp-on-push-cttl8-clamav-scan-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha256": "589e34f73d310aa993c9761d8b78265a904a121028bda2809d8a2d0500454bd8"
                        },
                        "entryPoint": "clamav-scan-min",
                        "uri": "quay.io/konflux-ci/tekton-catalog/task-clamav-scan-min"
                    }
                },
                "results": [
                    {
                        "name": "IMAGES_PROCESSED",
                        "type": "string",
                        "value": "{\"image\": {\"pullspec\": \"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9\", \"digests\": [\"sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5\"]}}\n"
                    },
                    {
                        "name": "TEST_OUTPUT",
                        "type": "string",
                        "value": "{\"timestamp\":\"1776295523\",\"namespace\":\"required_checks\",\"successes\":2,\"failures\":0,\"warnings\":0,\"result\":\"SUCCESS\",\"note\":\"All checks passed successfully\"}\n"
                    }
                ],
                "startTime": "2026-04-15T23:20:48Z",
                "steps": [
                    {
                        "container": "step-extract-and-scan-image",
                        "imageID": "quay.io/konflux-ci/clamav-db@sha256:0a1e1b24fc16108d2049a816f4bc1c59484d2acf8415f490a078113f1bc0bdd4",
                        "name": "extract-and-scan-image",
                        "terminated": {
                            "containerID": "cri-o://f1305176b1a1d0eec6b92de1082e095184f70e79f492be67bcdd55ed8de4d5f8",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:25:23Z",
                            "message": "[{\"key\":\"IMAGES_PROCESSED\",\"value\":\"{\\\"image\\\": {\\\"pullspec\\\": \\\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9\\\", \\\"digests\\\": [\\\"sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5\\\"]}}\\n\",\"type\":1},{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"timestamp\\\":\\\"1776295523\\\",\\\"namespace\\\":\\\"required_checks\\\",\\\"successes\\\":2,\\\"failures\\\":0,\\\"warnings\\\":0,\\\"result\\\":\\\"SUCCESS\\\",\\\"note\\\":\\\"All checks passed successfully\\\"}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:22:11Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-upload",
                        "imageID": "quay.io/konflux-ci/task-runner@sha256:200019314a50be5b6dd06f362c794c92a700583a522c5eee9a41e3eab7f706c5",
                        "name": "upload",
                        "terminated": {
                            "containerID": "cri-o://d62d901362ed4f7d54b9d2a95d53dd59d458e505173a2db1f8094d55575b12cf",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:25:27Z",
                            "message": "[{\"key\":\"IMAGES_PROCESSED\",\"value\":\"{\\\"image\\\": {\\\"pullspec\\\": \\\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9\\\", \\\"digests\\\": [\\\"sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5\\\"]}}\\n\",\"type\":1},{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"timestamp\\\":\\\"1776295523\\\",\\\"namespace\\\":\\\"required_checks\\\",\\\"successes\\\":2,\\\"failures\\\":0,\\\"warnings\\\":0,\\\"result\\\":\\\"SUCCESS\\\",\\\"note\\\":\\\"All checks passed successfully\\\"}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:25:24Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Scans the content of container images and OCI artifacts for viruses, malware, and other malicious content using ClamAV antivirus scanner.",
                    "params": [
                        {
                            "description": "Image digest to scan.",
                            "name": "image-digest",
                            "type": "string"
                        },
                        {
                            "description": "Image URL.",
                            "name": "image-url",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Image arch.",
                            "name": "image-arch",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "unused",
                            "name": "docker-auth",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from.",
                            "name": "ca-trust-config-map-name",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data.",
                            "name": "ca-trust-config-map-key",
                            "type": "string"
                        },
                        {
                            "default": "8",
                            "description": "Maximum number of threads clamd runs.",
                            "name": "clamd-max-threads",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "If true, skips uploading the results to the image registry. Useful for read-only tests.",
                            "name": "skip-upload",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Tekton task test output.",
                            "name": "TEST_OUTPUT",
                            "type": "string"
                        },
                        {
                            "description": "Images processed in the task.",
                            "name": "IMAGES_PROCESSED",
                            "type": "string"
                        }
                    ],
                    "steps": [
                        {
                            "computeResources": {
                                "limits": {
                                    "cpu": "512m",
                                    "memory": "3Gi"
                                },
                                "requests": {
                                    "cpu": "512m",
                                    "memory": "3Gi"
                                }
                            },
                            "env": [
                                {
                                    "name": "HOME",
                                    "value": "/work"
                                },
                                {
                                    "name": "IMAGE_URL",
                                    "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9"
                                },
                                {
                                    "name": "IMAGE_DIGEST",
                                    "value": "sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5"
                                },
                                {
                                    "name": "IMAGE_ARCH"
                                },
                                {
                                    "name": "MAX_THREADS",
                                    "value": "8"
                                }
                            ],
                            "image": "quay.io/konflux-ci/clamav-db:latest",
                            "name": "extract-and-scan-image",
                            "script": "#!/usr/bin/env bash\nset -euo pipefail\n. /utils.sh\ntrap 'handle_error /tekton/results/TEST_OUTPUT' EXIT\n\n# Start clamd in background\n/start-clamd.sh\n\n# Bootstrap .docker config in overridden HOME.\n# This prevents 'oc' CLI failures in clean environments where ~/.docker does not exist.\nif [ ! -d ~/.docker ]; then\n    mkdir -p ~/.docker\n    echo '{}' \u003e ~/.docker/config.json\nfi\n\nimagewithouttag=$(echo $IMAGE_URL | sed \"s/\\(.*\\):.*/\\1/\" | tr -d '\\n')\n\n# strip new-line escape symbol from parameter and save it to variable\nimageanddigest=$(echo $imagewithouttag@$IMAGE_DIGEST)\n\n# check if image is attestation one, skip the clamav scan in such case\nif [[ $imageanddigest == *.att ]]\nthen\n    echo \"$imageanddigest is an attestation image. Skipping ClamAV scan.\"\n    exit 0\nfi\n\nimages_processed_template='{\"image\": {\"pullspec\": \"'\"$IMAGE_URL\"'\", \"digests\": [%s]}}'\ndigests_processed=()\nmkdir logs\nmkdir content\ncd content\necho \"Detecting artifact type for ${imageanddigest}.\"\necho '{\"artifact\":{\"pullspec\":\"'\"${imageanddigest}\"'\",\"type\":\"unknown\",\"mediaType\":\"\"}}' \u003e /work/logs/artifact-meta.json\n\n# Function to scan content and process results with ClamAV and EC\n# Parameters:\n#   $1: destination - path to the content to scan\n#   $2: suffix - suffix for log file names (e.g., \"oci\", \"amd64\")\n#   $3: digest - digest to add to digests_processed array\n#   $4: scan_message - optional message describing what is being scanned\nscan_and_process() {\n  local destination=\"$1\"\n  local suffix=\"$2\"\n  local digest=\"$3\"\n  local scan_message=\"${4:-Scanning content}\"\n\n  db_version=$(clamdscan --version | sed 's|.*/\\(.*\\)/.*|\\1|')\n\n  echo \"$scan_message. This operation may take a while.\"\n  clamdscan \"${destination}\" -vi --multiscan --fdpass \\\n    | tee \"/work/logs/clamscan-result-${suffix}.log\" || true\n\n  echo \"Executed-on: Scan was executed on clamsdcan version - $(clamdscan --version) Database version: $db_version\" | tee -a \"/work/logs/clamscan-result-${suffix}.log\"\n\n  digests_processed+=(\"\\\"$digest\\\"\")\n\n  if [[ -e \"/work/logs/clamscan-result-${suffix}.log\" ]]; then\n    # OPA/EC requires structured data input, add clamAV log into json\n    jq -Rs '{ output: . }' \"/work/logs/clamscan-result-${suffix}.log\" \u003e \"/work/logs/clamscan-result-log-${suffix}.json\"\n\n    EC_EXPERIMENTAL=1 ec test \\\n      --namespace required_checks \\\n      --policy /project/clamav/virus-check.rego \\\n      -o json \\\n      \"/work/logs/clamscan-result-log-${suffix}.json\" || true\n\n    # workaround: due to a bug in ec-cli, we cannot generate json and appstudio output at the same time, running it again\n    EC_EXPERIMENTAL=1 ec test \\\n      --namespace required_checks \\\n      --policy /project/clamav/virus-check.rego \\\n      -o appstudio \\\n      \"/work/logs/clamscan-result-log-${suffix}.json\" | tee \"/work/logs/clamscan-ec-test-${suffix}.json\" || true\n\n    cat \"/work/logs/clamscan-ec-test-${suffix}.json\"\n  fi\n}\n\n# Detect artifact type: container image vs OCI artifact\n# First, try to get image manifests (works for container images)\n# Use subshell to prevent get_image_manifests() from exiting the main script if it fails\n# (get_image_manifests uses exit 1 when Architecture field is missing, which happens for OCI artifacts)\nimage_manifests=$(bash -c '. /utils.sh; get_image_manifests -i \"'\"${imageanddigest}\"'\"' 2\u003e/dev/null || echo \"\")\n\n# If get_image_manifests failed, check if it's an OCI artifact by inspecting manifest media type\nif [ -z \"$image_manifests\" ]; then\n  echo \"get_image_manifests returned empty, checking if this is an OCI artifact...\"\n  raw_manifest=$(skopeo inspect --raw --authfile ~/.docker/config.json \"docker://${imageanddigest}\" 2\u003e/dev/null || true)\n  if [ -s /work/logs/artifact-meta.json ]; then\n    tmp=$(mktemp)\n    if jq '.artifact.type = \"inspected\"' /work/logs/artifact-meta.json \u003e \"$tmp\"; then\n      mv \"$tmp\" /work/logs/artifact-meta.json || true\n    fi\n  fi\n\n  if [ -n \"$raw_manifest\" ]; then\n    media_type=$(echo \"$raw_manifest\" | jq -r '.mediaType // .config.mediaType // empty' 2\u003e/dev/null || echo \"\")\n    artifact_type=$(echo \"$raw_manifest\" | jq -r '.artifactType // empty' 2\u003e/dev/null || echo \"\")\n    config_media_type=$(echo \"$raw_manifest\" | jq -r '.config.mediaType // empty' 2\u003e/dev/null || echo \"\")\n\n    # Determine if this is an OCI artifact (not a container image)\n    # OCI artifacts typically have:\n    # - An empty/scratch config (config.mediaType contains \"empty\" or \"scratch\")\n    # - An explicit artifactType field that is not a container image type\n    is_oci_artifact=false\n\n    # Check if config is empty/scratch (typical for OCI artifacts like python wheels, helm charts, etc.)\n    if echo \"$config_media_type\" | grep -qiE \"(empty|scratch)\"; then\n      is_oci_artifact=true\n    fi\n\n    # Check if artifactType is set and is not a container image type\n    if [ -n \"$artifact_type\" ] \u0026\u0026 ! echo \"$artifact_type\" | grep -qE \"application/vnd\\.(oci|docker)\\.(image|container)\"; then\n      is_oci_artifact=true\n    fi\n\n    if [ \"$is_oci_artifact\" = true ]; then\n      # This is an OCI artifact (e.g., python wheels, helm charts, etc.)\n      echo \"Detected OCI artifact (artifactType: ${artifact_type:-unset}, config.mediaType: ${config_media_type:-unset}). Downloading for scanning...\"\n      if [ -s /work/logs/artifact-meta.json ]; then\n        tmp=$(mktemp)\n        if jq '.artifact.mediaType = '\"\\\"${media_type:-unknown}\\\"\"' | .artifact.artifactType = '\"\\\"${artifact_type:-unknown}\\\"\"' | .artifact.type = \"oci\"' /work/logs/artifact-meta.json \u003e \"$tmp\"; then\n          mv \"$tmp\" /work/logs/artifact-meta.json || true\n        fi\n      fi\n      destination=\"content-oci\"\n      mkdir -p \"$destination\"\n\n      # Download OCI artifact using skopeo copy\n      echo \"Downloading OCI artifact using skopeo copy\"\n      if ! retry skopeo copy --authfile ~/.docker/config.json \"docker://${imageanddigest}\" \"dir:${destination}\" 2\u003e\u00261; then\n        echo \"Failed to download OCI artifact \\\"$imageanddigest\\\". Skipping ClamAV scan!\"\n        note=\"Task clamav-scan-min failed: Failed to download OCI artifact \\\"$imageanddigest\\\". For details, check Tekton task log.\"\n        ERROR_OUTPUT=$(make_result_json -r \"ERROR\" -t \"$note\")\n        echo \"${ERROR_OUTPUT}\" | tee \"/tekton/results/TEST_OUTPUT\"\n        exit 0\n      fi\n\n      # Scan and process OCI artifact\n      scan_and_process \"${destination}\" \"oci\" \"$IMAGE_DIGEST\" \"Scanning OCI artifact\"\n\n      # Skip the container image processing path\n      image_manifests=\"\"\n    elif echo \"$media_type\" | grep -qE \"(application/vnd\\.(docker|oci)\\.(distribution|image)\\.manifest|application/vnd\\.docker\\.distribution\\.manifest)\"; then\n      # This looks like a container image manifest, but get_image_manifests failed\n      echo \"Detected container image manifest type: $media_type, but get_image_manifests failed. This may indicate an error.\"\n      if [ -s /work/logs/artifact-meta.json ]; then\n        tmp=$(mktemp)\n        if jq '.artifact.mediaType = '\"\\\"$media_type\\\"\"' | .artifact.type = \"image\"' /work/logs/artifact-meta.json \u003e \"$tmp\"; then\n          mv \"$tmp\" /work/logs/artifact-meta.json || true\n        fi\n      fi\n      note=\"Task clamav-scan-min failed: Failed to get image manifests from image \\\"$imageanddigest\\\". For details, check Tekton task log.\"\n      ERROR_OUTPUT=$(make_result_json -r \"ERROR\" -t \"$note\")\n      echo \"${ERROR_OUTPUT}\" | tee \"/tekton/results/TEST_OUTPUT\"\n      exit 0\n    else\n      # Likely an OCI artifact with non-standard media type\n      echo \"Detected OCI artifact (media type: ${media_type:-unknown}). Downloading for scanning...\"\n      if [ -s /work/logs/artifact-meta.json ]; then\n        tmp=$(mktemp)\n        if jq '.artifact.mediaType = '\"\\\"${media_type:-unknown}\\\"\"' | .artifact.type = \"oci\"' /work/logs/artifact-meta.json \u003e \"$tmp\"; then\n          mv \"$tmp\" /work/logs/artifact-meta.json || true\n        fi\n      fi\n      destination=\"content-oci\"\n      mkdir -p \"$destination\"\n\n      # Download OCI artifact using skopeo copy\n      echo \"Downloading OCI artifact using skopeo copy\"\n      if ! retry skopeo copy --authfile ~/.docker/config.json \"docker://${imageanddigest}\" \"dir:${destination}\" 2\u003e\u00261; then\n        echo \"Failed to download OCI artifact \\\"$imageanddigest\\\". Skipping ClamAV scan!\"\n        note=\"Task clamav-scan-min failed: Failed to download OCI artifact \\\"$imageanddigest\\\". For details, check Tekton task log.\"\n        ERROR_OUTPUT=$(make_result_json -r \"ERROR\" -t \"$note\")\n        echo \"${ERROR_OUTPUT}\" | tee \"/tekton/results/TEST_OUTPUT\"\n        exit 0\n      fi\n\n      # Scan and process OCI artifact\n      scan_and_process \"${destination}\" \"oci\" \"$IMAGE_DIGEST\" \"Scanning OCI artifact\"\n\n      # Skip the container image processing path\n      image_manifests=\"\"\n    fi\n  else\n    echo \"Failed to inspect artifact \\\"$imageanddigest\\\". Unable to determine type.\"\n    note=\"Task clamav-scan-min failed: Failed to inspect artifact \\\"$imageanddigest\\\". For details, check Tekton task log.\"\n    ERROR_OUTPUT=$(make_result_json -r \"ERROR\" -t \"$note\")\n    echo \"${ERROR_OUTPUT}\" | tee \"/tekton/results/TEST_OUTPUT\"\n    exit 0\n  fi\nfi\n\n# Process container images (existing logic)\nif [ -n \"$image_manifests\" ]; then\n  echo \"Detected container image. Processing image manifests.\"\n  if [ -s /work/logs/artifact-meta.json ]; then\n    tmp=$(mktemp)\n    if jq '.artifact.type = \"image\"' /work/logs/artifact-meta.json \u003e \"$tmp\"; then\n      mv \"$tmp\" /work/logs/artifact-meta.json || true\n    fi\n  fi\n  # Proceed only if a specific arch is provided.\n  # This typically occurs when using Tekton Matrix to launch multiple TaskRuns to scan all architectures of a multi-arch image in parallel.\n  if [ -n \"$IMAGE_ARCH\" ]; then\n    arch=\"${IMAGE_ARCH#*/}\"\n    if [ \"${arch}\" = \"x86_64\" ]; then\n      arch=\"amd64\"\n    fi\n\n    # Check if arch is supported; if not (e.g., it's 'local', see link below), default to amd64.\n    # https://github.com/redhat-appstudio/infra-deployments/blob/main/components/multi-platform-controller/production/stone-prd-rh01/host-config.yaml#L9-L14\n    case \"$arch\" in\n      amd64|ppc64le|arm64|s390x)\n        ;;\n      *)\n        arch=\"amd64\"\n        ;;\n    esac\n\n    image_manifests=$(echo \"$image_manifests\" | jq -c --arg arch \"$arch\" '{($arch): .[$arch]}')\n  fi\n\n  while read -r arch arch_sha; do\n    destination=$(echo content-$arch)\n    mkdir -p \"$destination\"\n    arch_imageanddigest=$(echo $imagewithouttag@$arch_sha)\n\n    echo \"Running \\\"oc image extract\\\" on image of arch $arch\"\n    retry oc image extract --only-files=true --registry-config ~/.docker/config.json \"$arch_imageanddigest\" --path=\"/:${destination}\" --filter-by-os=\"linux/${arch}\"\n    if [ $? -ne 0 ]; then\n      echo \"Unable to extract image for arch $arch. Skipping ClamAV scan!\"\n      exit 0\n    fi\n\n    # Scan and process container image for this architecture\n    scan_and_process \"${destination}\" \"$arch\" \"$arch_sha\" \"Scanning image for arch $arch\"\n  done \u003c \u003c(echo \"$image_manifests\" | jq -r 'to_entries[] | \"\\(.key) \\(.value)\"')\nfi\n\njq -s -rce '\n  reduce .[] as $item ({\"timestamp\":\"0\",\"namespace\":\"\",\"successes\":0,\"failures\":0,\"warnings\":0,\"result\":\"\",\"note\":\"\"};\n    {\n    \"timestamp\" : (if .timestamp \u003c $item.timestamp then $item.timestamp else .timestamp end),\n    \"namespace\" : $item.namespace,\n    \"successes\" : (.successes + $item.successes),\n    \"failures\" : (.failures + $item.failures),\n    \"warnings\" : (.warnings + $item.warnings),\n    \"result\" : (if .result == \"\" or ($item.result == \"SKIPPED\" and .result == \"SUCCESS\") or ($item.result == \"WARNING\" and (.result == \"SUCCESS\" or .result == \"SKIPPED\")) or ($item.result == \"FAILURE\" and .result != \"ERROR\") or $item.result == \"ERROR\" then $item.result else .result end),\n    \"note\" : (if .result == \"\" or ($item.result == \"SKIPPED\" and .result == \"SUCCESS\") or ($item.result == \"WARNING\" and (.result == \"SUCCESS\" or .result == \"SKIPPED\")) or ($item.result == \"FAILURE\" and .result != \"ERROR\") or $item.result == \"ERROR\" then $item.note else .note end)\n    })' /work/logs/clamscan-ec-test-*.json | tee /tekton/results/TEST_OUTPUT\n\n# If the image is an Image Index, also add the Image Index digest to the list.\nif [[ \"${digests_processed[*]}\" != *\"$IMAGE_DIGEST\"* ]]; then\n  digests_processed+=(\"\\\"$IMAGE_DIGEST\\\"\")\nfi\n\ndigests_processed_string=$(IFS=,; echo \"${digests_processed[*]}\")\necho \"${images_processed_template/\\[%s]/[$digests_processed_string]}\" | tee /tekton/results/IMAGES_PROCESSED\n",
                            "securityContext": {
                                "capabilities": {
                                    "add": [
                                        "SETFCAP"
                                    ]
                                }
                            },
                            "volumeMounts": [
                                {
                                    "mountPath": "/work",
                                    "name": "work"
                                },
                                {
                                    "mountPath": "/etc/pki/tls/certs/ca-custom-bundle.crt",
                                    "name": "trusted-ca",
                                    "readOnly": true,
                                    "subPath": "ca-bundle.crt"
                                }
                            ],
                            "workingDir": "/work"
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "SKIP_UPLOAD",
                                    "value": "false"
                                },
                                {
                                    "name": "IMAGE_URL",
                                    "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9"
                                },
                                {
                                    "name": "IMAGE_DIGEST",
                                    "value": "sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5"
                                }
                            ],
                            "image": "quay.io/konflux-ci/task-runner:1.5.0@sha256:200019314a50be5b6dd06f362c794c92a700583a522c5eee9a41e3eab7f706c5",
                            "name": "upload",
                            "script": "#!/usr/bin/env bash\nset -e\n\n# Skip upload if requested e.g. read-only CI tests where push access is denied\nif [ \"$SKIP_UPLOAD\" == \"true\" ]; then\n  echo \"Upload skipped by parameter.\"\n  exit 0\nfi\n\n# Don't return a glob expression when no matches are found\nshopt -s nullglob\n\ncd logs\n\nfor UPLOAD_FILE in clamscan-result*.log; do\n  MEDIA_TYPE=text/vnd.clamav\n  args+=(\"${UPLOAD_FILE}:${MEDIA_TYPE}\")\ndone\nfor UPLOAD_FILE in clamscan-ec-test*.json; do\n  MEDIA_TYPE=application/vnd.konflux.test_output+json\n  args+=(\"${UPLOAD_FILE}:${MEDIA_TYPE}\")\ndone\n\nif [ -z \"${args}\" ]; then\n  echo \"No files found. Skipping upload.\"\n  exit 0;\nfi\n\necho \"Selecting auth\"\nselect-oci-auth $IMAGE_URL \u003e $HOME/auth.json\necho \"Attaching to ${IMAGE_URL}\"\n retry oras attach --no-tty --registry-config \"$HOME/auth.json\" --artifact-type application/vnd.clamav \"${IMAGE_URL}@${IMAGE_DIGEST}\" \"${args[@]}\"\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/work",
                                    "name": "work"
                                },
                                {
                                    "mountPath": "/etc/pki/tls/certs/ca-custom-bundle.crt",
                                    "name": "trusted-ca",
                                    "readOnly": true,
                                    "subPath": "ca-bundle.crt"
                                }
                            ],
                            "workingDir": "/work"
                        }
                    ],
                    "volumes": [
                        {
                            "emptyDir": {},
                            "name": "dbfolder"
                        },
                        {
                            "emptyDir": {},
                            "name": "work"
                        },
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.openshift.io/repo": "https://github.com/rhads-tsf-qe/testrepo?rev=8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "build.appstudio.redhat.com/commit_sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "build.appstudio.redhat.com/target_branch": "base-miwkfv",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=7",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "pipelinesascode.tekton.dev/branch": "base-miwkfv",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552493202",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-ojyaao",
                    "pipelinesascode.tekton.dev/git-provider": "github",
                    "pipelinesascode.tekton.dev/installation-id": "112348674",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-push-cttl8",
                    "pipelinesascode.tekton.dev/max-keep-runs": "3",
                    "pipelinesascode.tekton.dev/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-miwkfv\"",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-ci-tests-bot",
                    "pipelinesascode.tekton.dev/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pipelinesascode.tekton.dev/sha-title": "Merge pull request #181 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pipelinesascode.tekton.dev/source-branch": "refs/heads/base-miwkfv",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-tenant/results/61ce9ab9-21e3-414b-b0da-d05b30fbea57/records/e6b40b6e-7863-43e6-8c19-146adc388309",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"testrepo\",\"commit\":\"8a419f9b1a920375f8112c9b7477d42bbd82b6c9\",\"eventType\":\"push\"}",
                    "results.tekton.dev/result": "default-tenant/results/61ce9ab9-21e3-414b-b0da-d05b30fbea57",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/categories": "Git",
                    "tekton.dev/displayName": "git clone oci trusted artifacts",
                    "tekton.dev/pipelines.minVersion": "0.21.0",
                    "tekton.dev/platforms": "linux/amd64,linux/s390x,linux/ppc64le,linux/arm64",
                    "tekton.dev/tags": "git"
                },
                "creationTimestamp": "2026-04-15T23:17:04Z",
                "finalizers": [
                    "chains.tekton.dev",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/version": "v0.37.7",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/component": "tsf-demo-comp",
