Running with gitlab-runner 13.8.0 (775dd39d)  on dsop-shared-gitlab-runner-f887cbcbd-srgz6 E82_g8RG section_start:1623430415:resolve_secrets Resolving secrets section_end:1623430415:resolve_secrets section_start:1623430415:prepare_executor Preparing the "kubernetes" executor Using Kubernetes namespace: gitlab-runner-ironbank-dsop WARNING: Pulling GitLab Runner helper image from Docker Hub. Helper image is migrating to registry.gitlab.com, for more information see https://docs.gitlab.com/runner/configuration/advanced-configuration.html#migrating-helper-image-to-registrygitlabcom Using Kubernetes executor with image registry1.dso.mil/ironbank/ironbank-pipelines/rootless-podman:0.1 ... section_end:1623430415:prepare_executor section_start:1623430415:prepare_script Preparing environment Waiting for pod gitlab-runner-ironbank-dsop/runner-e82g8rg-project-4501-concurrent-0bksrf to be running, status is Pending Waiting for pod gitlab-runner-ironbank-dsop/runner-e82g8rg-project-4501-concurrent-0bksrf to be running, status is Pending ContainersNotReady: "containers with unready status: [build helper istio-proxy]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" Running on runner-e82g8rg-project-4501-concurrent-0bksrf via dsop-shared-gitlab-runner-f887cbcbd-srgz6... section_end:1623430421:prepare_script section_start:1623430421:get_sources Getting source from Git repository $ until [ $(curl --fail --silent --output /dev/stderr --write-out "%{http_code}" localhost:15020/healthz/ready) -eq 200 ]; do echo Waiting for Sidecar; sleep 3 ; done ; echo Sidecar available; Sidecar available Fetching changes with git depth set to 50... Initialized empty Git repository in /builds/dsop/opensource/tektoncd/kubeconfigwriter/.git/ Created fresh repository. Checking out 24556671 as development... Skipping object checkout, Git LFS is not installed. Skipping Git submodules setup section_end:1623430422:get_sources section_start:1623430422:download_artifacts Downloading artifacts Downloading artifacts for hardening-manifest (4015565)... Downloading artifacts from coordinator... ok  id=4015565 responseStatus=200 OK token=1p-5Z8nP WARNING: ci-artifacts/preflight/: lchown ci-artifacts/preflight/: operation not permitted (suppressing repeats) Downloading artifacts for import-artifacts (4015567)... Downloading artifacts from coordinator... ok  id=4015567 responseStatus=200 OK token=szPsqwYZ Downloading artifacts for load-scripts (4015562)... WARNING: ci-artifacts/import-artifacts/: lchown ci-artifacts/import-artifacts/: operation not permitted (suppressing repeats) Downloading artifacts from coordinator... ok  id=4015562 responseStatus=200 OK token=Rs6jA1-J WARNING: ci-artifacts/[MASKED]/: lchown ci-artifacts/[MASKED]/: operation not permitted (suppressing repeats) Downloading artifacts for wl-compare-lint (4015566)... Downloading artifacts from coordinator... ok  id=4015566 responseStatus=200 OK token=ot6DUWGg WARNING: ci-artifacts/lint/: lchown ci-artifacts/lint/: operation not permitted (suppressing repeats) section_end:1623430423:download_artifacts section_start:1623430423:step_script Executing "step_script" stage of the job script $ "${PIPELINE_REPO_DIR}/stages/build/build-run.sh" Determine source registry based on branch Load any images used in Dockerfile build loading image ci-artifacts/import-artifacts/images/gcr.io-tekton-releases-github.com-tektoncd-pipeline-cmd-kubeconfigwriter-v0.24.3.tar time="2021-06-11T16:53:43Z" level=warning