-
Bug
-
Resolution: Unresolved
-
Undefined
-
None
-
4.20.0, 4.21.0
-
Quality / Stability / Reliability
-
False
-
-
None
-
None
-
None
-
None
-
None
-
Agent Sprint 278
-
1
-
In Progress
-
Release Note Not Required
-
None
-
None
-
None
-
None
-
None
When enabling the registry-standard suite of tests for the IntegrationTestScenario the following violations were reported:
Results: ✕ [Violation] buildah_build_task.platform_param ImageRef: quay.io/redhat-user-workloads/ocp-agent-based-installer-tenant/ove-ui-iso@sha256:a611ad4b58c973dc4437c854da2eda506a6c15e486a13523fb4b76a920e622e8 Reason: PLATFORM parameter value "linux-root/amd64" is disallowed by regex ".*root.*" Title: PLATFORM parameter Description: Verify the value of the PLATFORM parameter of a builder Task is allowed by matching against a list of disallowed patterns. The list of patterns can be customized via the `disallowed_platform_patterns` rule data key. If empty, all values are allowed. To exclude this rule add "buildah_build_task.platform_param" to the `exclude` section of the policy configuration. Solution: Use a different PLATFORM value that is not disallowed by the policy config. ✕ [Violation] buildah_build_task.privileged_nested_param ImageRef: quay.io/redhat-user-workloads/ocp-agent-based-installer-tenant/ove-ui-iso@sha256:a611ad4b58c973dc4437c854da2eda506a6c15e486a13523fb4b76a920e622e8 Reason: setting PRIVILEGED_NESTED parameter to true is not allowed Title: PRIVILEGED_NESTED parameter Description: Verify the PRIVILEGED_NESTED parameter of a builder Tasks was not set to `true`. To exclude this rule add "buildah_build_task.privileged_nested_param" to the `exclude` section of the policy configuration. Solution: Setting PRIVILEGED_NESTED parameter to true is not allowed for most container image builds. Either set the parameter value to false or use a policy config that excludes this policy rule. ✕ [Violation] hermetic_task.hermetic ImageRef: quay.io/redhat-user-workloads/ocp-agent-based-installer-tenant/ove-ui-iso@sha256:a611ad4b58c973dc4437c854da2eda506a6c15e486a13523fb4b76a920e622e8 Reason: Task 'buildah-remote-oci-ta' was not invoked with the hermetic parameter set Title: Task called with hermetic param set Description: Verify the task in the PipelineRun attestation was invoked with the proper parameters to make the task execution hermetic. To exclude this rule add "hermetic_task.hermetic" to the `exclude` section of the policy configuration. Solution: Make sure the task has the input parameter 'HERMETIC' set to 'true'. ✕ [Violation] labels.required_labels ImageRef: quay.io/redhat-user-workloads/ocp-agent-based-installer-tenant/ove-ui-iso@sha256:a611ad4b58c973dc4437c854da2eda506a6c15e486a13523fb4b76a920e622e8 Reason: The required "com.redhat.component" label is missing. Label description: The Bugzilla component name where bugs against this container should be reported by users. Term: com.redhat.component Title: Required labels Description: Check the image for the presence of labels that are required. Use the rule data `required_labels` key to set the list of labels to check, or the `fbc_required_labels` key for fbc images. To exclude this rule add "labels.required_labels:com.redhat.component" to the `exclude` section of the policy configuration. Solution: Update the image build process to set the required labels. ✕ [Violation] labels.required_labels ImageRef: quay.io/redhat-user-workloads/ocp-agent-based-installer-tenant/ove-ui-iso@sha256:a611ad4b58c973dc4437c854da2eda506a6c15e486a13523fb4b76a920e622e8 Reason: The required "description" label is missing. Label description: Detailed description of the image. Term: description Title: Required labels Description: Check the image for the presence of labels that are required. Use the rule data `required_labels` key to set the list of labels to check, or the `fbc_required_labels` key for fbc images. To exclude this rule add "labels.required_labels:description" to the `exclude` section of the policy configuration. Solution: Update the image build process to set the required labels. ✕ [Violation] labels.required_labels ImageRef: quay.io/redhat-user-workloads/ocp-agent-based-installer-tenant/ove-ui-iso@sha256:a611ad4b58c973dc4437c854da2eda506a6c15e486a13523fb4b76a920e622e8 