                    "pipelines.appstudio.openshift.io/type": "build",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552493202",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "tsf-demo-comp-on-push-cttl8",
                    "tekton.dev/pipelineRun": "tsf-demo-comp-on-push-cttl8",
                    "tekton.dev/pipelineRunUID": "61ce9ab9-21e3-414b-b0da-d05b30fbea57",
                    "tekton.dev/pipelineTask": "clone-repository",
                    "tekton.dev/task": "git-clone-oci-ta-min"
                },
                "name": "tsf-demo-comp-on-push-cttl8-clone-repository",
                "namespace": "default-tenant",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "tsf-demo-comp-on-push-cttl8",
                        "uid": "61ce9ab9-21e3-414b-b0da-d05b30fbea57"
                    }
                ],
                "resourceVersion": "34742",
                "uid": "e6b40b6e-7863-43e6-8c19-146adc388309"
            },
            "spec": {
                "params": [
                    {
                        "name": "url",
                        "value": "https://github.com/rhads-tsf-qe/testrepo"
                    },
                    {
                        "name": "revision",
                        "value": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9"
                    },
                    {
                        "name": "ociStorage",
                        "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9.git"
                    },
                    {
                        "name": "ociArtifactExpiresAfter",
                        "value": ""
                    }
                ],
                "serviceAccountName": "build-pipeline-tsf-demo-comp",
                "taskRef": {
                    "params": [
                        {
                            "name": "name",
                            "value": "git-clone-oci-ta-min"
                        },
                        {
                            "name": "bundle",
                            "value": "quay.io/konflux-ci/tekton-catalog/task-git-clone-oci-ta-min:0.1@sha256:2fff50eaed7d278c3ed82375d28241eaf6eecbc389ec4d44992721786a0dfa68"
                        },
                        {
                            "name": "kind",
                            "value": "task"
                        }
                    ],
                    "resolver": "bundles"
                },
                "timeout": "1h0m0s",
                "workspaces": [
                    {
                        "name": "basic-auth",
                        "secret": {
                            "secretName": "pac-gitauth-ojyaao"
                        }
                    }
                ]
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:17:13Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:17:13Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "tsf-demo-comp-on-push-cttl8-clone-repository-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha256": "2fff50eaed7d278c3ed82375d28241eaf6eecbc389ec4d44992721786a0dfa68"
                        },
                        "entryPoint": "git-clone-oci-ta-min",
                        "uri": "quay.io/konflux-ci/tekton-catalog/task-git-clone-oci-ta-min"
                    }
                },
                "results": [
                    {
                        "name": "CHAINS-GIT_COMMIT",
                        "type": "string",
                        "value": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9"
                    },
                    {
                        "name": "CHAINS-GIT_URL",
                        "type": "string",
                        "value": "https://github.com/rhads-tsf-qe/testrepo"
                    },
                    {
                        "name": "commit",
                        "type": "string",
                        "value": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9"
                    },
                    {
                        "name": "commit-timestamp",
                        "type": "string",
                        "value": "1776295007"
                    },
                    {
                        "name": "short-commit",
                        "type": "string",
                        "value": "8a419f9"
                    },
                    {
                        "name": "url",
                        "type": "string",
                        "value": "https://github.com/rhads-tsf-qe/testrepo"
                    },
                    {
                        "name": "SOURCE_ARTIFACT",
                        "type": "string",
                        "value": "oci:quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:7098d15e5ce4e4693bb0f592ef5340eebb08977048de58dd24fcb634390ccfaa"
                    }
                ],
                "startTime": "2026-04-15T23:17:05Z",
                "steps": [
                    {
                        "container": "step-clone",
                        "imageID": "quay.io/konflux-ci/git-clone@sha256:09ac9c14392b5c2b8057f66cc4abfb8ce5d7214706318959d00908923a754434",
                        "name": "clone",
                        "terminated": {
                            "containerID": "cri-o://014d892aff7de34ecdec5d31e1f22d6a35e76fbe6d8a3e5050a34f027a42ee38",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:17:09Z",
                            "message": "[{\"key\":\"CHAINS-GIT_COMMIT\",\"value\":\"8a419f9b1a920375f8112c9b7477d42bbd82b6c9\",\"type\":1},{\"key\":\"CHAINS-GIT_URL\",\"value\":\"https://github.com/rhads-tsf-qe/testrepo\",\"type\":1},{\"key\":\"commit\",\"value\":\"8a419f9b1a920375f8112c9b7477d42bbd82b6c9\",\"type\":1},{\"key\":\"commit-timestamp\",\"value\":\"1776295007\",\"type\":1},{\"key\":\"short-commit\",\"value\":\"8a419f9\",\"type\":1},{\"key\":\"url\",\"value\":\"https://github.com/rhads-tsf-qe/testrepo\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:17:09Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-symlink-check",
                        "imageID": "quay.io/konflux-ci/git-clone@sha256:09ac9c14392b5c2b8057f66cc4abfb8ce5d7214706318959d00908923a754434",
                        "name": "symlink-check",
                        "terminated": {
                            "containerID": "cri-o://7b4741e602a9bd166b6c36275d8b6cc6960b5b1cee34c951bb54b75f1a5392b6",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:17:10Z",
                            "message": "[{\"key\":\"CHAINS-GIT_COMMIT\",\"value\":\"8a419f9b1a920375f8112c9b7477d42bbd82b6c9\",\"type\":1},{\"key\":\"CHAINS-GIT_URL\",\"value\":\"https://github.com/rhads-tsf-qe/testrepo\",\"type\":1},{\"key\":\"commit\",\"value\":\"8a419f9b1a920375f8112c9b7477d42bbd82b6c9\",\"type\":1},{\"key\":\"commit-timestamp\",\"value\":\"1776295007\",\"type\":1},{\"key\":\"short-commit\",\"value\":\"8a419f9\",\"type\":1},{\"key\":\"url\",\"value\":\"https://github.com/rhads-tsf-qe/testrepo\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:17:10Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-create-trusted-artifact",
                        "imageID": "quay.io/konflux-ci/build-trusted-artifacts@sha256:15d7dc86012e41b10d1eb37679ec03ee75c96436224fadd0938a49dc537aa4ad",
                        "name": "create-trusted-artifact",
                        "terminated": {
                            "containerID": "cri-o://4d5775878ef351ded88ebaa3211ed9764dfcd128661bc0bcf3a37807965ce496",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:17:12Z",
                            "message": "[{\"key\":\"CHAINS-GIT_COMMIT\",\"value\":\"8a419f9b1a920375f8112c9b7477d42bbd82b6c9\",\"type\":1},{\"key\":\"CHAINS-GIT_URL\",\"value\":\"https://github.com/rhads-tsf-qe/testrepo\",\"type\":1},{\"key\":\"SOURCE_ARTIFACT\",\"value\":\"oci:quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:7098d15e5ce4e4693bb0f592ef5340eebb08977048de58dd24fcb634390ccfaa\",\"type\":1},{\"key\":\"commit\",\"value\":\"8a419f9b1a920375f8112c9b7477d42bbd82b6c9\",\"type\":1},{\"key\":\"commit-timestamp\",\"value\":\"1776295007\",\"type\":1},{\"key\":\"short-commit\",\"value\":\"8a419f9\",\"type\":1},{\"key\":\"url\",\"value\":\"https://github.com/rhads-tsf-qe/testrepo\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:17:10Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "The git-clone-oci-ta Task will clone a repo from the provided url and store it as a trusted artifact in the provided OCI repository.",
                    "params": [
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data.",
                            "name": "caTrustConfigMapKey",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from.",
                            "name": "caTrustConfigMapName",
                            "type": "string"
                        },
                        {
                            "default": "1",
                            "description": "Perform a shallow clone, fetching only the most recent N commits.",
                            "name": "depth",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Check symlinks in the repo. If they're pointing outside of the repo, the build will fail.\n",
                            "name": "enableSymlinkCheck",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Fetch all tags for the repo.",
                            "name": "fetchTags",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "HTTP proxy server for non-SSL requests.",
                            "name": "httpProxy",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "HTTPS proxy server for SSL requests.",
                            "name": "httpsProxy",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Perform a shallow fetch of the target branch, fetching only the most recent N commits.\nIf empty, fetches the full history of the target branch.\n",
                            "name": "mergeSourceDepth",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "URL of the repository to fetch the target branch from when mergeTargetBranch is true.\nIf empty, uses the same repository (origin). This allows merging a branch from a different repository.\n",
                            "name": "mergeSourceRepoUrl",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Set to \"true\" to merge the targetBranch into the checked-out revision.",
                            "name": "mergeTargetBranch",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Opt out of proxying HTTP/HTTPS requests.",
                            "name": "noProxy",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Expiration date for the trusted artifacts created in the OCI repository. An empty string means the artifacts do not expire.",
                            "name": "ociArtifactExpiresAfter",
                            "type": "string"
                        },
                        {
                            "description": "The OCI repository where the Trusted Artifacts are stored.",
                            "name": "ociStorage",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Refspec to fetch before checking out revision.",
                            "name": "refspec",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Revision to checkout. (branch, tag, sha, ref, etc...)",
                            "name": "revision",
                            "type": "string"
                        },
                        {
                            "default": "7",
                            "description": "Length of short commit SHA",
                            "name": "shortCommitLength",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Define the directory patterns to match or exclude when performing a sparse checkout.",
                            "name": "sparseCheckoutDirectories",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Set the `http.sslVerify` global git config. Setting this to `false` is not advised unless you are sure that you trust your git remote.",
                            "name": "sslVerify",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Comma-separated list of specific submodule paths to initialize and fetch. Only submodules in the specified directories and their subdirectories will be fetched.\nEmpty string fetches all submodules. Parameter \"submodules\" must be set to \"true\" to make this parameter applicable.\n",
                            "name": "submodulePaths",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Initialize and fetch git submodules.",
                            "name": "submodules",
                            "type": "string"
                        },
                        {
                            "default": "main",
                            "description": "The target branch to merge into the revision (if mergeTargetBranch is true).",
                            "name": "targetBranch",
                            "type": "string"
                        },
                        {
                            "description": "Repository URL to clone from.",
                            "name": "url",
                            "type": "string"
                        },
                        {
                            "default": "/tekton/home",
                            "description": "Absolute path to the user's home directory. Set this explicitly if you are running the image as a non-root user.\n",
                            "name": "userHome",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Log the commands that are executed during `git-clone`'s operation.",
                            "name": "verbose",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "The precise commit SHA that was fetched by this Task. This result uses Chains type hinting to include in the provenance.",
                            "name": "CHAINS-GIT_COMMIT",
                            "type": "string"
                        },
                        {
                            "description": "The precise URL that was fetched by this Task. This result uses Chains type hinting to include in the provenance.",
                            "name": "CHAINS-GIT_URL",
                            "type": "string"
                        },
                        {
                            "description": "The Trusted Artifact URI pointing to the artifact with the application source code.",
                            "name": "SOURCE_ARTIFACT",
                            "type": "string"
                        },
                        {
                            "description": "The precise commit SHA that was fetched by this Task.",
                            "name": "commit",
                            "type": "string"
                        },
                        {
                            "description": "The commit timestamp of the checkout",
                            "name": "commit-timestamp",
                            "type": "string"
                        },
                        {
                            "description": "The SHA of the commit after merging the target branch (if the param mergeTargetBranch is true).",
                            "name": "merged_sha",
                            "type": "string"
                        },
                        {
                            "description": "The commit SHA that was fetched by this Task limited to params.shortCommitLength number of characters",
                            "name": "short-commit",
                            "type": "string"
                        },
                        {
                            "description": "The precise URL that was fetched by this Task.",
                            "name": "url",
                            "type": "string"
                        }
                    ],
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "HOME",
                                    "value": "/tekton/home"
                                },
                                {
                                    "name": "PARAM_URL",
                                    "value": "https://github.com/rhads-tsf-qe/testrepo"
                                },
                                {
                                    "name": "PARAM_REVISION",
                                    "value": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9"
                                },
                                {
                                    "name": "PARAM_REFSPEC"
                                },
                                {
                                    "name": "PARAM_SUBMODULES",
                                    "value": "true"
                                },
                                {
                                    "name": "PARAM_SUBMODULE_PATHS"
                                },
                                {
                                    "name": "PARAM_DEPTH",
                                    "value": "1"
                                },
                                {
                                    "name": "PARAM_SHORT_COMMIT_LENGTH",
                                    "value": "7"
                                },
                                {
                                    "name": "PARAM_SSL_VERIFY",
                                    "value": "true"
                                },
                                {
                                    "name": "PARAM_HTTP_PROXY"
                                },
                                {
                                    "name": "PARAM_HTTPS_PROXY"
                                },
                                {
                                    "name": "PARAM_NO_PROXY"
                                },
                                {
                                    "name": "PARAM_VERBOSE",
                                    "value": "false"
                                },
                                {
                                    "name": "PARAM_SPARSE_CHECKOUT_DIRECTORIES"
                                },
                                {
                                    "name": "PARAM_USER_HOME",
                                    "value": "/tekton/home"
                                },
                                {
                                    "name": "PARAM_FETCH_TAGS",
                                    "value": "false"
                                },
                                {
                                    "name": "PARAM_MERGE_TARGET_BRANCH",
                                    "value": "false"
                                },
                                {
                                    "name": "PARAM_TARGET_BRANCH",
                                    "value": "main"
                                },
                                {
                                    "name": "PARAM_MERGE_SOURCE_REPO_URL"
                                },
                                {
                                    "name": "PARAM_MERGE_SOURCE_DEPTH"
                                },
                                {
                                    "name": "WORKSPACE_SSH_DIRECTORY_BOUND",
                                    "value": "false"
                                },
                                {
                                    "name": "WORKSPACE_SSH_DIRECTORY_PATH"
                                },
                                {
                                    "name": "WORKSPACE_BASIC_AUTH_DIRECTORY_BOUND",
                                    "value": "true"
                                },
                                {
                                    "name": "WORKSPACE_BASIC_AUTH_DIRECTORY_PATH",
                                    "value": "/workspace/basic-auth"
                                },
                                {
                                    "name": "CHECKOUT_DIR",
                                    "value": "/var/workdir/source"
                                }
                            ],
                            "image": "quay.io/konflux-ci/git-clone@sha256:09ac9c14392b5c2b8057f66cc4abfb8ce5d7214706318959d00908923a754434",
                            "name": "clone",
                            "script": "#!/usr/bin/env sh\nset -eu\n\nif [ \"${PARAM_VERBOSE}\" = \"true\" ]; then\n  set -x\nfi\n\nif [ \"${WORKSPACE_BASIC_AUTH_DIRECTORY_BOUND}\" = \"true\" ]; then\n  if [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.git-credentials\" ] \u0026\u0026 [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.gitconfig\" ]; then\n    cp \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.git-credentials\" \"${PARAM_USER_HOME}/.git-credentials\"\n    cp \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.gitconfig\" \"${PARAM_USER_HOME}/.gitconfig\"\n  # Compatibility with kubernetes.io/basic-auth secrets\n  elif [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/username\" ] \u0026\u0026 [ -f \"${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/password\" ]; then\n    HOSTNAME=$(echo $PARAM_URL | awk -F/ '{print $3}')\n    echo \"https://$(cat ${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/username):$(cat ${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/password)@$HOSTNAME\" \u003e\"${PARAM_USER_HOME}/.git-credentials\"\n    echo -e \"[credential \\\"https://$HOSTNAME\\\"]\\n  helper = store\" \u003e\"${PARAM_USER_HOME}/.gitconfig\"\n  else\n    echo \"Unknown basic-auth workspace format\"\n    exit 1\n  fi\n  chmod 400 \"${PARAM_USER_HOME}/.git-credentials\"\n  chmod 400 \"${PARAM_USER_HOME}/.gitconfig\"\nfi\n\n# Should be called after the gitconfig is copied from the repository secret\nca_bundle=/mnt/trusted-ca/ca-bundle.crt\nif [ -f \"$ca_bundle\" ]; then\n  echo \"INFO: Using mounted CA bundle: $ca_bundle\"\n  git config --global http.sslCAInfo \"$ca_bundle\"\nfi\n\nif [ \"${WORKSPACE_SSH_DIRECTORY_BOUND}\" = \"true\" ]; then\n  cp -R \"${WORKSPACE_SSH_DIRECTORY_PATH}\" \"${PARAM_USER_HOME}\"/.ssh\n  chmod 700 \"${PARAM_USER_HOME}\"/.ssh\n  chmod -R 400 \"${PARAM_USER_HOME}\"/.ssh/*\nfi\n\ntest -z \"${PARAM_HTTP_PROXY}\" || export HTTP_PROXY=\"${PARAM_HTTP_PROXY}\"\ntest -z \"${PARAM_HTTPS_PROXY}\" || export HTTPS_PROXY=\"${PARAM_HTTPS_PROXY}\"\ntest -z \"${PARAM_NO_PROXY}\" || export NO_PROXY=\"${PARAM_NO_PROXY}\"\n\n/ko-app/git-init \\\n  -url=\"${PARAM_URL}\" \\\n  -revision=\"${PARAM_REVISION}\" \\\n  -refspec=\"${PARAM_REFSPEC}\" \\\n  -path=\"${CHECKOUT_DIR}\" \\\n  -sslVerify=\"${PARAM_SSL_VERIFY}\" \\\n  -submodules=\"${PARAM_SUBMODULES}\" \\\n  -submodulePaths=\"${PARAM_SUBMODULE_PATHS}\" \\\n  -depth=\"${PARAM_DEPTH}\" \\\n  -sparseCheckoutDirectories=\"${PARAM_SPARSE_CHECKOUT_DIRECTORIES}\" \\\n  -retryMaxAttempts=10\ncd \"${CHECKOUT_DIR}\"\nRESULT_SHA=\"$(git rev-parse HEAD)\"\nRESULT_SHA_SHORT=\"$(git rev-parse --short=\"${PARAM_SHORT_COMMIT_LENGTH}\" HEAD)\"\n\nif [ \"${PARAM_MERGE_TARGET_BRANCH}\" = \"true\" ]; then\n  echo \"Merge option enabled. Attempting to merge target branch '${PARAM_TARGET_BRANCH}' into HEAD (${RESULT_SHA}).\"\n\n  if [ \"${PARAM_DEPTH}\" = \"1\" ]; then\n    echo \"WARNING: Shallow clone with depth=1 may cause merge conflicts due to insufficient commit history.\" \u003e\u00262\n  fi\n\n  if [ \"${PARAM_MERGE_SOURCE_DEPTH}\" = \"1\" ]; then\n    echo \"WARNING: Shallow fetch with mergeSourceDepth=1 may cause merge conflicts due to insufficient commit history.\" \u003e\u00262\n  fi\n\n  # Determine if merging from a different repository or the same one\n  if [ -n \"${PARAM_MERGE_SOURCE_REPO_URL}\" ]; then\n    # Normalize URLs for comparison (remove trailing slashes and .git suffix)\n    normalize_url() {\n      echo \"$1\" | sed -e 's#/$##' -e 's#\\.git$##'\n    }\n\n    NORMALIZED_ORIGIN_URL=$(normalize_url \"${PARAM_URL}\")\n    NORMALIZED_MERGE_URL=$(normalize_url \"${PARAM_MERGE_SOURCE_REPO_URL}\")\n\n    if [ \"${NORMALIZED_ORIGIN_URL}\" = \"${NORMALIZED_MERGE_URL}\" ]; then\n      echo \"Merge source URL is the same as origin. Using existing 'origin' remote.\"\n      MERGE_REMOTE=\"origin\"\n    else\n      echo \"Merging from different repository: ${PARAM_MERGE_SOURCE_REPO_URL}\"\n      echo \"Adding remote 'merge-source'...\"\n      git remote add merge-source \"${PARAM_MERGE_SOURCE_REPO_URL}\"\n      MERGE_REMOTE=\"merge-source\"\n    fi\n  else\n    echo \"Merging from the same repository (origin)\"\n    MERGE_REMOTE=\"origin\"\n  fi\n\n  echo \"Fetching target branch '${PARAM_TARGET_BRANCH}' from ${MERGE_REMOTE}...\"\n  if [ -n \"${PARAM_MERGE_SOURCE_DEPTH}\" ]; then\n    retry git fetch --depth=\"${PARAM_MERGE_SOURCE_DEPTH}\" ${MERGE_REMOTE} \"${PARAM_TARGET_BRANCH}\"\n  else\n    retry git fetch ${MERGE_REMOTE} \"${PARAM_TARGET_BRANCH}\"\n  fi\n\n  echo \"Merging ${MERGE_REMOTE}/${PARAM_TARGET_BRANCH} into current HEAD...\"\n  git config --global user.email \"tekton-git-clone@tekton.dev\"\n  git config --global user.name \"Tekton Git Clone Task\"\n\n  if ! git merge FETCH_HEAD --no-commit --no-ff --allow-unrelated-histories; then\n    echo \"ERROR: Merge conflict detected or merge failed before commit.\" \u003e\u00262\n    echo \"--- Git Status ---\"\n    git status\n    echo \"------------------\"\n    exit 1\n  fi\n\n  # Check if there are changes staged for commit\n  if git diff --staged --quiet; then\n    echo \"No diff was found, skipping merge...\" \u003e\u00262\n  else\n    echo \"Merge successful (no conflicts found), committing...\"\n    if ! git commit -m \"Merge branch '${PARAM_TARGET_BRANCH}' from ${MERGE_REMOTE} into ${RESULT_SHA}\"; then\n      echo \"ERROR: Failed to commit merge.\" \u003e\u00262\n      exit 1\n    fi\n    MERGED_SHA=$(git rev-parse HEAD)\n    echo \"New HEAD after merge: ${MERGED_SHA}\"\n    echo \"${MERGED_SHA}\" \u003e\"/tekton/results/merged_sha\"\n  fi\n\nelse\n  echo \"Merge option disabled. Using checked-out revision ${RESULT_SHA} directly.\"\nfi\nprintf \"%s\" \"${RESULT_SHA}\" \u003e\"/tekton/results/commit\"\nprintf \"%s\" \"${RESULT_SHA}\" \u003e\"/tekton/results/CHAINS-GIT_COMMIT\"\nprintf \"%s\" \"${RESULT_SHA_SHORT}\" \u003e\"/tekton/results/short-commit\"\nprintf \"%s\" \"${PARAM_URL}\" \u003e\"/tekton/results/url\"\nprintf \"%s\" \"${PARAM_URL}\" \u003e\"/tekton/results/CHAINS-GIT_URL\"\nprintf \"%s\" \"$(git log -1 --pretty=%ct)\" \u003e\"/tekton/results/commit-timestamp\"\n\nif [ \"${PARAM_FETCH_TAGS}\" = \"true\" ]; then\n  echo \"Fetching tags\"\n  retry git fetch --tags\nfi\n",
