Running with gitlab-runner 13.8.0 (775dd39d)  on dsop-shared-gitlab-runner-f887cbcbd-srgz6 E82_g8RG section_start:1623856699:resolve_secrets Resolving secrets section_end:1623856699:resolve_secrets section_start:1623856699:prepare_executor Preparing the "kubernetes" executor Using Kubernetes namespace: gitlab-runner-ironbank-dsop WARNING: Pulling GitLab Runner helper image from Docker Hub. Helper image is migrating to registry.gitlab.com, for more information see https://docs.gitlab.com/runner/configuration/advanced-configuration.html#migrating-helper-image-to-registrygitlabcom Using Kubernetes executor with image registry1.dso.mil/ironbank/ironbank-pipelines/rootless-podman:0.1 ... section_end:1623856699:prepare_executor section_start:1623856699:prepare_script Preparing environment Waiting for pod gitlab-runner-ironbank-dsop/runner-e82g8rg-project-4501-concurrent-0m7bfz to be running, status is Pending Waiting for pod gitlab-runner-ironbank-dsop/runner-e82g8rg-project-4501-concurrent-0m7bfz to be running, status is Pending ContainersNotReady: "containers with unready status: [build helper istio-proxy]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" Running on runner-e82g8rg-project-4501-concurrent-0m7bfz via dsop-shared-gitlab-runner-f887cbcbd-srgz6... section_end:1623856705:prepare_script section_start:1623856705:get_sources Getting source from Git repository $ until [ $(curl --fail --silent --output /dev/stderr --write-out "%{http_code}" localhost:15020/healthz/ready) -eq 200 ]; do echo Waiting for Sidecar; sleep 3 ; done ; echo Sidecar available; Sidecar available Fetching changes with git depth set to 50... Initialized empty Git repository in /builds/dsop/opensource/tektoncd/kubeconfigwriter/.git/ Created fresh repository. Checking out 01f50089 as development... Skipping object checkout, Git LFS is not installed. Skipping Git submodules setup section_end:1623856706:get_sources section_start:1623856706:download_artifacts Downloading artifacts Downloading artifacts for hardening-manifest (4140423)... Downloading artifacts from coordinator... ok  id=4140423 responseStatus=200 OK token=Y6hzztuf WARNING: ci-artifacts/preflight/: lchown ci-artifacts/preflight/: operation not permitted (suppressing repeats) Downloading artifacts for import-artifacts (4140425)... Downloading artifacts from coordinator... ok  id=4140425 responseStatus=200 OK token=HhAd5vZ3 WARNING: ci-artifacts/import-artifacts/: lchown ci-artifacts/import-artifacts/: operation not permitted (suppressing repeats) Downloading artifacts for load-scripts (4140420)... Downloading artifacts from coordinator... ok  id=4140420 responseStatus=200 OK token=rxMq9ee5 WARNING: ci-artifacts/[MASKED]/: lchown ci-artifacts/[MASKED]/: operation not permitted (suppressing repeats) Downloading artifacts for wl-compare-lint (4140424)... Downloading artifacts from coordinator... ok  id=4140424 responseStatus=200 OK token=za3fDCG4 WARNING: ci-artifacts/lint/: lchown ci-artifacts/lint/: operation not permitted (suppressing repeats) section_end:1623856707:download_artifacts section_start:1623856707:step_script Executing "step_script" stage of the job script $ "${PIPELINE_REPO_DIR}/stages/build/build-run.sh" Determine source registry based on branch Load any images used in Dockerfile build loading image ci-artifacts/import-artifacts/images/gcr.io-tekton-releases-github.com-tektoncd-pipeline-cmd-kubeconfigwriter-v0.25.0.tar time="2021-06-16T15:18:27Z" level=warning