Cloning into '/home/prow/go/src/github.com/google/licenseclassifier'... Docker in Docker enabled, initializing... ================================================================================ * Starting Docker: docker ...done. Waiting for docker to be ready, sleeping for 1 seconds. Cleaning up binfmt_misc ... ================================================================================ Done setting up docker in docker. Activated service account credentials for: [prow-account@tekton-releases.iam.gserviceaccount.com] == Running ./runner.sh backward compatibility test runner === + [[ 12 -ne 0 ]] + case $1 in ++ cut -d = -f2 + gcloud auth activate-service-account --key-file=/etc/test-account/service-account.json Activated service account credentials for: [prow-account@tekton-releases.iam.gserviceaccount.com] + shift + [[ 11 -ne 0 ]] + case $1 in + shift + [[ -- == \-\- ]] + shift + break + /usr/local/bin/kind-e2e --k8s-version v1.28.x --nodes 3 --e2e-script ./test/e2e-tests.sh --e2e-env ./test/e2e-tests-kind-prow.env + K8S_VERSION=v1.28.x + REGISTRY_NAME=registry.local + REGISTRY_PORT=5000 + CLUSTER_SUFFIX=cluster.local + NODE_COUNT=1 + REGISTRY_AUTH=0 + ESTARGZ_SUPPORT=0 + E2E_SCRIPT=test/e2e-tests.sh + E2E_ENV= + [[ 8 -ne 0 ]] + parameter=--k8s-version + case "${parameter}" in + shift + K8S_VERSION=v1.28.x + shift + [[ 6 -ne 0 ]] + parameter=--nodes + case "${parameter}" in + shift + NODE_COUNT=3 + shift + [[ 4 -ne 0 ]] + parameter=--e2e-script + case "${parameter}" in + shift + E2E_SCRIPT=./test/e2e-tests.sh + shift + [[ 2 -ne 0 ]] + parameter=--e2e-env + case "${parameter}" in + shift + E2E_ENV=./test/e2e-tests-kind-prow.env + shift + [[ 0 -ne 0 ]] + [[ ./test/e2e-tests-kind-prow.env != '' ]] + [[ ! -f ./test/e2e-tests-kind-prow.env ]] + case ${K8S_VERSION} in + K8S_VERSION=1.28.9 + KIND_IMAGE_SHA=sha256:dca54bc6a6079dd34699d53d7d4ffa2e853e46a20cd12d619a09207e35300bd0 + KIND_IMAGE=kindest/node:1.28.9@sha256:dca54bc6a6079dd34699d53d7d4ffa2e853e46a20cd12d619a09207e35300bd0 + echo '--- Setup KinD Cluster' --- Setup KinD Cluster + cat ++ seq 1 1 3 + for i in $(seq 1 1 "${NODE_COUNT}") + cat + for i in $(seq 1 1 "${NODE_COUNT}") + cat + for i in $(seq 1 1 "${NODE_COUNT}") + cat + cat ++ containerd_config ++ [[ 0 = \1 ]] ++ cat + echo '--- kind.yaml' --- kind.yaml + cat kind.yaml apiVersion: kind.x-k8s.io/v1alpha4 kind: Cluster nodes: - role: control-plane image: "kindest/node:1.28.9@sha256:dca54bc6a6079dd34699d53d7d4ffa2e853e46a20cd12d619a09207e35300bd0" - role: worker image: "kindest/node:1.28.9@sha256:dca54bc6a6079dd34699d53d7d4ffa2e853e46a20cd12d619a09207e35300bd0" - role: worker image: "kindest/node:1.28.9@sha256:dca54bc6a6079dd34699d53d7d4ffa2e853e46a20cd12d619a09207e35300bd0" - role: worker image: "kindest/node:1.28.9@sha256:dca54bc6a6079dd34699d53d7d4ffa2e853e46a20cd12d619a09207e35300bd0" kubeadmConfigPatches: # This is needed in order to support projected volumes with service account tokens. # See: https://kubernetes.slack.com/archives/CEKK1KTN2/p1600268272383600 - | apiVersion: kubeadm.k8s.io/v1beta2 kind: ClusterConfiguration metadata: name: config apiServer: extraArgs: "service-account-issuer": "kubernetes.default.svc" "service-account-signing-key-file": "/etc/kubernetes/pki/sa.key" networking: dnsDomain: "cluster.local" # This is needed to avoid filling our disk. # See: https://kubernetes.slack.com/archives/CEKK1KTN2/p1603391142276400 - | kind: KubeletConfiguration metadata: name: config imageGCHighThresholdPercent: 90 containerdConfigPatches: - |- [plugins."io.containerd.grpc.v1.cri".containerd] # Support many layered images: https://kubernetes.slack.com/archives/CEKK1KTN2/p1602770111199000 disable_snapshot_annotations = true # Support a local registry [plugins."io.containerd.grpc.v1.cri".registry.mirrors."registry.local:5000"] endpoint = ["http://registry.local:5000"] + kind --version kind version 0.23.0 + docker ps CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES + kind create cluster --config kind.yaml Creating cluster "kind" ... â€ĸ Ensuring node image (kindest/node:1.28.9) đŸ–ŧ ... ✓ Ensuring node image (kindest/node:1.28.9) đŸ–ŧ â€ĸ Preparing nodes đŸ“Ļ đŸ“Ļ đŸ“Ļ đŸ“Ļ ... ✓ Preparing nodes đŸ“Ļ đŸ“Ļ đŸ“Ļ đŸ“Ļ â€ĸ Writing configuration 📜 ... ✓ Writing configuration 📜 â€ĸ Starting control-plane đŸ•šī¸ ... ✓ Starting control-plane đŸ•šī¸ â€ĸ Installing CNI 🔌 ... ✓ Installing CNI 🔌 â€ĸ Installing StorageClass 💾 ... ✓ Installing StorageClass 💾 â€ĸ Joining worker nodes 🚜 ... ✓ Joining worker nodes 🚜 Set kubectl context to "kind-kind" You can now use your cluster with: kubectl cluster-info --context kind-kind Not sure what to do next? 😅 Check out https://kind.sigs.k8s.io/docs/user/quick-start/ + echo '--- Setup metallb' --- Setup metallb + kubectl apply -f https://raw.githubusercontent.com/metallb/metallb/v0.13.10/config/manifests/metallb-native.yaml namespace/metallb-system created customresourcedefinition.apiextensions.k8s.io/addresspools.metallb.io created customresourcedefinition.apiextensions.k8s.io/bfdprofiles.metallb.io created customresourcedefinition.apiextensions.k8s.io/bgpadvertisements.metallb.io created customresourcedefinition.apiextensions.k8s.io/bgppeers.metallb.io created customresourcedefinition.apiextensions.k8s.io/communities.metallb.io created customresourcedefinition.apiextensions.k8s.io/ipaddresspools.metallb.io created customresourcedefinition.apiextensions.k8s.io/l2advertisements.metallb.io created serviceaccount/controller created serviceaccount/speaker created role.rbac.authorization.k8s.io/controller created role.rbac.authorization.k8s.io/pod-lister created clusterrole.rbac.authorization.k8s.io/metallb-system:controller created clusterrole.rbac.authorization.k8s.io/metallb-system:speaker created rolebinding.rbac.authorization.k8s.io/controller created rolebinding.rbac.authorization.k8s.io/pod-lister created clusterrolebinding.rbac.authorization.k8s.io/metallb-system:controller created clusterrolebinding.rbac.authorization.k8s.io/metallb-system:speaker created configmap/metallb-excludel2 created secret/webhook-server-cert created service/webhook-service created deployment.apps/controller created daemonset.apps/speaker created validatingwebhookconfiguration.admissionregistration.k8s.io/metallb-webhook-configuration created ++ openssl rand -base64 128 + kubectl create secret generic -n metallb-system memberlist '--from-literal=secretkey=nYHPhuQX6DurkHKwuYNalfS8t5NCJEX+qo0xnpIQKs5lVzzgXgX12tLrtTce8++o I+2yYaJY/44ILgPSSyQ6/ToJKRyyeAVLTl/J2n4M2tEIsGYRGNxwh/5ZSBOsfJA+ Aezfrs+Zxjs/+8D9eBmIFEjNpQDL5nEh761bcdq0NPA=' secret/memberlist created ++ cut -d . -f1,2 ++ docker network inspect kind -f '{{(index .IPAM.Config 0).Subnet}}' + network=fc00:f853:ccd:e793::/64 + cat + kubectl apply -f - configmap/config created + echo '--- Setup container registry' --- Setup container registry + EXTRA_ARGS=() + [[ 0 == \1 ]] + docker run -d --restart=always -p 5000:5000 --name registry.local registry:2 Unable to find image 'registry:2' locally 2: Pulling from library/registry 44cf07d57ee4: Pulling fs layer bbbdd6c6894b: Pulling fs layer 8e82f80af0de: Pulling fs layer 3493bf46cdec: Pulling fs layer 6d464ea18732: Pulling fs layer 3493bf46cdec: Waiting 6d464ea18732: Waiting bbbdd6c6894b: Verifying Checksum bbbdd6c6894b: Download complete 44cf07d57ee4: Verifying Checksum 44cf07d57ee4: Download complete 8e82f80af0de: Verifying Checksum 8e82f80af0de: Download complete 3493bf46cdec: Verifying Checksum 3493bf46cdec: Download complete 6d464ea18732: Download complete 44cf07d57ee4: Pull complete bbbdd6c6894b: Pull complete 8e82f80af0de: Pull complete 3493bf46cdec: Pull complete 6d464ea18732: Pull complete Digest: sha256:a3d8aaa63ed8681a604f1dea0aa03f100d5895b6a58ace528858a7b332415373 Status: Downloaded newer image for registry:2 ba841178c468c6ba8d04fae86b7f9fe260b1c6161830d2ca9d6a909fb3c44ab1 + docker network connect kind registry.local + echo '127.0.0.1 registry.local' + tee -a /etc/hosts 127.0.0.1 registry.local + [[ 0 == \1 ]] + export KO_DOCKER_REPO=kind.local + KO_DOCKER_REPO=kind.local + [[ ./test/e2e-tests.sh == '' ]] + [[ ./test/e2e-tests-kind-prow.env != '' ]] + set -o allexport + source ./test/e2e-tests-kind-prow.env ++ E2E_SKIP_CLUSTER_CREATION=true ++ KO_DOCKER_REPO=registry.local:5000 ++ ARTIFACTS=/workspace/source/artifacts + set +o allexport + ./test/e2e-tests.sh ./test/../vendor/github.com/tektoncd/plumbing/scripts/library.sh: line 22: SERVING_GKE_VERSION: readonly variable ./test/../vendor/github.com/tektoncd/plumbing/scripts/library.sh: line 23: SERVING_GKE_IMAGE: readonly variable ./test/../vendor/github.com/tektoncd/plumbing/scripts/library.sh: line 34: IS_PROW: readonly variable ./test/../vendor/github.com/tektoncd/plumbing/scripts/library.sh: line 36: REPO_ROOT_DIR: readonly variable ./test/../vendor/github.com/tektoncd/plumbing/scripts/library.sh: line 37: REPO_NAME: readonly variable ./test/../vendor/github.com/tektoncd/plumbing/scripts/library.sh: line 402: _PLUMBING_SCRIPTS_DIR: readonly variable ./test/../vendor/github.com/tektoncd/plumbing/scripts/library.sh: line 403: REPO_NAME_FORMATTED: readonly variable ./test/../vendor/github.com/tektoncd/plumbing/scripts/e2e-tests.sh: line 47: E2E_CLUSTER_BACKUP_REGIONS: readonly variable ./test/../vendor/github.com/tektoncd/plumbing/scripts/e2e-tests.sh: line 48: E2E_CLUSTER_BACKUP_ZONES: readonly variable ./test/../vendor/github.com/tektoncd/plumbing/scripts/e2e-tests.sh: line 50: E2E_CLUSTER_MACHINE: readonly variable ./test/../vendor/github.com/tektoncd/plumbing/scripts/e2e-tests.sh: line 51: E2E_GKE_ENVIRONMENT: readonly variable ./test/../vendor/github.com/tektoncd/plumbing/scripts/e2e-tests.sh: line 52: E2E_GKE_COMMAND_GROUP: readonly variable ./test/../vendor/github.com/tektoncd/plumbing/scripts/e2e-tests.sh: line 57: E2E_MIN_CLUSTER_NODES: readonly variable ./test/../vendor/github.com/tektoncd/plumbing/scripts/e2e-tests.sh: line 58: E2E_MAX_CLUSTER_NODES: readonly variable ./test/../vendor/github.com/tektoncd/plumbing/scripts/e2e-tests.sh: line 60: E2E_BASE_NAME: readonly variable ./test/../vendor/github.com/tektoncd/plumbing/scripts/e2e-tests.sh: line 61: E2E_CLUSTER_NAME: readonly variable ./test/../vendor/github.com/tektoncd/plumbing/scripts/e2e-tests.sh: line 62: E2E_NETWORK_NAME: readonly variable ./test/../vendor/github.com/tektoncd/plumbing/scripts/e2e-tests.sh: line 63: TEST_RESULT_FILE: readonly variable >> Deploying Tekton Pipelines Installing https://github.com/tektoncd/pipeline/releases/download/v1.1.0/release.yaml namespace/tekton-pipelines created clusterrole.rbac.authorization.k8s.io/tekton-pipelines-controller-cluster-access created clusterrole.rbac.authorization.k8s.io/tekton-pipelines-controller-tenant-access created clusterrole.rbac.authorization.k8s.io/tekton-pipelines-webhook-cluster-access created clusterrole.rbac.authorization.k8s.io/tekton-events-controller-cluster-access created role.rbac.authorization.k8s.io/tekton-pipelines-controller created role.rbac.authorization.k8s.io/tekton-pipelines-webhook created role.rbac.authorization.k8s.io/tekton-pipelines-events-controller created role.rbac.authorization.k8s.io/tekton-pipelines-leader-election created role.rbac.authorization.k8s.io/tekton-pipelines-info created serviceaccount/tekton-pipelines-controller created serviceaccount/tekton-pipelines-webhook created serviceaccount/tekton-events-controller created clusterrolebinding.rbac.authorization.k8s.io/tekton-pipelines-controller-cluster-access created clusterrolebinding.rbac.authorization.k8s.io/tekton-pipelines-controller-tenant-access created clusterrolebinding.rbac.authorization.k8s.io/tekton-pipelines-webhook-cluster-access created clusterrolebinding.rbac.authorization.k8s.io/tekton-events-controller-cluster-access created rolebinding.rbac.authorization.k8s.io/tekton-pipelines-controller created rolebinding.rbac.authorization.k8s.io/tekton-pipelines-webhook created rolebinding.rbac.authorization.k8s.io/tekton-pipelines-controller-leaderelection created rolebinding.rbac.authorization.k8s.io/tekton-pipelines-webhook-leaderelection created rolebinding.rbac.authorization.k8s.io/tekton-pipelines-info created rolebinding.rbac.authorization.k8s.io/tekton-pipelines-events-controller created rolebinding.rbac.authorization.k8s.io/tekton-events-controller-leaderelection created customresourcedefinition.apiextensions.k8s.io/customruns.tekton.dev created customresourcedefinition.apiextensions.k8s.io/pipelines.tekton.dev created customresourcedefinition.apiextensions.k8s.io/pipelineruns.tekton.dev created customresourcedefinition.apiextensions.k8s.io/resolutionrequests.resolution.tekton.dev created customresourcedefinition.apiextensions.k8s.io/stepactions.