                            "securityContext": {
                                "runAsUser": 0
                            },
                            "volumeMounts": [
                                {
                                    "mountPath": "/mnt/trusted-ca",
                                    "name": "trusted-ca",
                                    "readOnly": true
                                },
                                {
                                    "mountPath": "/var/workdir",
                                    "name": "workdir"
                                }
                            ]
                        },
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "PARAM_ENABLE_SYMLINK_CHECK",
                                    "value": "true"
                                },
                                {
                                    "name": "CHECKOUT_DIR",
                                    "value": "/var/workdir/source"
                                }
                            ],
                            "image": "quay.io/konflux-ci/git-clone@sha256:09ac9c14392b5c2b8057f66cc4abfb8ce5d7214706318959d00908923a754434",
                            "name": "symlink-check",
                            "script": "#!/usr/bin/env bash\nset -euo pipefail\n\ncheck_symlinks() {\n  FOUND_SYMLINK_POINTING_OUTSIDE_OF_REPO=false\n  while read -r symlink; do\n    target=$(readlink -m \"$symlink\")\n    if ! [[ \"$target\" =~ ^$CHECKOUT_DIR ]]; then\n      echo \"The cloned repository contains symlink pointing outside of the cloned repository: $symlink\"\n      FOUND_SYMLINK_POINTING_OUTSIDE_OF_REPO=true\n    fi\n  done \u003c \u003c(find $CHECKOUT_DIR -type l -print)\n  if [ \"$FOUND_SYMLINK_POINTING_OUTSIDE_OF_REPO\" = true ]; then\n    return 1\n  fi\n}\n\nif [ \"${PARAM_ENABLE_SYMLINK_CHECK}\" = \"true\" ]; then\n  echo \"Running symlink check\"\n  check_symlinks\nfi\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/var/workdir",
                                    "name": "workdir"
                                }
                            ]
                        },
                        {
                            "args": [
                                "create",
                                "--store",
                                "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9.git",
                                "/tekton/results/SOURCE_ARTIFACT=/var/workdir/source"
                            ],
                            "computeResources": {
                                "limits": {
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "IMAGE_EXPIRES_AFTER"
                                }
                            ],
                            "image": "quay.io/konflux-ci/build-trusted-artifacts:latest@sha256:15d7dc86012e41b10d1eb37679ec03ee75c96436224fadd0938a49dc537aa4ad",
                            "name": "create-trusted-artifact",
                            "volumeMounts": [
                                {
                                    "mountPath": "/var/workdir",
                                    "name": "workdir"
                                },
                                {
                                    "mountPath": "/etc/pki/tls/certs/ca-custom-bundle.crt",
                                    "name": "trusted-ca",
                                    "readOnly": true,
                                    "subPath": "ca-bundle.crt"
                                }
                            ]
                        }
                    ],
                    "volumes": [
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        },
                        {
                            "emptyDir": {},
                            "name": "workdir"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "A Workspace containing a .gitconfig and .git-credentials file or username and password.\nThese will be copied to the user's home before any git commands are run. Any\nother files in this Workspace are ignored. It is strongly recommended\nto use ssh-directory over basic-auth whenever possible and to bind a\nSecret to this Workspace over other volume types.\n",
                            "name": "basic-auth",
                            "optional": true
                        },
                        {
                            "description": "A .ssh directory with private key, known_hosts, config, etc. Copied to\nthe user's home before git commands are executed. Used to authenticate\nwith the git remote when performing the clone. Binding a Secret to this\nWorkspace is strongly recommended over other volume types.\n",
                            "name": "ssh-directory",
                            "optional": true
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.openshift.io/repo": "https://github.com/rhads-tsf-qe/testrepo?rev=8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "build.appstudio.redhat.com/commit_sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "build.appstudio.redhat.com/target_branch": "base-miwkfv",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=31",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "pipelinesascode.tekton.dev/branch": "base-miwkfv",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552493202",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-ojyaao",
                    "pipelinesascode.tekton.dev/git-provider": "github",
                    "pipelinesascode.tekton.dev/installation-id": "112348674",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-push-cttl8",
                    "pipelinesascode.tekton.dev/max-keep-runs": "3",
                    "pipelinesascode.tekton.dev/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-miwkfv\"",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-ci-tests-bot",
                    "pipelinesascode.tekton.dev/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pipelinesascode.tekton.dev/sha-title": "Merge pull request #181 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pipelinesascode.tekton.dev/source-branch": "refs/heads/base-miwkfv",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-tenant/results/61ce9ab9-21e3-414b-b0da-d05b30fbea57/records/e456edc2-40d5-429f-8341-9a58d5b35a10",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"testrepo\",\"commit\":\"8a419f9b1a920375f8112c9b7477d42bbd82b6c9\",\"eventType\":\"push\"}",
                    "results.tekton.dev/result": "default-tenant/results/61ce9ab9-21e3-414b-b0da-d05b30fbea57",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "konflux"
                },
                "creationTimestamp": "2026-04-15T23:20:48Z",
                "finalizers": [
                    "chains.tekton.dev",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/version": "v0.37.7",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/component": "tsf-demo-comp",
                    "pipelines.appstudio.openshift.io/type": "build",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552493202",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "tsf-demo-comp-on-push-cttl8",
                    "tekton.dev/pipelineRun": "tsf-demo-comp-on-push-cttl8",
                    "tekton.dev/pipelineRunUID": "61ce9ab9-21e3-414b-b0da-d05b30fbea57",
                    "tekton.dev/pipelineTask": "deprecated-base-image-check",
                    "tekton.dev/task": "deprecated-image-check"
                },
                "name": "tsf-demo-comp-on-push-cttl8-deprecated-base-image-check",
                "namespace": "default-tenant",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "tsf-demo-comp-on-push-cttl8",
                        "uid": "61ce9ab9-21e3-414b-b0da-d05b30fbea57"
                    }
                ],
                "resourceVersion": "38790",
                "uid": "e456edc2-40d5-429f-8341-9a58d5b35a10"
            },
            "spec": {
                "params": [
                    {
                        "name": "IMAGE_URL",
                        "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9"
                    },
                    {
                        "name": "IMAGE_DIGEST",
                        "value": "sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5"
                    }
                ],
                "serviceAccountName": "build-pipeline-tsf-demo-comp",
                "taskRef": {
                    "params": [
                        {
                            "name": "name",
                            "value": "deprecated-image-check"
                        },
                        {
                            "name": "bundle",
                            "value": "quay.io/konflux-ci/tekton-catalog/task-deprecated-image-check:0.5@sha256:3457a4ca93f8d55f14ebd407532b1223c689eacc34f0abb3003db4111667bdae"
                        },
                        {
                            "name": "kind",
                            "value": "task"
                        }
                    ],
                    "resolver": "bundles"
                },
                "timeout": "1h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:22:18Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:22:18Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "tsf-demo-comp-on-push-cttl8-deprecated-base-image-check-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha256": "3457a4ca93f8d55f14ebd407532b1223c689eacc34f0abb3003db4111667bdae"
                        },
                        "entryPoint": "deprecated-image-check",
                        "uri": "quay.io/konflux-ci/tekton-catalog/task-deprecated-image-check"
                    }
                },
                "results": [
                    {
                        "name": "IMAGES_PROCESSED",
                        "type": "string",
                        "value": "{\"image\": {\"pullspec\": \"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9\", \"digests\": [\"sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5\"]}}\n"
                    },
                    {
                        "name": "TEST_OUTPUT",
                        "type": "string",
                        "value": "{\"result\":\"SUCCESS\",\"timestamp\":\"2026-04-15T23:22:18+00:00\",\"note\":\"Task deprecated-image-check completed: Check result for task result.\",\"namespace\":\"required_checks\",\"successes\":1,\"failures\":0,\"warnings\":0}\n"
                    }
                ],
                "startTime": "2026-04-15T23:20:48Z",
                "steps": [
                    {
                        "container": "step-check-images",
                        "imageID": "quay.io/konflux-ci/konflux-test@sha256:3bba1fe5ad96bd3811f34b367487192683aa9b1ba343da4885dda565b0a7207e",
                        "name": "check-images",
                        "terminated": {
                            "containerID": "cri-o://626889649fd417634f0b796ae778c360d0167bda27055b2c8667776e58bf3e48",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:22:18Z",
                            "message": "[{\"key\":\"IMAGES_PROCESSED\",\"value\":\"{\\\"image\\\": {\\\"pullspec\\\": \\\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9\\\", \\\"digests\\\": [\\\"sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5\\\"]}}\\n\",\"type\":1},{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"result\\\":\\\"SUCCESS\\\",\\\"timestamp\\\":\\\"2026-04-15T23:22:18+00:00\\\",\\\"note\\\":\\\"Task deprecated-image-check completed: Check result for task result.\\\",\\\"namespace\\\":\\\"required_checks\\\",\\\"successes\\\":1,\\\"failures\\\":0,\\\"warnings\\\":0}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:22:11Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Identifies the unmaintained and potentially insecure deprecated base images. Pyxis API collects metadata from image repository, and Conftest applies supplied policy to identify the deprecated images using that metadata.",
                    "params": [
                        {
                            "default": "/project/repository/",
                            "description": "Path to directory containing Conftest policies.",
                            "name": "POLICY_DIR",
                            "type": "string"
                        },
                        {
                            "default": "required_checks",
                            "description": "Namespace for Conftest policy.",
                            "name": "POLICY_NAMESPACE",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Digests of base build images.",
                            "name": "BASE_IMAGES_DIGESTS",
                            "type": "string"
                        },
                        {
                            "description": "Fully qualified image name.",
                            "name": "IMAGE_URL",
                            "type": "string"
                        },
                        {
                            "description": "Image digest.",
                            "name": "IMAGE_DIGEST",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from.",
                            "name": "CA_TRUST_CONFIG_MAP_NAME",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data.",
                            "name": "CA_TRUST_CONFIG_MAP_KEY",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Tekton task test output.",
                            "name": "TEST_OUTPUT",
                            "type": "string"
                        },
                        {
                            "description": "Images processed in the task.",
                            "name": "IMAGES_PROCESSED",
                            "type": "string"
                        }
                    ],
                    "steps": [
                        {
                            "computeResources": {
                                "limits": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "POLICY_DIR",
                                    "value": "/project/repository/"
                                },
                                {
                                    "name": "POLICY_NAMESPACE",
                                    "value": "required_checks"
                                },
                                {
                                    "name": "BASE_IMAGES_DIGESTS"
                                },
                                {
                                    "name": "IMAGE_URL",
                                    "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9"
                                },
                                {
                                    "name": "IMAGE_DIGEST",
                                    "value": "sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5"
                                }
                            ],
                            "image": "quay.io/konflux-ci/konflux-test:v1.4.49@sha256:74899c7a3dde27548e1ad9c665055bfef56c227251bd9224885f4bbd7addebd9",
                            "name": "check-images",
                            "script": "#!/usr/bin/env bash\nset -euo pipefail\nsource /utils.sh\ntrap 'handle_error /tekton/results/TEST_OUTPUT' EXIT\n\nIMAGES_TO_BE_PROCESSED_PATH=\"/tmp/images_to_be_processed.txt\"\ntouch /tmp/images_to_be_processed.txt\n\nsuccess_counter=0\nfailure_counter=0\nerror_counter=0\nwarnings_counter=0\n\nimages_processed_template='{\"image\": {\"pullspec\": \"'\"$IMAGE_URL\"'\", \"digests\": [%s]}}'\ndigests_processed=()\n\nimagewithouttag=$(echo -n $IMAGE_URL | sed \"s/\\(.*\\):.*/\\1/\")\n# strip new-line escape symbol from parameter and save it to variable\nimageanddigest=$(echo -n $imagewithouttag@$IMAGE_DIGEST)\n\n# Get the arch and image manifests by inspecting the image. This is mainly for identifying image indexes\nimage_manifests=$(get_image_manifests -i \"${imageanddigest}\")\nif [ -n \"$image_manifests\" ]; then\n  while read -r arch arch_sha; do\n    SBOM_FILE_PATH=$(echo \"/tmp/sbom-$arch.json\")\n    arch_imageanddigest=$(echo $imagewithouttag@$arch_sha)\n\n    # Get base images from SBOM\n    cosign download sbom $arch_imageanddigest \u003e ${SBOM_FILE_PATH}\n    if [ $? -ne 0 ]; then\n      echo \"Unable to download sbom for arch $arch.\"\n      continue\n    fi\n\n    \u003c \"${SBOM_FILE_PATH}\" jq -r '\n        if .bomFormat == \"CycloneDX\" then\n            .formulation[]?\n            | .components[]?\n            | select(any(.properties[]?; .name | test(\"^konflux:container:is_(base|builder)_image\")))\n            | (\n                .purl\n                | capture(\"^pkg:oci/.*?@(?\u003cdigest\u003e[a-z0-9]+:[a-f0-9]+)(?:\\\\?[^#]*repository_url=(?\u003crepository_url\u003e[^\u0026#]*))?\")\n              ) as $matched\n            | $matched.repository_url\n        else\n            .packages[]\n            | select(any(.annotations[]?.comment; (fromjson?).name? | test(\"^konflux:container:is_(base|builder)_image\")?))\n            | [.externalRefs[]? | select(.referenceType == \"purl\").referenceLocator] as $purls\n            | (\n                $purls | first\n                | capture(\"^pkg:oci/.*?@(?\u003cdigest\u003e[a-z0-9]+:[a-f0-9]+)(?:\\\\?[^#]*repository_url=(?\u003crepository_url\u003e[^\u0026#]*))?\")\n              ) as $matched\n            | $matched.repository_url\n        end\n    ' \u003e\u003e \"${IMAGES_TO_BE_PROCESSED_PATH}\"\n    echo \"Detected base images from $arch SBOM:\"\n    cat \"${IMAGES_TO_BE_PROCESSED_PATH}\"\n    echo \"\"\n\n    digests_processed+=(\"\\\"$arch_sha\\\"\")\n  done \u003c \u003c(echo \"$image_manifests\" | jq -r 'to_entries[] | \"\\(.key) \\(.value)\"')\nelse\n  echo \"Failed to get image manifests from image \\\"$imageanddigest\\\"\"\n  note=\"Task deprecated-image-check failed: Failed to get image manifests from image \\\"$imageanddigest\\\". For details, check Tekton task log.\"\n  ERROR_OUTPUT=$(make_result_json -r \"ERROR\" -t \"$note\")\n  echo \"${ERROR_OUTPUT}\" | tee \"/tekton/results/TEST_OUTPUT\"\n  exit 0\nfi\n\n# If the image is an Image Index, also add the Image Index digest to the list.\nif [[ \"${digests_processed[*]}\" != *\"$IMAGE_DIGEST\"* ]]; then\n  digests_processed+=(\"\\\"$IMAGE_DIGEST\\\"\")\nfi\n\ndigests_processed_string=$(IFS=,; echo \"${digests_processed[*]}\")\n\nif [ -n \"${BASE_IMAGES_DIGESTS}\" ];\nthen\n  echo \"Base images passed by param BASE_IMAGES_DIGESTS: $BASE_IMAGES_DIGESTS\"\n  # Get images from the parameter\n  for IMAGE_WITH_TAG in $(echo -n \"$BASE_IMAGES_DIGESTS\" | sed 's/\\\\n/\\'$'\\n''/g' );\n  do\n    echo $IMAGE_WITH_TAG | cut -d \":\" -f1 \u003e\u003e ${IMAGES_TO_BE_PROCESSED_PATH}\n  done\nfi\n\n# we want to remove duplicated entries\nBASE_IMAGES=$(sort -u \"${IMAGES_TO_BE_PROCESSED_PATH}\")\n\necho \"Images to be checked:\"\necho \"$BASE_IMAGES\"\necho \"\"\n\nfor BASE_IMAGE in ${BASE_IMAGES};\ndo\n  IFS=:'/' read -r IMAGE_REGISTRY IMAGE_REPOSITORY\u003c\u003c\u003c $BASE_IMAGE\n\n  # Red Hat Catalog hack: registry.redhat.io must be queried as registry.access.redhat.com in Red Hat catalog\n  IMAGE_REGISTRY_CATALOG=$(echo \"${IMAGE_REGISTRY}\" | sed 's/^registry.redhat.io$/registry.access.redhat.com/')\n\n  export IMAGE_REPO_PATH=/tmp/${IMAGE_REPOSITORY}\n  mkdir -p ${IMAGE_REPO_PATH}\n  echo \"Querying Red Hat Catalog for $BASE_IMAGE.\"\n  http_code=$(curl -s -o ${IMAGE_REPO_PATH}/repository_data.json -w '%{http_code}' \"https://catalog.redhat.com/api/containers/v1/repositories/registry/${IMAGE_REGISTRY_CATALOG}/repository/${IMAGE_REPOSITORY}\")\n\n  if [ \"$http_code\" == \"200\" ];\n  then\n    echo \"Running conftest using $POLICY_DIR policy, $POLICY_NAMESPACE namespace.\"\n    /usr/bin/conftest test --no-fail ${IMAGE_REPO_PATH}/repository_data.json \\\n    --policy $POLICY_DIR --namespace $POLICY_NAMESPACE \\\n    --output=json | tee ${IMAGE_REPO_PATH}/deprecated_image_check_output.json\n\n    failures_num=$(jq -r '.[].failures|length' ${IMAGE_REPO_PATH}/deprecated_image_check_output.json)\n    if [[ \"${failures_num}\" -gt 0 ]]; then\n      echo \"[FAILURE] Image ${IMAGE_REGISTRY}/${IMAGE_REPOSITORY} has been deprecated\"\n    fi\n    failure_counter=$((failure_counter+failures_num))\n\n    successes_num=$(jq -r '.[].successes' ${IMAGE_REPO_PATH}/deprecated_image_check_output.json)\n    if [[ \"${successes_num}\" -gt 0 ]]; then\n      echo \"[SUCCESS] Image ${IMAGE_REGISTRY}/${IMAGE_REPOSITORY} is valid\"\n    fi\n    success_counter=$((success_counter+successes_num))\n\n  elif [ \"$http_code\" == \"404\" ];\n  then\n    echo \"[WARNING] Registry/image ${IMAGE_REGISTRY}/${IMAGE_REPOSITORY} not found in Red Hat Catalog. Task cannot provide results if image is deprecated.\"\n    warnings_counter=$((warnings_counter+1))\n  else\n    echo \"[ERROR] Unexpected error (HTTP code: ${http_code}) occurred for registry/image ${IMAGE_REGISTRY}/${IMAGE_REPOSITORY}.\"\n    error_counter=$((error_counter+1))\n  fi\ndone\n\nnote=\"Task deprecated-image-check failed: Command conftest failed. For details, check Tekton task log.\"\nERROR_OUTPUT=$(make_result_json -r ERROR -n \"$POLICY_NAMESPACE\" -t \"$note\")\n\nnote=\"Task deprecated-image-check completed: Check result for task result.\"\nif [[ \"$error_counter\" == 0 ]];\nthen\n  if [[ \"${failure_counter}\" -gt 0 ]]; then\n    RES=\"FAILURE\"\n  elif [[ \"${warnings_counter}\" -gt 0 ]]; then\n    RES=\"WARNING\"\n  elif [[ \"${success_counter}\" -eq 0 ]]; then\n    # when all counters are 0, there are no base images to check\n    note=\"Task deprecated-image-check success: No base images to check.\"\n    RES=\"SUCCESS\"\n  else\n    RES=\"SUCCESS\"\n  fi\n  TEST_OUTPUT=$(make_result_json \\\n    -r \"${RES}\" -n \"$POLICY_NAMESPACE\" \\\n    -s \"${success_counter}\" -f \"${failure_counter}\" -w \"${warnings_counter}\" -t \"$note\")\nfi\necho \"${TEST_OUTPUT:-${ERROR_OUTPUT}}\" | tee /tekton/results/TEST_OUTPUT\n\necho \"${images_processed_template/\\[%s]/[$digests_processed_string]}\" | tee /tekton/results/IMAGES_PROCESSED\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/etc/pki/tls/certs/ca-custom-bundle.crt",
                                    "name": "trusted-ca",
                                    "readOnly": true,
                                    "subPath": "ca-bundle.crt"
                                }
                            ]
                        }
                    ],
                    "volumes": [
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.openshift.io/repo": "https://github.com/rhads-tsf-qe/testrepo?rev=8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "build.appstudio.redhat.com/commit_sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "build.appstudio.redhat.com/target_branch": "base-miwkfv",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=5",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "pipelinesascode.tekton.dev/branch": "base-miwkfv",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552493202",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-ojyaao",
                    "pipelinesascode.tekton.dev/git-provider": "github",
                    "pipelinesascode.tekton.dev/installation-id": "112348674",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-push-cttl8",
                    "pipelinesascode.tekton.dev/max-keep-runs": "3",
                    "pipelinesascode.tekton.dev/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-miwkfv\"",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-ci-tests-bot",
                    "pipelinesascode.tekton.dev/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pipelinesascode.tekton.dev/sha-title": "Merge pull request #181 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pipelinesascode.tekton.dev/source-branch": "refs/heads/base-miwkfv",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-tenant/results/61ce9ab9-21e3-414b-b0da-d05b30fbea57/records/d984f5ee-3d82-4089-bc42-5d74e3d48a9e",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"testrepo\",\"commit\":\"8a419f9b1a920375f8112c9b7477d42bbd82b6c9\",\"eventType\":\"push\"}",
                    "results.tekton.dev/result": "default-tenant/results/61ce9ab9-21e3-414b-b0da-d05b30fbea57",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "konflux"
                },
                "creationTimestamp": "2026-04-15T23:17:00Z",
                "finalizers": [
                    "chains.tekton.dev",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/version": "v0.37.7",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/component": "tsf-demo-comp",
                    "pipelines.appstudio.openshift.io/type": "build",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552493202",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "tsf-demo-comp-on-push-cttl8",
                    "tekton.dev/pipelineRun": "tsf-demo-comp-on-push-cttl8",
                    "tekton.dev/pipelineRunUID": "61ce9ab9-21e3-414b-b0da-d05b30fbea57",
                    "tekton.dev/pipelineTask": "init",
                    "tekton.dev/task": "init"
                },
                "name": "tsf-demo-comp-on-push-cttl8-init",
                "namespace": "default-tenant",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "tsf-demo-comp-on-push-cttl8",
                        "uid": "61ce9ab9-21e3-414b-b0da-d05b30fbea57"
                    }
                ],
                "resourceVersion": "34681",
                "uid": "d984f5ee-3d82-4089-bc42-5d74e3d48a9e"
            },
            "spec": {
                "params": [
                    {
                        "name": "enable-cache-proxy",
                        "value": "false"
                    }
                ],
                "serviceAccountName": "build-pipeline-tsf-demo-comp",
                "taskRef": {
                    "params": [
                        {
                            "name": "name",
                            "value": "init"
                        },
                        {
