Running with gitlab-runner 13.8.0 (775dd39d)  on dsop-shared-gitlab-runner-f887cbcbd-srgz6 E82_g8RG section_start:1630545335:resolve_secrets Resolving secrets section_end:1630545335:resolve_secrets section_start:1630545335:prepare_executor Preparing the "kubernetes" executor Using Kubernetes namespace: gitlab-runner-ironbank-dsop WARNING: Pulling GitLab Runner helper image from Docker Hub. Helper image is migrating to registry.gitlab.com, for more information see https://docs.gitlab.com/runner/configuration/advanced-configuration.html#migrating-helper-image-to-registrygitlabcom Using Kubernetes executor with image registry1.dso.mil/ironbank/ironbank-pipelines/rootless-podman:0.2 ... section_end:1630545335:prepare_executor section_start:1630545335:prepare_script Preparing environment Waiting for pod gitlab-runner-ironbank-dsop/runner-e82g8rg-project-4802-concurrent-0xbkv6 to be running, status is Pending Waiting for pod gitlab-runner-ironbank-dsop/runner-e82g8rg-project-4802-concurrent-0xbkv6 to be running, status is Pending ContainersNotInitialized: "containers with incomplete status: [istio-init]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" Waiting for pod gitlab-runner-ironbank-dsop/runner-e82g8rg-project-4802-concurrent-0xbkv6 to be running, status is Pending ContainersNotReady: "containers with unready status: [build helper istio-proxy]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" Running on runner-e82g8rg-project-4802-concurrent-0xbkv6 via dsop-shared-gitlab-runner-f887cbcbd-srgz6... section_end:1630545344:prepare_script section_start:1630545344:get_sources Getting source from Git repository $ until [ $(curl --fail --silent --output /dev/stderr --write-out "%{http_code}" localhost:15020/healthz/ready) -eq 200 ]; do echo Waiting for Sidecar; sleep 3 ; done ; echo Sidecar available; Sidecar available Fetching changes with git depth set to 50... Initialized empty Git repository in /builds/dsop/opensource/tektoncd/triggers/eventlistenersink/.git/ Created fresh repository. Checking out 5619898a as renovate/gcr.io-tekton-releases-github.com-tektoncd-triggers-cmd-eventlistenersink-0.x... Skipping object checkout, Git LFS is not installed. Skipping Git submodules setup section_end:1630545345:get_sources section_start:1630545345:download_artifacts Downloading artifacts Downloading artifacts for hardening-manifest (6163421)... Downloading artifacts from coordinator... ok  id=6163421 responseStatus=200 OK token=1bFotMhv WARNING: ci-artifacts/preflight/: lchown ci-artifacts/preflight/: operation not permitted (suppressing repeats) Downloading artifacts for import-artifacts (6163423)... Downloading artifacts from coordinator... ok  id=6163423 responseStatus=200 OK token=8DqR9YRX WARNING: ci-artifacts/import-artifacts/: lchown ci-artifacts/import-artifacts/: operation not permitted (suppressing repeats) Downloading artifacts for load-scripts (6163418)... Downloading artifacts from coordinator... ok  id=6163418 responseStatus=200 OK token=XD3ykzYX WARNING: ci-artifacts/[MASKED]/: lchown ci-artifacts/[MASKED]/: operation not permitted (suppressing repeats) Downloading artifacts for wl-compare-lint (6163422)... Downloading artifacts from coordinator... ok  id=6163422 responseStatus=200 OK token=Bvtyu2Hw WARNING: ci-artifacts/lint/: lchown ci-artifacts/lint/: operation not permitted (suppressing repeats) section_end:1630545354:download_artifacts section_start:1630545354:step_script Executing "step_script" stage of the job script $ "${PIPELINE_REPO_DIR}/stages/build/build-run.sh" Determine source registry based on branch Load any images used in Dockerfile build loading image