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tasks.tekton.dev created customresourcedefinition.apiextensions.k8s.io/taskruns.tekton.dev created customresourcedefinition.apiextensions.k8s.io/verificationpolicies.tekton.dev created secret/webhook-certs created validatingwebhookconfiguration.admissionregistration.k8s.io/validation.webhook.pipeline.tekton.dev created mutatingwebhookconfiguration.admissionregistration.k8s.io/webhook.pipeline.tekton.dev created validatingwebhookconfiguration.admissionregistration.k8s.io/config.webhook.pipeline.tekton.dev created clusterrole.rbac.authorization.k8s.io/tekton-aggregate-edit created clusterrole.rbac.authorization.k8s.io/tekton-aggregate-view created configmap/config-defaults created configmap/config-events created configmap/feature-flags created configmap/pipelines-info created configmap/config-leader-election-controller created configmap/config-leader-election-events created configmap/config-leader-election-webhook created configmap/config-logging created configmap/config-observability created configmap/config-registry-cert created configmap/config-spire created configmap/config-tracing created deployment.apps/tekton-pipelines-controller created service/tekton-pipelines-controller created deployment.apps/tekton-events-controller created service/tekton-events-controller created namespace/tekton-pipelines-resolvers created clusterrole.rbac.authorization.k8s.io/tekton-pipelines-resolvers-resolution-request-updates created role.rbac.authorization.k8s.io/tekton-pipelines-resolvers-namespace-rbac created serviceaccount/tekton-pipelines-resolvers created clusterrolebinding.rbac.authorization.k8s.io/tekton-pipelines-resolvers created rolebinding.rbac.authorization.k8s.io/tekton-pipelines-resolvers-namespace-rbac created configmap/bundleresolver-config created configmap/cluster-resolver-config created configmap/resolvers-feature-flags created configmap/config-leader-election-resolvers created configmap/config-logging created configmap/config-observability created configmap/git-resolver-config created configmap/http-resolver-config created configmap/hubresolver-config created deployment.apps/tekton-pipelines-remote-resolvers created service/tekton-pipelines-remote-resolvers created horizontalpodautoscaler.autoscaling/tekton-pipelines-webhook created deployment.apps/tekton-pipelines-webhook created service/tekton-pipelines-webhook created Enabling StepActions on the cluster configmap/feature-flags patched (no change) No resources found No resources found No resources found No resources found No resources found Waiting until all pods in namespace tekton-pipelines are up..... All pods are up: tekton-events-controller-6b7779c458-jcbhw 1/1 Running 0 12s tekton-pipelines-controller-645847c466-jpqzn 1/1 Running 0 12s tekton-pipelines-webhook-5889b64bc-lqj29 1/1 Running 0 12s + set -o pipefail ++ echo stepaction/git-clone/0.1/tests stepaction/git-clone/0.2/tests stepaction/tekton-catalog-publish/0.1/tests stepaction/tekton-catalog-publish/0.2/tests stepaction/tekton-catalog-publish/0.3/tests + all_stepactions='stepaction/git-clone/0.1/tests stepaction/git-clone/0.2/tests stepaction/tekton-catalog-publish/0.1/tests stepaction/tekton-catalog-publish/0.2/tests stepaction/tekton-catalog-publish/0.3/tests' ++ echo task/ansible-builder/0.1/tests task/ansible-runner/0.1/tests task/ansible-runner/0.2/tests task/asciidoctor/0.1/tests task/bentoml/0.1/tests task/black/0.1/tests task/black/0.2/tests task/blue-green-deploy/0.1/tests task/blue-green-deploy/0.2/tests task/buildah/0.1/tests task/buildah/0.2/tests task/buildah/0.3/tests task/buildah/0.4/tests task/buildah/0.5/tests task/buildah/0.6/tests task/buildah/0.7/tests task/buildah/0.8/tests task/buildah/0.9/tests task/buildpacks-phases/0.1/tests task/buildpacks-phases/0.2/tests task/buildpacks-phases/0.3/tests task/buildpacks/0.1/tests task/buildpacks/0.2/tests task/buildpacks/0.3/tests task/buildpacks/0.4/tests task/buildpacks/0.5/tests task/buildpacks/0.6/tests task/check-make/0.1/tests task/codecov/0.1/tests task/codecov/0.2/tests task/curl/0.1/tests task/docker-build/0.1/tests task/dockerslim-build/0.1/tests task/flake8/0.1/tests task/gcloud/0.3/tests task/generate-build-id/0.1/tests task/git-batch-merge/0.1/tests task/git-batch-merge/0.2/tests task/git-batch-merge/0.3/tests task/git-cli/0.1/tests task/git-cli/0.2/tests task/git-cli/0.3/tests task/git-cli/0.4/tests task/git-clone/0.1/tests task/git-clone/0.10/tests task/git-clone/0.2/tests task/git-clone/0.3/tests task/git-clone/0.4/tests task/git-clone/0.5/tests task/git-clone/0.6/tests task/git-clone/0.7/tests task/git-clone/0.8/tests task/git-clone/0.9/tests task/git-version/0.1/tests task/gitea-set-status/0.1/tests task/github-add-comment/0.1/tests task/github-add-comment/0.2/tests task/github-add-comment/0.3/tests task/github-add-comment/0.4/tests task/github-add-comment/0.5/tests task/github-add-comment/0.6/tests task/github-add-comment/0.7/tests task/github-add-gist/0.1/tests task/github-add-gist/0.2/tests task/github-create-deployment-status/0.1/tests task/github-create-deployment/0.2/tests task/github-open-pr/0.1/tests task/github-open-pr/0.2/tests task/github-request-reviewers/0.1/tests task/github-set-status/0.4/tests task/gitlab-set-status/0.1/tests task/gitlab-set-status/0.2/tests task/gitleaks/0.1/tests task/golang-build/0.1/tests task/golang-build/0.2/tests task/golang-build/0.3/tests task/golang-fuzz/0.1/tests task/golang-test/0.1/tests task/golang-test/0.2/tests task/golangci-lint/0.1/tests task/golangci-lint/0.2/tests task/gradle/0.1/tests task/gradle/0.2/tests task/gradle/0.3/tests task/gradle/0.4/tests task/grype/0.1/tests task/hadolint/0.1/tests task/helm-render-manifests-from-repo/0.1/tests task/helm-upgrade-from-repo/0.1/tests task/helm-upgrade-from-repo/0.2/tests task/helm-upgrade-from-repo/0.3/tests task/helm-upgrade-from-source/0.1/tests task/helm-upgrade-from-source/0.2/tests task/helm-upgrade-from-source/0.3/tests task/helm-upgrade-from-source/0.4/tests task/hugo/0.1/tests task/jenkins/0.1/tests task/jib-gradle/0.1/tests task/jib-gradle/0.2/tests task/jib-gradle/0.3/tests task/jib-gradle/0.4/tests task/jib-maven/0.1/tests task/jib-maven/0.2/tests task/jib-maven/0.3/tests task/jib-maven/0.4/tests task/jib-maven/0.5/tests task/jq/0.1/tests task/kamel-run/0.1/tests task/kaniko/0.1/tests task/kaniko/0.2/tests task/kaniko/0.3/tests task/kaniko/0.4/tests task/kaniko/0.5/tests task/kaniko/0.6/tests task/kaniko/0.7/tests task/kind/0.1/tests task/ko/0.1/tests task/kube-linter/0.1/tests task/kubeconfig-creator/0.1/tests task/kubeconfig-creator/0.2/tests task/kubernetes-actions/0.2/tests task/kythe-go/0.1/tests task/kythe-go/0.2/tests task/markdown-lint/0.1/tests task/maven/0.1/tests task/maven/0.2/tests task/maven/0.3/tests task/maven/0.4/tests task/mypy-lint/0.1/tests task/mypy-lint/0.2/tests task/npm/0.1/tests task/openshift-client/0.1/tests task/openshift-client/0.2/tests task/orka-deploy/0.1/tests task/orka-deploy/0.2/tests task/orka-full/0.1/tests task/orka-full/0.2/tests task/orka-init/0.1/tests task/orka-init/0.2/tests task/orka-teardown/0.1/tests task/orka-teardown/0.2/tests task/pluto/0.1/tests task/powershell/0.1/tests task/prettier/0.1/tests task/pull-request/0.1/tests task/pull-request/0.2/tests task/pylint/0.1/tests task/pylint/0.2/tests task/pylint/0.3/tests task/pytest/0.1/tests task/pytest/0.2/tests task/python-coverage/0.1/tests task/redhat-codeready-dependency-analysis/0.1/tests task/redhat-dependency-analytics/0.1/tests task/redhat-dependency-analytics/0.2/tests task/replace-tokens/0.1/tests task/robot-framework/0.1/tests task/ruby-lint/0.1/tests task/s2i/0.1/tests task/s2i/0.2/tests task/s2i/0.3/tests task/shellcheck/0.1/tests task/shp/0.1/tests task/skopeo-copy/0.1/tests task/skopeo-copy/0.2/tests task/skopeo-copy/0.3/tests task/skopeo-copy/0.4/tests task/sonarqube-scanner/0.2/tests task/sonarqube-scanner/0.3/tests task/sonarqube-scanner/0.4/tests task/syft/0.1/tests task/tekton-catalog-publish/0.1/tests task/tekton-catalog-publish/0.2/tests task/tkn/0.2/tests task/tkn/0.3/tests task/tkn/0.4/tests task/tkn/0.5/tests task/trigger-jenkins-job/0.1/tests task/trivy-scanner/0.1/tests task/trivy-scanner/0.2/tests task/ts-lint/0.1/tests task/upload-pypi/0.2/tests task/valint/0.1/tests task/wget/0.1/tests task/write-file/0.1/tests task/yaml-lint/0.1/tests task/yq/0.1/tests task/yq/0.2/tests task/yq/0.3/tests task/yq/0.4/tests + all_tests='task/ansible-builder/0.1/tests task/ansible-runner/0.1/tests task/ansible-runner/0.2/tests task/asciidoctor/0.1/tests task/bentoml/0.1/tests task/black/0.1/tests task/black/0.2/tests task/blue-green-deploy/0.1/tests task/blue-green-deploy/0.2/tests task/buildah/0.1/tests task/buildah/0.2/tests task/buildah/0.3/tests task/buildah/0.4/tests task/buildah/0.5/tests task/buildah/0.6/tests task/buildah/0.7/tests task/buildah/0.8/tests task/buildah/0.9/tests task/buildpacks-phases/0.1/tests task/buildpacks-phases/0.2/tests task/buildpacks-phases/0.3/tests task/buildpacks/0.1/tests task/buildpacks/0.2/tests task/buildpacks/0.3/tests task/buildpacks/0.4/tests task/buildpacks/0.5/tests task/buildpacks/0.6/tests task/check-make/0.1/tests task/codecov/0.1/tests task/codecov/0.2/tests task/curl/0.1/tests task/docker-build/0.1/tests task/dockerslim-build/0.1/tests task/flake8/0.1/tests task/gcloud/0.3/tests task/generate-build-id/0.1/tests task/git-batch-merge/0.1/tests task/git-batch-merge/0.2/tests task/git-batch-merge/0.3/tests task/git-cli/0.1/tests task/git-cli/0.2/tests task/git-cli/0.3/tests task/git-cli/0.4/tests task/git-clone/0.1/tests task/git-clone/0.10/tests task/git-clone/0.2/tests task/git-clone/0.3/tests task/git-clone/0.4/tests task/git-clone/0.5/tests task/git-clone/0.6/tests task/git-clone/0.7/tests task/git-clone/0.8/tests task/git-clone/0.9/tests task/git-version/0.1/tests task/gitea-set-status/0.1/tests task/github-add-comment/0.1/tests task/github-add-comment/0.2/tests task/github-add-comment/0.3/tests task/github-add-comment/0.4/tests task/github-add-comment/0.5/tests task/github-add-comment/0.6/tests task/github-add-comment/0.7/tests task/github-add-gist/0.1/tests task/github-add-gist/0.2/tests task/github-create-deployment-status/0.1/tests task/github-create-deployment/0.2/tests task/github-open-pr/0.1/tests task/github-open-pr/0.2/tests task/github-request-reviewers/0.1/tests task/github-set-status/0.4/tests task/gitlab-set-status/0.1/tests task/gitlab-set-status/0.2/tests task/gitleaks/0.1/tests task/golang-build/0.1/tests task/golang-build/0.2/tests task/golang-build/0.3/tests task/golang-fuzz/0.1/tests task/golang-test/0.1/tests task/golang-test/0.2/tests task/golangci-lint/0.1/tests task/golangci-lint/0.2/tests task/gradle/0.1/tests task/gradle/0.2/tests task/gradle/0.3/tests task/gradle/0.4/tests task/grype/0.1/tests task/hadolint/0.1/tests task/helm-render-manifests-from-repo/0.1/tests task/helm-upgrade-from-repo/0.1/tests task/helm-upgrade-from-repo/0.2/tests task/helm-upgrade-from-repo/0.3/tests task/helm-upgrade-from-source/0.1/tests task/helm-upgrade-from-source/0.2/tests task/helm-upgrade-from-source/0.3/tests task/helm-upgrade-from-source/0.4/tests task/hugo/0.1/tests task/jenkins/0.1/tests task/jib-gradle/0.1/tests task/jib-gradle/0.2/tests task/jib-gradle/0.3/tests task/jib-gradle/0.4/tests task/jib-maven/0.1/tests task/jib-maven/0.2/tests task/jib-maven/0.3/tests task/jib-maven/0.4/tests task/jib-maven/0.5/tests task/jq/0.1/tests task/kamel-run/0.1/tests task/kaniko/0.1/tests task/kaniko/0.2/tests task/kaniko/0.3/tests task/kaniko/0.4/tests task/kaniko/0.5/tests task/kaniko/0.6/tests task/kaniko/0.7/tests task/kind/0.1/tests task/ko/0.1/tests task/kube-linter/0.1/tests task/kubeconfig-creator/0.1/tests task/kubeconfig-creator/0.2/tests task/kubernetes-actions/0.2/tests task/kythe-go/0.1/tests task/kythe-go/0.2/tests task/markdown-lint/0.1/tests task/maven/0.1/tests task/maven/0.2/tests task/maven/0.3/tests task/maven/0.4/tests task/mypy-lint/0.1/tests task/mypy-lint/0.2/tests task/npm/0.1/tests task/openshift-client/0.1/tests task/openshift-client/0.2/tests task/orka-deploy/0.1/tests task/orka-deploy/0.2/tests task/orka-full/0.1/tests task/orka-full/0.2/tests task/orka-init/0.1/tests task/orka-init/0.2/tests task/orka-teardown/0.1/tests task/orka-teardown/0.2/tests task/pluto/0.1/tests task/powershell/0.1/tests task/prettier/0.1/tests task/pull-request/0.1/tests task/pull-request/0.2/tests task/pylint/0.1/tests task/pylint/0.2/tests task/pylint/0.3/tests task/pytest/0.1/tests task/pytest/0.2/tests task/python-coverage/0.1/tests task/redhat-codeready-dependency-analysis/0.1/tests task/redhat-dependency-analytics/0.1/tests task/redhat-dependency-analytics/0.2/tests task/replace-tokens/0.1/tests task/robot-framework/0.1/tests task/ruby-lint/0.1/tests task/s2i/0.1/tests task/s2i/0.2/tests task/s2i/0.3/tests task/shellcheck/0.1/tests task/shp/0.1/tests task/skopeo-copy/0.1/tests task/skopeo-copy/0.2/tests task/skopeo-copy/0.3/tests task/skopeo-copy/0.4/tests task/sonarqube-scanner/0.2/tests task/sonarqube-scanner/0.3/tests task/sonarqube-scanner/0.4/tests task/syft/0.1/tests task/tekton-catalog-publish/0.1/tests task/tekton-catalog-publish/0.2/tests task/tkn/0.2/tests task/tkn/0.3/tests task/tkn/0.4/tests task/tkn/0.5/tests task/trigger-jenkins-job/0.1/tests task/trivy-scanner/0.1/tests task/trivy-scanner/0.2/tests task/ts-lint/0.1/tests task/upload-pypi/0.2/tests task/valint/0.1/tests task/wget/0.1/tests task/write-file/0.1/tests task/yaml-lint/0.1/tests task/yq/0.1/tests task/yq/0.2/tests task/yq/0.3/tests task/yq/0.4/tests' + [[ -z '' ]] ++ detect_changed_e2e_test ++ git --no-pager diff --name-only c0af2a65816543066849335acda68393e9685418..bfa8e12b5061436d1593fc544c71641aafdf50f2 ++ grep '^test/[^/]*' + [[ ! -z test/e2e-common.sh ]] + TEST_RUN_ALL_TESTS=1 + [[ -z 1 ]] + test_yaml_can_install stepactions 'stepaction/git-clone/0.1/tests stepaction/git-clone/0.2/tests stepaction/tekton-catalog-publish/0.1/tests stepaction/tekton-catalog-publish/0.2/tests stepaction/tekton-catalog-publish/0.3/tests' + ns=stepactions-ns + shift + all_tasks='stepaction/git-clone/0.1/tests stepaction/git-clone/0.2/tests stepaction/tekton-catalog-publish/0.1/tests stepaction/tekton-catalog-publish/0.2/tests stepaction/tekton-catalog-publish/0.3/tests' + kubectl create ns stepactions-ns namespace/stepactions-ns created + local runtest + for runtest in ${all_tasks} + local runtestdir=git-clone/0.1/tests + local testname=git-clone + runtest=stepaction/git-clone/0.1/ + '[' '!' -d stepaction/git-clone ']' + runtest=stepaction/git-clone/0.1/git-clone.yaml + skipit= + grep 'tekton.dev/deprecated: \"true\"' + cat stepaction/git-clone/0.1/git-clone.yaml tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=git-clone/0.2/tests + local testname=git-clone + runtest=stepaction/git-clone/0.2/ + '[' '!' -d stepaction/git-clone ']' + runtest=stepaction/git-clone/0.2/git-clone.yaml + skipit= + cat stepaction/git-clone/0.2/git-clone.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking git-clone' Checking git-clone + kubectl -n stepactions-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' stepaction/git-clone/0.2/git-clone.yaml stepaction.tekton.dev/git-clone created + for runtest in ${all_tasks} + local runtestdir=tekton-catalog-publish/0.1/tests + local testname=tekton-catalog-publish + runtest=stepaction/tekton-catalog-publish/0.1/ + '[' '!' -d stepaction/tekton-catalog-publish ']' + runtest=stepaction/tekton-catalog-publish/0.1/tekton-catalog-publish.yaml + skipit= + cat stepaction/tekton-catalog-publish/0.1/tekton-catalog-publish.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=tekton-catalog-publish/0.2/tests + local testname=tekton-catalog-publish + runtest=stepaction/tekton-catalog-publish/0.2/ + '[' '!' -d stepaction/tekton-catalog-publish ']' + runtest=stepaction/tekton-catalog-publish/0.2/tekton-catalog-publish.yaml + skipit= + cat stepaction/tekton-catalog-publish/0.2/tekton-catalog-publish.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking tekton-catalog-publish' Checking tekton-catalog-publish + kubectl -n stepactions-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' stepaction/tekton-catalog-publish/0.2/tekton-catalog-publish.yaml stepaction.tekton.dev/tekton-catalog-publish created + for runtest in ${all_tasks} + local runtestdir=tekton-catalog-publish/0.3/tests + local testname=tekton-catalog-publish + runtest=stepaction/tekton-catalog-publish/0.3/ + '[' '!' -d stepaction/tekton-catalog-publish ']' + runtest=stepaction/tekton-catalog-publish/0.3/tekton-catalog-publish.yaml + skipit= + cat stepaction/tekton-catalog-publish/0.3/tekton-catalog-publish.