                            "name": "bundle",
                            "value": "quay.io/konflux-ci/tekton-catalog/task-init:0.4@sha256:288f3106118edc1d0f0c79a89c960abf5841a4dd8bc3f38feb10527253105b19"
                        },
                        {
                            "name": "kind",
                            "value": "task"
                        }
                    ],
                    "resolver": "bundles"
                },
                "timeout": "1h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:17:04Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:17:04Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "tsf-demo-comp-on-push-cttl8-init-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha256": "288f3106118edc1d0f0c79a89c960abf5841a4dd8bc3f38feb10527253105b19"
                        },
                        "entryPoint": "init",
                        "uri": "quay.io/konflux-ci/tekton-catalog/task-init"
                    }
                },
                "results": [
                    {
                        "name": "http-proxy",
                        "type": "string",
                        "value": ""
                    },
                    {
                        "name": "no-proxy",
                        "type": "string",
                        "value": ""
                    }
                ],
                "startTime": "2026-04-15T23:17:00Z",
                "steps": [
                    {
                        "container": "step-init",
                        "imageID": "quay.io/konflux-ci/konflux-build-cli@sha256:2d1039b614888ca46d5d771ca886a5843e56ac9acf7210040a61075371338247",
                        "name": "init",
                        "terminated": {
                            "containerID": "cri-o://4c17ce330c08b1407c27c3557c6c9e89ebdcecd5a8f79d8a1084f7b317002ee4",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:17:03Z",
                            "message": "[{\"key\":\"http-proxy\",\"value\":\"\",\"type\":1},{\"key\":\"no-proxy\",\"value\":\"\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:17:03Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Initialize Pipeline Task, enables configuration for cache-proxy if required during the PipelineRun.",
                    "params": [
                        {
                            "default": "false",
                            "description": "Enable cache proxy configuration",
                            "name": "enable-cache-proxy",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "HTTP proxy URL for cache proxy (when enable-cache-proxy is true)",
                            "name": "http-proxy",
                            "type": "string"
                        },
                        {
                            "description": "NO_PROXY value for cache proxy (when enable-cache-proxy is true)",
                            "name": "no-proxy",
                            "type": "string"
                        }
                    ],
                    "steps": [
                        {
                            "args": [
                                "--enable",
                                "false"
                            ],
                            "command": [
                                "konflux-build-cli",
                                "config",
                                "cache-proxy"
                            ],
                            "computeResources": {
                                "limits": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "KBC_LOG_LEVEL",
                                    "value": "info"
                                },
                                {
                                    "name": "DEFAULT_HTTP_PROXY",
                                    "value": "squid.caching.svc.cluster.local:3128"
                                },
                                {
                                    "name": "DEFAULT_NO_PROXY",
                                    "value": "brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai"
                                },
                                {
                                    "name": "HTTP_PROXY_RESULTS_PATH",
                                    "value": "/tekton/results/http-proxy"
                                },
                                {
                                    "name": "NO_PROXY_RESULTS_PATH",
                                    "value": "/tekton/results/no-proxy"
                                }
                            ],
                            "image": "quay.io/konflux-ci/konflux-build-cli@sha256:59f2ea93fa4d47342b54acb434422ee07ebccd927a06a00d3f3eca70f8356ddf",
                            "name": "init"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.openshift.io/repo": "https://github.com/rhads-tsf-qe/testrepo?rev=8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "build.appstudio.redhat.com/commit_sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "build.appstudio.redhat.com/target_branch": "base-miwkfv",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=8",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "pipelinesascode.tekton.dev/branch": "base-miwkfv",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552493202",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-ojyaao",
                    "pipelinesascode.tekton.dev/git-provider": "github",
                    "pipelinesascode.tekton.dev/installation-id": "112348674",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-push-cttl8",
                    "pipelinesascode.tekton.dev/max-keep-runs": "3",
                    "pipelinesascode.tekton.dev/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-miwkfv\"",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-ci-tests-bot",
                    "pipelinesascode.tekton.dev/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pipelinesascode.tekton.dev/sha-title": "Merge pull request #181 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pipelinesascode.tekton.dev/source-branch": "refs/heads/base-miwkfv",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-tenant/results/61ce9ab9-21e3-414b-b0da-d05b30fbea57/records/ef20dc52-5f4a-4d64-b8f5-20774ff4a23c",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"testrepo\",\"commit\":\"8a419f9b1a920375f8112c9b7477d42bbd82b6c9\",\"eventType\":\"push\"}",
                    "results.tekton.dev/result": "default-tenant/results/61ce9ab9-21e3-414b-b0da-d05b30fbea57",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "image-build, konflux"
                },
                "creationTimestamp": "2026-04-15T23:17:14Z",
                "finalizers": [
                    "chains.tekton.dev",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/version": "v0.37.7",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/component": "tsf-demo-comp",
                    "pipelines.appstudio.openshift.io/type": "build",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552493202",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "tsf-demo-comp-on-push-cttl8",
                    "tekton.dev/pipelineRun": "tsf-demo-comp-on-push-cttl8",
                    "tekton.dev/pipelineRunUID": "61ce9ab9-21e3-414b-b0da-d05b30fbea57",
                    "tekton.dev/pipelineTask": "prefetch-dependencies",
                    "tekton.dev/task": "prefetch-dependencies-oci-ta-min"
                },
                "name": "tsf-demo-comp-on-push-cttl8-prefetch-dependencies",
                "namespace": "default-tenant",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "tsf-demo-comp-on-push-cttl8",
                        "uid": "61ce9ab9-21e3-414b-b0da-d05b30fbea57"
                    }
                ],
                "resourceVersion": "35127",
                "uid": "ef20dc52-5f4a-4d64-b8f5-20774ff4a23c"
            },
            "spec": {
                "params": [
                    {
                        "name": "input",
                        "value": ""
                    },
                    {
                        "name": "SOURCE_ARTIFACT",
                        "value": "oci:quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:7098d15e5ce4e4693bb0f592ef5340eebb08977048de58dd24fcb634390ccfaa"
                    },
                    {
                        "name": "ociStorage",
                        "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9.prefetch"
                    },
                    {
                        "name": "ociArtifactExpiresAfter",
                        "value": ""
                    }
                ],
                "serviceAccountName": "build-pipeline-tsf-demo-comp",
                "taskRef": {
                    "params": [
                        {
                            "name": "name",
                            "value": "prefetch-dependencies-oci-ta-min"
                        },
                        {
                            "name": "bundle",
                            "value": "quay.io/konflux-ci/tekton-catalog/task-prefetch-dependencies-oci-ta-min:0.3@sha256:1a41e7ee19f9e02874b4ef1f74e6f588a7601deaf5b30ca0862808e5760cea5d"
                        },
                        {
                            "name": "kind",
                            "value": "task"
                        }
                    ],
                    "resolver": "bundles"
                },
                "timeout": "1h0m0s",
                "workspaces": [
                    {
                        "name": "git-basic-auth",
                        "secret": {
                            "secretName": "pac-gitauth-ojyaao"
                        }
                    }
                ]
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:17:53Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:17:53Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "tsf-demo-comp-on-push-cttl8-prefetch-dependencies-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha256": "1a41e7ee19f9e02874b4ef1f74e6f588a7601deaf5b30ca0862808e5760cea5d"
                        },
                        "entryPoint": "prefetch-dependencies-oci-ta-min",
                        "uri": "quay.io/konflux-ci/tekton-catalog/task-prefetch-dependencies-oci-ta-min"
                    }
                },
                "results": [
                    {
                        "name": "CACHI2_ARTIFACT",
                        "type": "string",
                        "value": ""
                    },
                    {
                        "name": "SOURCE_ARTIFACT",
                        "type": "string",
                        "value": "oci:quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:7098d15e5ce4e4693bb0f592ef5340eebb08977048de58dd24fcb634390ccfaa"
                    }
                ],
                "startTime": "2026-04-15T23:17:15Z",
                "steps": [
                    {
                        "container": "step-skip-ta",
                        "imageID": "registry.access.redhat.com/ubi9/ubi-minimal@sha256:83006d535923fcf1345067873524a3980316f51794f01d8655be55d6e9387183",
                        "name": "skip-ta",
                        "terminated": {
                            "containerID": "cri-o://63eac25312eb57c7de34ffb7f0f32540683bf890fa9df95e8d22be7ff4c351e5",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:17:32Z",
                            "message": "[{\"key\":\"CACHI2_ARTIFACT\",\"value\":\"\",\"type\":1},{\"key\":\"SOURCE_ARTIFACT\",\"value\":\"oci:quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:7098d15e5ce4e4693bb0f592ef5340eebb08977048de58dd24fcb634390ccfaa\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:17:32Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-use-trusted-artifact",
                        "imageID": "quay.io/konflux-ci/build-trusted-artifacts@sha256:6ee5ae7d29b718eb3c69e55f1ec3a3264bc1a03ba398b2e1f34c7a20af1720d1",
                        "name": "use-trusted-artifact",
                        "terminated": {
                            "containerID": "cri-o://f3c69c19cd5b83c8c6674a766a04073e0e2e385442353e40efd47e3280295fb3",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:17:32Z",
                            "message": "[{\"key\":\"CACHI2_ARTIFACT\",\"value\":\"\",\"type\":1},{\"key\":\"SOURCE_ARTIFACT\",\"value\":\"oci:quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:7098d15e5ce4e4693bb0f592ef5340eebb08977048de58dd24fcb634390ccfaa\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:17:32Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-prefetch-dependencies",
                        "imageID": "quay.io/konflux-ci/hermeto@sha256:0101888c066cc428dbbe87f91752e6208cdfdce5e68f6d7b1a773ec281870784",
                        "name": "prefetch-dependencies",
                        "terminated": {
                            "containerID": "cri-o://0f07f0f763b511d3ad0485c5b625dc467676d9bab9158efe98fa5d2f234e5c2d",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:17:51Z",
                            "message": "[{\"key\":\"CACHI2_ARTIFACT\",\"value\":\"\",\"type\":1},{\"key\":\"SOURCE_ARTIFACT\",\"value\":\"oci:quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:7098d15e5ce4e4693bb0f592ef5340eebb08977048de58dd24fcb634390ccfaa\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:17:33Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-create-trusted-artifact",
                        "imageID": "quay.io/konflux-ci/build-trusted-artifacts@sha256:6ee5ae7d29b718eb3c69e55f1ec3a3264bc1a03ba398b2e1f34c7a20af1720d1",
                        "name": "create-trusted-artifact",
                        "terminated": {
                            "containerID": "cri-o://2cc4466d1aa433eb117901c5333096e411b92ed14cfe49e82104b502dac59789",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:17:52Z",
                            "message": "[{\"key\":\"CACHI2_ARTIFACT\",\"value\":\"\",\"type\":1},{\"key\":\"SOURCE_ARTIFACT\",\"value\":\"oci:quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:7098d15e5ce4e4693bb0f592ef5340eebb08977048de58dd24fcb634390ccfaa\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:17:52Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Task that prefetches project dependencies for hermetic build.",
                    "params": [
                        {
                            "default": "activation-key",
                            "description": "Name of secret which contains subscription activation key",
                            "name": "ACTIVATION_KEY",
                            "type": "string"
                        },
                        {
                            "description": "The Trusted Artifact URI pointing to the artifact with the application source code.",
                            "name": "SOURCE_ARTIFACT",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data.",
                            "name": "caTrustConfigMapKey",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from.",
                            "name": "caTrustConfigMapName",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Pass configuration to the prefetch tool.\nNote this needs to be passed as a YAML-formatted config dump, not as a file path!\n",
                            "name": "config-file-content",
                            "type": "string"
                        },
                        {
                            "description": "Configures project packages that will have their dependencies prefetched.",
                            "name": "input",
                            "type": "string"
                        },
                        {
                            "default": "debug",
                            "description": "Set the logging level (debug, info, warn, error, fatal).",
                            "name": "log-level",
                            "type": "string"
                        },
                        {
                            "default": "strict",
                            "description": "Control how input requirement violations are handled: strict (errors) or permissive (warnings).",
                            "name": "mode",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Expiration date for the trusted artifacts created in the OCI repository. An empty string means the artifacts do not expire.",
                            "name": "ociArtifactExpiresAfter",
                            "type": "string"
                        },
                        {
                            "description": "The OCI repository where the Trusted Artifacts are stored.",
                            "name": "ociStorage",
                            "type": "string"
                        },
                        {
                            "default": "spdx",
                            "description": "Select the SBOM format to generate. Valid values: spdx, cyclonedx.",
                            "name": "sbom-type",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "The Trusted Artifact URI pointing to the artifact with the prefetched dependencies.",
                            "name": "CACHI2_ARTIFACT",
                            "type": "string"
                        },
                        {
                            "description": "The Trusted Artifact URI pointing to the artifact with the application source code.",
                            "name": "SOURCE_ARTIFACT",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "volumeMounts": [
                            {
                                "mountPath": "/var/workdir",
                                "name": "workdir"
                            }
                        ]
                    },
                    "steps": [
                        {
                            "computeResources": {},
                            "env": [
                                {
                                    "name": "INPUT"
                                },
                                {
                                    "name": "SOURCE_ARTIFACT",
                                    "value": "oci:quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:7098d15e5ce4e4693bb0f592ef5340eebb08977048de58dd24fcb634390ccfaa"
                                }
                            ],
                            "image": "registry.access.redhat.com/ubi9/ubi-minimal:9.7-1773939694@sha256:83006d535923fcf1345067873524a3980316f51794f01d8655be55d6e9387183",
                            "name": "skip-ta",
                            "script": "#!/bin/bash\n\nif [ -z \"${INPUT}\" ]; then\n  mkdir -p /var/workdir/source\n  mkdir -p /var/workdir/cachi2\n  echo \"true\" \u003e/var/workdir/source/.skip-trusted-artifacts\n  echo \"true\" \u003e/var/workdir/cachi2/.skip-trusted-artifacts\n  echo -n \"${SOURCE_ARTIFACT}\" \u003e\"/tekton/results/SOURCE_ARTIFACT\"\n  echo -n \"\" \u003e\"/tekton/results/CACHI2_ARTIFACT\"\nfi\n"
                        },
                        {
                            "args": [
                                "use",
                                "oci:quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:7098d15e5ce4e4693bb0f592ef5340eebb08977048de58dd24fcb634390ccfaa=/var/workdir/source"
                            ],
                            "computeResources": {},
                            "image": "quay.io/konflux-ci/build-trusted-artifacts:latest@sha256:6ee5ae7d29b718eb3c69e55f1ec3a3264bc1a03ba398b2e1f34c7a20af1720d1",
                            "name": "use-trusted-artifact"
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "KBC_LOG_LEVEL",
                                    "value": "debug"
                                },
                                {
                                    "name": "KBC_PD_INPUT"
                                },
                                {
                                    "name": "KBC_PD_SOURCE_DIR",
                                    "value": "/var/workdir/source"
                                },
                                {
                                    "name": "KBC_PD_OUTPUT_DIR",
                                    "value": "/var/workdir/cachi2/output"
                                },
                                {
                                    "name": "KBC_PD_SBOM_FORMAT",
                                    "value": "spdx"
                                },
                                {
                                    "name": "KBC_PD_MODE",
                                    "value": "strict"
                                },
                                {
                                    "name": "KBC_PD_OUTPUT_DIR_MOUNT_POINT",
                                    "value": "/cachi2/output"
                                },
                                {
                                    "name": "KBC_PD_ENV_FILE",
                                    "value": "/var/workdir/cachi2/cachi2.env"
                                },
                                {
                                    "name": "KBC_PD_GIT_AUTH_DIRECTORY",
                                    "value": "/workspace/git-basic-auth"
                                },
                                {
                                    "name": "WORKSPACE_NETRC_PATH"
                                },
                                {
                                    "name": "CONFIG_FILE_CONTENT"
                                }
                            ],
                            "image": "quay.io/konflux-ci/hermeto:0.48.0@sha256:105b953463a203b82223cc54fb466ee0395ae9cca67bcdbbcbec4c340d511f26",
                            "name": "prefetch-dependencies",
                            "script": "#!/bin/bash\n\nif [ -n \"${WORKSPACE_NETRC_PATH}\" ]; then\n  export NETRC=\"${WORKSPACE_NETRC_PATH}/.netrc\"\nfi\n\nCA_BUNDLE_PATH=/mnt/trusted-ca/ca-bundle.crt\nif [ -f \"$CA_BUNDLE_PATH\" ]; then\n  cp -vf \"$CA_BUNDLE_PATH\" /etc/pki/ca-trust/source/anchors\n  update-ca-trust\nfi\n\nif [ -e /activation-key/org ] \u0026\u0026 [ -e /activation-key/activationkey ]; then\n  export KBC_PD_RHSM_ORG=/activation-key/org\n  export KBC_PD_RHSM_ACTIVATION_KEY=/activation-key/activationkey\nfi\n\nif [ -n \"${CONFIG_FILE_CONTENT}\" ]; then\n  echo \"${CONFIG_FILE_CONTENT}\" \u003e/mnt/config/config.yaml\n  export KBC_PD_CONFIG_FILE=/mnt/config/config.yaml\nfi\n\nkonflux-build-cli prefetch-dependencies\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/activation-key",
                                    "name": "activation-key"
                                },
                                {
                                    "mountPath": "/mnt/config",
                                    "name": "config"
                                },
                                {
                                    "mountPath": "/mnt/trusted-ca",
                                    "name": "trusted-ca",
                                    "readOnly": true
                                }
                            ]
                        },
                        {
                            "args": [
                                "create",
                                "--store",
                                "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9.prefetch",
                                "/tekton/results/SOURCE_ARTIFACT=/var/workdir/source",
                                "/tekton/results/CACHI2_ARTIFACT=/var/workdir/cachi2"
                            ],
                            "computeResources": {
                                "limits": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "IMAGE_EXPIRES_AFTER"
                                }
                            ],
                            "image": "quay.io/konflux-ci/build-trusted-artifacts:latest@sha256:6ee5ae7d29b718eb3c69e55f1ec3a3264bc1a03ba398b2e1f34c7a20af1720d1",
                            "name": "create-trusted-artifact"
                        }
                    ],
                    "volumes": [
                        {
                            "name": "activation-key",
                            "secret": {
                                "optional": true,
                                "secretName": "activation-key"
                            }
                        },
                        {
                            "emptyDir": {},
                            "name": "config"
                        },
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        },
                        {
                            "emptyDir": {},
                            "name": "workdir"
                        }
                    ],
                    "workspaces": [
                        {
                            "description": "A Workspace containing a .gitconfig and .git-credentials file or username and password.\nThese will be copied to the user's home before prefetch is run. Any\nother files in this Workspace are ignored. It is strongly recommended\nto bind a Secret to this Workspace over other volume types.\n",
                            "name": "git-basic-auth",
                            "optional": true
                        },
                        {
                            "description": "Workspace containing a .netrc file. Prefetch will use the credentials in this file when\nperforming http(s) requests.\n",
                            "name": "netrc",
                            "optional": true
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.openshift.io/repo": "https://github.com/rhads-tsf-qe/testrepo?rev=8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "build.appstudio.redhat.com/commit_sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "build.appstudio.redhat.com/target_branch": "base-miwkfv",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=29",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "pipelinesascode.tekton.dev/branch": "base-miwkfv",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552493202",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-ojyaao",