msg="Failed to detect the owner for the current cgroup: stat /sys/fs/cgroup/systemd/kubepods/burstable/pod90e6d473-83d8-4f84-891e-d569fe19dbf5/ee121d2d20cf9c707b2ec478e58604afa3f27278d80ed83b60d9e3b7fe4a1d9a: no such file or directory" Getting image source signatures Copying blob sha256:ff1b49c4335ea4fbc3af49feee4e15270eccc6aee31b2d5408129861abd05acf Copying blob sha256:817dc9cdbd3f38d28d209c0132ed69d90aef0975c3471bc32ed897f7ce8c8f71 Copying blob sha256:417cb9b79adeec55f58b890dc9831e252e3523d8de5fd28b4ee2abb151b7dc8b Copying config sha256:f3cc6db2860d4c1391b47e916cb46f10f4a8388717edbf18e8f8f79533420936 Writing manifest to image destination Storing signatures Loaded image(s): gcr.io/tekton-releases/github.com/tektoncd/pipeline/cmd/kubeconfigwriter:v0.25.0 Load HTTP and S3 external resources Converting labels from hardening manifest into command line args Converting build args from hardening manifest into command line args Build the image STEP 1: FROM gcr.io/tekton-releases/github.com/tektoncd/pipeline/cmd/kubeconfigwriter:v0.25.0 AS build Getting image source signatures Copying blob sha256:417cb9b79adeec55f58b890dc9831e252e3523d8de5fd28b4ee2abb151b7dc8b Copying blob sha256:817dc9cdbd3f38d28d209c0132ed69d90aef0975c3471bc32ed897f7ce8c8f71 Copying blob sha256:ff1b49c4335ea4fbc3af49feee4e15270eccc6aee31b2d5408129861abd05acf Copying config sha256:d8bb54bb61c2bdd7270b28de5b0e1ca4d1b41434d234f66ef3e330e0bfc59485 Writing manifest to image destination Storing signatures --> d8bb54bb61c STEP 2: FROM registry1.dso.mil/ironbank/google/distroless/static:latest Getting image source signatures Copying blob sha256:0601dccf3e93d42edf170296e848683623040da96519b1b943b8842620c24bd0 Copying blob sha256:ff53f95d20d5f6ca55d46980861da4798ee325927876aa53bfc5e2a32a864dc7 Copying blob sha256:56a974ed63388950cfc5e7627b1bee951cc1a20fb45dedd4d8d8f34d63c6ef4a Copying config sha256:16f743b18673c29d54af5b864b4375054771866a6f7cecb267a24636f8a7908d Writing manifest to image destination Storing signatures STEP 3: COPY --from=build /ko-app /ko-app STEP 4: USER 1001 STEP 5: HEALTHCHECK NONE STEP 6: CMD ["/ko-app/kubeconfigwriter"] STEP 7: COMMIT registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter Getting image source signatures Copying blob sha256:79d541cda6cb9a0c0e4aaa62aaea1f85b6b56544b5ad25e1e3369525ec0bf670 Copying blob sha256:84ff92691f909a05b224e1c56abb4864f01b4f8e3c854e4bb4c7baf1d3f6d652 Copying blob sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef Copying blob sha256:6d90b8e4977a1665526de6840eaa69542c3ac8f3035818336ffdc36824f19e2f Copying config sha256:f7908f28774aa56998e278c12e61715a44420ff3a983fc8700fc08f24a36b6fe Writing manifest to image destination Storing signatures --> f7908f28774 f7908f28774aa56998e278c12e61715a44420ff3a983fc8700fc08f24a36b6fe + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter:318532 + buildah push --storage-driver=vfs --authfile staging_auth.json --digestfile=ci-artifacts/build/digest registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter:318532 Getting image source signatures Copying blob sha256:6d90b8e4977a1665526de6840eaa69542c3ac8f3035818336ffdc36824f19e2f Copying blob sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef Copying blob sha256:84ff92691f909a05b224e1c56abb4864f01b4f8e3c854e4bb4c7baf1d3f6d652 Copying blob sha256:79d541cda6cb9a0c0e4aaa62aaea1f85b6b56544b5ad25e1e3369525ec0bf670 Copying config sha256:f7908f28774aa56998e278c12e61715a44420ff3a983fc8700fc08f24a36b6fe