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking tekton-catalog-publish' Checking tekton-catalog-publish + kubectl -n stepactions-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' stepaction/tekton-catalog-publish/0.3/tekton-catalog-publish.yaml stepaction.tekton.dev/tekton-catalog-publish configured + test_yaml_can_install tasks 'task/ansible-builder/0.1/tests task/ansible-runner/0.1/tests task/ansible-runner/0.2/tests task/asciidoctor/0.1/tests task/bentoml/0.1/tests task/black/0.1/tests task/black/0.2/tests task/blue-green-deploy/0.1/tests task/blue-green-deploy/0.2/tests task/buildah/0.1/tests task/buildah/0.2/tests task/buildah/0.3/tests task/buildah/0.4/tests task/buildah/0.5/tests task/buildah/0.6/tests task/buildah/0.7/tests task/buildah/0.8/tests task/buildah/0.9/tests task/buildpacks-phases/0.1/tests task/buildpacks-phases/0.2/tests task/buildpacks-phases/0.3/tests task/buildpacks/0.1/tests task/buildpacks/0.2/tests task/buildpacks/0.3/tests task/buildpacks/0.4/tests task/buildpacks/0.5/tests task/buildpacks/0.6/tests task/check-make/0.1/tests task/codecov/0.1/tests task/codecov/0.2/tests task/curl/0.1/tests task/docker-build/0.1/tests task/dockerslim-build/0.1/tests task/flake8/0.1/tests task/gcloud/0.3/tests task/generate-build-id/0.1/tests task/git-batch-merge/0.1/tests task/git-batch-merge/0.2/tests task/git-batch-merge/0.3/tests task/git-cli/0.1/tests task/git-cli/0.2/tests task/git-cli/0.3/tests task/git-cli/0.4/tests task/git-clone/0.1/tests task/git-clone/0.10/tests task/git-clone/0.2/tests task/git-clone/0.3/tests task/git-clone/0.4/tests task/git-clone/0.5/tests task/git-clone/0.6/tests task/git-clone/0.7/tests task/git-clone/0.8/tests task/git-clone/0.9/tests task/git-version/0.1/tests task/gitea-set-status/0.1/tests task/github-add-comment/0.1/tests task/github-add-comment/0.2/tests task/github-add-comment/0.3/tests task/github-add-comment/0.4/tests task/github-add-comment/0.5/tests task/github-add-comment/0.6/tests task/github-add-comment/0.7/tests task/github-add-gist/0.1/tests task/github-add-gist/0.2/tests task/github-create-deployment-status/0.1/tests task/github-create-deployment/0.2/tests task/github-open-pr/0.1/tests task/github-open-pr/0.2/tests task/github-request-reviewers/0.1/tests task/github-set-status/0.4/tests task/gitlab-set-status/0.1/tests task/gitlab-set-status/0.2/tests task/gitleaks/0.1/tests task/golang-build/0.1/tests task/golang-build/0.2/tests task/golang-build/0.3/tests task/golang-fuzz/0.1/tests task/golang-test/0.1/tests task/golang-test/0.2/tests task/golangci-lint/0.1/tests task/golangci-lint/0.2/tests task/gradle/0.1/tests task/gradle/0.2/tests task/gradle/0.3/tests task/gradle/0.4/tests task/grype/0.1/tests task/hadolint/0.1/tests task/helm-render-manifests-from-repo/0.1/tests task/helm-upgrade-from-repo/0.1/tests task/helm-upgrade-from-repo/0.2/tests task/helm-upgrade-from-repo/0.3/tests task/helm-upgrade-from-source/0.1/tests task/helm-upgrade-from-source/0.2/tests task/helm-upgrade-from-source/0.3/tests task/helm-upgrade-from-source/0.4/tests task/hugo/0.1/tests task/jenkins/0.1/tests task/jib-gradle/0.1/tests task/jib-gradle/0.2/tests task/jib-gradle/0.3/tests task/jib-gradle/0.4/tests task/jib-maven/0.1/tests task/jib-maven/0.2/tests task/jib-maven/0.3/tests task/jib-maven/0.4/tests task/jib-maven/0.5/tests task/jq/0.1/tests task/kamel-run/0.1/tests task/kaniko/0.1/tests task/kaniko/0.2/tests task/kaniko/0.3/tests task/kaniko/0.4/tests task/kaniko/0.5/tests task/kaniko/0.6/tests task/kaniko/0.7/tests task/kind/0.1/tests task/ko/0.1/tests task/kube-linter/0.1/tests task/kubeconfig-creator/0.1/tests task/kubeconfig-creator/0.2/tests task/kubernetes-actions/0.2/tests task/kythe-go/0.1/tests task/kythe-go/0.2/tests task/markdown-lint/0.1/tests task/maven/0.1/tests task/maven/0.2/tests task/maven/0.3/tests task/maven/0.4/tests task/mypy-lint/0.1/tests task/mypy-lint/0.2/tests task/npm/0.1/tests task/openshift-client/0.1/tests task/openshift-client/0.2/tests task/orka-deploy/0.1/tests task/orka-deploy/0.2/tests task/orka-full/0.1/tests task/orka-full/0.2/tests task/orka-init/0.1/tests task/orka-init/0.2/tests task/orka-teardown/0.1/tests task/orka-teardown/0.2/tests task/pluto/0.1/tests task/powershell/0.1/tests task/prettier/0.1/tests task/pull-request/0.1/tests task/pull-request/0.2/tests task/pylint/0.1/tests task/pylint/0.2/tests task/pylint/0.3/tests task/pytest/0.1/tests task/pytest/0.2/tests task/python-coverage/0.1/tests task/redhat-codeready-dependency-analysis/0.1/tests task/redhat-dependency-analytics/0.1/tests task/redhat-dependency-analytics/0.2/tests task/replace-tokens/0.1/tests task/robot-framework/0.1/tests task/ruby-lint/0.1/tests task/s2i/0.1/tests task/s2i/0.2/tests task/s2i/0.3/tests task/shellcheck/0.1/tests task/shp/0.1/tests task/skopeo-copy/0.1/tests task/skopeo-copy/0.2/tests task/skopeo-copy/0.3/tests task/skopeo-copy/0.4/tests task/sonarqube-scanner/0.2/tests task/sonarqube-scanner/0.3/tests task/sonarqube-scanner/0.4/tests task/syft/0.1/tests task/tekton-catalog-publish/0.1/tests task/tekton-catalog-publish/0.2/tests task/tkn/0.2/tests task/tkn/0.3/tests task/tkn/0.4/tests task/tkn/0.5/tests task/trigger-jenkins-job/0.1/tests task/trivy-scanner/0.1/tests task/trivy-scanner/0.2/tests task/ts-lint/0.1/tests task/upload-pypi/0.2/tests task/valint/0.1/tests task/wget/0.1/tests task/write-file/0.1/tests task/yaml-lint/0.1/tests task/yq/0.1/tests task/yq/0.2/tests task/yq/0.3/tests task/yq/0.4/tests' + ns=tasks-ns + shift + all_tasks='task/ansible-builder/0.1/tests task/ansible-runner/0.1/tests task/ansible-runner/0.2/tests task/asciidoctor/0.1/tests task/bentoml/0.1/tests task/black/0.1/tests task/black/0.2/tests task/blue-green-deploy/0.1/tests task/blue-green-deploy/0.2/tests task/buildah/0.1/tests task/buildah/0.2/tests task/buildah/0.3/tests task/buildah/0.4/tests task/buildah/0.5/tests task/buildah/0.6/tests task/buildah/0.7/tests task/buildah/0.8/tests task/buildah/0.9/tests task/buildpacks-phases/0.1/tests task/buildpacks-phases/0.2/tests task/buildpacks-phases/0.3/tests task/buildpacks/0.1/tests task/buildpacks/0.2/tests task/buildpacks/0.3/tests task/buildpacks/0.4/tests task/buildpacks/0.5/tests task/buildpacks/0.6/tests task/check-make/0.1/tests task/codecov/0.1/tests task/codecov/0.2/tests task/curl/0.1/tests task/docker-build/0.1/tests task/dockerslim-build/0.1/tests task/flake8/0.1/tests task/gcloud/0.3/tests task/generate-build-id/0.1/tests task/git-batch-merge/0.1/tests task/git-batch-merge/0.2/tests task/git-batch-merge/0.3/tests task/git-cli/0.1/tests task/git-cli/0.2/tests task/git-cli/0.3/tests task/git-cli/0.4/tests task/git-clone/0.1/tests task/git-clone/0.10/tests task/git-clone/0.2/tests task/git-clone/0.3/tests task/git-clone/0.4/tests task/git-clone/0.5/tests task/git-clone/0.6/tests task/git-clone/0.7/tests task/git-clone/0.8/tests task/git-clone/0.9/tests task/git-version/0.1/tests task/gitea-set-status/0.1/tests task/github-add-comment/0.1/tests task/github-add-comment/0.2/tests task/github-add-comment/0.3/tests task/github-add-comment/0.4/tests task/github-add-comment/0.5/tests task/github-add-comment/0.6/tests task/github-add-comment/0.7/tests task/github-add-gist/0.1/tests task/github-add-gist/0.2/tests task/github-create-deployment-status/0.1/tests task/github-create-deployment/0.2/tests task/github-open-pr/0.1/tests task/github-open-pr/0.2/tests task/github-request-reviewers/0.1/tests task/github-set-status/0.4/tests task/gitlab-set-status/0.1/tests task/gitlab-set-status/0.2/tests task/gitleaks/0.1/tests task/golang-build/0.1/tests task/golang-build/0.2/tests task/golang-build/0.3/tests task/golang-fuzz/0.1/tests task/golang-test/0.1/tests task/golang-test/0.2/tests task/golangci-lint/0.1/tests task/golangci-lint/0.2/tests task/gradle/0.1/tests task/gradle/0.2/tests task/gradle/0.3/tests task/gradle/0.4/tests task/grype/0.1/tests task/hadolint/0.1/tests task/helm-render-manifests-from-repo/0.1/tests task/helm-upgrade-from-repo/0.1/tests task/helm-upgrade-from-repo/0.2/tests task/helm-upgrade-from-repo/0.3/tests task/helm-upgrade-from-source/0.1/tests task/helm-upgrade-from-source/0.2/tests task/helm-upgrade-from-source/0.3/tests task/helm-upgrade-from-source/0.4/tests task/hugo/0.1/tests task/jenkins/0.1/tests task/jib-gradle/0.1/tests task/jib-gradle/0.2/tests task/jib-gradle/0.3/tests task/jib-gradle/0.4/tests task/jib-maven/0.1/tests task/jib-maven/0.2/tests task/jib-maven/0.3/tests task/jib-maven/0.4/tests task/jib-maven/0.5/tests task/jq/0.1/tests task/kamel-run/0.1/tests task/kaniko/0.1/tests task/kaniko/0.2/tests task/kaniko/0.3/tests task/kaniko/0.4/tests task/kaniko/0.5/tests task/kaniko/0.6/tests task/kaniko/0.7/tests task/kind/0.1/tests task/ko/0.1/tests task/kube-linter/0.1/tests task/kubeconfig-creator/0.1/tests task/kubeconfig-creator/0.2/tests task/kubernetes-actions/0.2/tests task/kythe-go/0.1/tests task/kythe-go/0.2/tests task/markdown-lint/0.1/tests task/maven/0.1/tests task/maven/0.2/tests task/maven/0.3/tests task/maven/0.4/tests task/mypy-lint/0.1/tests task/mypy-lint/0.2/tests task/npm/0.1/tests task/openshift-client/0.1/tests task/openshift-client/0.2/tests task/orka-deploy/0.1/tests task/orka-deploy/0.2/tests task/orka-full/0.1/tests task/orka-full/0.2/tests task/orka-init/0.1/tests task/orka-init/0.2/tests task/orka-teardown/0.1/tests task/orka-teardown/0.2/tests task/pluto/0.1/tests task/powershell/0.1/tests task/prettier/0.1/tests task/pull-request/0.1/tests task/pull-request/0.2/tests task/pylint/0.1/tests task/pylint/0.2/tests task/pylint/0.3/tests task/pytest/0.1/tests task/pytest/0.2/tests task/python-coverage/0.1/tests task/redhat-codeready-dependency-analysis/0.1/tests task/redhat-dependency-analytics/0.1/tests task/redhat-dependency-analytics/0.2/tests task/replace-tokens/0.1/tests task/robot-framework/0.1/tests task/ruby-lint/0.1/tests task/s2i/0.1/tests task/s2i/0.2/tests task/s2i/0.3/tests task/shellcheck/0.1/tests task/shp/0.1/tests task/skopeo-copy/0.1/tests task/skopeo-copy/0.2/tests task/skopeo-copy/0.3/tests task/skopeo-copy/0.4/tests task/sonarqube-scanner/0.2/tests task/sonarqube-scanner/0.3/tests task/sonarqube-scanner/0.4/tests task/syft/0.1/tests task/tekton-catalog-publish/0.1/tests task/tekton-catalog-publish/0.2/tests task/tkn/0.2/tests task/tkn/0.3/tests task/tkn/0.4/tests task/tkn/0.5/tests task/trigger-jenkins-job/0.1/tests task/trivy-scanner/0.1/tests task/trivy-scanner/0.2/tests task/ts-lint/0.1/tests task/upload-pypi/0.2/tests task/valint/0.1/tests task/wget/0.1/tests task/write-file/0.1/tests task/yaml-lint/0.1/tests task/yq/0.1/tests task/yq/0.2/tests task/yq/0.3/tests task/yq/0.4/tests' + kubectl create ns tasks-ns namespace/tasks-ns created + local runtest + for runtest in ${all_tasks} + local runtestdir=ansible-builder/0.1/tests + local testname=ansible-builder + runtest=task/ansible-builder/0.1/ + '[' '!' -d task/ansible-builder ']' + runtest=task/ansible-builder/0.1/ansible-builder.yaml + skipit= + cat task/ansible-builder/0.1/ansible-builder.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=ansible-runner/0.1/tests + local testname=ansible-runner + runtest=task/ansible-runner/0.1/ + '[' '!' -d task/ansible-runner ']' + runtest=task/ansible-runner/0.1/ansible-runner.yaml + skipit= + cat task/ansible-runner/0.1/ansible-runner.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=ansible-runner/0.2/tests + local testname=ansible-runner + runtest=task/ansible-runner/0.2/ + '[' '!' -d task/ansible-runner ']' + runtest=task/ansible-runner/0.2/ansible-runner.yaml + skipit= + cat task/ansible-runner/0.2/ansible-runner.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=asciidoctor/0.1/tests + local testname=asciidoctor + runtest=task/asciidoctor/0.1/ + '[' '!' -d task/asciidoctor ']' + runtest=task/asciidoctor/0.1/asciidoctor.yaml + skipit= + cat task/asciidoctor/0.1/asciidoctor.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking asciidoctor' Checking asciidoctor + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/asciidoctor/0.1/asciidoctor.yaml task.tekton.dev/asciidoctor created + for runtest in ${all_tasks} + local runtestdir=bentoml/0.1/tests + local testname=bentoml + runtest=task/bentoml/0.1/ + '[' '!' -d task/bentoml ']' + runtest=task/bentoml/0.1/bentoml.yaml + skipit= + cat task/bentoml/0.1/bentoml.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking bentoml' Checking bentoml + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/bentoml/0.1/bentoml.yaml task.tekton.dev/bentoml created + for runtest in ${all_tasks} + local runtestdir=black/0.1/tests + local testname=black + runtest=task/black/0.1/ + '[' '!' -d task/black ']' + runtest=task/black/0.1/black.yaml + skipit= + cat task/black/0.1/black.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking black' Checking black + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/black/0.1/black.yaml task.tekton.dev/black created + for runtest in ${all_tasks} + local runtestdir=black/0.2/tests + local testname=black + runtest=task/black/0.2/ + '[' '!' -d task/black ']' + runtest=task/black/0.2/black.yaml + skipit= + cat task/black/0.2/black.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking black' Checking black + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/black/0.2/black.yaml task.tekton.dev/black configured + for runtest in ${all_tasks} + local runtestdir=blue-green-deploy/0.1/tests + local testname=blue-green-deploy + runtest=task/blue-green-deploy/0.1/ + '[' '!' -d task/blue-green-deploy ']' + runtest=task/blue-green-deploy/0.1/blue-green-deploy.yaml + skipit= + cat task/blue-green-deploy/0.1/blue-green-deploy.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking blue-green-deploy' Checking blue-green-deploy + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/blue-green-deploy/0.1/blue-green-deploy.yaml task.tekton.dev/blue-green-deploy created + for runtest in ${all_tasks} + local runtestdir=blue-green-deploy/0.2/tests + local testname=blue-green-deploy + runtest=task/blue-green-deploy/0.2/ + '[' '!' -d task/blue-green-deploy ']' + runtest=task/blue-green-deploy/0.2/blue-green-deploy.yaml + skipit= + cat task/blue-green-deploy/0.2/blue-green-deploy.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking blue-green-deploy' Checking blue-green-deploy + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/blue-green-deploy/0.2/blue-green-deploy.yaml task.tekton.dev/blue-green-deploy configured + for runtest in ${all_tasks} + local runtestdir=buildah/0.1/tests + local testname=buildah + runtest=task/buildah/0.1/ + '[' '!' -d task/buildah ']' + runtest=task/buildah/0.1/buildah.yaml + skipit= + cat task/buildah/0.1/buildah.