                    "pipelinesascode.tekton.dev/git-provider": "github",
                    "pipelinesascode.tekton.dev/installation-id": "112348674",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-push-cttl8",
                    "pipelinesascode.tekton.dev/max-keep-runs": "3",
                    "pipelinesascode.tekton.dev/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-miwkfv\"",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-ci-tests-bot",
                    "pipelinesascode.tekton.dev/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pipelinesascode.tekton.dev/sha-title": "Merge pull request #181 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pipelinesascode.tekton.dev/source-branch": "refs/heads/base-miwkfv",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-tenant/results/61ce9ab9-21e3-414b-b0da-d05b30fbea57/records/deb1e5c6-028f-4adc-8a14-05386e76b3bf",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"testrepo\",\"commit\":\"8a419f9b1a920375f8112c9b7477d42bbd82b6c9\",\"eventType\":\"push\"}",
                    "results.tekton.dev/result": "default-tenant/results/61ce9ab9-21e3-414b-b0da-d05b30fbea57",
                    "results.tekton.dev/stored": "true"
                },
                "creationTimestamp": "2026-04-15T23:20:48Z",
                "finalizers": [
                    "chains.tekton.dev",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/version": "v0.37.7",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/component": "tsf-demo-comp",
                    "pipelines.appstudio.openshift.io/type": "build",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552493202",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "tsf-demo-comp-on-push-cttl8",
                    "tekton.dev/pipelineRun": "tsf-demo-comp-on-push-cttl8",
                    "tekton.dev/pipelineRunUID": "61ce9ab9-21e3-414b-b0da-d05b30fbea57",
                    "tekton.dev/pipelineTask": "rpms-signature-scan",
                    "tekton.dev/task": "rpms-signature-scan"
                },
                "name": "tsf-demo-comp-on-push-cttl8-rpms-signature-scan",
                "namespace": "default-tenant",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "tsf-demo-comp-on-push-cttl8",
                        "uid": "61ce9ab9-21e3-414b-b0da-d05b30fbea57"
                    }
                ],
                "resourceVersion": "38499",
                "uid": "deb1e5c6-028f-4adc-8a14-05386e76b3bf"
            },
            "spec": {
                "params": [
                    {
                        "name": "image-url",
                        "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9"
                    },
                    {
                        "name": "image-digest",
                        "value": "sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5"
                    }
                ],
                "serviceAccountName": "build-pipeline-tsf-demo-comp",
                "taskRef": {
                    "params": [
                        {
                            "name": "name",
                            "value": "rpms-signature-scan"
                        },
                        {
                            "name": "bundle",
                            "value": "quay.io/konflux-ci/tekton-catalog/task-rpms-signature-scan:0.2@sha256:47b81d6b3d752649eddfbb8b3fd8f6522c4bb07f6d1946f9bc45dae3f92e2c9a"
                        },
                        {
                            "name": "kind",
                            "value": "task"
                        }
                    ],
                    "resolver": "bundles"
                },
                "timeout": "1h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:21:51Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:21:51Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "tsf-demo-comp-on-push-cttl8-rpms-signature-scan-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha256": "47b81d6b3d752649eddfbb8b3fd8f6522c4bb07f6d1946f9bc45dae3f92e2c9a"
                        },
                        "entryPoint": "rpms-signature-scan",
                        "uri": "quay.io/konflux-ci/tekton-catalog/task-rpms-signature-scan"
                    }
                },
                "results": [
                    {
                        "name": "IMAGES_PROCESSED",
                        "type": "string",
                        "value": "{\"image\": {\"pullspec\": \"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9\", \"digests\": [\"sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5\"]}}\n"
                    },
                    {
                        "name": "RPMS_DATA",
                        "type": "string",
                        "value": "{\"keys\": {\"199e2f91fd431d51\": 183, \"unsigned\": 0}}\n"
                    },
                    {
                        "name": "TEST_OUTPUT",
                        "type": "string",
                        "value": "{\"result\":\"SUCCESS\",\"timestamp\":\"2026-04-15T23:21:50+00:00\",\"note\":\"Task rpms-signature-scan completed successfully\",\"namespace\":\"default\",\"successes\":0,\"failures\":0,\"warnings\":0}\n"
                    }
                ],
                "startTime": "2026-04-15T23:20:49Z",
                "steps": [
                    {
                        "container": "step-rpms-signature-scan",
                        "imageID": "quay.io/konflux-ci/tools@sha256:c677979dbad26c7b95e502ef62548beaf805607b691ba0d26ff488fd394fb215",
                        "name": "rpms-signature-scan",
                        "terminated": {
                            "containerID": "cri-o://df732bde4dd91b98c38555c2096654f938f774a27565d401234c71226b33748a",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:21:50Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:21:35Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-output-results",
                        "imageID": "quay.io/konflux-ci/konflux-test@sha256:c7e2099ad87d4c65284cba5df8488eae64d16ea0baff344c549ed7ca2415ebce",
                        "name": "output-results",
                        "terminated": {
                            "containerID": "cri-o://298f5613bfc3532d89b14205ba05f29f1a4db7fae7b6196f83079da2e84f8533",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:21:51Z",
                            "message": "[{\"key\":\"IMAGES_PROCESSED\",\"value\":\"{\\\"image\\\": {\\\"pullspec\\\": \\\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9\\\", \\\"digests\\\": [\\\"sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5\\\"]}}\\n\",\"type\":1},{\"key\":\"RPMS_DATA\",\"value\":\"{\\\"keys\\\": {\\\"199e2f91fd431d51\\\": 183, \\\"unsigned\\\": 0}}\\n\",\"type\":1},{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"result\\\":\\\"SUCCESS\\\",\\\"timestamp\\\":\\\"2026-04-15T23:21:50+00:00\\\",\\\"note\\\":\\\"Task rpms-signature-scan completed successfully\\\",\\\"namespace\\\":\\\"default\\\",\\\"successes\\\":0,\\\"failures\\\":0,\\\"warnings\\\":0}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:21:50Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Scans RPMs in an image and provide information about RPMs signatures.",
                    "params": [
                        {
                            "description": "Image URL",
                            "name": "image-url",
                            "type": "string"
                        },
                        {
                            "description": "Image digest to scan",
                            "name": "image-digest",
                            "type": "string"
                        },
                        {
                            "default": "/tmp",
                            "description": "Directory that will be used for storing temporary\nfiles produced by this task.\n",
                            "name": "workdir",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from.",
                            "name": "ca-trust-config-map-name",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data.",
                            "name": "ca-trust-config-map-key",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Tekton task test output.",
                            "name": "TEST_OUTPUT",
                            "type": "string"
                        },
                        {
                            "description": "Information about signed and unsigned RPMs",
                            "name": "RPMS_DATA",
                            "type": "string"
                        },
                        {
                            "description": "Images processed in the task.",
                            "name": "IMAGES_PROCESSED",
                            "type": "string"
                        }
                    ],
                    "steps": [
                        {
                            "computeResources": {
                                "limits": {
                                    "cpu": "200m",
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "200m",
                                    "memory": "256Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "IMAGE_URL",
                                    "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9"
                                },
                                {
                                    "name": "IMAGE_DIGEST",
                                    "value": "sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5"
                                },
                                {
                                    "name": "WORKDIR",
                                    "value": "/tmp"
                                }
                            ],
                            "image": "quay.io/konflux-ci/tools@sha256:c677979dbad26c7b95e502ef62548beaf805607b691ba0d26ff488fd394fb215",
                            "name": "rpms-signature-scan",
                            "script": "#!/bin/bash\nset -ex\nset -o pipefail\n\nrpm_verifier \\\n  --image-url \"${IMAGE_URL}\" \\\n  --image-digest \"${IMAGE_DIGEST}\" \\\n  --workdir \"${WORKDIR}\" \\\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/tmp",
                                    "name": "workdir"
                                },
                                {
                                    "mountPath": "/etc/pki/tls/certs/ca-custom-bundle.crt",
                                    "name": "trusted-ca",
                                    "readOnly": true,
                                    "subPath": "ca-bundle.crt"
                                }
                            ]
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "cpu": "50m",
                                    "memory": "32Mi"
                                },
                                "requests": {
                                    "cpu": "50m",
                                    "memory": "32Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "WORKDIR",
                                    "value": "/tmp"
                                }
                            ],
                            "image": "quay.io/konflux-ci/konflux-test:v1.4.46@sha256:c7e2099ad87d4c65284cba5df8488eae64d16ea0baff344c549ed7ca2415ebce",
                            "name": "output-results",
                            "script": "#!/bin/bash\nset -ex\n\nsource /utils.sh\nstatus=$(cat \"${WORKDIR}\"/status)\nrpms_data=$(cat \"${WORKDIR}\"/results)\nimages_processed=$(cat \"${WORKDIR}\"/images_processed)\n\nif [ \"$status\" == \"ERROR\" ]; then\n  note=\"Task rpms-signature-scan failed to scan images. Refer to Tekton task output for details\"\nelse\n  note=\"Task rpms-signature-scan completed successfully\"\nfi\n\nTEST_OUTPUT=$(make_result_json -r \"$status\" -t \"$note\")\n\necho \"${TEST_OUTPUT}\" | tee \"/tekton/results/TEST_OUTPUT\"\necho \"${rpms_data}\" | tee \"/tekton/results/RPMS_DATA\"\necho \"${images_processed}\" | tee \"/tekton/results/IMAGES_PROCESSED\"\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/tmp",
                                    "name": "workdir"
                                }
                            ]
                        }
                    ],
                    "volumes": [
                        {
                            "emptyDir": {},
                            "name": "workdir"
                        },
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.openshift.io/repo": "https://github.com/rhads-tsf-qe/testrepo?rev=8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "build.appstudio.redhat.com/commit_sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "build.appstudio.redhat.com/target_branch": "base-miwkfv",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=26",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "pipelinesascode.tekton.dev/branch": "base-miwkfv",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552493202",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-ojyaao",
                    "pipelinesascode.tekton.dev/git-provider": "github",
                    "pipelinesascode.tekton.dev/installation-id": "112348674",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-push-cttl8",
                    "pipelinesascode.tekton.dev/max-keep-runs": "3",
                    "pipelinesascode.tekton.dev/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-miwkfv\"",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-ci-tests-bot",
                    "pipelinesascode.tekton.dev/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pipelinesascode.tekton.dev/sha-title": "Merge pull request #181 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pipelinesascode.tekton.dev/source-branch": "refs/heads/base-miwkfv",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-tenant/results/61ce9ab9-21e3-414b-b0da-d05b30fbea57/records/d1d21b5f-e000-44ad-9d3a-25f1ec904f3f",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"testrepo\",\"commit\":\"8a419f9b1a920375f8112c9b7477d42bbd82b6c9\",\"eventType\":\"push\"}",
                    "results.tekton.dev/result": "default-tenant/results/61ce9ab9-21e3-414b-b0da-d05b30fbea57",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "konflux"
                },
                "creationTimestamp": "2026-04-15T23:20:48Z",
                "finalizers": [
                    "chains.tekton.dev",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/version": "v0.37.7",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/component": "tsf-demo-comp",
                    "pipelines.appstudio.openshift.io/type": "build",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552493202",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "tsf-demo-comp-on-push-cttl8",
                    "tekton.dev/pipelineRun": "tsf-demo-comp-on-push-cttl8",
                    "tekton.dev/pipelineRunUID": "61ce9ab9-21e3-414b-b0da-d05b30fbea57",
                    "tekton.dev/pipelineTask": "sast-shell-check",
                    "tekton.dev/task": "sast-shell-check-oci-ta-min"
                },
                "name": "tsf-demo-comp-on-push-cttl8-sast-shell-check",
                "namespace": "default-tenant",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "tsf-demo-comp-on-push-cttl8",
                        "uid": "61ce9ab9-21e3-414b-b0da-d05b30fbea57"
                    }
                ],
                "resourceVersion": "38031",
                "uid": "d1d21b5f-e000-44ad-9d3a-25f1ec904f3f"
            },
            "spec": {
                "params": [
                    {
                        "name": "image-digest",
                        "value": "sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5"
                    },
                    {
                        "name": "image-url",
                        "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9"
                    },
                    {
                        "name": "SOURCE_ARTIFACT",
                        "value": "oci:quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:7098d15e5ce4e4693bb0f592ef5340eebb08977048de58dd24fcb634390ccfaa"
                    },
                    {
                        "name": "CACHI2_ARTIFACT",
                        "value": ""
                    }
                ],
                "serviceAccountName": "build-pipeline-tsf-demo-comp",
                "taskRef": {
                    "params": [
                        {
                            "name": "name",
                            "value": "sast-shell-check-oci-ta-min"
                        },
                        {
                            "name": "bundle",
                            "value": "quay.io/konflux-ci/tekton-catalog/task-sast-shell-check-oci-ta-min:0.1@sha256:fa19753f59288a397aab2ddb9459f35f0ec1b89f43c36e944a3958db72becb5a"
                        },
                        {
                            "name": "kind",
                            "value": "task"
                        }
                    ],
                    "resolver": "bundles"
                },
                "timeout": "1h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:21:04Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:21:04Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "tsf-demo-comp-on-push-cttl8-sast-shell-check-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha256": "fa19753f59288a397aab2ddb9459f35f0ec1b89f43c36e944a3958db72becb5a"
                        },
                        "entryPoint": "sast-shell-check-oci-ta-min",
                        "uri": "quay.io/konflux-ci/tekton-catalog/task-sast-shell-check-oci-ta-min"
                    }
                },
                "results": [
                    {
                        "name": "TEST_OUTPUT",
                        "type": "string",
                        "value": "{\"result\":\"SUCCESS\",\"timestamp\":\"2026-04-15T23:21:00+00:00\",\"note\":\"For details, check Tekton task log.\",\"namespace\":\"default\",\"successes\":0,\"failures\":0,\"warnings\":0}\n"
                    }
                ],
                "startTime": "2026-04-15T23:20:48Z",
                "steps": [
                    {
                        "container": "step-use-trusted-artifact",
                        "imageID": "quay.io/konflux-ci/build-trusted-artifacts@sha256:ab064e9763b62d99da5ee9653370da86ffd9d3e770e1aad7a935e88b64a0b6ac",
                        "name": "use-trusted-artifact",
                        "terminated": {
                            "containerID": "cri-o://c73fb414bfaed828f9748412ceeeb0f495612424d2c9bff0d1a5634b1e1781f9",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:20:54Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:20:53Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-sast-shell-check",
                        "imageID": "quay.io/konflux-ci/konflux-test@sha256:169f73f80fbde8d54f42416c5de8cc9214ecc7e8c89c70a3385285bbac32ad0a",
                        "name": "sast-shell-check",
                        "terminated": {
                            "containerID": "cri-o://62493180a339d2cb0efbc59c3188a8afb592ddc6188020a4c41bc0734e5ef233",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:21:01Z",
                            "message": "[{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"result\\\":\\\"SUCCESS\\\",\\\"timestamp\\\":\\\"2026-04-15T23:21:00+00:00\\\",\\\"note\\\":\\\"For details, check Tekton task log.\\\",\\\"namespace\\\":\\\"default\\\",\\\"successes\\\":0,\\\"failures\\\":0,\\\"warnings\\\":0}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:20:55Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-upload",
                        "imageID": "quay.io/konflux-ci/oras@sha256:180b50c7be50c20e3349a79df8dd6062fee0e0dd01aa30e9a09d1d07d9ebd0c2",
                        "name": "upload",
                        "terminated": {
                            "containerID": "cri-o://1bfa3e625b5e00445615a034f3f9cf0ecc74c633e0ce53da2238913dded84cbf",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:21:03Z",
                            "message": "[{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"result\\\":\\\"SUCCESS\\\",\\\"timestamp\\\":\\\"2026-04-15T23:21:00+00:00\\\",\\\"note\\\":\\\"For details, check Tekton task log.\\\",\\\"namespace\\\":\\\"default\\\",\\\"successes\\\":0,\\\"failures\\\":0,\\\"warnings\\\":0}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:21:01Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "The sast-shell-check task uses [shellcheck](https://www.shellcheck.net/) tool to perform Static Application Security Testing (SAST), a popular cloud-native application security platform. This task leverages the shellcheck wrapper (csmock-plugin-shellcheck-core) to run shellcheck on a directory tree.\nShellCheck is a static analysis tool, gives warnings and suggestions for bash/sh shell scripts. This task can run on x86 and arm.",
                    "params": [
                        {
                            "default": "",
                            "description": "The Trusted Artifact URI pointing to the artifact with the prefetched dependencies.",
                            "name": "CACHI2_ARTIFACT",
                            "type": "string"
                        },
                        {
                            "default": "true",
                            "description": "Whether to include important findings only",
                            "name": "IMP_FINDINGS_ONLY",
                            "type": "string"
                        },
                        {
                            "default": "SITE_DEFAULT",
                            "description": "Known False Positives (KFP) git URL (optionally taking a revision delimited by \\#). Defaults to \"SITE_DEFAULT\", which means the default value \"https://gitlab.cee.redhat.com/osh/known-false-positives.git\" for internal Konflux instance and empty string for external Konflux instance. If set to an empty string, the KFP filtering is disabled.",
                            "name": "KFP_GIT_URL",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Name of the scanned project, used to find path exclusions. By default, the Konflux component name will be used.",
                            "name": "PROJECT_NAME",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Whether to record the excluded findings (default to false).\nIf `true`, the excluded findings will be stored in `excluded-findings.json`.\n",
                            "name": "RECORD_EXCLUDED",
                            "type": "string"
                        },
                        {
                            "description": "The Trusted Artifact URI pointing to the artifact with the application source code.",
                            "name": "SOURCE_ARTIFACT",
                            "type": "string"
                        },
                        {
                            "default": ".",
                            "description": "Target directories in component's source code. Multiple values should be separated with commas.",
                            "name": "TARGET_DIRS",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data.",
                            "name": "caTrustConfigMapKey",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from.",
                            "name": "caTrustConfigMapName",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Image digest to report findings for.",
                            "name": "image-digest",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Image URL.",
                            "name": "image-url",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Tekton task test output.",
                            "name": "TEST_OUTPUT",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "volumeMounts": [
                            {
                                "mountPath": "/var/workdir",
                                "name": "workdir"
                            }
                        ]
                    },
                    "steps": [
                        {
                            "args": [
                                "use",
                                "oci:quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:7098d15e5ce4e4693bb0f592ef5340eebb08977048de58dd24fcb634390ccfaa=/var/workdir/source",
                                "=/var/workdir/cachi2"
                            ],
                            "computeResources": {},
                            "image": "quay.io/konflux-ci/build-trusted-artifacts:latest@sha256:ab064e9763b62d99da5ee9653370da86ffd9d3e770e1aad7a935e88b64a0b6ac",
                            "name": "use-trusted-artifact",
                            "volumeMounts": [
                                {
                                    "mountPath": "/etc/pki/tls/certs/ca-custom-bundle.crt",
                                    "name": "trusted-ca",
                                    "readOnly": true,
                                    "subPath": "ca-bundle.crt"
                                }
                            ]
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "cpu": "128m",
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "128m",
                                    "memory": "256Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "KFP_GIT_URL",
                                    "value": "SITE_DEFAULT"
                                },
                                {
                                    "name": "PROJECT_NAME"
                                },
                                {
                                    "name": "RECORD_EXCLUDED",
                                    "value": "false"
                                },
                                {
                                    "name": "IMP_FINDINGS_ONLY",
                                    "value": "true"
                                },
                                {
                                    "name": "TARGET_DIRS",
                                    "value": "."
                                },
                                {
                                    "name": "COMPONENT_LABEL",
                                    "valueFrom": {
                                        "fieldRef": {
                                            "fieldPath": "metadata.labels['appstudio.openshift.io/component']"
                                        }
                                    }
                                },
                                {
                                    "name": "BUILD_PLR_LOG_URL",
                                    "valueFrom": {
                                        "fieldRef": {
                                            "fieldPath": "metadata.annotations['pipelinesascode.tekton.dev/log-url']"
                                        }
                                    }
                                }
                            ],
                            "image": "quay.io/konflux-ci/konflux-test:v1.4.51@sha256:169f73f80fbde8d54f42416c5de8cc9214ecc7e8c89c70a3385285bbac32ad0a",
                            "name": "sast-shell-check",
                            "script": "#!/usr/bin/env bash\nset -x\n# shellcheck source=/dev/null\nsource /utils.sh\ntrap 'handle_error /tekton/results/TEST_OUTPUT' EXIT\n\nif [[ -z \"${PROJECT_NAME}\" ]]; then\n  PROJECT_NAME=${COMPONENT_LABEL}\nfi\n\necho \"INFO: The PROJECT_NAME used is: ${PROJECT_NAME}\"\n\nca_bundle=/mnt/trusted-ca/ca-bundle.crt\nif [ -f \"$ca_bundle\" ]; then\n  echo \"INFO: Using mounted CA bundle: $ca_bundle\"\n  cp -vf $ca_bundle /etc/pki/ca-trust/source/anchors\n  update-ca-trust\nfi\n\nPACKAGE_VERSION=$(rpm -q --queryformat '%{NAME}-%{VERSION}-%{RELEASE}\\n' ShellCheck)\n\nOUTPUT_FILE=\"shellcheck-results.json\"\nSOURCE_CODE_DIR=/var/workdir/source\n\n# generate full path for each dirname separated by comma\ndeclare -a ALL_TARGETS\nIFS=\",\" read -ra TARGET_ARRAY \u003c\u003c\u003c\"$TARGET_DIRS\"\nfor d in \"${TARGET_ARRAY[@]}\"; do\n  potential_path=\"${SOURCE_CODE_DIR}/${d}\"\n\n  resolved_path=$(realpath -m \"$potential_path\")\n\n  # ensure resolved path is still within SOURCE_CODE_DIR\n  if [[ \"$resolved_path\" == \"$SOURCE_CODE_DIR\"* ]]; then\n    ALL_TARGETS+=(\"$resolved_path\")\n  else\n    echo \"Error: path traversal attempt, '$potential_path' is outside '$SOURCE_CODE_DIR'\"\n    exit 1\n  fi\ndone\n\n# determine number of available CPU cores for shellcheck based on container cgroup v2 CPU limits\n# this calculates the ceiling, so if the cpu limit is 0.5, the number of jobs will be 1.\nif [ -z \"$SC_JOBS\" ] \u0026\u0026 [ -r \"/sys/fs/cgroup/cpu.max\" ]; then\n  read -r quota period \u003c/sys/fs/cgroup/cpu.max\n  if [ \"$quota\" != \"max\" ] \u0026\u0026 [ -n \"$period\" ] \u0026\u0026 [ \"$period\" -gt 0 ]; then\n    export SC_JOBS=$(((quota + period - 1) / period))\n    echo \"INFO: Setting SC_JOBS=${SC_JOBS} based on cgroups v2 max for run-shellcheck.sh\"\n  fi\nfi\n\n# generate all shellcheck result JSON files to $SC_RESULTS_DIR, which defaults to ./shellcheck-results/\n/usr/share/csmock/scripts/run-shellcheck.sh \"${ALL_TARGETS[@]}\"\n\nCSGREP_OPTS=(\n  --mode=json\n  --strip-path-prefix=\"$SOURCE_CODE_DIR\"/\n  --remove-duplicates\n  --embed-context=3\n  --set-scan-prop=\"ShellCheck:${PACKAGE_VERSION}\"\n)\nif [[ \"$IMP_FINDINGS_ONLY\" == \"true\" ]]; then\n  # predefined list of shellcheck important findings\n  CSGREP_EVENT_FILTER='\\[SC(1020|1035|1054|1066|1068|1073|1080|1083|1099|1113|1115|1127|1128|1143|2043|2050|'\n  CSGREP_EVENT_FILTER+='2055|2057|2066|2069|2071|2077|2078|2091|2092|2157|2171|2193|2194|2195|2215|2216|'\n  CSGREP_EVENT_FILTER+='2218|2224|2225|2242|2256|2258|2261)\\]$'\n  CSGREP_OPTS+=(\n    --event=\"$CSGREP_EVENT_FILTER\"\n  )\nelse\n  CSGREP_OPTS+=(\n    --event=\"error|warning\"\n  )\nfi\n\nif ! csgrep \"${CSGREP_OPTS[@]}\" ./shellcheck-results/*.json \u003e\"$OUTPUT_FILE\"; then\n  echo \"Error occurred while running 'run-shellcheck.sh'\"\n  note=\"Task sast-shell-check-oci-ta-min failed: For details, check Tekton task log.\"\n  ERROR_OUTPUT=$(make_result_json -r ERROR -t \"$note\")\n  echo \"${ERROR_OUTPUT}\" | tee \"/tekton/results/TEST_OUTPUT\"\n  exit 1\nfi\n\nif [[ \"${KFP_GIT_URL}\" == \"SITE_DEFAULT\" ]]; then\n  KFP_GIT_URL=\"https://gitlab.cee.redhat.com/osh/known-false-positives.git\"\nfi\nPROBE_URL=\"${KFP_GIT_URL%.git}\" # trims '.git' suffix\n\n# create the KFP clone directory regardless\nKFP_DIR=\"known-false-positives\"\nKFP_CLONED=\"0\"\nmkdir \"${KFP_DIR}\"\n\n# We check if the KFP_GIT_URL variable is set to clone and apply the filters or not\nif [[ -n \"${KFP_GIT_URL}\" ]]; then\n  # Default location only reachable from internal Konflux instances, check reachable first\n  echo -n \"INFO: Probing ${PROBE_URL}... \"\n  if curl --fail --head --max-time 60 --no-progress-meter \"${PROBE_URL}\" \u003e \u003e(head -1); then\n    echo \"INFO: Trying to clone known-false-positives..\"\n    git clone \"${KFP_GIT_URL}\" \"${KFP_DIR}\" \u0026\u0026 KFP_CLONED=\"1\"\n  fi\nfi\n\nif [[ \"${KFP_CLONED}\" -eq \"0\" ]]; then\n  echo \"WARN: Failed to clone known-false-positives at ${KFP_GIT_URL}, scan results will not be filtered\"\nelse\n  echo \"INFO: Filtering false positives in results files using csfilter-kfp...\"\n\n  # build initial csfilter-kfp command\n  csfilter_kfp_cmd=(\n    csfilter-kfp\n    --verbose\n    --kfp-dir=\"${KFP_DIR}\"\n    --project-nvr=\"${PROJECT_NAME}\"\n  )\n\n  if [[ \"${RECORD_EXCLUDED}\" == \"true\" ]]; then\n    csfilter_kfp_cmd+=(--record-excluded=\"excluded-findings.json\")\n  fi\n\n  # Execute the command and capture any errors\n  set +e\n  \"${csfilter_kfp_cmd[@]}\" \"${OUTPUT_FILE}\" \u003e\"${OUTPUT_FILE}.filtered\" 2\u003e\"${OUTPUT_FILE}.error\"\n  status=$?\n  set -e\n  if [ \"$status\" -ne 0 ]; then\n    echo \"WARN: failed to filter known false positives\" \u003e\u00262\n  else\n    mv \"${OUTPUT_FILE}.filtered\" \"$OUTPUT_FILE\"\n    echo \"INFO: Succeeded filtering known false positives\" \u003e\u00262\n  fi\nfi\n\necho \"ShellCheck results have been saved to $OUTPUT_FILE\"\n\ncsgrep --mode=evtstat \"$OUTPUT_FILE\"\ncsgrep --mode=sarif \"$OUTPUT_FILE\" \u003eshellcheck-results.sarif\n\nTEST_OUTPUT=\nparse_test_output \"sast-shell-check-oci-ta-min\" sarif shellcheck-results.sarif || true\necho \"${TEST_OUTPUT}\" | tee \"/tekton/results/TEST_OUTPUT\"\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/mnt/trusted-ca",
                                    "name": "trusted-ca",
                                    "readOnly": true
                                }
                            ],
                            "workingDir": "/var/workdir/source"
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "IMAGE_URL",
                                    "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9"
                                },
                                {
                                    "name": "IMAGE_DIGEST",
                                    "value": "sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5"
                                }
                            ],
                            "image": "quay.io/konflux-ci/oras:latest@sha256:180b50c7be50c20e3349a79df8dd6062fee0e0dd01aa30e9a09d1d07d9ebd0c2",
                            "name": "upload",
                            "script": "#!/usr/bin/env bash\nset -e\n\nif [ -z \"${IMAGE_URL}\" ] || [ -z \"${IMAGE_DIGEST}\" ]; then\n  echo 'No image-url or image-digest param provided. Skipping upload.'\n  exit 0\nfi\n\nUPLOAD_FILES=\"shellcheck-results.sarif excluded-findings.json\"\n\nfor UPLOAD_FILE in ${UPLOAD_FILES}; do\n  if [ ! -f \"${UPLOAD_FILE}\" ]; then\n    echo \"No ${UPLOAD_FILE} exists. Skipping upload.\"\n    continue\n  fi\n\n  # Determine the media type based on the file extension\n  if [[ \"${UPLOAD_FILE}\" == *.json ]]; then\n    MEDIA_TYPE=\"application/json\"\n  else\n    MEDIA_TYPE=\"application/sarif+json\"\n  fi\n\n  echo \"Selecting auth\"\n  select-oci-auth \"$IMAGE_URL\" \u003e\"$HOME/auth.json\"\n  echo \"Attaching to ${IMAGE_URL}\"\n  if ! retry oras attach --no-tty --registry-config \"$HOME/auth.json\" --artifact-type \"${MEDIA_TYPE}\" \"${IMAGE_URL}@${IMAGE_DIGEST}\" \"${UPLOAD_FILE}:${MEDIA_TYPE}\"; then\n    echo \"Failed to attach ${UPLOAD_FILE} to ${IMAGE_URL}\"\n    exit 1\n  fi\ndone\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/etc/pki/tls/certs/ca-custom-bundle.crt",
                                    "name": "trusted-ca",
                                    "readOnly": true,
                                    "subPath": "ca-bundle.crt"
                                }
                            ],
                            "workingDir": "/var/workdir/source"
                        }
                    ],
                    "volumes": [
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        },
                        {
                            "emptyDir": {},
                            "name": "workdir"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.openshift.io/repo": "https://github.com/rhads-tsf-qe/testrepo?rev=8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "build.appstudio.redhat.com/commit_sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "build.appstudio.redhat.com/target_branch": "base-miwkfv",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=25",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "pipelinesascode.tekton.dev/branch": "base-miwkfv",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552493202",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-ojyaao",
                    "pipelinesascode.tekton.dev/git-provider": "github",
                    "pipelinesascode.tekton.dev/installation-id": "112348674",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-push-cttl8",
                    "pipelinesascode.tekton.dev/max-keep-runs": "3",
                    "pipelinesascode.tekton.dev/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-miwkfv\"",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-ci-tests-bot",
                    "pipelinesascode.tekton.dev/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pipelinesascode.tekton.dev/sha-title": "Merge pull request #181 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pipelinesascode.tekton.dev/source-branch": "refs/heads/base-miwkfv",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-tenant/results/61ce9ab9-21e3-414b-b0da-d05b30fbea57/records/2fea9986-3716-413b-ad5f-7b626fcc1ec4",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"testrepo\",\"commit\":\"8a419f9b1a920375f8112c9b7477d42bbd82b6c9\",\"eventType\":\"push\"}",
                    "results.tekton.dev/result": "default-tenant/results/61ce9ab9-21e3-414b-b0da-d05b30fbea57",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "konflux"
                },
                "creationTimestamp": "2026-04-15T23:20:48Z",
                "finalizers": [
                    "chains.tekton.dev",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/version": "v0.37.7",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/component": "tsf-demo-comp",
                    "pipelines.appstudio.openshift.io/type": "build",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552493202",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "tsf-demo-comp-on-push-cttl8",
                    "tekton.dev/pipelineRun": "tsf-demo-comp-on-push-cttl8",
                    "tekton.dev/pipelineRunUID": "61ce9ab9-21e3-414b-b0da-d05b30fbea57",
                    "tekton.dev/pipelineTask": "sast-unicode-check",
                    "tekton.dev/task": "sast-unicode-check-oci-ta-min"
                },
                "name": "tsf-demo-comp-on-push-cttl8-sast-unicode-check",
                "namespace": "default-tenant",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "tsf-demo-comp-on-push-cttl8",
                        "uid": "61ce9ab9-21e3-414b-b0da-d05b30fbea57"
                    }
                ],
                "resourceVersion": "37771",
                "uid": "2fea9986-3716-413b-ad5f-7b626fcc1ec4"
            },
            "spec": {
                "params": [
                    {
                        "name": "image-digest",
                        "value": "sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5"
                    },
                    {
                        "name": "image-url",
                        "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9"
                    },
                    {
                        "name": "SOURCE_ARTIFACT",
                        "value": "oci:quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:7098d15e5ce4e4693bb0f592ef5340eebb08977048de58dd24fcb634390ccfaa"
                    },
                    {
                        "name": "CACHI2_ARTIFACT",
                        "value": ""
                    }
                ],
                "serviceAccountName": "build-pipeline-tsf-demo-comp",
                "taskRef": {
                    "params": [
                        {
                            "name": "name",
                            "value": "sast-unicode-check-oci-ta-min"
                        },
                        {
                            "name": "bundle",
                            "value": "quay.io/konflux-ci/tekton-catalog/task-sast-unicode-check-oci-ta-min:0.4@sha256:624d9ed6d461b59a16d8c1578276626c02fa6d56e0ee4bcd752f7859055f21ab"
                        },
                        {
                            "name": "kind",
                            "value": "task"
                        }
                    ],
                    "resolver": "bundles"
                },
                "timeout": "1h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:20:59Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:20:59Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "tsf-demo-comp-on-push-cttl8-sast-unicode-check-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha256": "624d9ed6d461b59a16d8c1578276626c02fa6d56e0ee4bcd752f7859055f21ab"
                        },
                        "entryPoint": "sast-unicode-check-oci-ta-min",
                        "uri": "quay.io/konflux-ci/tekton-catalog/task-sast-unicode-check-oci-ta-min"
                    }
                },
                "results": [
                    {
                        "name": "TEST_OUTPUT",
                        "type": "string",
                        "value": "{\"result\":\"SUCCESS\",\"timestamp\":\"2026-04-15T23:20:57+00:00\",\"note\":\"Task sast-unicode-check-oci-ta-min success: No finding was detected\",\"namespace\":\"default\",\"successes\":0,\"failures\":0,\"warnings\":0}\n"
                    }
                ],
                "startTime": "2026-04-15T23:20:48Z",
                "steps": [
                    {
                        "container": "step-use-trusted-artifact",
                        "imageID": "quay.io/konflux-ci/build-trusted-artifacts@sha256:ab064e9763b62d99da5ee9653370da86ffd9d3e770e1aad7a935e88b64a0b6ac",
                        "name": "use-trusted-artifact",
                        "terminated": {
                            "containerID": "cri-o://d8b8a3fa955d60d248bc667c3287f348f0b46293e71c58d69f50d27af25b6a55",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:20:55Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:20:55Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-sast-unicode-check",
                        "imageID": "quay.io/konflux-ci/konflux-test@sha256:169f73f80fbde8d54f42416c5de8cc9214ecc7e8c89c70a3385285bbac32ad0a",
                        "name": "sast-unicode-check",
                        "terminated": {
                            "containerID": "cri-o://0098d6d1abe5a4a50d92ecb7c6c8cbbb4434bd92907a262ddf2d99201a7e54c8",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:20:57Z",
                            "message": "[{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"result\\\":\\\"SUCCESS\\\",\\\"timestamp\\\":\\\"2026-04-15T23:20:57+00:00\\\",\\\"note\\\":\\\"Task sast-unicode-check-oci-ta-min success: No finding was detected\\\",\\\"namespace\\\":\\\"default\\\",\\\"successes\\\":0,\\\"failures\\\":0,\\\"warnings\\\":0}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:20:56Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-upload",
                        "imageID": "quay.io/konflux-ci/oras@sha256:180b50c7be50c20e3349a79df8dd6062fee0e0dd01aa30e9a09d1d07d9ebd0c2",
                        "name": "upload",
                        "terminated": {
                            "containerID": "cri-o://2f878d79527c6423e182baa0843a760f22692e0345a99e035631a77e11a386e9",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:20:58Z",
                            "message": "[{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"result\\\":\\\"SUCCESS\\\",\\\"timestamp\\\":\\\"2026-04-15T23:20:57+00:00\\\",\\\"note\\\":\\\"Task sast-unicode-check-oci-ta-min success: No finding was detected\\\",\\\"namespace\\\":\\\"default\\\",\\\"successes\\\":0,\\\"failures\\\":0,\\\"warnings\\\":0}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:20:57Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Scans source code for non-printable unicode characters in all text files.",
                    "params": [
                        {
                            "default": "",
                            "description": "The Trusted Artifact URI pointing to the artifact with the prefetched dependencies.",
                            "name": "CACHI2_ARTIFACT",
                            "type": "string"
                        },
                        {
                            "default": "-p bidi -v -d -t",
                            "description": "arguments for find-unicode-control command.",
                            "name": "FIND_UNICODE_CONTROL_ARGS",
                            "type": "string"
                        },
                        {
                            "default": "SITE_DEFAULT",
                            "description": "Known False Positives (KFP) git URL (optionally taking a revision delimited by \\#). Defaults to \"SITE_DEFAULT\", which means the default value \"https://gitlab.cee.redhat.com/osh/known-false-positives.git\" for internal Konflux instance and empty string for external Konflux instance. If set to an empty string, the KFP filtering is disabled.",
                            "name": "KFP_GIT_URL",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "Name of the scanned project, used to find path exclusions. By default, the Konflux component name will be used.",
                            "name": "PROJECT_NAME",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "Whether to record the excluded findings (defaults to false).\nIf `true`, the excluded findings will be stored in `excluded-findings.json`.\n",
                            "name": "RECORD_EXCLUDED",
                            "type": "string"
                        },
                        {
                            "description": "The Trusted Artifact URI pointing to the artifact with the application source code.",
                            "name": "SOURCE_ARTIFACT",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data.",
                            "name": "caTrustConfigMapKey",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from.",
                            "name": "caTrustConfigMapName",
                            "type": "string"
                        },
                        {
                            "description": "Image digest used for ORAS upload.",
                            "name": "image-digest",
                            "type": "string"
                        },
                        {
                            "description": "Image URL used for ORAS upload.",
                            "name": "image-url",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Tekton task test output.",
                            "name": "TEST_OUTPUT",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "volumeMounts": [
                            {
                                "mountPath": "/var/workdir",
                                "name": "workdir"
                            }
                        ]
                    },
                    "steps": [
                        {
                            "args": [
                                "use",
                                "oci:quay.io/rhtap_qe/default-tenant/tsf-demo-comp@sha256:7098d15e5ce4e4693bb0f592ef5340eebb08977048de58dd24fcb634390ccfaa=/var/workdir/source",
                                "=/var/workdir/cachi2"
                            ],
                            "computeResources": {},
                            "image": "quay.io/konflux-ci/build-trusted-artifacts:latest@sha256:ab064e9763b62d99da5ee9653370da86ffd9d3e770e1aad7a935e88b64a0b6ac",
                            "name": "use-trusted-artifact",
                            "volumeMounts": [
                                {
                                    "mountPath": "/etc/pki/tls/certs/ca-custom-bundle.crt",