ci-artifacts/import-artifacts/images/gcr.io-tekton-releases-github.com-tektoncd-triggers-cmd-eventlistenersink-v0.16.0.tar Getting image source signatures Copying blob sha256:8c4289b4adbb063b13517a7393db7341ca4eb43ae121774a413c4fa6846caef6 Copying blob sha256:16679402dc206c982b5552ab8de7d898547100e5468be29d4f67d393c0eadfdb Copying blob sha256:4dbc525fc99f01d4f1df12a6b27a71a8b658cda7a4cad5ac9a6bfa7c00670bf7 Copying config sha256:106b50f42204192b2d3959c575b9309a94b8d2d6753b15a177f8014baffdd246 Writing manifest to image destination Storing signatures Loaded image(s): gcr.io/tekton-releases/github.com/tektoncd/triggers/cmd/eventlistenersink:v0.16.0 Load HTTP and S3 external resources Converting labels from hardening manifest into command line args Converting build args from hardening manifest into command line args Build the image STEP 1: FROM gcr.io/tekton-releases/github.com/tektoncd/triggers/cmd/eventlistenersink:v0.16.0 AS build Getting image source signatures Copying blob sha256:16679402dc206c982b5552ab8de7d898547100e5468be29d4f67d393c0eadfdb Copying blob sha256:4dbc525fc99f01d4f1df12a6b27a71a8b658cda7a4cad5ac9a6bfa7c00670bf7 Copying blob sha256:8c4289b4adbb063b13517a7393db7341ca4eb43ae121774a413c4fa6846caef6 Copying config sha256:c1e26e2ecf8046279745fa6b31f590663cf664914a6f7ce622f0748e8931abf2 Writing manifest to image destination Storing signatures Trying to pull registry1.dso.mil/ironbank/google/distroless/static:latest... --> c1e26e2ecf8 STEP 2: FROM registry1.dso.mil/ironbank/google/distroless/static:latest Getting image source signatures Copying blob sha256:ff53f95d20d5f6ca55d46980861da4798ee325927876aa53bfc5e2a32a864dc7 Copying blob sha256:0601dccf3e93d42edf170296e848683623040da96519b1b943b8842620c24bd0 Copying blob sha256:56a974ed63388950cfc5e7627b1bee951cc1a20fb45dedd4d8d8f34d63c6ef4a Copying config sha256:16f743b18673c29d54af5b864b4375054771866a6f7cecb267a24636f8a7908d Writing manifest to image destination Storing signatures STEP 3: COPY --from=build /ko-app /ko-app STEP 4: USER 1001 STEP 5: HEALTHCHECK none STEP 6: CMD ["/ko-app/eventlistenersink"] STEP 7: COMMIT registry1.dso.mil/ironbank-staging/opensource/tektoncd/triggers/eventlistenersink Getting image source signatures Copying blob sha256:79d541cda6cb9a0c0e4aaa62aaea1f85b6b56544b5ad25e1e3369525ec0bf670 Copying blob sha256:84ff92691f909a05b224e1c56abb4864f01b4f8e3c854e4bb4c7baf1d3f6d652 Copying blob sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef Copying blob sha256:9ac4078398368aac9465782a17c561b054906a2360b2ddaa0656f9bba19ed5f7 Copying config sha256:d86b57809439269ec6ab1252ee3c46b2a85bd65b6b8f3a6be8c0afd9e6ba4194 Writing manifest to image destination Storing signatures --> d86b5780943 Successfully tagged registry1.dso.mil/ironbank-staging/opensource/tektoncd/triggers/eventlistenersink:latest d86b57809439269ec6ab1252ee3c46b2a85bd65b6b8f3a6be8c0afd9e6ba4194 + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/tektoncd/triggers/eventlistenersink registry1.dso.mil/ironbank-staging/opensource/tektoncd/triggers/eventlistenersink:ibci-456486 + buildah push --storage-driver=vfs --authfile staging_auth.json --digestfile=ci-artifacts/build/digest registry1.dso.mil/ironbank-staging/opensource/tektoncd/triggers/eventlistenersink:ibci-456486 Getting image source signatures Copying blob sha256:9ac4078398368aac9465782a17c561b054906a2360b2ddaa0656f9bba19ed5f7 Copying blob sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef Copying blob sha256:79d541cda6cb9a0c0e4aaa62aaea1f85b6b56544b5ad25e1e3369525ec0bf670 Copying blob sha256:84ff92691f909a05b224e1c56abb4864f01b4f8e3c854e4bb4c7baf1d3f6d652 Copying config