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking buildah' Checking buildah + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/buildah/0.1/buildah.yaml task.tekton.dev/buildah created + for runtest in ${all_tasks} + local runtestdir=buildah/0.2/tests + local testname=buildah + runtest=task/buildah/0.2/ + '[' '!' -d task/buildah ']' + runtest=task/buildah/0.2/buildah.yaml + skipit= + cat task/buildah/0.2/buildah.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking buildah' Checking buildah + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/buildah/0.2/buildah.yaml task.tekton.dev/buildah configured + for runtest in ${all_tasks} + local runtestdir=buildah/0.3/tests + local testname=buildah + runtest=task/buildah/0.3/ + '[' '!' -d task/buildah ']' + runtest=task/buildah/0.3/buildah.yaml + skipit= + cat task/buildah/0.3/buildah.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking buildah' Checking buildah + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/buildah/0.3/buildah.yaml task.tekton.dev/buildah configured + for runtest in ${all_tasks} + local runtestdir=buildah/0.4/tests + local testname=buildah + runtest=task/buildah/0.4/ + '[' '!' -d task/buildah ']' + runtest=task/buildah/0.4/buildah.yaml + skipit= + cat task/buildah/0.4/buildah.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking buildah' Checking buildah + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/buildah/0.4/buildah.yaml task.tekton.dev/buildah configured + for runtest in ${all_tasks} + local runtestdir=buildah/0.5/tests + local testname=buildah + runtest=task/buildah/0.5/ + '[' '!' -d task/buildah ']' + runtest=task/buildah/0.5/buildah.yaml + skipit= + cat task/buildah/0.5/buildah.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking buildah' Checking buildah + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/buildah/0.5/buildah.yaml task.tekton.dev/buildah configured + for runtest in ${all_tasks} + local runtestdir=buildah/0.6/tests + local testname=buildah + runtest=task/buildah/0.6/ + '[' '!' -d task/buildah ']' + runtest=task/buildah/0.6/buildah.yaml + skipit= + cat task/buildah/0.6/buildah.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking buildah' Checking buildah + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/buildah/0.6/buildah.yaml task.tekton.dev/buildah configured + for runtest in ${all_tasks} + local runtestdir=buildah/0.7/tests + local testname=buildah + runtest=task/buildah/0.7/ + '[' '!' -d task/buildah ']' + runtest=task/buildah/0.7/buildah.yaml + skipit= + cat task/buildah/0.7/buildah.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking buildah' Checking buildah + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/buildah/0.7/buildah.yaml task.tekton.dev/buildah configured + for runtest in ${all_tasks} + local runtestdir=buildah/0.8/tests + local testname=buildah + runtest=task/buildah/0.8/ + '[' '!' -d task/buildah ']' + runtest=task/buildah/0.8/buildah.yaml + skipit= + cat task/buildah/0.8/buildah.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking buildah' Checking buildah + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/buildah/0.8/buildah.yaml task.tekton.dev/buildah configured + for runtest in ${all_tasks} + local runtestdir=buildah/0.9/tests + local testname=buildah + runtest=task/buildah/0.9/ + '[' '!' -d task/buildah ']' + runtest=task/buildah/0.9/buildah.yaml + skipit= + cat task/buildah/0.9/buildah.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking buildah' Checking buildah + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/buildah/0.9/buildah.yaml task.tekton.dev/buildah configured + for runtest in ${all_tasks} + local runtestdir=buildpacks-phases/0.1/tests + local testname=buildpacks-phases + runtest=task/buildpacks-phases/0.1/ + '[' '!' -d task/buildpacks-phases ']' + runtest=task/buildpacks-phases/0.1/buildpacks-phases.yaml + skipit= + cat task/buildpacks-phases/0.1/buildpacks-phases.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=buildpacks-phases/0.2/tests + local testname=buildpacks-phases + runtest=task/buildpacks-phases/0.2/ + '[' '!' -d task/buildpacks-phases ']' + runtest=task/buildpacks-phases/0.2/buildpacks-phases.yaml + skipit= + cat task/buildpacks-phases/0.2/buildpacks-phases.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking buildpacks-phases' Checking buildpacks-phases + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/buildpacks-phases/0.2/buildpacks-phases.yaml task.tekton.dev/buildpacks-phases created + for runtest in ${all_tasks} + local runtestdir=buildpacks-phases/0.3/tests + local testname=buildpacks-phases + runtest=task/buildpacks-phases/0.3/ + '[' '!' -d task/buildpacks-phases ']' + runtest=task/buildpacks-phases/0.3/buildpacks-phases.yaml + skipit= + cat task/buildpacks-phases/0.3/buildpacks-phases.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking buildpacks-phases' Checking buildpacks-phases + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/buildpacks-phases/0.3/buildpacks-phases.yaml task.tekton.dev/buildpacks-phases configured + for runtest in ${all_tasks} + local runtestdir=buildpacks/0.1/tests + local testname=buildpacks + runtest=task/buildpacks/0.1/ + '[' '!' -d task/buildpacks ']' + runtest=task/buildpacks/0.1/buildpacks.yaml + skipit= + cat task/buildpacks/0.1/buildpacks.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=buildpacks/0.2/tests + local testname=buildpacks + runtest=task/buildpacks/0.2/ + '[' '!' -d task/buildpacks ']' + runtest=task/buildpacks/0.2/buildpacks.yaml + skipit= + cat task/buildpacks/0.2/buildpacks.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=buildpacks/0.3/tests + local testname=buildpacks + runtest=task/buildpacks/0.3/ + '[' '!' -d task/buildpacks ']' + runtest=task/buildpacks/0.3/buildpacks.yaml + skipit= + cat task/buildpacks/0.3/buildpacks.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking buildpacks' Checking buildpacks + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/buildpacks/0.3/buildpacks.yaml task.tekton.dev/buildpacks created + for runtest in ${all_tasks} + local runtestdir=buildpacks/0.4/tests + local testname=buildpacks + runtest=task/buildpacks/0.4/ + '[' '!' -d task/buildpacks ']' + runtest=task/buildpacks/0.4/buildpacks.yaml + skipit= + cat task/buildpacks/0.4/buildpacks.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking buildpacks' Checking buildpacks + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/buildpacks/0.4/buildpacks.yaml task.tekton.dev/buildpacks configured + for runtest in ${all_tasks} + local runtestdir=buildpacks/0.5/tests + local testname=buildpacks + runtest=task/buildpacks/0.5/ + '[' '!' -d task/buildpacks ']' + runtest=task/buildpacks/0.5/buildpacks.yaml + skipit= + cat task/buildpacks/0.5/buildpacks.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking buildpacks' Checking buildpacks + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/buildpacks/0.5/buildpacks.yaml task.tekton.dev/buildpacks configured + for runtest in ${all_tasks} + local runtestdir=buildpacks/0.6/tests + local testname=buildpacks + runtest=task/buildpacks/0.6/ + '[' '!' -d task/buildpacks ']' + runtest=task/buildpacks/0.6/buildpacks.yaml + skipit= + cat task/buildpacks/0.6/buildpacks.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking buildpacks' Checking buildpacks + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/buildpacks/0.6/buildpacks.yaml task.tekton.dev/buildpacks configured + for runtest in ${all_tasks} + local runtestdir=check-make/0.1/tests + local testname=check-make + runtest=task/check-make/0.1/ + '[' '!' -d task/check-make ']' + runtest=task/check-make/0.1/check-make.yaml + skipit= + cat task/check-make/0.1/check-make.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking check-make' Checking check-make + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/check-make/0.1/check-make.yaml task.tekton.dev/check-make created + for runtest in ${all_tasks} + local runtestdir=codecov/0.1/tests + local testname=codecov + runtest=task/codecov/0.1/ + '[' '!' -d task/codecov ']' + runtest=task/codecov/0.1/codecov.yaml + skipit= + cat task/codecov/0.1/codecov.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=codecov/0.2/tests + local testname=codecov + runtest=task/codecov/0.2/ + '[' '!' -d task/codecov ']' + runtest=task/codecov/0.2/codecov.yaml + skipit= + cat task/codecov/0.2/codecov.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking codecov' Checking codecov + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/codecov/0.2/codecov.yaml task.tekton.dev/codecov created + for runtest in ${all_tasks} + local runtestdir=curl/0.1/tests + local testname=curl + runtest=task/curl/0.1/ + '[' '!' -d task/curl ']' + runtest=task/curl/0.1/curl.yaml + skipit= + cat task/curl/0.1/curl.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking curl' Checking curl + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/curl/0.1/curl.yaml task.tekton.dev/curl created + for runtest in ${all_tasks} + local runtestdir=docker-build/0.1/tests + local testname=docker-build + runtest=task/docker-build/0.1/ + '[' '!' -d task/docker-build ']' + runtest=task/docker-build/0.1/docker-build.yaml + skipit= + cat task/docker-build/0.1/docker-build.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking docker-build' Checking docker-build + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/docker-build/0.1/docker-build.yaml task.tekton.dev/docker-build created + for runtest in ${all_tasks} + local runtestdir=dockerslim-build/0.1/tests + local testname=dockerslim-build + runtest=task/dockerslim-build/0.1/ + '[' '!' -d task/dockerslim-build ']' + runtest=task/dockerslim-build/0.1/dockerslim-build.yaml + skipit= + cat task/dockerslim-build/0.1/dockerslim-build.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=flake8/0.1/tests + local testname=flake8 + runtest=task/flake8/0.1/ + '[' '!' -d task/flake8 ']' + runtest=task/flake8/0.1/flake8.yaml + skipit= + cat task/flake8/0.1/flake8.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking flake8' Checking flake8 + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/flake8/0.1/flake8.yaml task.tekton.dev/flake8 created + for runtest in ${all_tasks} + local runtestdir=gcloud/0.3/tests + local testname=gcloud + runtest=task/gcloud/0.3/ + '[' '!' -d task/gcloud ']' + runtest=task/gcloud/0.3/gcloud.yaml + skipit= + cat task/gcloud/0.3/gcloud.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking gcloud' Checking gcloud + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/gcloud/0.3/gcloud.yaml task.tekton.dev/gcloud created + for runtest in ${all_tasks} + local runtestdir=generate-build-id/0.1/tests + local testname=generate-build-id + runtest=task/generate-build-id/0.1/ + '[' '!' -d task/generate-build-id ']' + runtest=task/generate-build-id/0.1/generate-build-id.yaml + skipit= + cat task/generate-build-id/0.1/generate-build-id.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking generate-build-id' Checking generate-build-id + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/generate-build-id/0.1/generate-build-id.yaml task.tekton.dev/generate-build-id created + for runtest in ${all_tasks} + local runtestdir=git-batch-merge/0.1/tests + local testname=git-batch-merge + runtest=task/git-batch-merge/0.1/ + '[' '!' -d task/git-batch-merge ']' + runtest=task/git-batch-merge/0.1/git-batch-merge.yaml + skipit= + cat task/git-batch-merge/0.1/git-batch-merge.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=git-batch-merge/0.2/tests + local testname=git-batch-merge + runtest=task/git-batch-merge/0.2/ + '[' '!' -d task/git-batch-merge ']' + runtest=task/git-batch-merge/0.2/git-batch-merge.yaml + skipit= + cat task/git-batch-merge/0.2/git-batch-merge.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=git-batch-merge/0.3/tests + local testname=git-batch-merge + runtest=task/git-batch-merge/0.3/ + '[' '!' -d task/git-batch-merge ']' + runtest=task/git-batch-merge/0.3/git-batch-merge.yaml + skipit= + cat task/git-batch-merge/0.3/git-batch-merge.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking git-batch-merge' Checking git-batch-merge + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/git-batch-merge/0.3/git-batch-merge.yaml task.tekton.dev/git-batch-merge created + for runtest in ${all_tasks} + local runtestdir=git-cli/0.1/tests + local testname=git-cli + runtest=task/git-cli/0.1/ + '[' '!' -d task/git-cli ']' + runtest=task/git-cli/0.1/git-cli.yaml + skipit= + cat task/git-cli/0.1/git-cli.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking git-cli' Checking git-cli + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/git-cli/0.1/git-cli.yaml task.tekton.dev/git-cli created + for runtest in ${all_tasks} + local runtestdir=git-cli/0.2/tests + local testname=git-cli + runtest=task/git-cli/0.2/ + '[' '!' -d task/git-cli ']' + runtest=task/git-cli/0.2/git-cli.yaml + skipit= + cat task/git-cli/0.2/git-cli.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking git-cli' Checking git-cli + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/git-cli/0.2/git-cli.yaml task.tekton.dev/git-cli configured + for runtest in ${all_tasks} + local runtestdir=git-cli/0.3/tests + local testname=git-cli + runtest=task/git-cli/0.3/ + '[' '!' -d task/git-cli ']' + runtest=task/git-cli/0.3/git-cli.yaml + skipit= + cat task/git-cli/0.3/git-cli.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking git-cli' Checking git-cli + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/git-cli/0.3/git-cli.yaml task.tekton.dev/git-cli configured + for runtest in ${all_tasks} + local runtestdir=git-cli/0.4/tests + local testname=git-cli + runtest=task/git-cli/0.4/ + '[' '!' -d task/git-cli ']' + runtest=task/git-cli/0.4/git-cli.yaml + skipit= + cat task/git-cli/0.4/git-cli.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking git-cli' Checking git-cli + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/git-cli/0.4/git-cli.yaml task.tekton.dev/git-cli configured + for runtest in ${all_tasks} + local runtestdir=git-clone/0.1/tests + local testname=git-clone + runtest=task/git-clone/0.1/ + '[' '!' -d task/git-clone ']' + runtest=task/git-clone/0.1/git-clone.yaml + skipit= + cat task/git-clone/0.1/git-clone.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=git-clone/0.10/tests + local testname=git-clone + runtest=task/git-clone/0.10/ + '[' '!' -d task/git-clone ']' + runtest=task/git-clone/0.10/git-clone.yaml + skipit= + cat task/git-clone/0.10/git-clone.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking git-clone' Checking git-clone + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/git-clone/0.10/git-clone.yaml task.tekton.dev/git-clone created + for runtest in ${all_tasks} + local runtestdir=git-clone/0.2/tests + local testname=git-clone + runtest=task/git-clone/0.2/ + '[' '!' -d task/git-clone ']' + runtest=task/git-clone/0.2/git-clone.yaml + skipit= + cat task/git-clone/0.2/git-clone.