                                    "name": "trusted-ca",
                                    "readOnly": true,
                                    "subPath": "ca-bundle.crt"
                                }
                            ]
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "128m",
                                    "memory": "256Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "KFP_GIT_URL",
                                    "value": "SITE_DEFAULT"
                                },
                                {
                                    "name": "PROJECT_NAME"
                                },
                                {
                                    "name": "FIND_UNICODE_CONTROL_ARGS",
                                    "value": "-p bidi -v -d -t"
                                },
                                {
                                    "name": "RECORD_EXCLUDED",
                                    "value": "false"
                                },
                                {
                                    "name": "SOURCE_CODE_DIR",
                                    "value": "/var/workdir"
                                },
                                {
                                    "name": "COMPONENT_LABEL",
                                    "valueFrom": {
                                        "fieldRef": {
                                            "fieldPath": "metadata.labels['appstudio.openshift.io/component']"
                                        }
                                    }
                                },
                                {
                                    "name": "BUILD_PLR_LOG_URL",
                                    "valueFrom": {
                                        "fieldRef": {
                                            "fieldPath": "metadata.annotations['pipelinesascode.tekton.dev/log-url']"
                                        }
                                    }
                                }
                            ],
                            "image": "quay.io/konflux-ci/konflux-test:v1.4.51@sha256:169f73f80fbde8d54f42416c5de8cc9214ecc7e8c89c70a3385285bbac32ad0a",
                            "name": "sast-unicode-check",
                            "script": "#!/usr/bin/env bash\nset -exuo pipefail\n\n# shellcheck source=/dev/null\n. /utils.sh\ntrap 'handle_error /tekton/results/TEST_OUTPUT' EXIT\n\nif [[ -z \"${PROJECT_NAME}\" ]]; then\n  PROJECT_NAME=${COMPONENT_LABEL}\nfi\n\necho \"INFO: The PROJECT_NAME used is: ${PROJECT_NAME}\"\n\nca_bundle=/mnt/trusted-ca/ca-bundle.crt\nif [ -f \"$ca_bundle\" ]; then\n  echo \"INFO: Using mounted CA bundle: $ca_bundle\"\n  cp -vf $ca_bundle /etc/pki/ca-trust/source/anchors\n  update-ca-trust\nfi\n\nSCAN_PROP=\"https://github.com/siddhesh/find-unicode-control.git#c2accbfbba7553a8bc1ebd97089ae08ad8347e58\"\nFUC_EXIT_CODE=0\n\n# shellcheck disable=SC2086\nLANG=en_US.utf8 find_unicode_control.py ${FIND_UNICODE_CONTROL_ARGS} \"${SOURCE_CODE_DIR}/source\" \\\n  \u003eraw_sast_unicode_check_out.txt \\\n  2\u003eraw_sast_unicode_check_out.log ||\n  FUC_EXIT_CODE=$?\nif [[ \"${FUC_EXIT_CODE}\" -ne 0 ]] \u0026\u0026 [[ \"${FUC_EXIT_CODE}\" -ne 1 ]]; then\n  echo \"Failed to run find-unicode-control command\" \u003e\u00262\n  cat raw_sast_unicode_check_out.log\n  note=\"Task sast-unicode-check-oci-ta-min failed: For details, check Tekton task log.\"\n  ERROR_OUTPUT=$(make_result_json -r ERROR -t \"$note\")\n  echo \"${ERROR_OUTPUT}\" | tee \"/tekton/results/TEST_OUTPUT\"\n  exit 1\nfi\n\n# Translate the output format\nif ! sed -i raw_sast_unicode_check_out.txt -E -e 's|(.*:[0-9]+)(.*)|\\1: warning:\\2|' -e 's|^|Error: UNICONTROL_WARNING:\\n|'; then\n  echo \"Error: failed to translate the unicontrol output format\" \u003e\u00262\n  note=\"Task sast-unicode-check-oci-ta-min failed: For details, check Tekton task log.\"\n  ERROR_OUTPUT=$(make_result_json -r ERROR -t \"$note\")\n  echo \"${ERROR_OUTPUT}\" | tee \"/tekton/results/TEST_OUTPUT\"\n  exit 1\nfi\n\n# Process all results as configured with CSGERP_OPTS\nCSGERP_OPTS=(\n  --mode=json\n  --remove-duplicates\n  --embed-context=3\n  --set-scan-prop=\"${SCAN_PROP}\"\n  --strip-path-prefix=\"${SOURCE_CODE_DIR}\"/source/\n)\n# In order to generate csdiff/v1, we need to add the whole path of the source code as\n# sast-unicode-check only provides an URI to embed the context\nif ! csgrep \"${CSGERP_OPTS[@]}\" raw_sast_unicode_check_out.txt \u003eprocessed_sast_unicode_check_out.json 2\u003eprocessed_sast_unicode_check_out.err; then\n  echo \"Error occurred while running csgrep with CSGERP_OPTS:\"\n  cat processed_sast_unicode_check_out.err\n  note=\"Task sast-unicode-check-oci-ta-min failed: For details, check Tekton task log.\"\n  ERROR_OUTPUT=$(make_result_json -r ERROR -t \"$note\")\n  echo \"${ERROR_OUTPUT}\" | tee \"/tekton/results/TEST_OUTPUT\"\n  exit 1\nfi\n\ncsgrep --mode=evtstat processed_sast_unicode_check_out.json\n\nif [[ \"${KFP_GIT_URL}\" == \"SITE_DEFAULT\" ]]; then\n  KFP_GIT_URL=\"https://gitlab.cee.redhat.com/osh/known-false-positives.git\"\nfi\nPROBE_URL=\"${KFP_GIT_URL%.git}\" # trims '.git' suffix\n\n# create the KFP clone directory regardless\nKFP_DIR=\"known-false-positives\"\nKFP_CLONED=\"0\"\nmkdir \"${KFP_DIR}\"\n\n# We check if the KFP_GIT_URL variable is set to clone and apply the filters or not\nif [[ -n \"${KFP_GIT_URL}\" ]]; then\n  # Default location only reachable from internal Konflux instances, check reachable first\n  echo -n \"INFO: Probing ${PROBE_URL}... \"\n  if curl --fail --head --max-time 60 --no-progress-meter \"${PROBE_URL}\" \u003e \u003e(head -1); then\n    echo \"INFO: Trying to clone known-false-positives..\"\n    git clone \"${KFP_GIT_URL}\" \"${KFP_DIR}\" \u0026\u0026 KFP_CLONED=\"1\"\n  fi\nfi\n\n# If KFP clone failed, use the unfiltered results\nif [[ \"${KFP_CLONED}\" -eq \"0\" ]]; then\n  echo \"WARN: Failed to clone known-false-positives at ${KFP_GIT_URL}, scan results will not be filtered\"\n  mv processed_sast_unicode_check_out.json sast_unicode_check_out.json\nelse\n  echo \"INFO: Filtering false positives in results files using csfilter-kfp...\"\n\n  # Build initial csfilter-kfp command\n  csfilter_kfp_cmd=(\n    csfilter-kfp\n    --verbose\n    --kfp-dir=\"${KFP_DIR}\"\n    --project-nvr=\"${PROJECT_NAME}\"\n  )\n\n  # Append --record-excluded option if RECORD_EXCLUDED is true\n  if [[ \"${RECORD_EXCLUDED}\" == \"true\" ]]; then\n    csfilter_kfp_cmd+=(--record-excluded=\"excluded-findings.json\")\n  fi\n\n  # Execute the command and capture any errors\n  set +e\n  \"${csfilter_kfp_cmd[@]}\" processed_sast_unicode_check_out.json \u003esast_unicode_check_out.json 2\u003esast_unicode_check_out.error\n  status=$?\n  set -e\n  if [ \"$status\" -ne 0 ]; then\n    echo \"WARN: failed to filter known false positives\" \u003e\u00262\n    mv processed_sast_unicode_check_out.json sast_unicode_check_out.json\n  else\n    echo \"INFO: Succeeded filtering known false positives\" \u003e\u00262\n  fi\nfi\n\n# Generate sarif report\ncsgrep --mode=sarif sast_unicode_check_out.json \u003esast_unicode_check_out.sarif\nif [[ \"${FUC_EXIT_CODE}\" -eq 0 ]]; then\n  note=\"Task sast-unicode-check-oci-ta-min success: No finding was detected\"\n  ERROR_OUTPUT=$(make_result_json -r SUCCESS -t \"$note\")\nelif [[ \"${FUC_EXIT_CODE}\" -eq 1 ]] \u0026\u0026 [[ ! -s sast_unicode_check_out.sarif ]]; then\n  note=\"Task sast-unicode-check-oci-ta-min success: Some findings were detected, but filtered by known false positive\"\n  ERROR_OUTPUT=$(make_result_json -r SUCCESS -t \"$note\")\nelse\n  echo \"sast-unicode-check test failed because of the following issues:\"\n  cat sast_unicode_check_out.json\n  TEST_OUTPUT=\n  parse_test_output \"sast-unicode-check-oci-ta-min\" sarif sast_unicode_check_out.sarif || true\n  note=\"Task sast-unicode-check-oci-ta-min failed: For details, check Tekton task log.\"\n  ERROR_OUTPUT=$(make_result_json -r ERROR -t \"$note\")\nfi\necho \"${TEST_OUTPUT:-${ERROR_OUTPUT}}\" | tee \"/tekton/results/TEST_OUTPUT\"\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/mnt/trusted-ca",
                                    "name": "trusted-ca",
                                    "readOnly": true
                                }
                            ],
                            "workingDir": "/var/workdir/source"
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "IMAGE_URL",
                                    "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9"
                                },
                                {
                                    "name": "IMAGE_DIGEST",
                                    "value": "sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5"
                                }
                            ],
                            "image": "quay.io/konflux-ci/oras:latest@sha256:180b50c7be50c20e3349a79df8dd6062fee0e0dd01aa30e9a09d1d07d9ebd0c2",
                            "name": "upload",
                            "script": "#!/usr/bin/env bash\n\nif [ -z \"${IMAGE_URL}\" ]; then\n  echo 'No image-url param provided. Skipping upload.'\n  exit 0\nfi\n\nUPLOAD_FILES=\"sast_unicode_check_out.sarif excluded-findings.json\"\nfor UPLOAD_FILE in ${UPLOAD_FILES}; do\n  if [ ! -f \"${UPLOAD_FILE}\" ]; then\n    echo \"No ${UPLOAD_FILE} exists. Skipping upload.\"\n    continue\n  fi\n\n  if [ \"${UPLOAD_FILE}\" == \"excluded-findings.json\" ]; then\n    MEDIA_TYPE=application/json\n  else\n    MEDIA_TYPE=application/sarif+json\n  fi\n\n  echo \"Selecting auth\"\n  select-oci-auth \"${IMAGE_URL}\" \u003e\"${HOME}/auth.json\"\n  echo \"Attaching to ${IMAGE_URL}\"\n  retry oras attach --no-tty --registry-config \"$HOME/auth.json\" --artifact-type \"${MEDIA_TYPE}\" \"${IMAGE_URL}@${IMAGE_DIGEST}\" \"${UPLOAD_FILE}:${MEDIA_TYPE}\"\ndone\n",
                            "volumeMounts": [
                                {
                                    "mountPath": "/etc/pki/tls/certs/ca-custom-bundle.crt",
                                    "name": "trusted-ca",
                                    "readOnly": true,
                                    "subPath": "ca-bundle.crt"
                                }
                            ],
                            "workingDir": "/var/workdir/source"
                        }
                    ],
                    "volumes": [
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        },
                        {
                            "emptyDir": {},
                            "name": "workdir"
                        }
                    ]
                }
            }
        },
        {
            "apiVersion": "tekton.dev/v1",
            "kind": "TaskRun",
            "metadata": {
                "annotations": {
                    "build.appstudio.openshift.io/repo": "https://github.com/rhads-tsf-qe/testrepo?rev=8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "build.appstudio.redhat.com/commit_sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "build.appstudio.redhat.com/target_branch": "base-miwkfv",
                    "chains.tekton.dev/signed": "true",
                    "chains.tekton.dev/transparency": "http://rekor-server.tsf-tas.svc.cluster.local/api/v1/log/entries?logIndex=32",
                    "pipeline.tekton.dev/release": "3f3e5497e72862d4ae89c117bed1da4ebf50b320",
                    "pipelinesascode.tekton.dev/branch": "base-miwkfv",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552493202",
                    "pipelinesascode.tekton.dev/controller-info": "{\"name\":\"default\",\"configmap\":\"pipelines-as-code\",\"secret\":\"pipelines-as-code-secret\", \"gRepo\": \"pipelines-as-code\"}",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/git-auth-secret": "pac-gitauth-ojyaao",
                    "pipelinesascode.tekton.dev/git-provider": "github",
                    "pipelinesascode.tekton.dev/installation-id": "112348674",
                    "pipelinesascode.tekton.dev/log-url": "https://console-openshift-console.apps.rosa.kx-96320ebfaa.fiai.p3.openshiftapps.com/k8s/ns/default-tenant/tekton.dev~v1~PipelineRun/tsf-demo-comp-on-push-cttl8",
                    "pipelinesascode.tekton.dev/max-keep-runs": "3",
                    "pipelinesascode.tekton.dev/on-cel-expression": "event == \"push\" \u0026\u0026 target_branch == \"base-miwkfv\"",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/scm-reporting-plr-started": "true",
                    "pipelinesascode.tekton.dev/sender": "rhtap-ci-tests-bot",
                    "pipelinesascode.tekton.dev/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pipelinesascode.tekton.dev/sha-title": "Merge pull request #181 from rhads-tsf-qe/konflux-tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha-url": "https://github.com/rhads-tsf-qe/testrepo/commit/8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pipelinesascode.tekton.dev/source-branch": "refs/heads/base-miwkfv",
                    "pipelinesascode.tekton.dev/source-repo-url": "https://github.com/rhads-tsf-qe/testrepo",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "results.tekton.dev/childReadyForDeletion": "true",
                    "results.tekton.dev/record": "default-tenant/results/61ce9ab9-21e3-414b-b0da-d05b30fbea57/records/9a98d57c-f2fa-4015-a506-ace70e81b42f",
                    "results.tekton.dev/recordSummaryAnnotations": "{\"repo\":\"testrepo\",\"commit\":\"8a419f9b1a920375f8112c9b7477d42bbd82b6c9\",\"eventType\":\"push\"}",
                    "results.tekton.dev/result": "default-tenant/results/61ce9ab9-21e3-414b-b0da-d05b30fbea57",
                    "results.tekton.dev/stored": "true",
                    "tekton.dev/pipelines.minVersion": "0.12.1",
                    "tekton.dev/tags": "konflux"
                },
                "creationTimestamp": "2026-04-15T23:20:48Z",
                "finalizers": [
                    "chains.tekton.dev",
                    "results.tekton.dev/taskrun"
                ],
                "generation": 1,
                "labels": {
                    "app.kubernetes.io/managed-by": "pipelinesascode.tekton.dev",
                    "app.kubernetes.io/version": "v0.37.7",
                    "appstudio.openshift.io/application": "tsf-demo-app",
                    "appstudio.openshift.io/component": "tsf-demo-comp",
                    "pipelines.appstudio.openshift.io/type": "build",
                    "pipelinesascode.tekton.dev/cancel-in-progress": "false",
                    "pipelinesascode.tekton.dev/check-run-id": "71552493202",
                    "pipelinesascode.tekton.dev/event-type": "push",
                    "pipelinesascode.tekton.dev/original-prname": "tsf-demo-comp-on-push",
                    "pipelinesascode.tekton.dev/repository": "tsf-demo-comp",
                    "pipelinesascode.tekton.dev/sha": "8a419f9b1a920375f8112c9b7477d42bbd82b6c9",
                    "pipelinesascode.tekton.dev/state": "started",
                    "pipelinesascode.tekton.dev/url-org": "rhads-tsf-qe",
                    "pipelinesascode.tekton.dev/url-repository": "testrepo",
                    "tekton.dev/memberOf": "tasks",
                    "tekton.dev/pipeline": "tsf-demo-comp-on-push-cttl8",
                    "tekton.dev/pipelineRun": "tsf-demo-comp-on-push-cttl8",
                    "tekton.dev/pipelineRunUID": "61ce9ab9-21e3-414b-b0da-d05b30fbea57",
                    "tekton.dev/pipelineTask": "tpa-scan",
                    "tekton.dev/task": "tpa-scan"
                },
                "name": "tsf-demo-comp-on-push-cttl8-tpa-scan",
                "namespace": "default-tenant",
                "ownerReferences": [
                    {
                        "apiVersion": "tekton.dev/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "PipelineRun",
                        "name": "tsf-demo-comp-on-push-cttl8",
                        "uid": "61ce9ab9-21e3-414b-b0da-d05b30fbea57"
                    }
                ],
                "resourceVersion": "38959",
                "uid": "9a98d57c-f2fa-4015-a506-ace70e81b42f"
            },
            "spec": {
                "params": [
                    {
                        "name": "image-digest",
                        "value": "sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5"
                    },
                    {
                        "name": "image-url",
                        "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9"
                    }
                ],
                "serviceAccountName": "build-pipeline-tsf-demo-comp",
                "taskRef": {
                    "params": [
                        {
                            "name": "name",
                            "value": "tpa-scan"
                        },
                        {
                            "name": "bundle",
                            "value": "quay.io/konflux-ci/tekton-catalog/task-tpa-scan:0.1@sha256:68b6e188f742da92af9c40a794fd021a65d49b419d1e36096277b2d9ebbe1afc"
                        },
                        {
                            "name": "kind",
                            "value": "task"
                        }
                    ],
                    "resolver": "bundles"
                },
                "timeout": "1h0m0s"
            },
            "status": {
                "artifacts": {},
                "completionTime": "2026-04-15T23:22:31Z",
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-15T23:22:31Z",
                        "message": "All Steps have completed executing",
                        "reason": "Succeeded",
                        "status": "True",
                        "type": "Succeeded"
                    }
                ],
                "podName": "tsf-demo-comp-on-push-cttl8-tpa-scan-pod",
                "provenance": {
                    "featureFlags": {
                        "awaitSidecarReadiness": true,
                        "coschedule": "workspaces",
                        "enableAPIFields": "beta",
                        "enableProvenanceInStatus": true,
                        "enforceNonfalsifiability": "none",
                        "maxResultSize": 4096,
                        "resultExtractionMethod": "termination-message",
                        "runningInEnvWithInjectedSidecars": true,
                        "verificationNoMatchPolicy": "ignore"
                    },
                    "refSource": {
                        "digest": {
                            "sha256": "68b6e188f742da92af9c40a794fd021a65d49b419d1e36096277b2d9ebbe1afc"
                        },
                        "entryPoint": "tpa-scan",
                        "uri": "quay.io/konflux-ci/tekton-catalog/task-tpa-scan"
                    }
                },
                "results": [
                    {
                        "name": "IMAGES_PROCESSED",
                        "type": "string",
                        "value": "{\"image\": {\"pullspec\": \"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9\", \"digests\": [\"sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5\"]}}\n"
                    },
                    {
                        "name": "REPORTS",
                        "type": "string",
                        "value": "{\"sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5\":\"sha256:98d9c8687bd5af29d73ab09f101f7aa315970ecfcf44032356baf5b99aa3104a\"}\n"
                    },
                    {
                        "name": "SCAN_OUTPUT",
                        "type": "string",
                        "value": "{\"vulnerabilities\":{\"critical\":6,\"high\":155,\"medium\":182,\"low\":15,\"unknown\":0},\"unpatched_vulnerabilities\":{\"critical\":0,\"high\":0,\"medium\":0,\"low\":0,\"unknown\":0}}\n"
                    },
                    {
                        "name": "TEST_OUTPUT",
                        "type": "string",
                        "value": "{\"result\":\"SUCCESS\",\"timestamp\":\"2026-04-15T23:22:30+00:00\",\"note\":\"Task tpa-scan completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by TPA.\",\"namespace\":\"default\",\"successes\":0,\"failures\":0,\"warnings\":0}\n"
                    }
                ],
                "startTime": "2026-04-15T23:20:49Z",
                "steps": [
                    {
                        "container": "step-get-vulnerabilities",
                        "imageID": "quay.io/konflux-ci/konflux-test@sha256:aa2c97da9bb73a4e8d1c6b41950f8d902b74461be0e042debe89277fdc4ebe49",
                        "name": "get-vulnerabilities",
                        "terminated": {
                            "containerID": "cri-o://d4618acc5289eefeb6b1309128a3e208c38d47dfe736f9278d489806b89d0e5c",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:22:14Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:22:12Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-oci-attach-report",
                        "imageID": "quay.io/konflux-ci/task-runner@sha256:200019314a50be5b6dd06f362c794c92a700583a522c5eee9a41e3eab7f706c5",