msg="Failed to detect the owner for the current cgroup: stat /sys/fs/cgroup/systemd/kubepods/burstable/pod9e5af410-83f8-4a54-9e29-273fe187c6b2/1c52ca6a73976269fc8a3bfb162065740ec8366be6573f038966f2ea7f95b4cd: no such file or directory" Getting image source signatures Copying blob sha256:3d5eaedf5f786fafff5aba1994c07968c36e50cfbc3de6c975c4675fa1aa2f9b Copying blob sha256:417cb9b79adeec55f58b890dc9831e252e3523d8de5fd28b4ee2abb151b7dc8b Copying blob sha256:aa7650f3af0a50a1ffcf558864ec2849caad3cec4f7d079bf6351049f8527fd1 Copying config sha256:c0658ab1803d1b5b922bfcdebe2148cb38d30e2db32a76ba8d8e3211a72360ee Writing manifest to image destination Storing signatures Loaded image(s): gcr.io/tekton-releases/github.com/tektoncd/pipeline/cmd/kubeconfigwriter:v0.24.3 Load HTTP and S3 external resources Converting labels from hardening manifest into command line args Converting build args from hardening manifest into command line args Build the image STEP 1: FROM gcr.io/tekton-releases/github.com/tektoncd/pipeline/cmd/kubeconfigwriter:v0.24.3 AS build Getting image source signatures Copying blob sha256:417cb9b79adeec55f58b890dc9831e252e3523d8de5fd28b4ee2abb151b7dc8b Copying blob sha256:aa7650f3af0a50a1ffcf558864ec2849caad3cec4f7d079bf6351049f8527fd1 Copying blob sha256:3d5eaedf5f786fafff5aba1994c07968c36e50cfbc3de6c975c4675fa1aa2f9b Copying config sha256:7020753430b05f4a76247b94d0898a74154f46107d1506bcc1800cb3429236ac Writing manifest to image destination Storing signatures --> 7020753430b STEP 2: FROM registry1.dso.mil/ironbank/google/distroless/static:latest Getting image source signatures Copying blob sha256:ff53f95d20d5f6ca55d46980861da4798ee325927876aa53bfc5e2a32a864dc7 Copying blob sha256:0601dccf3e93d42edf170296e848683623040da96519b1b943b8842620c24bd0 Copying blob sha256:56a974ed63388950cfc5e7627b1bee951cc1a20fb45dedd4d8d8f34d63c6ef4a Copying config sha256:16f743b18673c29d54af5b864b4375054771866a6f7cecb267a24636f8a7908d Writing manifest to image destination Storing signatures STEP 3: COPY --from=build /ko-app /ko-app STEP 4: USER 1001 STEP 5: HEALTHCHECK NONE STEP 6: CMD ["/ko-app/kubeconfigwriter"] STEP 7: COMMIT registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter Getting image source signatures Copying blob sha256:79d541cda6cb9a0c0e4aaa62aaea1f85b6b56544b5ad25e1e3369525ec0bf670 Copying blob sha256:84ff92691f909a05b224e1c56abb4864f01b4f8e3c854e4bb4c7baf1d3f6d652 Copying blob sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef Copying blob sha256:60b194c22acf44202860b82db7726ab7fc90008bf9da4b29fb40ba0daa32f44a Copying config sha256:1ffafffe58339524b766e2694e0706dee95495913d7a1bf234ae0882289a262f Writing manifest to image destination Storing signatures --> 1ffafffe583 1ffafffe58339524b766e2694e0706dee95495913d7a1bf234ae0882289a262f + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter:309762 + buildah push --storage-driver=vfs --authfile staging_auth.json --digestfile=ci-artifacts/build/digest registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter:309762 Getting image source signatures Copying blob sha256:60b194c22acf44202860b82db7726ab7fc90008bf9da4b29fb40ba0daa32f44a Copying blob sha256:79d541cda6cb9a0c0e4aaa62aaea1f85b6b56544b5ad25e1e3369525ec0bf670 Copying blob sha256:84ff92691f909a05b224e1c56abb4864f01b4f8e3c854e4bb4c7baf1d3f6d652 Copying blob sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef Copying config sha256:1ffafffe58339524b766e2694e0706dee95495913d7a1bf234ae0882289a262f