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=git-clone/0.3/tests + local testname=git-clone + runtest=task/git-clone/0.3/ + '[' '!' -d task/git-clone ']' + runtest=task/git-clone/0.3/git-clone.yaml + skipit= + cat task/git-clone/0.3/git-clone.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=git-clone/0.4/tests + local testname=git-clone + runtest=task/git-clone/0.4/ + '[' '!' -d task/git-clone ']' + runtest=task/git-clone/0.4/git-clone.yaml + skipit= + cat task/git-clone/0.4/git-clone.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=git-clone/0.5/tests + local testname=git-clone + runtest=task/git-clone/0.5/ + '[' '!' -d task/git-clone ']' + runtest=task/git-clone/0.5/git-clone.yaml + skipit= + cat task/git-clone/0.5/git-clone.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=git-clone/0.6/tests + local testname=git-clone + runtest=task/git-clone/0.6/ + '[' '!' -d task/git-clone ']' + runtest=task/git-clone/0.6/git-clone.yaml + skipit= + grep 'tekton.dev/deprecated: \"true\"' + cat task/git-clone/0.6/git-clone.yaml tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=git-clone/0.7/tests + local testname=git-clone + runtest=task/git-clone/0.7/ + '[' '!' -d task/git-clone ']' + runtest=task/git-clone/0.7/git-clone.yaml + skipit= + cat task/git-clone/0.7/git-clone.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=git-clone/0.8/tests + local testname=git-clone + runtest=task/git-clone/0.8/ + '[' '!' -d task/git-clone ']' + runtest=task/git-clone/0.8/git-clone.yaml + skipit= + cat task/git-clone/0.8/git-clone.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=git-clone/0.9/tests + local testname=git-clone + runtest=task/git-clone/0.9/ + '[' '!' -d task/git-clone ']' + runtest=task/git-clone/0.9/git-clone.yaml + skipit= + cat task/git-clone/0.9/git-clone.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=git-version/0.1/tests + local testname=git-version + runtest=task/git-version/0.1/ + '[' '!' -d task/git-version ']' + runtest=task/git-version/0.1/git-version.yaml + skipit= + cat task/git-version/0.1/git-version.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking git-version' Checking git-version + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/git-version/0.1/git-version.yaml task.tekton.dev/git-version created + for runtest in ${all_tasks} + local runtestdir=gitea-set-status/0.1/tests + local testname=gitea-set-status + runtest=task/gitea-set-status/0.1/ + '[' '!' -d task/gitea-set-status ']' + runtest=task/gitea-set-status/0.1/gitea-set-status.yaml + skipit= + cat task/gitea-set-status/0.1/gitea-set-status.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking gitea-set-status' Checking gitea-set-status + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/gitea-set-status/0.1/gitea-set-status.yaml task.tekton.dev/gitea-set-status created + for runtest in ${all_tasks} + local runtestdir=github-add-comment/0.1/tests + local testname=github-add-comment + runtest=task/github-add-comment/0.1/ + '[' '!' -d task/github-add-comment ']' + runtest=task/github-add-comment/0.1/github-add-comment.yaml + skipit= + grep 'tekton.dev/deprecated: \"true\"' + cat task/github-add-comment/0.1/github-add-comment.yaml + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking github-add-comment' Checking github-add-comment + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/github-add-comment/0.1/github-add-comment.yaml task.tekton.dev/github-add-comment created + for runtest in ${all_tasks} + local runtestdir=github-add-comment/0.2/tests + local testname=github-add-comment + runtest=task/github-add-comment/0.2/ + '[' '!' -d task/github-add-comment ']' + runtest=task/github-add-comment/0.2/github-add-comment.yaml + skipit= + cat task/github-add-comment/0.2/github-add-comment.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking github-add-comment' Checking github-add-comment + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/github-add-comment/0.2/github-add-comment.yaml task.tekton.dev/github-add-comment configured + for runtest in ${all_tasks} + local runtestdir=github-add-comment/0.3/tests + local testname=github-add-comment + runtest=task/github-add-comment/0.3/ + '[' '!' -d task/github-add-comment ']' + runtest=task/github-add-comment/0.3/github-add-comment.yaml + skipit= + cat task/github-add-comment/0.3/github-add-comment.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking github-add-comment' Checking github-add-comment + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/github-add-comment/0.3/github-add-comment.yaml task.tekton.dev/github-add-comment configured + for runtest in ${all_tasks} + local runtestdir=github-add-comment/0.4/tests + local testname=github-add-comment + runtest=task/github-add-comment/0.4/ + '[' '!' -d task/github-add-comment ']' + runtest=task/github-add-comment/0.4/github-add-comment.yaml + skipit= + cat task/github-add-comment/0.4/github-add-comment.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking github-add-comment' Checking github-add-comment + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/github-add-comment/0.4/github-add-comment.yaml task.tekton.dev/github-add-comment configured + for runtest in ${all_tasks} + local runtestdir=github-add-comment/0.5/tests + local testname=github-add-comment + runtest=task/github-add-comment/0.5/ + '[' '!' -d task/github-add-comment ']' + runtest=task/github-add-comment/0.5/github-add-comment.yaml + skipit= + cat task/github-add-comment/0.5/github-add-comment.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking github-add-comment' Checking github-add-comment + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/github-add-comment/0.5/github-add-comment.yaml task.tekton.dev/github-add-comment configured + for runtest in ${all_tasks} + local runtestdir=github-add-comment/0.6/tests + local testname=github-add-comment + runtest=task/github-add-comment/0.6/ + '[' '!' -d task/github-add-comment ']' + runtest=task/github-add-comment/0.6/github-add-comment.yaml + skipit= + cat task/github-add-comment/0.6/github-add-comment.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking github-add-comment' Checking github-add-comment + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/github-add-comment/0.6/github-add-comment.yaml task.tekton.dev/github-add-comment configured + for runtest in ${all_tasks} + local runtestdir=github-add-comment/0.7/tests + local testname=github-add-comment + runtest=task/github-add-comment/0.7/ + '[' '!' -d task/github-add-comment ']' + runtest=task/github-add-comment/0.7/github-add-comment.yaml + skipit= + cat task/github-add-comment/0.7/github-add-comment.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking github-add-comment' Checking github-add-comment + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/github-add-comment/0.7/github-add-comment.yaml task.tekton.dev/github-add-comment configured + for runtest in ${all_tasks} + local runtestdir=github-add-gist/0.1/tests + local testname=github-add-gist + runtest=task/github-add-gist/0.1/ + '[' '!' -d task/github-add-gist ']' + runtest=task/github-add-gist/0.1/github-add-gist.yaml + skipit= + cat task/github-add-gist/0.1/github-add-gist.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking github-add-gist' Checking github-add-gist + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/github-add-gist/0.1/github-add-gist.yaml task.tekton.dev/github-add-gist created + for runtest in ${all_tasks} + local runtestdir=github-add-gist/0.2/tests + local testname=github-add-gist + runtest=task/github-add-gist/0.2/ + '[' '!' -d task/github-add-gist ']' + runtest=task/github-add-gist/0.2/github-add-gist.yaml + skipit= + grep 'tekton.dev/deprecated: \"true\"' + cat task/github-add-gist/0.2/github-add-gist.yaml + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking github-add-gist' Checking github-add-gist + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/github-add-gist/0.2/github-add-gist.yaml task.tekton.dev/github-add-gist configured + for runtest in ${all_tasks} + local runtestdir=github-create-deployment-status/0.1/tests + local testname=github-create-deployment-status + runtest=task/github-create-deployment-status/0.1/ + '[' '!' -d task/github-create-deployment-status ']' + runtest=task/github-create-deployment-status/0.1/github-create-deployment-status.yaml + skipit= + cat task/github-create-deployment-status/0.1/github-create-deployment-status.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking github-create-deployment-status' Checking github-create-deployment-status + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/github-create-deployment-status/0.1/github-create-deployment-status.yaml task.tekton.dev/github-create-deployment-status created + for runtest in ${all_tasks} + local runtestdir=github-create-deployment/0.2/tests + local testname=github-create-deployment + runtest=task/github-create-deployment/0.2/ + '[' '!' -d task/github-create-deployment ']' + runtest=task/github-create-deployment/0.2/github-create-deployment.yaml + skipit= + cat task/github-create-deployment/0.2/github-create-deployment.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking github-create-deployment' Checking github-create-deployment + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/github-create-deployment/0.2/github-create-deployment.yaml task.tekton.dev/github-create-deployment created + for runtest in ${all_tasks} + local runtestdir=github-open-pr/0.1/tests + local testname=github-open-pr + runtest=task/github-open-pr/0.1/ + '[' '!' -d task/github-open-pr ']' + runtest=task/github-open-pr/0.1/github-open-pr.yaml + skipit= + cat task/github-open-pr/0.1/github-open-pr.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking github-open-pr' Checking github-open-pr + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/github-open-pr/0.1/github-open-pr.yaml task.tekton.dev/github-open-pr created + for runtest in ${all_tasks} + local runtestdir=github-open-pr/0.2/tests + local testname=github-open-pr + runtest=task/github-open-pr/0.2/ + '[' '!' -d task/github-open-pr ']' + runtest=task/github-open-pr/0.2/github-open-pr.yaml + skipit= + cat task/github-open-pr/0.2/github-open-pr.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking github-open-pr' Checking github-open-pr + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/github-open-pr/0.2/github-open-pr.yaml task.tekton.dev/github-open-pr configured + for runtest in ${all_tasks} + local runtestdir=github-request-reviewers/0.1/tests + local testname=github-request-reviewers + runtest=task/github-request-reviewers/0.1/ + '[' '!' -d task/github-request-reviewers ']' + runtest=task/github-request-reviewers/0.1/github-request-reviewers.yaml + skipit= + cat task/github-request-reviewers/0.1/github-request-reviewers.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking github-request-reviewers' Checking github-request-reviewers + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/github-request-reviewers/0.1/github-request-reviewers.yaml task.tekton.dev/github-request-reviewers created + for runtest in ${all_tasks} + local runtestdir=github-set-status/0.4/tests + local testname=github-set-status + runtest=task/github-set-status/0.4/ + '[' '!' -d task/github-set-status ']' + runtest=task/github-set-status/0.4/github-set-status.yaml + skipit= + cat task/github-set-status/0.4/github-set-status.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking github-set-status' Checking github-set-status + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/github-set-status/0.4/github-set-status.yaml task.tekton.dev/github-set-status created + for runtest in ${all_tasks} + local runtestdir=gitlab-set-status/0.1/tests + local testname=gitlab-set-status + runtest=task/gitlab-set-status/0.1/ + '[' '!' -d task/gitlab-set-status ']' + runtest=task/gitlab-set-status/0.1/gitlab-set-status.yaml + skipit= + cat task/gitlab-set-status/0.1/gitlab-set-status.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking gitlab-set-status' Checking gitlab-set-status + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/gitlab-set-status/0.1/gitlab-set-status.yaml task.tekton.dev/gitlab-set-status created + for runtest in ${all_tasks} + local runtestdir=gitlab-set-status/0.2/tests + local testname=gitlab-set-status + runtest=task/gitlab-set-status/0.2/ + '[' '!' -d task/gitlab-set-status ']' + runtest=task/gitlab-set-status/0.2/gitlab-set-status.yaml + skipit= + cat task/gitlab-set-status/0.2/gitlab-set-status.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking gitlab-set-status' Checking gitlab-set-status + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/gitlab-set-status/0.2/gitlab-set-status.yaml task.tekton.dev/gitlab-set-status configured + for runtest in ${all_tasks} + local runtestdir=gitleaks/0.1/tests + local testname=gitleaks + runtest=task/gitleaks/0.1/ + '[' '!' -d task/gitleaks ']' + runtest=task/gitleaks/0.1/gitleaks.yaml + skipit= + cat task/gitleaks/0.1/gitleaks.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=golang-build/0.1/tests + local testname=golang-build + runtest=task/golang-build/0.1/ + '[' '!' -d task/golang-build ']' + runtest=task/golang-build/0.1/golang-build.yaml + skipit= + grep 'tekton.dev/deprecated: \"true\"' + cat task/golang-build/0.1/golang-build.yaml + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking golang-build' Checking golang-build + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/golang-build/0.1/golang-build.yaml task.tekton.dev/golang-build created + for runtest in ${all_tasks} + local runtestdir=golang-build/0.2/tests + local testname=golang-build + runtest=task/golang-build/0.2/ + '[' '!' -d task/golang-build ']' + runtest=task/golang-build/0.2/golang-build.yaml + skipit= + cat task/golang-build/0.2/golang-build.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking golang-build' Checking golang-build + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/golang-build/0.2/golang-build.yaml task.tekton.dev/golang-build configured + for runtest in ${all_tasks} + local runtestdir=golang-build/0.3/tests + local testname=golang-build + runtest=task/golang-build/0.3/ + '[' '!' -d task/golang-build ']' + runtest=task/golang-build/0.3/golang-build.yaml + skipit= + cat task/golang-build/0.3/golang-build.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking golang-build' Checking golang-build + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/golang-build/0.3/golang-build.yaml task.tekton.dev/golang-build configured + for runtest in ${all_tasks} + local runtestdir=golang-fuzz/0.1/tests + local testname=golang-fuzz + runtest=task/golang-fuzz/0.1/ + '[' '!' -d task/golang-fuzz ']' + runtest=task/golang-fuzz/0.1/golang-fuzz.yaml + skipit= + cat task/golang-fuzz/0.1/golang-fuzz.