                        "name": "oci-attach-report",
                        "terminated": {
                            "containerID": "cri-o://bb5ed281d4995ade0e6d47167653578774310ecee6bf0fbd55c7a66bdc0ce939",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:22:18Z",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:22:15Z"
                        },
                        "terminationReason": "Completed"
                    },
                    {
                        "container": "step-conftest-vulnerabilities",
                        "imageID": "quay.io/konflux-ci/konflux-test@sha256:aa2c97da9bb73a4e8d1c6b41950f8d902b74461be0e042debe89277fdc4ebe49",
                        "name": "conftest-vulnerabilities",
                        "terminated": {
                            "containerID": "cri-o://0c0dad03853a692b89099dcd7ae7e441c085aa1cd3b26ae805a023824edca3f8",
                            "exitCode": 0,
                            "finishedAt": "2026-04-15T23:22:30Z",
                            "message": "[{\"key\":\"IMAGES_PROCESSED\",\"value\":\"{\\\"image\\\": {\\\"pullspec\\\": \\\"quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9\\\", \\\"digests\\\": [\\\"sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5\\\"]}}\\n\",\"type\":1},{\"key\":\"REPORTS\",\"value\":\"{\\\"sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5\\\":\\\"sha256:98d9c8687bd5af29d73ab09f101f7aa315970ecfcf44032356baf5b99aa3104a\\\"}\\n\",\"type\":1},{\"key\":\"SCAN_OUTPUT\",\"value\":\"{\\\"vulnerabilities\\\":{\\\"critical\\\":6,\\\"high\\\":155,\\\"medium\\\":182,\\\"low\\\":15,\\\"unknown\\\":0},\\\"unpatched_vulnerabilities\\\":{\\\"critical\\\":0,\\\"high\\\":0,\\\"medium\\\":0,\\\"low\\\":0,\\\"unknown\\\":0}}\\n\",\"type\":1},{\"key\":\"TEST_OUTPUT\",\"value\":\"{\\\"result\\\":\\\"SUCCESS\\\",\\\"timestamp\\\":\\\"2026-04-15T23:22:30+00:00\\\",\\\"note\\\":\\\"Task tpa-scan completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by TPA.\\\",\\\"namespace\\\":\\\"default\\\",\\\"successes\\\":0,\\\"failures\\\":0,\\\"warnings\\\":0}\\n\",\"type\":1}]",
                            "reason": "Completed",
                            "startedAt": "2026-04-15T23:22:19Z"
                        },
                        "terminationReason": "Completed"
                    }
                ],
                "taskSpec": {
                    "description": "Scans container images for vulnerabilities using the TPA vulnerability scanner, by comparing the components of container image against the vulnerability databases.",
                    "params": [
                        {
                            "description": "Image digest to scan.",
                            "name": "image-digest",
                            "type": "string"
                        },
                        {
                            "description": "Image URL.",
                            "name": "image-url",
                            "type": "string"
                        },
                        {
                            "default": "",
                            "description": "The platform which will be scanned by this task.",
                            "name": "image-platform",
                            "type": "string"
                        },
                        {
                            "default": "https://exhort.stage.devshift.net/api/v5/analysis",
                            "description": "The url of the TPA instance which will be used for scanning.",
                            "name": "tpa-url",
                            "type": "string"
                        },
                        {
                            "default": "trusted-ca",
                            "description": "The name of the ConfigMap to read CA bundle data from.",
                            "name": "ca-trust-config-map-name",
                            "type": "string"
                        },
                        {
                            "default": "ca-bundle.crt",
                            "description": "The name of the key in the ConfigMap that contains the CA bundle data.",
                            "name": "ca-trust-config-map-key",
                            "type": "string"
                        },
                        {
                            "default": "false",
                            "description": "If true, skips uploading the results to the image registry. Useful for read-only tests.",
                            "name": "skip-oci-attach-report",
                            "type": "string"
                        }
                    ],
                    "results": [
                        {
                            "description": "Tekton task test output.",
                            "name": "TEST_OUTPUT",
                            "type": "string"
                        },
                        {
                            "description": "TPA scan result.",
                            "name": "SCAN_OUTPUT",
                            "type": "string"
                        },
                        {
                            "description": "Images processed in the task.",
                            "name": "IMAGES_PROCESSED",
                            "type": "string"
                        },
                        {
                            "description": "Mapping of image digests to report digests",
                            "name": "REPORTS",
                            "type": "string"
                        }
                    ],
                    "stepTemplate": {
                        "computeResources": {},
                        "volumeMounts": [
                            {
                                "mountPath": "/etc/pki/tls/certs/ca-custom-bundle.crt",
                                "name": "trusted-ca",
                                "readOnly": true,
                                "subPath": "ca-bundle.crt"
                            }
                        ]
                    },
                    "steps": [
                        {
                            "computeResources": {
                                "limits": {
                                    "cpu": "800m",
                                    "memory": "2Gi"
                                },
                                "requests": {
                                    "cpu": "800m",
                                    "memory": "2Gi"
                                }
                            },
                            "env": [
                                {
                                    "name": "IMAGE_URL",
                                    "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9"
                                },
                                {
                                    "name": "IMAGE_DIGEST",
                                    "value": "sha256:f13f36d0e40cb94b1bb365d8cbf52270144cddfbfc2d9a51f14424c46da6a0c5"
                                },
                                {
                                    "name": "IMAGE_PLATFORM"
                                },
                                {
                                    "name": "TPA_URL",
                                    "value": "https://exhort.stage.devshift.net/api/v5/analysis"
                                }
                            ],
                            "image": "quay.io/konflux-ci/konflux-test:v1.4.52@sha256:deabe80a01dca3a8a0edb709324e30cbf0baa176f7a181bbb695323f506f7aac",
                            "imagePullPolicy": "Always",
                            "name": "get-vulnerabilities",
                            "script": "#!/usr/bin/env bash\n\nset -o nounset\nset -o pipefail\n# shellcheck source=/utils.sh\n. /utils.sh\n\ntrap 'handle_error /tekton/results/TEST_OUTPUT' EXIT\n\nimagewithouttag=$(echo -n $IMAGE_URL | sed \"s/\\(.*\\):.*/\\1/\")\n# strip new-line escape symbol from parameter and save it to variable\nimageanddigest=$(echo $imagewithouttag@$IMAGE_DIGEST)\nimages_processed_template='{\"image\": {\"pullspec\": \"'\"$IMAGE_URL\"'\", \"digests\": [%s]}}'\ndigests_processed=()\n\necho \"Inspecting raw image manifest $imageanddigest.\"\n# Get the arch and image manifests by inspecting the image. This is mainly for identifying image indexes\necho \"Selecting auth\"\nmkdir -p /tmp/auth \u0026\u0026 select-oci-auth \"${imageanddigest}\" \u003e/tmp/auth/config.json\nexport DOCKER_CONFIG=/tmp/auth\nimage_manifests=$(get_image_manifests -i \"${imageanddigest}\")\nif [ -n \"$image_manifests\" ]; then\n  echo \"$image_manifests\" | jq -r 'to_entries[] | \"\\(.key) \\(.value)\"' | while read -r arch arch_sha; do\n    echo \"$arch_sha\" \u003e /tekton/home/image-manifest-$arch.sha\n  done\nelse\n  echo \"Failed to get image manifests from image \\\"$imageanddigest\\\"\"\n  note=\"Task tpa-scan failed: Failed to get image manifests from image \\\"$imageanddigest\\\". For details, check Tekton task log.\"\n  ERROR_OUTPUT=$(make_result_json -r \"ERROR\" -t \"$note\")\n  echo \"${ERROR_OUTPUT}\" | tee \"/tekton/results/TEST_OUTPUT\"\n  exit 0\nfi\n\n\ntpa_scan() {\n  local sbom_file=${1}\n  local arch=${2}\n  local sbom_format\n\n  sbom_format=$(jq -r 'if .bomFormat == \"CycloneDX\" then \"cyclonedx\" else \"spdx\" end' \u003c \"${sbom_file}\")\n  retry curl -f --show-error -L -X POST -T \"${sbom_file}\" -H \"Content-Type:application/vnd.${sbom_format}+json\" \"${TPA_URL}\" | tee  \"tpa-report-${arch}.json\";\n}\n\nrun_tpa_on_arch() {\n  local arch=\"$1\"\n  local sha_file=\"image-manifest-${arch}.sha\"\n  local sbom_file_path=\"/tmp/sbom-${arch}.json\"\n  local arch_sha=\"\"\n\n  if [ -e \"${sha_file}\" ]; then\n    arch_sha=$(\u003c\"${sha_file}\")\n    arch_imageanddigest=$(echo -n \"${imagewithouttag}@${arch_sha}\")\n  else\n    echo \"Couldn't find the SHA file for the requested architecture.\"\n    exit 1\n  fi\n\n  echo \"Selecting auth\"\n  mkdir -p /tmp/auth \u0026\u0026 select-oci-auth \"${arch_imageanddigest}\" \u003e/tmp/auth/config.json\n  export DOCKER_CONFIG=/tmp/auth\n\n  # Attempt to download the SBOM file via cosign\n\n  if ! retry cosign download sbom \"${arch_imageanddigest}\" \u003e \"${sbom_file_path}\"; then\n    echo \"Unable to download SBOM for the architecture ${arch}.\"\n    exit 1\n  fi\n\n  if [ -e \"${sbom_file_path}\" ]; then\n    local arch_sha\n    arch_sha=$(\u003c\"$sha_file\")\n\n    echo \"Running TPA scan on $arch image manifest...\"\n    tpa_scan \"${sbom_file_path}\" \"$arch\" || true\n\n    digests_processed+=(\"\\\"$arch_sha\\\"\")\n  else\n    echo \"Couldn't find the SBOM file for the requested ${arch} architecture.\"\n    exit 1\n  fi\n}\n\nplatform=\"${IMAGE_PLATFORM}\"\n\n# If a platform is specified, extract the architecture and run the tpa scan on the corresponding image manifest\nif [ -n \"$platform\" ]; then\n  arch=\"${platform#*/}\"\n  if [ \"$arch\" = \"x86_64\" ] || [ \"$arch\" = \"local\" ] || [ \"$arch\" = \"localhost\" ]; then\n    arch=\"amd64\"\n  fi\n  # Validate against supported arch list. If it's not a known arch, fallback to amd64\n  case \"$arch\" in\n    amd64|ppc64le|arm64|s390x)\n      ;;\n    *)\n      echo \"Error: Unsupported or malformed architecture: '$arch' (parsed from platform: '$platform')\"\n      exit 1\n      ;;\n  esac\n\n  run_tpa_on_arch \"$arch\"\n\n# If no platform is specified, run TPA scan on all available image manifests\nelse\n  for sha_file in image-manifest-*.sha; do\n    if [ -e \"$sha_file\" ]; then\n      arch=$(basename \"$sha_file\" | sed 's/image-manifest-//;s/.sha//')\n      run_tpa_on_arch \"$arch\"\n    fi\n  done\nfi\n\n# If the image is an Image Index, also add the Image Index digest to the list.\nif [[ \"${digests_processed[*]}\" != *\"$IMAGE_DIGEST\"* ]]; then\n  digests_processed+=(\"\\\"$IMAGE_DIGEST\\\"\")\nfi\ndigests_processed_string=$(IFS=,; echo \"${digests_processed[*]}\")\n\nimages_processed=$(echo \"${images_processed_template/\\[%s]/[$digests_processed_string]}\")\necho \"$images_processed\" \u003e images-processed.json\n",
                            "workingDir": "/tekton/home"
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "env": [
                                {
                                    "name": "SKIP_OCI_ATTACH_REPORT",
                                    "value": "false"
                                },
                                {
                                    "name": "IMAGE_URL",
                                    "value": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8a419f9b1a920375f8112c9b7477d42bbd82b6c9"
                                }
                            ],
                            "image": "quay.io/konflux-ci/task-runner:1.5.0@sha256:200019314a50be5b6dd06f362c794c92a700583a522c5eee9a41e3eab7f706c5",
                            "name": "oci-attach-report",
                            "script": "#!/usr/bin/env bash\n\nset -o errexit\nset -o nounset\nset -o pipefail\n\nif [ \"$SKIP_OCI_ATTACH_REPORT\" = \"true\" ]; then\n  echo 'OCI attach report skipped by parameter.'\n  echo '{}' \u003e reports.json\n  exit 0\nfi\n\nif ! compgen -G \"tpa-report-*.json\" \u003e /dev/null; then\n  echo 'No TPA reports generated. Skipping upload.'\n  echo '{}' \u003e reports.json\n  exit 0\nfi\n\nrepository=\"${IMAGE_URL/:*/}\"\n\narch() {\n  report_file=\"$1\"\n  arch=\"${report_file/*-}\"\n  echo \"${arch/.json/}\"\n}\n\nMEDIA_TYPE='application/vnd.redhat.tpa-report+json'\n\nreports_json=\"{}\"\nfor f in tpa-report-*.json; do\n  digest=$(cat \"image-manifest-$(arch \"$f\").sha\")\n  image_ref=\"${repository}@${digest}\"\n  mkdir -p /tmp/auth \u0026\u0026 select-oci-auth \"${image_ref}\" \u003e/tmp/auth/config.json\n  export DOCKER_CONFIG=/tmp/auth\n  echo \"Attaching $f to ${image_ref}\"\n  if ! report_digest=\"$(retry oras attach --no-tty --format go-template='{{.digest}}' --registry-config \\\n    \"/tmp/auth/config.json\" --artifact-type \"${MEDIA_TYPE}\" \"${image_ref}\" \"$f:${MEDIA_TYPE}\")\"\n  then\n    echo \"Failed to attach ${f} to ${image_ref}\"\n    exit 1\n  fi\n  # shellcheck disable=SC2016\n  reports_json=\"$(yq --output-format json --indent=0 eval-all '. as $i ireduce ({}; . * $i)' \u003c(echo \"${reports_json}\") \u003c(echo \"${digest}: ${report_digest}\"))\"\ndone\necho \"${reports_json}\" \u003e reports.json\n",
                            "workingDir": "/tekton/home"
                        },
                        {
                            "computeResources": {
                                "limits": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                },
                                "requests": {
                                    "cpu": "100m",
                                    "memory": "256Mi"
                                }
                            },
                            "image": "quay.io/redhat-user-workloads/rhtap-integration-tenant/konflux-test:v1.4.52@sha256:deabe80a01dca3a8a0edb709324e30cbf0baa176f7a181bbb695323f506f7aac",
                            "name": "conftest-vulnerabilities",
                            "script": "#!/usr/bin/env bash\nset -euo pipefail\n. /utils.sh\ntrap 'handle_error /tekton/results/TEST_OUTPUT' EXIT\n\ntpa_result_files=$(ls /tekton/home/tpa-report-*.json 2\u003e/dev/null || true)\nif [ -z \"$tpa_result_files\" ]; then\n  echo \"Previous step [get-vulnerabilities] failed: No tpa-report files found in /tekton/home.\"\n  exit 1\nfi\n\nmissing_vulnerabilities_files=\"\"\nfor file in $tpa_result_files; do\n  file_suffix=$(basename \"$file\" | sed 's/tpa-report-//;s/.json//')\n  if [ ! -s \"$file\" ]; then\n    echo \"Previous step [get-vulnerabilities] failed: $file is empty.\"\n  else\n    /usr/bin/conftest test --no-fail $file \\\n    --policy /project/rhtpa/vulnerabilities-check.rego --namespace required_checks \\\n    --output=json | tee /tekton/home/tpa-vulnerabilities-\"${file_suffix}\".json || true\n  fi\n\n  #check for missing \"tpa-vulnerabilities-\u003carch\u003e/image-index\" file and create a string\n  if [ ! -f \"/tekton/home/tpa-vulnerabilities-$file_suffix.json\" ]; then\n    missing_vulnerabilities_files+=\"${missing_vulnerabilities_files:+, }/tekton/home/tpa-vulnerabilities-$file_suffix.json\"\n  fi\ndone\n\nif [ -n \"$missing_vulnerabilities_files\" ]; then\n  note=\"Task tpa-scan failed: $missing_vulnerabilities_files did not generate. For details, check Tekton task log.\"\n  TEST_OUTPUT=$(make_result_json -r \"ERROR\" -t \"$note\")\n  echo \"$missing_vulnerabilities_files did not generate correctly. For details, check conftest command in Tekton task log.\"\n  echo \"${TEST_OUTPUT}\" | tee /tekton/results/TEST_OUTPUT\n  exit 0\nfi\n\nscan_result='{\"vulnerabilities\":{\"critical\":0, \"high\":0, \"medium\":0, \"low\":0, \"unknown\":0}, \"unpatched_vulnerabilities\":{\"critical\":0, \"high\":0, \"medium\":0, \"low\":0, \"unknown\":0}}'\nfor file in /tekton/home/tpa-vulnerabilities-*.json; do\n    result=$(jq -rce \\\n        '{\n            vulnerabilities:{\n              critical: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"rhtpa_critical_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0),\n              high: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"rhtpa_high_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0),\n              medium: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"rhtpa_medium_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0),\n              low: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"rhtpa_low_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0),\n              unknown: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"rhtpa_unknown_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0)\n            },\n            unpatched_vulnerabilities:{\n              critical: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"rhtpa_unpatched_critical_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0),\n              high: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"rhtpa_unpatched_high_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0),\n              medium: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"rhtpa_unpatched_medium_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0),\n              low: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"rhtpa_unpatched_low_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0),\n              unknown: (.[] | .warnings? // [] | map(select(.metadata.details.name==\"rhtpa_unpatched_unknown_vulnerabilities\").metadata.\"vulnerabilities_number\" // 0)| add // 0)\n            }\n        }' \"$file\")\n\n    scan_result=$(jq -s -rce \\\n          '.[0].vulnerabilities.critical += .[1].vulnerabilities.critical |\n          .[0].vulnerabilities.high += .[1].vulnerabilities.high |\n          .[0].vulnerabilities.medium += .[1].vulnerabilities.medium |\n          .[0].vulnerabilities.low += .[1].vulnerabilities.low |\n          .[0].vulnerabilities.unknown += .[1].vulnerabilities.unknown |\n          .[0].unpatched_vulnerabilities.critical += .[1].unpatched_vulnerabilities.critical |\n          .[0].unpatched_vulnerabilities.high += .[1].unpatched_vulnerabilities.high |\n          .[0].unpatched_vulnerabilities.medium += .[1].unpatched_vulnerabilities.medium |\n          .[0].unpatched_vulnerabilities.low += .[1].unpatched_vulnerabilities.low |\n          .[0].unpatched_vulnerabilities.unknown += .[1].unpatched_vulnerabilities.unknown |\n          .[0]' \u003c\u003c\u003c\"$scan_result $result\")\ndone\n\necho \"$scan_result\" | tee \"/tekton/results/SCAN_OUTPUT\"\n\ncat /tekton/home/images-processed.json | tee /tekton/results/IMAGES_PROCESSED\n# shellcheck disable=SC2154\ncat /tekton/home/reports.json \u003e \"/tekton/results/REPORTS\"\n\nnote=\"Task tpa-scan completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by TPA.\"\nTEST_OUTPUT=$(make_result_json -r \"SUCCESS\" -t \"$note\")\necho \"${TEST_OUTPUT}\" | tee /tekton/results/TEST_OUTPUT\n",
                            "securityContext": {
                                "capabilities": {
                                    "add": [
                                        "SETFCAP"
                                    ]
                                }
                            }
                        }
                    ],
                    "volumes": [
                        {
                            "configMap": {
                                "items": [
                                    {
                                        "key": "ca-bundle.crt",
                                        "path": "ca-bundle.crt"
                                    }
                                ],
                                "name": "trusted-ca",
                                "optional": true
                            },
                            "name": "trusted-ca"
                        }
                    ]
                }
            }
        }
    ],
    "kind": "List",
    "metadata": {
        "resourceVersion": ""
    }
}