Reason: The required "distribution-scope" label is missing. Label description: Scope of intended distribution of the image. (private/authoritative-source-only/restricted/public). Term: distribution-scope Title: Required labels Description: Check the image for the presence of labels that are required. Use the rule data `required_labels` key to set the list of labels to check, or the `fbc_required_labels` key for fbc images. To exclude this rule add "labels.required_labels:distribution-scope" to the `exclude` section of the policy configuration. Solution: Update the image build process to set the required labels. ✕ [Violation] labels.required_labels ImageRef: quay.io/redhat-user-workloads/ocp-agent-based-installer-tenant/ove-ui-iso@sha256:a611ad4b58c973dc4437c854da2eda506a6c15e486a13523fb4b76a920e622e8 Reason: The required "io.k8s.description" label is missing. Label description: Description of the container displayed in Kubernetes. Term: io.k8s.description Title: Required labels Description: Check the image for the presence of labels that are required. Use the rule data `required_labels` key to set the list of labels to check, or the `fbc_required_labels` key for fbc images. To exclude this rule add "labels.required_labels:io.k8s.description" to the `exclude` section of the policy configuration. Solution: Update the image build process to set the required labels. ✕ [Violation] labels.required_labels ImageRef: quay.io/redhat-user-workloads/ocp-agent-based-installer-tenant/ove-ui-iso@sha256:a611ad4b58c973dc4437c854da2eda506a6c15e486a13523fb4b76a920e622e8 Reason: The required "name" label is missing. Label description: Name of the Image or Container. Term: name Title: Required labels Description: Check the image for the presence of labels that are required. Use the rule data `required_labels` key to set the list of labels to check, or the `fbc_required_labels` key for fbc images. To exclude this rule add "labels.required_labels:name" to the `exclude` section of the policy configuration. Solution: Update the image build process to set the required labels. ✕ [Violation] labels.required_labels ImageRef: quay.io/redhat-user-workloads/ocp-agent-based-installer-tenant/ove-ui-iso@sha256:a611ad4b58c973dc4437c854da2eda506a6c15e486a13523fb4b76a920e622e8 Reason: The required "release" label is missing. Label description: Release Number for this version. Term: release Title: Required labels Description: Check the image for the presence of labels that are required. Use the rule data `required_labels` key to set the list of labels to check, or the `fbc_required_labels` key for fbc images. To exclude this rule add "labels.required_labels:release" to the `exclude` section of the policy configuration. Solution: Update the image build process to set the required labels. ✕ [Violation] labels.required_labels ImageRef: quay.io/redhat-user-workloads/ocp-agent-based-installer-tenant/ove-ui-iso@sha256:a611ad4b58c973dc4437c854da2eda506a6c15e486a13523fb4b76a920e622e8 Reason: The required "url" label is missing. Label description: A URL where the user can find more information about the image. Term: url Title: Required labels Description: Check the image for the presence of labels that are required. Use the rule data `required_labels` key to set the list of labels to check, or the `fbc_required_labels` key for fbc images. To exclude this rule add "labels.required_labels:url" to the `exclude` section of the policy configuration. Solution: Update the image build process to set the required labels. ✕ [Violation] labels.required_labels ImageRef: quay.io/redhat-user-workloads/ocp-agent-based-installer-tenant/ove-ui-iso@sha256:a611ad4b58c973dc4437c854da2eda506a6c15e486a13523fb4b76a920e622e8 Reason: The required "vendor" label is missing. Label description: Name of the vendor. Term: vendor Title: Required labels Description: Check the image for the presence of labels that are required. Use the rule data `required_labels` key to set the list of labels to check, or the `fbc_required_labels` key for fbc images. To exclude this rule add "labels.required_labels:vendor" to the `exclude` section of the policy configuration. Solution: Update the image build process to set the required labels. ✕ [Violation] labels.required_labels ImageRef: quay.io/redhat-user-workloads/ocp-agent-based-installer-tenant/ove-ui-iso@sha256:a611ad4b58c973dc4437c854da2eda506a6c15e486a13523fb4b76a920e622e8 Reason: The required "version" label is missing. Label description: Version of the image. Term: version Title: Required labels Description: Check the image for the presence of labels that are required. Use the rule data `required_labels` key to set the list of labels to check, or the `fbc_required_labels` key for fbc images. To exclude this rule add "labels.required_labels:version" to the `exclude` section of the policy configuration. Solution: Update the image build process to set the required labels. ✕ [Violation] source_image.exists ImageRef: quay.io/redhat-user-workloads/ocp-agent-based-installer-tenant/ove-ui-iso@sha256:a611ad4b58c973dc4437c854da2eda506a6c15e486a13523fb4b76a920e622e8 Reason: No source image references found Title: Exists Description: Verify the source container image exists. To exclude this rule add "source_image.exists" to the `exclude` section of the policy configuration. ✕ [Violation] tasks.required_tasks_found ImageRef: quay.io/redhat-user-workloads/ocp-agent-based-installer-tenant/ove-ui-iso@sha256:a611ad4b58c973dc4437c854da2eda506a6c15e486a13523fb4b76a920e622e8 Reason: Required task "clair-scan" is missing Term: clair-scan Title: All required tasks were included in the pipeline Description: Ensure that the set of required tasks are included in the PipelineRun attestation. To exclude this rule add "tasks.required_tasks_found:clair-scan" to the `exclude` section of the policy configuration. Solution: Make sure all required tasks are in the build pipeline. The required task list is contained as https://conforma.dev/docs/cli/configuration.html#_data_sources under the key 'required-tasks'. ✕ [Violation] tasks.required_tasks_found ImageRef: quay.io/redhat-user-workloads/ocp-agent-based-installer-tenant/ove-ui-iso@sha256:a611ad4b58c973dc4437c854da2eda506a6c15e486a13523fb4b76a920e622e8 Reason: One of "source-build", "source-build-oci-ta" tasks is missing Terms: source-build, source-build-oci-ta Title: All required tasks were included in the pipeline Description: Ensure that the set of required tasks are included in the PipelineRun attestation. To exclude this rule add one or more of "tasks.required_tasks_found:source-build", "tasks.required_tasks_found:source-build-oci-ta" to the `exclude` section of the policy configuration. Solution: Make sure all required tasks are in the build pipeline. The required task list is contained as https://conforma.dev/docs/cli/configuration.html#_data_sources under the key 'required-tasks'. ✕ [Violation] test.no_erred_tests ImageRef: quay.io/redhat-user-workloads/ocp-agent-based-installer-tenant/ove-ui-iso@sha256:a611ad4b58c973dc4437c854da2eda506a6c15e486a13523fb4b76a920e622e8 Reason: The Task "ecosystem-cert-preflight-checks" from the build Pipeline reports a test erred Term: ecosystem-cert-preflight-checks Title: No tests erred Description: Produce a violation if any tests have their result set to "ERROR". The result type is configurable by the "erred_tests_results" key in the rule data. To exclude this rule add "test.no_erred_tests:ecosystem-cert-preflight-checks" to the `exclude` section of the policy configuration. Solution: There is a test that erred. Make sure that any task in the build pipeline with a result named 'TEST_OUTPUT' does not err. More information about the test should be available in the logs for the build Pipeline. ✕ [Violation] test.no_skipped_tests ImageRef: quay.io/redhat-user-workloads/ocp-agent-based-installer-tenant/ove-ui-iso@sha256:a611ad4b58c973dc4437c854da2eda506a6c15e486a13523fb4b76a920e622e8 Reason: The Task "sast-snyk-check-oci-ta" from the build Pipeline reports a test was skipped Term: sast-snyk-check-oci-ta Title: No tests were skipped Description: Produce a violation if any tests have their result set to "SKIPPED". A skipped result means a pre-requirement for executing the test was not met, e.g. a license key for executing a scanner was not provided. The result type is configurable by