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=golang-test/0.1/tests + local testname=golang-test + runtest=task/golang-test/0.1/ + '[' '!' -d task/golang-test ']' + runtest=task/golang-test/0.1/golang-test.yaml + skipit= + cat task/golang-test/0.1/golang-test.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking golang-test' Checking golang-test + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/golang-test/0.1/golang-test.yaml task.tekton.dev/golang-test created + for runtest in ${all_tasks} + local runtestdir=golang-test/0.2/tests + local testname=golang-test + runtest=task/golang-test/0.2/ + '[' '!' -d task/golang-test ']' + runtest=task/golang-test/0.2/golang-test.yaml + skipit= + cat task/golang-test/0.2/golang-test.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking golang-test' Checking golang-test + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/golang-test/0.2/golang-test.yaml task.tekton.dev/golang-test configured + for runtest in ${all_tasks} + local runtestdir=golangci-lint/0.1/tests + local testname=golangci-lint + runtest=task/golangci-lint/0.1/ + '[' '!' -d task/golangci-lint ']' + runtest=task/golangci-lint/0.1/golangci-lint.yaml + skipit= + cat task/golangci-lint/0.1/golangci-lint.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking golangci-lint' Checking golangci-lint + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/golangci-lint/0.1/golangci-lint.yaml task.tekton.dev/golangci-lint created + for runtest in ${all_tasks} + local runtestdir=golangci-lint/0.2/tests + local testname=golangci-lint + runtest=task/golangci-lint/0.2/ + '[' '!' -d task/golangci-lint ']' + runtest=task/golangci-lint/0.2/golangci-lint.yaml + skipit= + cat task/golangci-lint/0.2/golangci-lint.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking golangci-lint' Checking golangci-lint + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/golangci-lint/0.2/golangci-lint.yaml task.tekton.dev/golangci-lint configured + for runtest in ${all_tasks} + local runtestdir=gradle/0.1/tests + local testname=gradle + runtest=task/gradle/0.1/ + '[' '!' -d task/gradle ']' + runtest=task/gradle/0.1/gradle.yaml + skipit= + cat task/gradle/0.1/gradle.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking gradle' Checking gradle + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/gradle/0.1/gradle.yaml task.tekton.dev/gradle created + for runtest in ${all_tasks} + local runtestdir=gradle/0.2/tests + local testname=gradle + runtest=task/gradle/0.2/ + '[' '!' -d task/gradle ']' + runtest=task/gradle/0.2/gradle.yaml + skipit= + cat task/gradle/0.2/gradle.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking gradle' Checking gradle + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/gradle/0.2/gradle.yaml task.tekton.dev/gradle configured + for runtest in ${all_tasks} + local runtestdir=gradle/0.3/tests + local testname=gradle + runtest=task/gradle/0.3/ + '[' '!' -d task/gradle ']' + runtest=task/gradle/0.3/gradle.yaml + skipit= + cat task/gradle/0.3/gradle.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking gradle' Checking gradle + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/gradle/0.3/gradle.yaml task.tekton.dev/gradle configured + for runtest in ${all_tasks} + local runtestdir=gradle/0.4/tests + local testname=gradle + runtest=task/gradle/0.4/ + '[' '!' -d task/gradle ']' + runtest=task/gradle/0.4/gradle.yaml + skipit= + grep 'tekton.dev/deprecated: \"true\"' + cat task/gradle/0.4/gradle.yaml + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking gradle' Checking gradle + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/gradle/0.4/gradle.yaml task.tekton.dev/gradle configured + for runtest in ${all_tasks} + local runtestdir=grype/0.1/tests + local testname=grype + runtest=task/grype/0.1/ + '[' '!' -d task/grype ']' + runtest=task/grype/0.1/grype.yaml + skipit= + cat task/grype/0.1/grype.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=hadolint/0.1/tests + local testname=hadolint + runtest=task/hadolint/0.1/ + '[' '!' -d task/hadolint ']' + runtest=task/hadolint/0.1/hadolint.yaml + skipit= + cat task/hadolint/0.1/hadolint.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking hadolint' Checking hadolint + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/hadolint/0.1/hadolint.yaml task.tekton.dev/hadolint created + for runtest in ${all_tasks} + local runtestdir=helm-render-manifests-from-repo/0.1/tests + local testname=helm-render-manifests-from-repo + runtest=task/helm-render-manifests-from-repo/0.1/ + '[' '!' -d task/helm-render-manifests-from-repo ']' + runtest=task/helm-render-manifests-from-repo/0.1/helm-render-manifests-from-repo.yaml + skipit= + cat task/helm-render-manifests-from-repo/0.1/helm-render-manifests-from-repo.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking helm-render-manifests-from-repo' Checking helm-render-manifests-from-repo + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/helm-render-manifests-from-repo/0.1/helm-render-manifests-from-repo.yaml task.tekton.dev/helm-render-manifests-from-repo created + for runtest in ${all_tasks} + local runtestdir=helm-upgrade-from-repo/0.1/tests + local testname=helm-upgrade-from-repo + runtest=task/helm-upgrade-from-repo/0.1/ + '[' '!' -d task/helm-upgrade-from-repo ']' + runtest=task/helm-upgrade-from-repo/0.1/helm-upgrade-from-repo.yaml + skipit= + cat task/helm-upgrade-from-repo/0.1/helm-upgrade-from-repo.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking helm-upgrade-from-repo' Checking helm-upgrade-from-repo + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/helm-upgrade-from-repo/0.1/helm-upgrade-from-repo.yaml task.tekton.dev/helm-upgrade-from-repo created + for runtest in ${all_tasks} + local runtestdir=helm-upgrade-from-repo/0.2/tests + local testname=helm-upgrade-from-repo + runtest=task/helm-upgrade-from-repo/0.2/ + '[' '!' -d task/helm-upgrade-from-repo ']' + runtest=task/helm-upgrade-from-repo/0.2/helm-upgrade-from-repo.yaml + skipit= + cat task/helm-upgrade-from-repo/0.2/helm-upgrade-from-repo.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking helm-upgrade-from-repo' Checking helm-upgrade-from-repo + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/helm-upgrade-from-repo/0.2/helm-upgrade-from-repo.yaml task.tekton.dev/helm-upgrade-from-repo configured + for runtest in ${all_tasks} + local runtestdir=helm-upgrade-from-repo/0.3/tests + local testname=helm-upgrade-from-repo + runtest=task/helm-upgrade-from-repo/0.3/ + '[' '!' -d task/helm-upgrade-from-repo ']' + runtest=task/helm-upgrade-from-repo/0.3/helm-upgrade-from-repo.yaml + skipit= + cat task/helm-upgrade-from-repo/0.3/helm-upgrade-from-repo.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking helm-upgrade-from-repo' Checking helm-upgrade-from-repo + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/helm-upgrade-from-repo/0.3/helm-upgrade-from-repo.yaml task.tekton.dev/helm-upgrade-from-repo configured + for runtest in ${all_tasks} + local runtestdir=helm-upgrade-from-source/0.1/tests + local testname=helm-upgrade-from-source + runtest=task/helm-upgrade-from-source/0.1/ + '[' '!' -d task/helm-upgrade-from-source ']' + runtest=task/helm-upgrade-from-source/0.1/helm-upgrade-from-source.yaml + skipit= + cat task/helm-upgrade-from-source/0.1/helm-upgrade-from-source.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking helm-upgrade-from-source' Checking helm-upgrade-from-source + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/helm-upgrade-from-source/0.1/helm-upgrade-from-source.yaml task.tekton.dev/helm-upgrade-from-source created + for runtest in ${all_tasks} + local runtestdir=helm-upgrade-from-source/0.2/tests + local testname=helm-upgrade-from-source + runtest=task/helm-upgrade-from-source/0.2/ + '[' '!' -d task/helm-upgrade-from-source ']' + runtest=task/helm-upgrade-from-source/0.2/helm-upgrade-from-source.yaml + skipit= + cat task/helm-upgrade-from-source/0.2/helm-upgrade-from-source.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking helm-upgrade-from-source' Checking helm-upgrade-from-source + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/helm-upgrade-from-source/0.2/helm-upgrade-from-source.yaml task.tekton.dev/helm-upgrade-from-source configured + for runtest in ${all_tasks} + local runtestdir=helm-upgrade-from-source/0.3/tests + local testname=helm-upgrade-from-source + runtest=task/helm-upgrade-from-source/0.3/ + '[' '!' -d task/helm-upgrade-from-source ']' + runtest=task/helm-upgrade-from-source/0.3/helm-upgrade-from-source.yaml + skipit= + grep 'tekton.dev/deprecated: \"true\"' + cat task/helm-upgrade-from-source/0.3/helm-upgrade-from-source.yaml + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking helm-upgrade-from-source' Checking helm-upgrade-from-source + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/helm-upgrade-from-source/0.3/helm-upgrade-from-source.yaml task.tekton.dev/helm-upgrade-from-source configured + for runtest in ${all_tasks} + local runtestdir=helm-upgrade-from-source/0.4/tests + local testname=helm-upgrade-from-source + runtest=task/helm-upgrade-from-source/0.4/ + '[' '!' -d task/helm-upgrade-from-source ']' + runtest=task/helm-upgrade-from-source/0.4/helm-upgrade-from-source.yaml + skipit= + cat task/helm-upgrade-from-source/0.4/helm-upgrade-from-source.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking helm-upgrade-from-source' Checking helm-upgrade-from-source + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/helm-upgrade-from-source/0.4/helm-upgrade-from-source.yaml task.tekton.dev/helm-upgrade-from-source configured + for runtest in ${all_tasks} + local runtestdir=hugo/0.1/tests + local testname=hugo + runtest=task/hugo/0.1/ + '[' '!' -d task/hugo ']' + runtest=task/hugo/0.1/hugo.yaml + skipit= + cat task/hugo/0.1/hugo.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking hugo' Checking hugo + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/hugo/0.1/hugo.yaml task.tekton.dev/hugo created + for runtest in ${all_tasks} + local runtestdir=jenkins/0.1/tests + local testname=jenkins + runtest=task/jenkins/0.1/ + '[' '!' -d task/jenkins ']' + runtest=task/jenkins/0.1/jenkins.yaml + skipit= + cat task/jenkins/0.1/jenkins.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking jenkins' Checking jenkins + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/jenkins/0.1/jenkins.yaml task.tekton.dev/jenkins created + for runtest in ${all_tasks} + local runtestdir=jib-gradle/0.1/tests + local testname=jib-gradle + runtest=task/jib-gradle/0.1/ + '[' '!' -d task/jib-gradle ']' + runtest=task/jib-gradle/0.1/jib-gradle.yaml + skipit= + cat task/jib-gradle/0.1/jib-gradle.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=jib-gradle/0.2/tests + local testname=jib-gradle + runtest=task/jib-gradle/0.2/ + '[' '!' -d task/jib-gradle ']' + runtest=task/jib-gradle/0.2/jib-gradle.yaml + skipit= + cat task/jib-gradle/0.2/jib-gradle.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking jib-gradle' Checking jib-gradle + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/jib-gradle/0.2/jib-gradle.yaml task.tekton.dev/jib-gradle created + for runtest in ${all_tasks} + local runtestdir=jib-gradle/0.3/tests + local testname=jib-gradle + runtest=task/jib-gradle/0.3/ + '[' '!' -d task/jib-gradle ']' + runtest=task/jib-gradle/0.3/jib-gradle.yaml + skipit= + cat task/jib-gradle/0.3/jib-gradle.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking jib-gradle' Checking jib-gradle + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/jib-gradle/0.3/jib-gradle.yaml task.tekton.dev/jib-gradle configured + for runtest in ${all_tasks} + local runtestdir=jib-gradle/0.4/tests + local testname=jib-gradle + runtest=task/jib-gradle/0.4/ + '[' '!' -d task/jib-gradle ']' + runtest=task/jib-gradle/0.4/jib-gradle.yaml + skipit= + cat task/jib-gradle/0.4/jib-gradle.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking jib-gradle' Checking jib-gradle + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/jib-gradle/0.4/jib-gradle.yaml task.tekton.dev/jib-gradle configured + for runtest in ${all_tasks} + local runtestdir=jib-maven/0.1/tests + local testname=jib-maven + runtest=task/jib-maven/0.1/ + '[' '!' -d task/jib-maven ']' + runtest=task/jib-maven/0.1/jib-maven.yaml + skipit= + grep 'tekton.dev/deprecated: \"true\"' + cat task/jib-maven/0.1/jib-maven.yaml tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=jib-maven/0.2/tests + local testname=jib-maven + runtest=task/jib-maven/0.2/ + '[' '!' -d task/jib-maven ']' + runtest=task/jib-maven/0.2/jib-maven.yaml + skipit= + cat task/jib-maven/0.2/jib-maven.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking jib-maven' Checking jib-maven + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/jib-maven/0.2/jib-maven.yaml task.tekton.dev/jib-maven created + for runtest in ${all_tasks} + local runtestdir=jib-maven/0.3/tests + local testname=jib-maven + runtest=task/jib-maven/0.3/ + '[' '!' -d task/jib-maven ']' + runtest=task/jib-maven/0.3/jib-maven.yaml + skipit= + grep 'tekton.dev/deprecated: \"true\"' + cat task/jib-maven/0.3/jib-maven.yaml + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking jib-maven' Checking jib-maven + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/jib-maven/0.3/jib-maven.yaml task.tekton.dev/jib-maven configured + for runtest in ${all_tasks} + local runtestdir=jib-maven/0.4/tests + local testname=jib-maven + runtest=task/jib-maven/0.4/ + '[' '!' -d task/jib-maven ']' + runtest=task/jib-maven/0.4/jib-maven.yaml + skipit= + cat task/jib-maven/0.4/jib-maven.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking jib-maven' Checking jib-maven + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/jib-maven/0.4/jib-maven.yaml task.tekton.dev/jib-maven configured + for runtest in ${all_tasks} + local runtestdir=jib-maven/0.5/tests + local testname=jib-maven + runtest=task/jib-maven/0.5/ + '[' '!' -d task/jib-maven ']' + runtest=task/jib-maven/0.5/jib-maven.yaml + skipit= + cat task/jib-maven/0.5/jib-maven.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking jib-maven' Checking jib-maven + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/jib-maven/0.5/jib-maven.yaml task.tekton.dev/jib-maven configured + for runtest in ${all_tasks} + local runtestdir=jq/0.1/tests + local testname=jq + runtest=task/jq/0.1/ + '[' '!' -d task/jq ']' + runtest=task/jq/0.1/jq.yaml + skipit= + cat task/jq/0.1/jq.