Writing manifest to image destination Storing signatures + echo 'Read the tags' + tags_file=ci-artifacts/preflight/tags.txt + test -f ci-artifacts/preflight/tags.txt + IFS= + read -r tag + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter:v0.25.0 Read the tags + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter:v0.25.0 Getting image source signatures Copying blob sha256:84ff92691f909a05b224e1c56abb4864f01b4f8e3c854e4bb4c7baf1d3f6d652 Copying blob sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef Copying blob sha256:79d541cda6cb9a0c0e4aaa62aaea1f85b6b56544b5ad25e1e3369525ec0bf670 Copying blob sha256:6d90b8e4977a1665526de6840eaa69542c3ac8f3035818336ffdc36824f19e2f Copying config sha256:f7908f28774aa56998e278c12e61715a44420ff3a983fc8700fc08f24a36b6fe Writing manifest to image destination Storing signatures + IFS= + read -r tag + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter:latest + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter:latest Getting image source signatures Copying blob sha256:6d90b8e4977a1665526de6840eaa69542c3ac8f3035818336ffdc36824f19e2f Copying blob sha256:79d541cda6cb9a0c0e4aaa62aaea1f85b6b56544b5ad25e1e3369525ec0bf670 Copying blob sha256:84ff92691f909a05b224e1c56abb4864f01b4f8e3c854e4bb4c7baf1d3f6d652 Copying blob sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef Copying config sha256:f7908f28774aa56998e278c12e61715a44420ff3a983fc8700fc08f24a36b6fe Writing manifest to image destination Storing signatures + IFS= + read -r tag ++ podman inspect --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter --format '{{.Id}}' time="2021-06-16T15:19:05Z" level=warning msg="Failed to detect the owner for the current cgroup: stat /sys/fs/cgroup/systemd/kubepods/burstable/pod90e6d473-83d8-4f84-891e-d569fe19dbf5/ee121d2d20cf9c707b2ec478e58604afa3f27278d80ed83b60d9e3b7fe4a1d9a: no such file or directory" + IMAGE_ID=sha256:f7908f28774aa56998e278c12e61715a44420ff3a983fc8700fc08f24a36b6fe + echo IMAGE_ID=sha256:f7908f28774aa56998e278c12e61715a44420ff3a983fc8700fc08f24a36b6fe A tarball of the built image can be retrieved from the documentation job artifacts. + IMAGE_PODMAN_SHA=sha256:a7bd68f15243fb29a51148086faaf546c43aa33b163f45186b4079585bdb0cf6 + echo IMAGE_PODMAN_SHA=sha256:a7bd68f15243fb29a51148086faaf546c43aa33b163f45186b4079585bdb0cf6 + echo IMAGE_FULLTAG=registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter:318532 + echo IMAGE_NAME=opensource/tektoncd/kubeconfigwriter + branches=("master" "development") + [[ master development =~ development ]] + msg='A tarball of the built image can be retrieved from the documentation job artifacts.' + echo 'A tarball of the built image can be retrieved from the documentation job artifacts.' section_end:1623856745:step_script section_start:1623856745:upload_artifacts_on_success Uploading artifacts for successful job Uploading artifacts... ci-artifacts/build/: found 2 matching files and directories Uploading artifacts as "archive" to coordinator... ok id=4140427 responseStatus=201 Created token=bdNX--Bd Uploading artifacts... build.env: found 1 matching files and directories  Uploading artifacts as "dotenv" to coordinator... ok id=4140427 responseStatus=201 Created token=bdNX--Bd section_end:1623856746:upload_artifacts_on_success section_start:1623856746:cleanup_file_variables Cleaning up file based variables section_end:1623856746:cleanup_file_variables Job succeeded