the "skipped_tests_results" key in the rule data. To exclude this rule add "test.no_skipped_tests:sast-snyk-check-oci-ta" to the `exclude` section of the policy configuration. Solution: There is a test that was skipped. Make sure that each task with a result named 'TEST_OUTPUT' was not skipped. You can find which test was skipped by examining the 'result' key in the 'TEST_OUTPUT'. More information about the test should be available in the logs for the build Pipeline. ✕ [Violation] base_image_registries.base_image_permitted ImageRef: quay.io/redhat-user-workloads/ocp-agent-based-installer-tenant/ove-ui-iso@sha256:538f4b60df5fa3bc57ce8a74b564cd27831476238cfc2fcb43bf670b9cb13c33 Reason: Base image "registry.ci.openshift.org/ocp/4.21@sha256:549aada9a03130e243c5e40c7244bdbb06319fbce5f84db50e8f5c303ef4a209" is from a disallowed registry Term: registry.ci.openshift.org/ocp/4.21 Title: Base image comes from permitted registry Description: Verify that the base images used when building a container image come from a known set of trusted registries to reduce potential supply chain attacks. By default this policy defines trusted registries as registries that are fully maintained by Red Hat and only contain content produced by Red Hat. The list of permitted registries can be customized by setting the `allowed_registry_prefixes` list in the rule data. Base images that are found in the snapshot being validated are also allowed since EC will also validate those images individually. To exclude this rule add "base_image_registries.base_image_permitted:registry.ci.openshift.org/ocp/4.21" to the `exclude` section of the policy configuration. To exclude this rule add "base_image_registries.base_image_permitted:registry.ci.openshift.org/ocp/4.21" to the `exclude` section of the policy configuration. Solution: Make sure the image used in each task comes from a trusted registry. The list of trusted registries is a configurable https://conforma.dev/docs/cli/configuration.html#_data_sources. ✕ [Violation] base_image_registries.base_image_permitted ImageRef: quay.io/redhat-user-workloads/ocp-agent-based-installer-tenant/ove-ui-iso@sha256:538f4b60df5fa3bc57ce8a74b564cd27831476238cfc2fcb43bf670b9cb13c33 Reason: Base image "registry.ci.openshift.org/ocp/4.21@sha256:549aada9a03130e243c5e40c7244bdbb06319fbce5f84db50e8f5c303ef4a209" is from a disallowed registry Term: registry.ci.openshift.org/ocp/4.21 Title: Base image comes from permitted registry Description: Verify that the base images used when building a container image come from a known set of trusted registries to reduce potential supply chain attacks. By default this policy defines trusted registries as registries that are fully maintained by Red Hat and only contain content produced by Red Hat. The list of permitted registries can be customized by setting the `allowed_registry_prefixes` list in the rule data. Base images that are found in the snapshot being validated are also allowed since EC will also validate those images individually. To exclude this rule add "base_image_registries.base_image_permitted:registry.ci.openshift.org/ocp/4.21" to the `exclude` section of the policy configuration. To exclude this rule add "base_image_registries.base_image_permitted:registry.ci.openshift.org/ocp/4.21" to the `exclude` section of the policy configuration. Solution: Make sure the image used in each task comes from a trusted registry. The list of trusted registries is a configurable https://conforma.dev/docs/cli/configuration.html#_data_sources. ✕ [Violation] buildah_build_task.platform_param ImageRef: quay.io/redhat-user-workloads/ocp-agent-based-installer-tenant/ove-ui-iso@sha256:538f4b60df5fa3bc57ce8a74b564cd27831476238cfc2fcb43bf670b9cb13c33 Reason: PLATFORM parameter value "linux-root/amd64" is disallowed by regex ".*root.