sha256:d86b57809439269ec6ab1252ee3c46b2a85bd65b6b8f3a6be8c0afd9e6ba4194 Writing manifest to image destination Storing signatures Read the tags + echo 'Read the tags' + tags_file=ci-artifacts/preflight/tags.txt + test -f ci-artifacts/preflight/tags.txt + IFS= + read -r tag + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/tektoncd/triggers/eventlistenersink registry1.dso.mil/ironbank-staging/opensource/tektoncd/triggers/eventlistenersink:v0.16.0 + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/opensource/tektoncd/triggers/eventlistenersink:v0.16.0 Getting image source signatures Copying blob sha256:84ff92691f909a05b224e1c56abb4864f01b4f8e3c854e4bb4c7baf1d3f6d652 Copying blob sha256:9ac4078398368aac9465782a17c561b054906a2360b2ddaa0656f9bba19ed5f7 Copying blob sha256:79d541cda6cb9a0c0e4aaa62aaea1f85b6b56544b5ad25e1e3369525ec0bf670 Copying blob sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef Copying config sha256:d86b57809439269ec6ab1252ee3c46b2a85bd65b6b8f3a6be8c0afd9e6ba4194 Writing manifest to image destination Storing signatures + IFS= + read -r tag + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/tektoncd/triggers/eventlistenersink registry1.dso.mil/ironbank-staging/opensource/tektoncd/triggers/eventlistenersink:latest + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/opensource/tektoncd/triggers/eventlistenersink:latest Getting image source signatures Copying blob sha256:79d541cda6cb9a0c0e4aaa62aaea1f85b6b56544b5ad25e1e3369525ec0bf670 Copying blob sha256:84ff92691f909a05b224e1c56abb4864f01b4f8e3c854e4bb4c7baf1d3f6d652 Copying blob sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef Copying blob sha256:9ac4078398368aac9465782a17c561b054906a2360b2ddaa0656f9bba19ed5f7 Copying config sha256:d86b57809439269ec6ab1252ee3c46b2a85bd65b6b8f3a6be8c0afd9e6ba4194 Writing manifest to image destination Storing signatures + IFS= + read -r tag ++ podman inspect --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/tektoncd/triggers/eventlistenersink --format '{{.Id}}' + IMAGE_ID=sha256:d86b57809439269ec6ab1252ee3c46b2a85bd65b6b8f3a6be8c0afd9e6ba4194 + echo IMAGE_ID=sha256:d86b57809439269ec6ab1252ee3c46b2a85bd65b6b8f3a6be8c0afd9e6ba4194 + IMAGE_PODMAN_SHA=sha256:f888a5d5d156f7dec2e117446e4697ad0d3ee1008aee4a289086c4245f36f690 + echo IMAGE_PODMAN_SHA=sha256:f888a5d5d156f7dec2e117446e4697ad0d3ee1008aee4a289086c4245f36f690 + echo IMAGE_FULLTAG=registry1.dso.mil/ironbank-staging/opensource/tektoncd/triggers/eventlistenersink:ibci-456486 + echo IMAGE_NAME=opensource/tektoncd/triggers/eventlistenersink A tarball of the built image can be retrieved from the create-tar job artifacts. + branches=("master" "development") + [[ master development =~ renovate/gcr.io-tekton-releases-github.com-tektoncd-triggers-cmd-eventlistenersink-0.x ]] + msg='A tarball of the built image can be retrieved from the create-tar job artifacts.' + echo 'A tarball of the built image can be retrieved from the create-tar job artifacts.' section_end:1630545410:step_script section_start:1630545410:upload_artifacts_on_success Uploading artifacts for successful job Uploading artifacts... ci-artifacts/build/: found 2 matching files and directories Uploading artifacts as "archive" to coordinator... ok id=6163425 responseStatus=201 Created token=wTg6zVLK Uploading artifacts... build.env: found 1 matching files and directories  Uploading artifacts as "dotenv" to coordinator... ok id=6163425 responseStatus=201 Created token=wTg6zVLK section_end:1630545412:upload_artifacts_on_success section_start:1630545412:cleanup_file_variables Cleaning up file based variables section_end:1630545412:cleanup_file_variables Job succeeded