Skip to content

Conversation

@octo-sts
Copy link
Contributor

@octo-sts octo-sts bot commented Oct 16, 2025

Signed-off-by: wolfi-bot <121097084+wolfi-bot@users.noreply.github.com>
@octo-sts octo-sts bot added request-version-update request for a newer version of a package automated pr keycloak-26.4 P1 This label indicates our scanning found High, Medium or Low CVEs for these packages. labels Oct 16, 2025
@octo-sts
Copy link
Contributor Author

octo-sts bot commented Oct 16, 2025

📡 Build Failed: Network

curl: (22) The requested URL returned error: 404

Build Details

Category Details
Build System melange
Failure Point curl command trying to get token from OctoSTS service

Root Cause Analysis 🔍

Network request to OctoSTS service failed with HTTP 404 error while attempting to authenticate for GitHub access. The service endpoint 'http://metadata.google.internal/computeMetadata/v1/instance/service-accounts/default/identity?audience=octo-sts.dev' returned a 404 Not Found error, indicating either the service is unavailable or the endpoint URL is incorrect.


🔍 Build failure fix suggestions

Found similar build failures that have been fixed in the past and analyzed them to suggest a fix:

Similar PRs with fixes

Suggested Changes

File: keycloak-26.4.yaml

  • modification at line 4 (package.epoch field)
    Original:
  epoch: 0 # GHSA-3p8m-j85q-pgmj

Replacement:

  epoch: 1 # GHSA-3p8m-j85q-pgmj

Content:

Increment epoch from 0 to 1 to trigger rebuild with fresh authentication context
Click to expand fix analysis

Analysis

All three similar fixes show an identical pattern: when build failures occur due to curl 404 errors from OctoSTS authentication services, the solution was to increment the epoch value in the package metadata and add a CVE reference comment. This suggests that the OctoSTS authentication issues are typically resolved by triggering a rebuild with updated package metadata, likely because the authentication service endpoints or tokens get refreshed in newer build environments.

Click to expand fix explanation

Explanation

The fix works by incrementing the package epoch, which forces a complete rebuild in a fresh environment. This addresses the OctoSTS authentication 404 error because: 1) The ephemeral build environment will be recreated with potentially updated authentication service endpoints, 2) Any cached or stale authentication tokens that might be causing the 404 will be cleared, 3) The build system will retry the authentication process from scratch, and 4) The epoch increment ensures the package manager treats this as a newer version, forcing the rebuild. Since all three similar failures were resolved using this exact approach, it's the established pattern for fixing OctoSTS 404 authentication errors in the Wolfi build system.

Click to expand alternative approaches

Alternative Approaches

  • Wait for the OctoSTS service to be restored if it's a temporary service outage
  • Check if the metadata service endpoint URL has changed and update build scripts accordingly
  • Implement retry logic with exponential backoff in the authentication step
  • Use alternative authentication methods if OctoSTS continues to be unreliable

Was this comment helpful? Please use 👍 or 👎 reactions on this comment.

@octo-sts octo-sts bot added the ai/skip-comment Stop AI from commenting on PR label Oct 16, 2025
@OddBloke OddBloke self-assigned this Oct 16, 2025
@octo-sts octo-sts bot added bincapz/pass bincapz/pass Bincapz (aka. malcontent) scan didn't detect any CRITICALs on the scanned packages. manual/review-needed labels Oct 16, 2025
@OddBloke OddBloke removed their assignment Oct 22, 2025
@octo-sts octo-sts bot closed this Oct 23, 2025
@octo-sts
Copy link
Contributor Author

octo-sts bot commented Oct 23, 2025

superseded by #69798

@octo-sts octo-sts bot deleted the wolfictl-fd24211f-7b88-4474-a537-76c5f439d10f branch October 24, 2025 00:02
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

ai/skip-comment Stop AI from commenting on PR automated pr bincapz/pass bincapz/pass Bincapz (aka. malcontent) scan didn't detect any CRITICALs on the scanned packages. keycloak-26.4 manual/review-needed P1 This label indicates our scanning found High, Medium or Low CVEs for these packages. request-version-update request for a newer version of a package

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants