Running with gitlab-runner 13.8.0 (775dd39d)  on dsop-shared-gitlab-runner-f887cbcbd-srgz6 E82_g8RG section_start:1626192425:resolve_secrets Resolving secrets section_end:1626192425:resolve_secrets section_start:1626192425:prepare_executor Preparing the "kubernetes" executor Using Kubernetes namespace: gitlab-runner-ironbank-dsop WARNING: Pulling GitLab Runner helper image from Docker Hub. Helper image is migrating to registry.gitlab.com, for more information see https://docs.gitlab.com/runner/configuration/advanced-configuration.html#migrating-helper-image-to-registrygitlabcom Using Kubernetes executor with image registry1.dso.mil/ironbank/ironbank-pipelines/rootless-podman:0.2 ... section_end:1626192425:prepare_executor section_start:1626192425:prepare_script Preparing environment Waiting for pod gitlab-runner-ironbank-dsop/runner-e82g8rg-project-4501-concurrent-0qlvbz to be running, status is Pending Waiting for pod gitlab-runner-ironbank-dsop/runner-e82g8rg-project-4501-concurrent-0qlvbz to be running, status is Pending ContainersNotReady: "containers with unready status: [build helper istio-proxy]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" Running on runner-e82g8rg-project-4501-concurrent-0qlvbz via dsop-shared-gitlab-runner-f887cbcbd-srgz6... section_end:1626192431:prepare_script section_start:1626192431:get_sources Getting source from Git repository $ until [ $(curl --fail --silent --output /dev/stderr --write-out "%{http_code}" localhost:15020/healthz/ready) -eq 200 ]; do echo Waiting for Sidecar; sleep 3 ; done ; echo Sidecar available; Sidecar available Fetching changes with git depth set to 50... Initialized empty Git repository in /builds/dsop/opensource/tektoncd/kubeconfigwriter/.git/ Created fresh repository. Checking out dc087bb6 as development... Skipping object checkout, Git LFS is not installed. Skipping Git submodules setup section_end:1626192432:get_sources section_start:1626192432:download_artifacts Downloading artifacts Downloading artifacts for hardening-manifest (4769285)... Downloading artifacts from coordinator... ok  id=4769285 responseStatus=200 OK token=XZVjt5xL WARNING: ci-artifacts/preflight/: lchown ci-artifacts/preflight/: operation not permitted (suppressing repeats) Downloading artifacts for import-artifacts (4769287)... Downloading artifacts from coordinator... ok  id=4769287 responseStatus=200 OK token=AAkRSEfs WARNING: ci-artifacts/import-artifacts/: lchown ci-artifacts/import-artifacts/: operation not permitted (suppressing repeats) Downloading artifacts for load-scripts (4769282)... Downloading artifacts from coordinator... ok  id=4769282 responseStatus=200 OK token=n-wkGsSa WARNING: ci-artifacts/[MASKED]/: lchown ci-artifacts/[MASKED]/: operation not permitted (suppressing repeats) Downloading artifacts for wl-compare-lint (4769286)... Downloading artifacts from coordinator... ok  id=4769286 responseStatus=200 OK token=bE4nWUEE WARNING: ci-artifacts/lint/: lchown ci-artifacts/lint/: operation not permitted (suppressing repeats) section_end:1626192433:download_artifacts section_start:1626192433:step_script Executing "step_script" stage of the job script $ "${PIPELINE_REPO_DIR}/stages/build/build-run.sh" Determine source registry based on branch Load any images used in Dockerfile build loading image ci-artifacts/import-artifacts/images/gcr.io-tekton-releases-github.com-tektoncd-pipeline-cmd-kubeconfigwriter-v0.26.0.tar time="2021-07-13T16:07:14Z" level=warning msg="Failed to detect the owner for the current cgroup: stat /sys/fs/cgroup/systemd/kubepods/burstable/pod64d9386b-b05e-4196-9019-dd0d12ed0a19/aaea8668c3b124982eb202aa2d5a653dc83ee00ad1fe3dfc3573795f1d7a1995: no such file or directory" Getting image source signatures Copying blob sha256:123cc8f03674ab6dcbdc8563e76513c7249876dc1e612169166d8b2ee7590a88 Copying blob sha256:16679402dc206c982b5552ab8de7d898547100e5468be29d4f67d393c0eadfdb Copying blob sha256:12076ba25c7ff1570e1027d628e8290ef8b3e34d7e2600be0e083313aecdc624 Copying config sha256:98add72203c8c839f34bcf5fd6ebb8f51fbb93067fef0b6da433588a6b65e808 Writing manifest to image destination Storing signatures Loaded image(s): gcr.io/tekton-releases/github.com/tektoncd/pipeline/cmd/kubeconfigwriter:v0.26.0 Load HTTP and S3 external resources Converting labels from hardening manifest into command line args Converting build args from hardening manifest into command line args Build the image STEP 1: FROM gcr.io/tekton-releases/github.com/tektoncd/pipeline/cmd/kubeconfigwriter:v0.26.0 AS build Getting image source signatures Copying blob sha256:16679402dc206c982b5552ab8de7d898547100e5468be29d4f67d393c0eadfdb Copying blob sha256:12076ba25c7ff1570e1027d628e8290ef8b3e34d7e2600be0e083313aecdc624 Copying blob sha256:123cc8f03674ab6dcbdc8563e76513c7249876dc1e612169166d8b2ee7590a88 Copying config sha256:cf8cfb95ad0e546c3fc6717a802c2be3eb8ded4c2712319e639244aa01eec523 Writing manifest to image destination Storing signatures --> cf8cfb95ad0 STEP 2: FROM registry1.dso.mil/ironbank/google/distroless/static:latest Getting image source signatures Copying blob sha256:ff53f95d20d5f6ca55d46980861da4798ee325927876aa53bfc5e2a32a864dc7 Copying blob sha256:0601dccf3e93d42edf170296e848683623040da96519b1b943b8842620c24bd0 Copying blob sha256:56a974ed63388950cfc5e7627b1bee951cc1a20fb45dedd4d8d8f34d63c6ef4a Copying config sha256:16f743b18673c29d54af5b864b4375054771866a6f7cecb267a24636f8a7908d Writing manifest to image destination Storing signatures STEP 3: COPY --from=build /ko-app /ko-app STEP 4: USER 1001 STEP 5: HEALTHCHECK NONE STEP 6: CMD ["/ko-app/kubeconfigwriter"] STEP 7: COMMIT registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter Getting image source signatures Copying blob sha256:79d541cda6cb9a0c0e4aaa62aaea1f85b6b56544b5ad25e1e3369525ec0bf670 Copying blob sha256:84ff92691f909a05b224e1c56abb4864f01b4f8e3c854e4bb4c7baf1d3f6d652 Copying blob sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef Copying blob sha256:cc96d68ad10c5816a10a77bb869ca1e05d418103e78688c901a74c50e6f46618 Copying config sha256:8780ebd69be19b21a3443c0a1346c61837531271479f5debd18801917d83355e Writing manifest to image destination Storing signatures --> 8780ebd69be 8780ebd69be19b21a3443c0a1346c61837531271479f5debd18801917d83355e + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter:ibci-363426 + buildah push --storage-driver=vfs --authfile staging_auth.json --digestfile=ci-artifacts/build/digest registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter:ibci-363426 Getting image source signatures Copying blob sha256:cc96d68ad10c5816a10a77bb869ca1e05d418103e78688c901a74c50e6f46618 Copying blob sha256:79d541cda6cb9a0c0e4aaa62aaea1f85b6b56544b5ad25e1e3369525ec0bf670 Copying blob sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef Copying blob sha256:84ff92691f909a05b224e1c56abb4864f01b4f8e3c854e4bb4c7baf1d3f6d652 Copying config sha256:8780ebd69be19b21a3443c0a1346c61837531271479f5debd18801917d83355e Writing manifest to image destination Storing signatures + echo 'Read the tags' + tags_file=ci-artifacts/preflight/tags.txt + test -f ci-artifacts/preflight/tags.txt + IFS= + read -r tag Read the tags + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter:v0.26.0 + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter:v0.26.0 Getting image source signatures Copying blob sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef Copying blob sha256:84ff92691f909a05b224e1c56abb4864f01b4f8e3c854e4bb4c7baf1d3f6d652 Copying blob sha256:cc96d68ad10c5816a10a77bb869ca1e05d418103e78688c901a74c50e6f46618 Copying blob sha256:79d541cda6cb9a0c0e4aaa62aaea1f85b6b56544b5ad25e1e3369525ec0bf670 Copying config sha256:8780ebd69be19b21a3443c0a1346c61837531271479f5debd18801917d83355e Writing manifest to image destination Storing signatures + IFS= + read -r tag + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter:latest + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter:latest Getting image source signatures Copying blob sha256:cc96d68ad10c5816a10a77bb869ca1e05d418103e78688c901a74c50e6f46618 Copying blob sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef Copying blob sha256:79d541cda6cb9a0c0e4aaa62aaea1f85b6b56544b5ad25e1e3369525ec0bf670 Copying blob sha256:84ff92691f909a05b224e1c56abb4864f01b4f8e3c854e4bb4c7baf1d3f6d652 Copying config sha256:8780ebd69be19b21a3443c0a1346c61837531271479f5debd18801917d83355e Writing manifest to image destination Storing signatures + IFS= + read -r tag ++ podman inspect --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter --format '{{.Id}}' time="2021-07-13T16:07:51Z" level=warning msg="Failed to detect the owner for the current cgroup: stat /sys/fs/cgroup/systemd/kubepods/burstable/pod64d9386b-b05e-4196-9019-dd0d12ed0a19/aaea8668c3b124982eb202aa2d5a653dc83ee00ad1fe3dfc3573795f1d7a1995: no such file or directory" + IMAGE_ID=sha256:8780ebd69be19b21a3443c0a1346c61837531271479f5debd18801917d83355e + echo IMAGE_ID=sha256:8780ebd69be19b21a3443c0a1346c61837531271479f5debd18801917d83355e A tarball of the built image can be retrieved from the documentation job artifacts. + IMAGE_PODMAN_SHA=sha256:dec3e59fb1c79883dfd321c199d203f2d2094caa9f2c53d124957dadc1a471aa + echo IMAGE_PODMAN_SHA=sha256:dec3e59fb1c79883dfd321c199d203f2d2094caa9f2c53d124957dadc1a471aa + echo IMAGE_FULLTAG=registry1.dso.mil/ironbank-staging/opensource/tektoncd/kubeconfigwriter:ibci-363426 + echo IMAGE_NAME=opensource/tektoncd/kubeconfigwriter + branches=("master" "development") + [[ master development =~ development ]] + msg='A tarball of the built image can be retrieved from the documentation job artifacts.' + echo 'A tarball of the built image can be retrieved from the documentation job artifacts.' section_end:1626192471:step_script section_start:1626192471:upload_artifacts_on_success Uploading artifacts for successful job Uploading artifacts... ci-artifacts/build/: found 2 matching files and directories Uploading artifacts as "archive" to coordinator... ok id=4769289 responseStatus=201 Created token=f2eEG2zG Uploading artifacts... build.env: found 1 matching files and directories  Uploading artifacts as "dotenv" to coordinator... ok id=4769289 responseStatus=201 Created token=f2eEG2zG section_end:1626192473:upload_artifacts_on_success section_start:1626192473:cleanup_file_variables Cleaning up file based variables section_end:1626192473:cleanup_file_variables Job succeeded