Writing manifest to image destination Storing signatures + echo 'Read the tags' + tags_file=ci-artifacts/preflight/tags.txt + test -f ci-artifacts/preflight/tags.txt + IFS= + read -r tag + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter:v0.24.3 Read the tags + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter:v0.24.3 Getting image source signatures Copying blob sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef Copying blob sha256:79d541cda6cb9a0c0e4aaa62aaea1f85b6b56544b5ad25e1e3369525ec0bf670 Copying blob sha256:60b194c22acf44202860b82db7726ab7fc90008bf9da4b29fb40ba0daa32f44a Copying blob sha256:84ff92691f909a05b224e1c56abb4864f01b4f8e3c854e4bb4c7baf1d3f6d652 Copying config sha256:1ffafffe58339524b766e2694e0706dee95495913d7a1bf234ae0882289a262f Writing manifest to image destination Storing signatures + IFS= + read -r tag + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter:latest + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter:latest Getting image source signatures Copying blob sha256:79d541cda6cb9a0c0e4aaa62aaea1f85b6b56544b5ad25e1e3369525ec0bf670 Copying blob sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef Copying blob sha256:60b194c22acf44202860b82db7726ab7fc90008bf9da4b29fb40ba0daa32f44a Copying blob sha256:84ff92691f909a05b224e1c56abb4864f01b4f8e3c854e4bb4c7baf1d3f6d652 Copying config sha256:1ffafffe58339524b766e2694e0706dee95495913d7a1bf234ae0882289a262f Writing manifest to image destination Storing signatures + IFS= + read -r tag ++ podman inspect --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter --format '{{.Id}}' time="2021-06-11T16:54:22Z" level=warning msg="Failed to detect the owner for the current cgroup: stat /sys/fs/cgroup/systemd/kubepods/burstable/pod9e5af410-83f8-4a54-9e29-273fe187c6b2/1c52ca6a73976269fc8a3bfb162065740ec8366be6573f038966f2ea7f95b4cd: no such file or directory" + IMAGE_ID=sha256:1ffafffe58339524b766e2694e0706dee95495913d7a1bf234ae0882289a262f + echo IMAGE_ID=sha256:1ffafffe58339524b766e2694e0706dee95495913d7a1bf234ae0882289a262f + IMAGE_PODMAN_SHA=sha256:a8782f3b05adf17f2e6e87eadbc8f439455345d21cd84aefb133fc9556f7554f + echo IMAGE_PODMAN_SHA=sha256:a8782f3b05adf17f2e6e87eadbc8f439455345d21cd84aefb133fc9556f7554f A tarball of the built image can be retrieved from the documentation job artifacts. + echo IMAGE_FULLTAG=registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter:309762 + echo IMAGE_NAME=opensource/tektoncd/kubeconfigwriter + branches=("master" "development") + [[ master development =~ development ]] + msg='A tarball of the built image can be retrieved from the documentation job artifacts.' + echo 'A tarball of the built image can be retrieved from the documentation job artifacts.' section_end:1623430462:step_script section_start:1623430462:upload_artifacts_on_success Uploading artifacts for successful job Uploading artifacts... ci-artifacts/build/: found 2 matching files and directories Uploading artifacts as "archive" to coordinator... ok id=4015569 responseStatus=201 Created token=GJhuCUeu Uploading artifacts... build.env: found 1 matching files and directories  Uploading artifacts as "dotenv" to coordinator... ok id=4015569 responseStatus=201 Created token=GJhuCUeu section_end:1623430463:upload_artifacts_on_success section_start:1623430463:cleanup_file_variables Cleaning up file based variables section_end:1623430463:cleanup_file_variables Job succeeded