*" Title: PLATFORM parameter Description: Verify the value of the PLATFORM parameter of a builder Task is allowed by matching against a list of disallowed patterns. The list of patterns can be customized via the `disallowed_platform_patterns` rule data key. If empty, all values are allowed. To exclude this rule add "buildah_build_task.platform_param" to the `exclude` section of the policy configuration. Solution: Use a different PLATFORM value that is not disallowed by the policy config. ✕ [Violation] buildah_build_task.privileged_nested_param ImageRef: quay.io/redhat-user-workloads/ocp-agent-based-installer-tenant/ove-ui-iso@sha256:538f4b60df5fa3bc57ce8a74b564cd27831476238cfc2fcb43bf670b9cb13c33 Reason: setting PRIVILEGED_NESTED parameter to true is not allowed Title: PRIVILEGED_NESTED parameter Description: Verify the PRIVILEGED_NESTED parameter of a builder Tasks was not set to `true`. To exclude this rule add "buildah_build_task.privileged_nested_param" to the `exclude` section of the policy configuration. Solution: Setting PRIVILEGED_NESTED parameter to true is not allowed for most container image builds. Either set the parameter value to false or use a policy config that excludes this policy rule. ✕ [Violation] cve.cve_results_found ImageRef: quay.io/redhat-user-workloads/ocp-agent-based-installer-tenant/ove-ui-iso@sha256:538f4b60df5fa3bc57ce8a74b564cd27831476238cfc2fcb43bf670b9cb13c33 Reason: Clair CVE scan results were not found Title: CVE scan results found Description: Confirm that clair-scan task results are present in the SLSA Provenance attestation of the build pipeline. To exclude this rule add "cve.cve_results_found" to the `exclude` section of the policy configuration. Solution: Make sure there is a successful task in the build pipeline that runs a Clair scan. ✕ [Violation] hermetic_task.hermetic ImageRef: quay.io/redhat-user-workloads/ocp-agent-based-installer-tenant/ove-ui-iso@sha256:538f4b60df5fa3bc57ce8a74b564cd27831476238cfc2fcb43bf670b9cb13c33 Reason: Task 'buildah-remote-oci-ta' was not invoked with the hermetic parameter set Title: Task called with hermetic param set Description: Verify the task in the PipelineRun attestation was invoked with the proper parameters to make the task execution hermetic. To exclude this rule add "hermetic_task.hermetic" to the `exclude` section of the policy configuration. Solution: Make sure the task has the input parameter 'HERMETIC' set to 'true'. ✕ [Violation] labels.required_labels ImageRef: quay.io/redhat-user-workloads/ocp-agent-based-installer-tenant/ove-ui-iso@sha256:538f4b60df5fa3bc57ce8a74b564cd27831476238cfc2fcb43bf670b9cb13c33 Reason: The required "com.redhat.component" label is missing. Label description: The Bugzilla component name where bugs against this container should be reported by users. Term: com.redhat.component Title: Required labels Description: Check the image for the presence of labels that are required. Use the rule data `required_labels` key to set the list of labels to check, or the `fbc_required_labels` key for fbc images. To exclude this rule add "labels.required_labels:com.redhat.component" to the `exclude` section of the policy configuration. Solution: Update the image build process to set the required labels. ✕ [Violation] labels.required_labels ImageRef: quay.io/redhat-user-workloads/ocp-agent-based-installer-tenant/ove-ui-iso@sha256:538f4b60df5fa3bc57ce8a74b564cd27831476238cfc2fcb43bf670b9cb13c33 Reason: The required "description" label is missing. Label description: Detailed description of the image. Term: description Title: Required labels Description: Check the image for the presence of labels that are required. Use the rule data `required_labels` key to set the list of labels to check, or the `fbc_required_labels` key for fbc images. To exclude this rule add "labels.required_labels:description" to the `exclude` section of the policy configuration. Solution: Update the image build process to set the required labels. ✕ [Violation] labels.required_labels ImageRef: quay.io/redhat-user-workloads/ocp-agent-based-installer-tenant/ove-ui-iso@sha256:538f4b60df5fa3bc57ce8a74b564cd27831476238cfc2fcb43bf670b9cb13c33 Reason: The required "distribution-scope" label is missing. Label description: Scope of intended distribution of the image. (private/authoritative-source-only/restricted/public). Term: distribution-scope Title: Required labels Description: Check the image for the presence of labels that are required. Use the rule data `required_labels` key to set the list of labels to check, or the `fbc_required_labels` key for fbc images. To exclude this rule add "labels.required_labels:distribution-scope" to the `exclude` section of the policy configuration. Solution: Update the image build process to set the required labels. ✕ [Violation] labels.required_labels ImageRef: quay.io/redhat-user-workloads/ocp-agent-based-installer-tenant/ove-ui-iso@sha256:538f4b60df5fa3bc57ce8a74b564cd27831476238cfc2fcb43bf670b9cb13c33 Reason: The required "io.k8s.description" label is missing. Label description: Description of the container displayed in Kubernetes. Term: io.k8s.description Title: Required labels Description: Check the image for the presence of labels that are required. Use the rule data `required_labels` key to set the list of labels to check, or the `fbc_required_labels` key for fbc images. To exclude this rule add "labels.required_labels:io.k8s.description" to the `exclude` section of the policy configuration. Solution: Update the image build process to set the required labels. ✕ [Violation] labels.required_labels ImageRef: quay.io/redhat-user-workloads/ocp-agent-based-installer-tenant/ove-ui-iso@sha256:538f4b60df5fa3bc57ce8a74b564cd27831476238cfc2fcb43bf670b9cb13c33 Reason: The required "name" label is missing. Label description: Name of the Image or Container. Term: name Title: Required labels Description: Check the image for the presence of labels that are required. Use the rule data `required_labels` key to set the list of labels to check, or the `fbc_required_labels` key for fbc images. To exclude this rule add "labels.required_labels:name" to the `exclude` section of the policy configuration. Solution: Update the image build process to set the required labels. ✕ [Violation] labels.required_labels ImageRef: quay.io/redhat-user-workloads/ocp-agent-based-installer-tenant/ove-ui-iso@sha256:538f4b60df5fa3bc57ce8a74b564cd27831476238cfc2fcb43bf670b9cb13c33 Reason: The required "release" label is missing. Label description: Release Number for this version. Term: release Title: Required labels Description: Check the image for the presence of labels that are required. Use the rule data `required_labels` key to set the list of labels to check, or the `fbc_required_labels` key for fbc images. To exclude this rule add "labels.required_labels:release" to the `exclude` section of the policy configuration. Solution: Update the image build process to set the required labels. ✕ [Violation] labels.required_labels ImageRef: quay.io/redhat-user-workloads/ocp-agent-based-installer-tenant/ove-ui-iso@sha256:538f4b60df5fa3bc57ce8a74b564cd27831476238cfc2fcb43bf670b9cb13c33 Reason: The required "url" label is missing. Label description: A URL where the user can find more information about the image. Term: url Title: Required labels Description: Check the image for the presence of labels that are required. Use the rule data `required_labels` key to set the list of labels to check, or the `fbc_required_labels` key for fbc images. To exclude this rule add "labels.required_labels:url" to the `exclude` section of the policy configuration. Solution: Update the image build process to set the required labels. ✕ [Violation] labels.required_labels ImageRef: quay.io/redhat-user-workloads/ocp-agent-based-installer-tenant/ove-ui-iso@sha256:538f4b60df5fa3bc57ce8a74b564cd27831476238cfc2fcb43bf670b9cb13c33 Reason: The required "vendor" label is missing. Label description: Name of the vendor. Term: vendor Title: Required labels Description: Check the image for the presence of labels that are required. Use the rule data `required_labels` key to set the list of labels to check, or the `fbc_required_labels` key for fbc images. To exclude this rule add "labels.required_labels:vendor" to the `exclude` section of the policy configuration. Solution: Update the image build process to set the required labels. ✕ [Violation] labels.required_labels ImageRef: quay.io/redhat-user-workloads/ocp-agent-based-installer-tenant/ove-ui-iso@sha256:538f4b60df5fa3bc57ce8a74b564cd27831476238cfc2fcb43bf670b9cb13c33 Reason: The required "version" label is missing. Label description: Version of the image. Term: version Title: Required labels Description: Check the image for the presence of labels that are required. Use the