Running with gitlab-runner 13.8.0 (775dd39d)  on dsop-shared-gitlab-runner-5f4b468dff-8vfv5 BsbAJu5w section_start:1623273481:resolve_secrets Resolving secrets section_end:1623273481:resolve_secrets section_start:1623273481:prepare_executor Preparing the "kubernetes" executor Using Kubernetes namespace: gitlab-runner-ironbank-dsop WARNING: Pulling GitLab Runner helper image from Docker Hub. Helper image is migrating to registry.gitlab.com, for more information see https://docs.gitlab.com/runner/configuration/advanced-configuration.html#migrating-helper-image-to-registrygitlabcom Using Kubernetes executor with image registry1.dso.mil/ironbank/ironbank-pipelines/rootless-podman:0.1 ... section_end:1623273481:prepare_executor section_start:1623273481:prepare_script Preparing environment Waiting for pod gitlab-runner-ironbank-dsop/runner-bsbaju5w-project-4501-concurrent-0bzzcc to be running, status is Pending Running on runner-bsbaju5w-project-4501-concurrent-0bzzcc via dsop-shared-gitlab-runner-5f4b468dff-8vfv5... section_end:1623273484:prepare_script section_start:1623273484:get_sources Getting source from Git repository Fetching changes with git depth set to 50... Initialized empty Git repository in /builds/dsop/opensource/tektoncd/kubeconfigwriter/.git/ Created fresh repository. Checking out 02cb58e1 as development... Skipping Git submodules setup section_end:1623273485:get_sources section_start:1623273485:download_artifacts Downloading artifacts Downloading artifacts for hardening-manifest (3974459)... Downloading artifacts for import-artifacts (3974485)... Downloading artifacts from coordinator... ok  id=3974459 responseStatus=200 OK token=h6zLsMqh Downloading artifacts from coordinator... ok  id=3974485 responseStatus=200 OK token=opK9bLNp Downloading artifacts for load-scripts (3974456)... Downloading artifacts from coordinator... ok  id=3974456 responseStatus=200 OK token=RsU53TWj Downloading artifacts for wl-compare-lint (3974460)... Downloading artifacts from coordinator... ok  id=3974460 responseStatus=200 OK token=d7X7z5K3 section_end:1623273486:download_artifacts section_start:1623273486:step_script Executing "step_script" stage of the job script $ "${PIPELINE_REPO_DIR}/stages/build/build-run.sh" Determine source registry based on branch Load any images used in Dockerfile build loading image ci-artifacts/import-artifacts/images/gcr.io-tekton-releases-github.com-tektoncd-pipeline-cmd-kubeconfigwriter-v0.24.2.tar time="2021-06-09T21:18:06Z" level=warning msg="Failed to detect the owner for the current cgroup: stat /sys/fs/cgroup/systemd/kubepods/burstable/pod8dff5a1f-af32-48ed-b955-26f14506f179/e26d0a62e24d3acbf2d04ce47a91a346264efe456472fc4b344131e6244e87d4: no such file or directory" Getting image source signatures Copying blob sha256:d9716f263a845a621fb0292c291e08849dfaf5cc6ac1d0611d77c72d648e2a9c Copying blob sha256:417cb9b79adeec55f58b890dc9831e252e3523d8de5fd28b4ee2abb151b7dc8b Copying blob sha256:23145b539d1bd891652a85eb6dd303c9ef8916082d6926c81d7c7eaf058df77f Copying config sha256:5424cc426cb6abddebbcadd4a850df7db2375711cbed214f0117019be3bc85d7 Writing manifest to image destination Storing signatures Loaded image(s): gcr.io/tekton-releases/github.com/tektoncd/pipeline/cmd/kubeconfigwriter:v0.24.2 Load HTTP and S3 external resources Converting labels from hardening manifest into command line args Converting build args from hardening manifest into command line args Build the image STEP 1: FROM gcr.io/tekton-releases/github.com/tektoncd/pipeline/cmd/kubeconfigwriter:v0.24.2 AS build Getting image source signatures Copying blob sha256:417cb9b79adeec55f58b890dc9831e252e3523d8de5fd28b4ee2abb151b7dc8b Copying blob sha256:23145b539d1bd891652a85eb6dd303c9ef8916082d6926c81d7c7eaf058df77f Copying blob sha256:d9716f263a845a621fb0292c291e08849dfaf5cc6ac1d0611d77c72d648e2a9c Copying config sha256:0c879f5de8625aefc219f94accc93b225a5d2ce1ca79f31e51c60f2ec4f41c1a Writing manifest to image destination Storing signatures --> 0c879f5de86 STEP 2: FROM registry1.dso.mil/ironbank/google/distroless/static:latest Getting image source signatures Copying blob sha256:56a974ed63388950cfc5e7627b1bee951cc1a20fb45dedd4d8d8f34d63c6ef4a Copying blob sha256:0601dccf3e93d42edf170296e848683623040da96519b1b943b8842620c24bd0 Copying blob sha256:ff53f95d20d5f6ca55d46980861da4798ee325927876aa53bfc5e2a32a864dc7 Copying config sha256:16f743b18673c29d54af5b864b4375054771866a6f7cecb267a24636f8a7908d Writing manifest to image destination Storing signatures STEP 3: COPY --from=build /ko-app /ko-app STEP 4: USER 1001 STEP 5: HEALTHCHECK NONE STEP 6: CMD ["/ko-app/kubeconfigwriter"] STEP 7: COMMIT registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter Getting image source signatures Copying blob sha256:79d541cda6cb9a0c0e4aaa62aaea1f85b6b56544b5ad25e1e3369525ec0bf670 Copying blob sha256:84ff92691f909a05b224e1c56abb4864f01b4f8e3c854e4bb4c7baf1d3f6d652 Copying blob sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef Copying blob sha256:f0d09d9b2dca480852be720616fa49cd7f9510fa3a0966bbdb7f2826a96b25b2 Copying config sha256:4da8d72ae6f1c79f39b833441e9533e108548dc385f64c091cc3bcb2f60ccff9 Writing manifest to image destination Storing signatures --> 4da8d72ae6f 4da8d72ae6f1c79f39b833441e9533e108548dc385f64c091cc3bcb2f60ccff9 + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter:306693 + buildah push --storage-driver=vfs --authfile staging_auth.json --digestfile=ci-artifacts/build/digest registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter:306693 Getting image source signatures Copying blob sha256:f0d09d9b2dca480852be720616fa49cd7f9510fa3a0966bbdb7f2826a96b25b2 Copying blob sha256:84ff92691f909a05b224e1c56abb4864f01b4f8e3c854e4bb4c7baf1d3f6d652 Copying blob sha256:79d541cda6cb9a0c0e4aaa62aaea1f85b6b56544b5ad25e1e3369525ec0bf670 Copying blob sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef Copying config sha256:4da8d72ae6f1c79f39b833441e9533e108548dc385f64c091cc3bcb2f60ccff9 Writing manifest to image destination Storing signatures Read the tags + echo 'Read the tags' + tags_file=ci-artifacts/preflight/tags.txt + test -f ci-artifacts/preflight/tags.txt + IFS= + read -r tag + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter:v0.24.2 + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter:v0.24.2 Getting image source signatures Copying blob sha256:84ff92691f909a05b224e1c56abb4864f01b4f8e3c854e4bb4c7baf1d3f6d652 Copying blob sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef Copying blob sha256:f0d09d9b2dca480852be720616fa49cd7f9510fa3a0966bbdb7f2826a96b25b2 Copying blob sha256:79d541cda6cb9a0c0e4aaa62aaea1f85b6b56544b5ad25e1e3369525ec0bf670 Copying config sha256:4da8d72ae6f1c79f39b833441e9533e108548dc385f64c091cc3bcb2f60ccff9 Writing manifest to image destination Storing signatures + IFS= + read -r tag + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter:latest + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter:latest Getting image source signatures Copying blob sha256:f0d09d9b2dca480852be720616fa49cd7f9510fa3a0966bbdb7f2826a96b25b2 Copying blob sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef Copying blob sha256:79d541cda6cb9a0c0e4aaa62aaea1f85b6b56544b5ad25e1e3369525ec0bf670 Copying blob sha256:84ff92691f909a05b224e1c56abb4864f01b4f8e3c854e4bb4c7baf1d3f6d652 Copying config sha256:4da8d72ae6f1c79f39b833441e9533e108548dc385f64c091cc3bcb2f60ccff9 Writing manifest to image destination Storing signatures + IFS= + read -r tag ++ podman inspect --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter --format '{{.Id}}' time="2021-06-09T21:19:24Z" level=warning msg="Failed to detect the owner for the current cgroup: stat /sys/fs/cgroup/systemd/kubepods/burstable/pod8dff5a1f-af32-48ed-b955-26f14506f179/e26d0a62e24d3acbf2d04ce47a91a346264efe456472fc4b344131e6244e87d4: no such file or directory" + IMAGE_ID=sha256:4da8d72ae6f1c79f39b833441e9533e108548dc385f64c091cc3bcb2f60ccff9 + echo IMAGE_ID=sha256:4da8d72ae6f1c79f39b833441e9533e108548dc385f64c091cc3bcb2f60ccff9 A tarball of the built image can be retrieved from the documentation job artifacts. + IMAGE_PODMAN_SHA=sha256:4c3aa0cafc4bb41a53d053934b9c4231607d8be01ed0c3721dd03e965922e18f + echo IMAGE_PODMAN_SHA=sha256:4c3aa0cafc4bb41a53d053934b9c4231607d8be01ed0c3721dd03e965922e18f + echo IMAGE_FULLTAG=registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter:306693 + echo IMAGE_NAME=opensource/tektoncd/kubeconfigwriter + branches=("master" "development") + [[ master development =~ development ]] + msg='A tarball of the built image can be retrieved from the documentation job artifacts.' + echo 'A tarball of the built image can be retrieved from the documentation job artifacts.' section_end:1623273564:step_script section_start:1623273564:upload_artifacts_on_success Uploading artifacts for successful job Uploading artifacts... ci-artifacts/build/: found 2 matching files and directories Uploading artifacts as "archive" to coordinator... ok id=3974463 responseStatus=201 Created token=pBrxCQsi Uploading artifacts... build.env: found 1 matching files and directories  Uploading artifacts as "dotenv" to coordinator... ok id=3974463 responseStatus=201 Created token=pBrxCQsi section_end:1623273565:upload_artifacts_on_success section_start:1623273565:cleanup_file_variables Cleaning up file based variables section_end:1623273565:cleanup_file_variables Job succeeded