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking jq' Checking jq + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/jq/0.1/jq.yaml task.tekton.dev/jq created + for runtest in ${all_tasks} + local runtestdir=kamel-run/0.1/tests + local testname=kamel-run + runtest=task/kamel-run/0.1/ + '[' '!' -d task/kamel-run ']' + runtest=task/kamel-run/0.1/kamel-run.yaml + skipit= + cat task/kamel-run/0.1/kamel-run.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking kamel-run' Checking kamel-run + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/kamel-run/0.1/kamel-run.yaml task.tekton.dev/kamel-run created + for runtest in ${all_tasks} + local runtestdir=kaniko/0.1/tests + local testname=kaniko + runtest=task/kaniko/0.1/ + '[' '!' -d task/kaniko ']' + runtest=task/kaniko/0.1/kaniko.yaml + skipit= + cat task/kaniko/0.1/kaniko.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=kaniko/0.2/tests + local testname=kaniko + runtest=task/kaniko/0.2/ + '[' '!' -d task/kaniko ']' + runtest=task/kaniko/0.2/kaniko.yaml + skipit= + cat task/kaniko/0.2/kaniko.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=kaniko/0.3/tests + local testname=kaniko + runtest=task/kaniko/0.3/ + '[' '!' -d task/kaniko ']' + runtest=task/kaniko/0.3/kaniko.yaml + skipit= + cat task/kaniko/0.3/kaniko.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=kaniko/0.4/tests + local testname=kaniko + runtest=task/kaniko/0.4/ + '[' '!' -d task/kaniko ']' + runtest=task/kaniko/0.4/kaniko.yaml + skipit= + cat task/kaniko/0.4/kaniko.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=kaniko/0.5/tests + local testname=kaniko + runtest=task/kaniko/0.5/ + '[' '!' -d task/kaniko ']' + runtest=task/kaniko/0.5/kaniko.yaml + skipit= + cat task/kaniko/0.5/kaniko.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=kaniko/0.6/tests + local testname=kaniko + runtest=task/kaniko/0.6/ + '[' '!' -d task/kaniko ']' + runtest=task/kaniko/0.6/kaniko.yaml + skipit= + cat task/kaniko/0.6/kaniko.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=kaniko/0.7/tests + local testname=kaniko + runtest=task/kaniko/0.7/ + '[' '!' -d task/kaniko ']' + runtest=task/kaniko/0.7/kaniko.yaml + skipit= + cat task/kaniko/0.7/kaniko.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=kind/0.1/tests + local testname=kind + runtest=task/kind/0.1/ + '[' '!' -d task/kind ']' + runtest=task/kind/0.1/kind.yaml + skipit= + cat task/kind/0.1/kind.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking kind' Checking kind + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/kind/0.1/kind.yaml task.tekton.dev/kind created + for runtest in ${all_tasks} + local runtestdir=ko/0.1/tests + local testname=ko + runtest=task/ko/0.1/ + '[' '!' -d task/ko ']' + runtest=task/ko/0.1/ko.yaml + skipit= + cat task/ko/0.1/ko.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking ko' Checking ko + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/ko/0.1/ko.yaml task.tekton.dev/ko created + for runtest in ${all_tasks} + local runtestdir=kube-linter/0.1/tests + local testname=kube-linter + runtest=task/kube-linter/0.1/ + '[' '!' -d task/kube-linter ']' + runtest=task/kube-linter/0.1/kube-linter.yaml + skipit= + cat task/kube-linter/0.1/kube-linter.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking kube-linter' Checking kube-linter + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/kube-linter/0.1/kube-linter.yaml task.tekton.dev/kube-linter created + for runtest in ${all_tasks} + local runtestdir=kubeconfig-creator/0.1/tests + local testname=kubeconfig-creator + runtest=task/kubeconfig-creator/0.1/ + '[' '!' -d task/kubeconfig-creator ']' + runtest=task/kubeconfig-creator/0.1/kubeconfig-creator.yaml + skipit= + cat task/kubeconfig-creator/0.1/kubeconfig-creator.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=kubeconfig-creator/0.2/tests + local testname=kubeconfig-creator + runtest=task/kubeconfig-creator/0.2/ + '[' '!' -d task/kubeconfig-creator ']' + runtest=task/kubeconfig-creator/0.2/kubeconfig-creator.yaml + skipit= + cat task/kubeconfig-creator/0.2/kubeconfig-creator.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking kubeconfig-creator' Checking kubeconfig-creator + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/kubeconfig-creator/0.2/kubeconfig-creator.yaml task.tekton.dev/kubeconfig-creator created + for runtest in ${all_tasks} + local runtestdir=kubernetes-actions/0.2/tests + local testname=kubernetes-actions + runtest=task/kubernetes-actions/0.2/ + '[' '!' -d task/kubernetes-actions ']' + runtest=task/kubernetes-actions/0.2/kubernetes-actions.yaml + skipit= + cat task/kubernetes-actions/0.2/kubernetes-actions.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking kubernetes-actions' Checking kubernetes-actions + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/kubernetes-actions/0.2/kubernetes-actions.yaml task.tekton.dev/kubernetes-actions created + for runtest in ${all_tasks} + local runtestdir=kythe-go/0.1/tests + local testname=kythe-go + runtest=task/kythe-go/0.1/ + '[' '!' -d task/kythe-go ']' + runtest=task/kythe-go/0.1/kythe-go.yaml + skipit= + cat task/kythe-go/0.1/kythe-go.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=kythe-go/0.2/tests + local testname=kythe-go + runtest=task/kythe-go/0.2/ + '[' '!' -d task/kythe-go ']' + runtest=task/kythe-go/0.2/kythe-go.yaml + skipit= + cat task/kythe-go/0.2/kythe-go.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=markdown-lint/0.1/tests + local testname=markdown-lint + runtest=task/markdown-lint/0.1/ + '[' '!' -d task/markdown-lint ']' + runtest=task/markdown-lint/0.1/markdown-lint.yaml + skipit= + cat task/markdown-lint/0.1/markdown-lint.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking markdown-lint' Checking markdown-lint + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/markdown-lint/0.1/markdown-lint.yaml task.tekton.dev/markdown-lint created + for runtest in ${all_tasks} + local runtestdir=maven/0.1/tests + local testname=maven + runtest=task/maven/0.1/ + '[' '!' -d task/maven ']' + runtest=task/maven/0.1/maven.yaml + skipit= + cat task/maven/0.1/maven.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking maven' Checking maven + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/maven/0.1/maven.yaml task.tekton.dev/maven created + for runtest in ${all_tasks} + local runtestdir=maven/0.2/tests + local testname=maven + runtest=task/maven/0.2/ + '[' '!' -d task/maven ']' + runtest=task/maven/0.2/maven.yaml + skipit= + cat task/maven/0.2/maven.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking maven' Checking maven + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/maven/0.2/maven.yaml task.tekton.dev/maven configured + for runtest in ${all_tasks} + local runtestdir=maven/0.3/tests + local testname=maven + runtest=task/maven/0.3/ + '[' '!' -d task/maven ']' + runtest=task/maven/0.3/maven.yaml + skipit= + cat task/maven/0.3/maven.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking maven' Checking maven + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/maven/0.3/maven.yaml task.tekton.dev/maven configured + for runtest in ${all_tasks} + local runtestdir=maven/0.4/tests + local testname=maven + runtest=task/maven/0.4/ + '[' '!' -d task/maven ']' + runtest=task/maven/0.4/maven.yaml + skipit= + cat task/maven/0.4/maven.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking maven' Checking maven + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/maven/0.4/maven.yaml task.tekton.dev/maven configured + for runtest in ${all_tasks} + local runtestdir=mypy-lint/0.1/tests + local testname=mypy-lint + runtest=task/mypy-lint/0.1/ + '[' '!' -d task/mypy-lint ']' + runtest=task/mypy-lint/0.1/mypy-lint.yaml + skipit= + cat task/mypy-lint/0.1/mypy-lint.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking mypy-lint' Checking mypy-lint + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/mypy-lint/0.1/mypy-lint.yaml task.tekton.dev/mypy-lint created + for runtest in ${all_tasks} + local runtestdir=mypy-lint/0.2/tests + local testname=mypy-lint + runtest=task/mypy-lint/0.2/ + '[' '!' -d task/mypy-lint ']' + runtest=task/mypy-lint/0.2/mypy-lint.yaml + skipit= + cat task/mypy-lint/0.2/mypy-lint.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking mypy-lint' Checking mypy-lint + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/mypy-lint/0.2/mypy-lint.yaml task.tekton.dev/mypy-lint configured + for runtest in ${all_tasks} + local runtestdir=npm/0.1/tests + local testname=npm + runtest=task/npm/0.1/ + '[' '!' -d task/npm ']' + runtest=task/npm/0.1/npm.yaml + skipit= + cat task/npm/0.1/npm.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking npm' Checking npm + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/npm/0.1/npm.yaml task.tekton.dev/npm created + for runtest in ${all_tasks} + local runtestdir=openshift-client/0.1/tests + local testname=openshift-client + runtest=task/openshift-client/0.1/ + '[' '!' -d task/openshift-client ']' + runtest=task/openshift-client/0.1/openshift-client.yaml + skipit= + cat task/openshift-client/0.1/openshift-client.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=openshift-client/0.2/tests + local testname=openshift-client + runtest=task/openshift-client/0.2/ + '[' '!' -d task/openshift-client ']' + runtest=task/openshift-client/0.2/openshift-client.yaml + skipit= + cat task/openshift-client/0.2/openshift-client.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking openshift-client' Checking openshift-client + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/openshift-client/0.2/openshift-client.yaml task.tekton.dev/openshift-client created + for runtest in ${all_tasks} + local runtestdir=orka-deploy/0.1/tests + local testname=orka-deploy + runtest=task/orka-deploy/0.1/ + '[' '!' -d task/orka-deploy ']' + runtest=task/orka-deploy/0.1/orka-deploy.yaml + skipit= + cat task/orka-deploy/0.1/orka-deploy.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=orka-deploy/0.2/tests + local testname=orka-deploy + runtest=task/orka-deploy/0.2/ + '[' '!' -d task/orka-deploy ']' + runtest=task/orka-deploy/0.2/orka-deploy.yaml + skipit= + cat task/orka-deploy/0.2/orka-deploy.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=orka-full/0.1/tests + local testname=orka-full + runtest=task/orka-full/0.1/ + '[' '!' -d task/orka-full ']' + runtest=task/orka-full/0.1/orka-full.yaml + skipit= + cat task/orka-full/0.1/orka-full.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=orka-full/0.2/tests + local testname=orka-full + runtest=task/orka-full/0.2/ + '[' '!' -d task/orka-full ']' + runtest=task/orka-full/0.2/orka-full.yaml + skipit= + cat task/orka-full/0.2/orka-full.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=orka-init/0.1/tests + local testname=orka-init + runtest=task/orka-init/0.1/ + '[' '!' -d task/orka-init ']' + runtest=task/orka-init/0.1/orka-init.yaml + skipit= + cat task/orka-init/0.1/orka-init.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=orka-init/0.2/tests + local testname=orka-init + runtest=task/orka-init/0.2/ + '[' '!' -d task/orka-init ']' + runtest=task/orka-init/0.2/orka-init.yaml + skipit= + cat task/orka-init/0.2/orka-init.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=orka-teardown/0.1/tests + local testname=orka-teardown + runtest=task/orka-teardown/0.1/ + '[' '!' -d task/orka-teardown ']' + runtest=task/orka-teardown/0.1/orka-teardown.yaml + skipit= + cat task/orka-teardown/0.1/orka-teardown.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=orka-teardown/0.2/tests + local testname=orka-teardown + runtest=task/orka-teardown/0.2/ + '[' '!' -d task/orka-teardown ']' + runtest=task/orka-teardown/0.2/orka-teardown.yaml + skipit= + cat task/orka-teardown/0.2/orka-teardown.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=pluto/0.1/tests + local testname=pluto + runtest=task/pluto/0.1/ + '[' '!' -d task/pluto ']' + runtest=task/pluto/0.1/pluto.yaml + skipit= + cat task/pluto/0.1/pluto.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking pluto' Checking pluto + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/pluto/0.1/pluto.yaml task.tekton.dev/pluto created + for runtest in ${all_tasks} + local runtestdir=powershell/0.1/tests + local testname=powershell + runtest=task/powershell/0.1/ + '[' '!' -d task/powershell ']' + runtest=task/powershell/0.1/powershell.yaml + skipit= + cat task/powershell/0.1/powershell.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking powershell' Checking powershell + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/powershell/0.1/powershell.yaml task.tekton.dev/powershell created + for runtest in ${all_tasks} + local runtestdir=prettier/0.1/tests + local testname=prettier + runtest=task/prettier/0.1/ + '[' '!' -d task/prettier ']' + runtest=task/prettier/0.1/prettier.yaml + skipit= + cat task/prettier/0.1/prettier.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking prettier' Checking prettier + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/prettier/0.1/prettier.yaml task.tekton.dev/prettier created + for runtest in ${all_tasks} + local runtestdir=pull-request/0.1/tests + local testname=pull-request + runtest=task/pull-request/0.1/ + '[' '!' -d task/pull-request ']' + runtest=task/pull-request/0.1/pull-request.yaml + skipit= + cat task/pull-request/0.1/pull-request.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=pull-request/0.2/tests + local testname=pull-request + runtest=task/pull-request/0.2/ + '[' '!' -d task/pull-request ']' + runtest=task/pull-request/0.2/pull-request.yaml + skipit= + cat task/pull-request/0.2/pull-request.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking pull-request' Checking pull-request + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/pull-request/0.2/pull-request.yaml task.tekton.dev/pull-request created + for runtest in ${all_tasks} + local runtestdir=pylint/0.1/tests + local testname=pylint + runtest=task/pylint/0.1/ + '[' '!' -d task/pylint ']' + runtest=task/pylint/0.1/pylint.yaml + skipit= + cat task/pylint/0.1/pylint.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking pylint' Checking pylint + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/pylint/0.1/pylint.yaml task.tekton.dev/pylint created + for runtest in ${all_tasks} + local runtestdir=pylint/0.2/tests + local testname=pylint + runtest=task/pylint/0.2/ + '[' '!' -d task/pylint ']' + runtest=task/pylint/0.2/pylint.yaml + skipit= + cat task/pylint/0.2/pylint.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking pylint' Checking pylint + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/pylint/0.2/pylint.yaml task.tekton.dev/pylint configured + for runtest in ${all_tasks} + local runtestdir=pylint/0.3/tests + local testname=pylint + runtest=task/pylint/0.3/ + '[' '!' -d task/pylint ']' + runtest=task/pylint/0.3/pylint.yaml + skipit= + cat task/pylint/0.3/pylint.