rule data `required_labels` key to set the list of labels to check, or the `fbc_required_labels` key for fbc images. To exclude this rule add "labels.required_labels:version" to the `exclude` section of the policy configuration. Solution: Update the image build process to set the required labels. ✕ [Violation] source_image.exists ImageRef: quay.io/redhat-user-workloads/ocp-agent-based-installer-tenant/ove-ui-iso@sha256:538f4b60df5fa3bc57ce8a74b564cd27831476238cfc2fcb43bf670b9cb13c33 Reason: No source image references found Title: Exists Description: Verify the source container image exists. To exclude this rule add "source_image.exists" to the `exclude` section of the policy configuration. ✕ [Violation] tasks.required_tasks_found ImageRef: quay.io/redhat-user-workloads/ocp-agent-based-installer-tenant/ove-ui-iso@sha256:538f4b60df5fa3bc57ce8a74b564cd27831476238cfc2fcb43bf670b9cb13c33 Reason: Required task "clair-scan" is missing Term: clair-scan Title: All required tasks were included in the pipeline Description: Ensure that the set of required tasks are included in the PipelineRun attestation. To exclude this rule add "tasks.required_tasks_found:clair-scan" to the `exclude` section of the policy configuration. Solution: Make sure all required tasks are in the build pipeline. The required task list is contained as https://conforma.dev/docs/cli/configuration.html#_data_sources under the key 'required-tasks'. ✕ [Violation] tasks.required_tasks_found ImageRef: quay.io/redhat-user-workloads/ocp-agent-based-installer-tenant/ove-ui-iso@sha256:538f4b60df5fa3bc57ce8a74b564cd27831476238cfc2fcb43bf670b9cb13c33 Reason: One of "source-build", "source-build-oci-ta" tasks is missing Terms: source-build, source-build-oci-ta Title: All required tasks were included in the pipeline Description: Ensure that the set of required tasks are included in the PipelineRun attestation. To exclude this rule add one or more of "tasks.required_tasks_found:source-build", "tasks.required_tasks_found:source-build-oci-ta" to the `exclude` section of the policy configuration. Solution: Make sure all required tasks are in the build pipeline. The required task list is contained as https://conforma.dev/docs/cli/configuration.html#_data_sources under the key 'required-tasks'. ✕ [Violation] test.no_erred_tests ImageRef: quay.io/redhat-user-workloads/ocp-agent-based-installer-tenant/ove-ui-iso@sha256:538f4b60df5fa3bc57ce8a74b564cd27831476238cfc2fcb43bf670b9cb13c33 Reason: The Task "ecosystem-cert-preflight-checks" from the build Pipeline reports a test erred Term: ecosystem-cert-preflight-checks Title: No tests erred Description: Produce a violation if any tests have their result set to "ERROR". The result type is configurable by the "erred_tests_results" key in the rule data. To exclude this rule add "test.no_erred_tests:ecosystem-cert-preflight-checks" to the `exclude` section of the policy configuration. Solution: There is a test that erred. Make sure that any task in the build pipeline with a result named 'TEST_OUTPUT' does not err. More information about the test should be available in the logs for the build Pipeline. ✕ [Violation] test.no_skipped_tests ImageRef: quay.io/redhat-user-workloads/ocp-agent-based-installer-tenant/ove-ui-iso@sha256:538f4b60df5fa3bc57ce8a74b564cd27831476238cfc2fcb43bf670b9cb13c33 Reason: The Task "sast-snyk-check-oci-ta" from the build Pipeline reports a test was skipped Term: sast-snyk-check-oci-ta Title: No tests were skipped Description: Produce a violation if any tests have their result set to "SKIPPED". A skipped result means a pre-requirement for executing the test was not met, e.g. a license key for executing a scanner was not provided. The result type is configurable by the "skipped_tests_results" key in the rule data. To exclude this rule add "test.no_skipped_tests:sast-snyk-check-oci-ta" to the `exclude` section of the policy configuration. Solution: There is a test that was skipped. Make sure that each task with a result named 'TEST_OUTPUT' was not skipped. You can find which test was skipped by examining the 'result' key in the 'TEST_OUTPUT'. More information about the test should be available in the logs for the build Pipeline.