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking pylint' Checking pylint + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/pylint/0.3/pylint.yaml task.tekton.dev/pylint configured + for runtest in ${all_tasks} + local runtestdir=pytest/0.1/tests + local testname=pytest + runtest=task/pytest/0.1/ + '[' '!' -d task/pytest ']' + runtest=task/pytest/0.1/pytest.yaml + skipit= + cat task/pytest/0.1/pytest.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking pytest' Checking pytest + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/pytest/0.1/pytest.yaml task.tekton.dev/pytest created + for runtest in ${all_tasks} + local runtestdir=pytest/0.2/tests + local testname=pytest + runtest=task/pytest/0.2/ + '[' '!' -d task/pytest ']' + runtest=task/pytest/0.2/pytest.yaml + skipit= + cat task/pytest/0.2/pytest.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking pytest' Checking pytest + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/pytest/0.2/pytest.yaml task.tekton.dev/pytest configured + for runtest in ${all_tasks} + local runtestdir=python-coverage/0.1/tests + local testname=python-coverage + runtest=task/python-coverage/0.1/ + '[' '!' -d task/python-coverage ']' + runtest=task/python-coverage/0.1/python-coverage.yaml + skipit= + cat task/python-coverage/0.1/python-coverage.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking python-coverage' Checking python-coverage + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/python-coverage/0.1/python-coverage.yaml task.tekton.dev/python-coverage created + for runtest in ${all_tasks} + local runtestdir=redhat-codeready-dependency-analysis/0.1/tests + local testname=redhat-codeready-dependency-analysis + runtest=task/redhat-codeready-dependency-analysis/0.1/ + '[' '!' -d task/redhat-codeready-dependency-analysis ']' + runtest=task/redhat-codeready-dependency-analysis/0.1/redhat-codeready-dependency-analysis.yaml + skipit= + cat task/redhat-codeready-dependency-analysis/0.1/redhat-codeready-dependency-analysis.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=redhat-dependency-analytics/0.1/tests + local testname=redhat-dependency-analytics + runtest=task/redhat-dependency-analytics/0.1/ + '[' '!' -d task/redhat-dependency-analytics ']' + runtest=task/redhat-dependency-analytics/0.1/redhat-dependency-analytics.yaml + skipit= + cat task/redhat-dependency-analytics/0.1/redhat-dependency-analytics.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=redhat-dependency-analytics/0.2/tests + local testname=redhat-dependency-analytics + runtest=task/redhat-dependency-analytics/0.2/ + '[' '!' -d task/redhat-dependency-analytics ']' + runtest=task/redhat-dependency-analytics/0.2/redhat-dependency-analytics.yaml + skipit= + cat task/redhat-dependency-analytics/0.2/redhat-dependency-analytics.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=replace-tokens/0.1/tests + local testname=replace-tokens + runtest=task/replace-tokens/0.1/ + '[' '!' -d task/replace-tokens ']' + runtest=task/replace-tokens/0.1/replace-tokens.yaml + skipit= + cat task/replace-tokens/0.1/replace-tokens.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking replace-tokens' Checking replace-tokens + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/replace-tokens/0.1/replace-tokens.yaml task.tekton.dev/replace-tokens created + for runtest in ${all_tasks} + local runtestdir=robot-framework/0.1/tests + local testname=robot-framework + runtest=task/robot-framework/0.1/ + '[' '!' -d task/robot-framework ']' + runtest=task/robot-framework/0.1/robot-framework.yaml + skipit= + cat task/robot-framework/0.1/robot-framework.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking robot-framework' Checking robot-framework + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/robot-framework/0.1/robot-framework.yaml task.tekton.dev/robot-framework created + for runtest in ${all_tasks} + local runtestdir=ruby-lint/0.1/tests + local testname=ruby-lint + runtest=task/ruby-lint/0.1/ + '[' '!' -d task/ruby-lint ']' + runtest=task/ruby-lint/0.1/ruby-lint.yaml + skipit= + cat task/ruby-lint/0.1/ruby-lint.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking ruby-lint' Checking ruby-lint + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/ruby-lint/0.1/ruby-lint.yaml task.tekton.dev/ruby-lint created + for runtest in ${all_tasks} + local runtestdir=s2i/0.1/tests + local testname=s2i + runtest=task/s2i/0.1/ + '[' '!' -d task/s2i ']' + runtest=task/s2i/0.1/s2i.yaml + skipit= + cat task/s2i/0.1/s2i.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=s2i/0.2/tests + local testname=s2i + runtest=task/s2i/0.2/ + '[' '!' -d task/s2i ']' + runtest=task/s2i/0.2/s2i.yaml + skipit= + cat task/s2i/0.2/s2i.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking s2i' Checking s2i + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/s2i/0.2/s2i.yaml task.tekton.dev/s2i created + for runtest in ${all_tasks} + local runtestdir=s2i/0.3/tests + local testname=s2i + runtest=task/s2i/0.3/ + '[' '!' -d task/s2i ']' + runtest=task/s2i/0.3/s2i.yaml + skipit= + cat task/s2i/0.3/s2i.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking s2i' Checking s2i + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/s2i/0.3/s2i.yaml task.tekton.dev/s2i configured + for runtest in ${all_tasks} + local runtestdir=shellcheck/0.1/tests + local testname=shellcheck + runtest=task/shellcheck/0.1/ + '[' '!' -d task/shellcheck ']' + runtest=task/shellcheck/0.1/shellcheck.yaml + skipit= + cat task/shellcheck/0.1/shellcheck.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking shellcheck' Checking shellcheck + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/shellcheck/0.1/shellcheck.yaml task.tekton.dev/shellcheck created + for runtest in ${all_tasks} + local runtestdir=shp/0.1/tests + local testname=shp + runtest=task/shp/0.1/ + '[' '!' -d task/shp ']' + runtest=task/shp/0.1/shp.yaml + skipit= + cat task/shp/0.1/shp.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking shp' Checking shp + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/shp/0.1/shp.yaml task.tekton.dev/shp created + for runtest in ${all_tasks} + local runtestdir=skopeo-copy/0.1/tests + local testname=skopeo-copy + runtest=task/skopeo-copy/0.1/ + '[' '!' -d task/skopeo-copy ']' + runtest=task/skopeo-copy/0.1/skopeo-copy.yaml + skipit= + cat task/skopeo-copy/0.1/skopeo-copy.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking skopeo-copy' Checking skopeo-copy + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/skopeo-copy/0.1/skopeo-copy.yaml task.tekton.dev/skopeo-copy created + for runtest in ${all_tasks} + local runtestdir=skopeo-copy/0.2/tests + local testname=skopeo-copy + runtest=task/skopeo-copy/0.2/ + '[' '!' -d task/skopeo-copy ']' + runtest=task/skopeo-copy/0.2/skopeo-copy.yaml + skipit= + cat task/skopeo-copy/0.2/skopeo-copy.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking skopeo-copy' Checking skopeo-copy + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/skopeo-copy/0.2/skopeo-copy.yaml task.tekton.dev/skopeo-copy configured + for runtest in ${all_tasks} + local runtestdir=skopeo-copy/0.3/tests + local testname=skopeo-copy + runtest=task/skopeo-copy/0.3/ + '[' '!' -d task/skopeo-copy ']' + runtest=task/skopeo-copy/0.3/skopeo-copy.yaml + skipit= + cat task/skopeo-copy/0.3/skopeo-copy.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking skopeo-copy' Checking skopeo-copy + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/skopeo-copy/0.3/skopeo-copy.yaml task.tekton.dev/skopeo-copy configured + for runtest in ${all_tasks} + local runtestdir=skopeo-copy/0.4/tests + local testname=skopeo-copy + runtest=task/skopeo-copy/0.4/ + '[' '!' -d task/skopeo-copy ']' + runtest=task/skopeo-copy/0.4/skopeo-copy.yaml + skipit= + cat task/skopeo-copy/0.4/skopeo-copy.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking skopeo-copy' Checking skopeo-copy + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/skopeo-copy/0.4/skopeo-copy.yaml task.tekton.dev/skopeo-copy configured + for runtest in ${all_tasks} + local runtestdir=sonarqube-scanner/0.2/tests + local testname=sonarqube-scanner + runtest=task/sonarqube-scanner/0.2/ + '[' '!' -d task/sonarqube-scanner ']' + runtest=task/sonarqube-scanner/0.2/sonarqube-scanner.yaml + skipit= + cat task/sonarqube-scanner/0.2/sonarqube-scanner.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=sonarqube-scanner/0.3/tests + local testname=sonarqube-scanner + runtest=task/sonarqube-scanner/0.3/ + '[' '!' -d task/sonarqube-scanner ']' + runtest=task/sonarqube-scanner/0.3/sonarqube-scanner.yaml + skipit= + cat task/sonarqube-scanner/0.3/sonarqube-scanner.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=sonarqube-scanner/0.4/tests + local testname=sonarqube-scanner + runtest=task/sonarqube-scanner/0.4/ + '[' '!' -d task/sonarqube-scanner ']' + runtest=task/sonarqube-scanner/0.4/sonarqube-scanner.yaml + skipit= + cat task/sonarqube-scanner/0.4/sonarqube-scanner.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=syft/0.1/tests + local testname=syft + runtest=task/syft/0.1/ + '[' '!' -d task/syft ']' + runtest=task/syft/0.1/syft.yaml + skipit= + cat task/syft/0.1/syft.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking syft' Checking syft + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/syft/0.1/syft.yaml task.tekton.dev/syft created + for runtest in ${all_tasks} + local runtestdir=tekton-catalog-publish/0.1/tests + local testname=tekton-catalog-publish + runtest=task/tekton-catalog-publish/0.1/ + '[' '!' -d task/tekton-catalog-publish ']' + runtest=task/tekton-catalog-publish/0.1/tekton-catalog-publish.yaml + skipit= + cat task/tekton-catalog-publish/0.1/tekton-catalog-publish.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=tekton-catalog-publish/0.2/tests + local testname=tekton-catalog-publish + runtest=task/tekton-catalog-publish/0.2/ + '[' '!' -d task/tekton-catalog-publish ']' + runtest=task/tekton-catalog-publish/0.2/tekton-catalog-publish.yaml + skipit= + cat task/tekton-catalog-publish/0.2/tekton-catalog-publish.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking tekton-catalog-publish' Checking tekton-catalog-publish + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/tekton-catalog-publish/0.2/tekton-catalog-publish.yaml task.tekton.dev/tekton-catalog-publish created + for runtest in ${all_tasks} + local runtestdir=tkn/0.2/tests + local testname=tkn + runtest=task/tkn/0.2/ + '[' '!' -d task/tkn ']' + runtest=task/tkn/0.2/tkn.yaml + skipit= + cat task/tkn/0.2/tkn.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=tkn/0.3/tests + local testname=tkn + runtest=task/tkn/0.3/ + '[' '!' -d task/tkn ']' + runtest=task/tkn/0.3/tkn.yaml + skipit= + cat task/tkn/0.3/tkn.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=tkn/0.4/tests + local testname=tkn + runtest=task/tkn/0.4/ + '[' '!' -d task/tkn ']' + runtest=task/tkn/0.4/tkn.yaml + skipit= + cat task/tkn/0.4/tkn.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=tkn/0.5/tests + local testname=tkn + runtest=task/tkn/0.5/ + '[' '!' -d task/tkn ']' + runtest=task/tkn/0.5/tkn.yaml + skipit= + cat task/tkn/0.5/tkn.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking tkn' Checking tkn + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/tkn/0.5/tkn.yaml task.tekton.dev/tkn created + for runtest in ${all_tasks} + local runtestdir=trigger-jenkins-job/0.1/tests + local testname=trigger-jenkins-job + runtest=task/trigger-jenkins-job/0.1/ + '[' '!' -d task/trigger-jenkins-job ']' + runtest=task/trigger-jenkins-job/0.1/trigger-jenkins-job.yaml + skipit= + cat task/trigger-jenkins-job/0.1/trigger-jenkins-job.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking trigger-jenkins-job' Checking trigger-jenkins-job + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/trigger-jenkins-job/0.1/trigger-jenkins-job.yaml task.tekton.dev/trigger-jenkins-job created + for runtest in ${all_tasks} + local runtestdir=trivy-scanner/0.1/tests + local testname=trivy-scanner + runtest=task/trivy-scanner/0.1/ + '[' '!' -d task/trivy-scanner ']' + runtest=task/trivy-scanner/0.1/trivy-scanner.yaml + skipit= + cat task/trivy-scanner/0.1/trivy-scanner.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking trivy-scanner' Checking trivy-scanner + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/trivy-scanner/0.1/trivy-scanner.yaml task.tekton.dev/trivy-scanner created + for runtest in ${all_tasks} + local runtestdir=trivy-scanner/0.2/tests + local testname=trivy-scanner + runtest=task/trivy-scanner/0.2/ + '[' '!' -d task/trivy-scanner ']' + runtest=task/trivy-scanner/0.2/trivy-scanner.yaml + skipit= + cat task/trivy-scanner/0.2/trivy-scanner.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking trivy-scanner' Checking trivy-scanner + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/trivy-scanner/0.2/trivy-scanner.yaml task.tekton.dev/trivy-scanner configured + for runtest in ${all_tasks} + local runtestdir=ts-lint/0.1/tests + local testname=ts-lint + runtest=task/ts-lint/0.1/ + '[' '!' -d task/ts-lint ']' + runtest=task/ts-lint/0.1/ts-lint.yaml + skipit= + cat task/ts-lint/0.1/ts-lint.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking ts-lint' Checking ts-lint + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/ts-lint/0.1/ts-lint.yaml task.tekton.dev/ts-lint created + for runtest in ${all_tasks} + local runtestdir=upload-pypi/0.2/tests + local testname=upload-pypi + runtest=task/upload-pypi/0.2/ + '[' '!' -d task/upload-pypi ']' + runtest=task/upload-pypi/0.2/upload-pypi.yaml + skipit= + cat task/upload-pypi/0.2/upload-pypi.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking upload-pypi' Checking upload-pypi + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/upload-pypi/0.2/upload-pypi.yaml task.tekton.dev/upload-pypi created + for runtest in ${all_tasks} + local runtestdir=valint/0.1/tests + local testname=valint + runtest=task/valint/0.1/ + '[' '!' -d task/valint ']' + runtest=task/valint/0.1/valint.yaml + skipit= + cat task/valint/0.1/valint.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking valint' Checking valint + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/valint/0.1/valint.yaml task.tekton.dev/valint created + for runtest in ${all_tasks} + local runtestdir=wget/0.1/tests + local testname=wget + runtest=task/wget/0.1/ + '[' '!' -d task/wget ']' + runtest=task/wget/0.1/wget.yaml + skipit= + cat task/wget/0.1/wget.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking wget' Checking wget + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/wget/0.1/wget.yaml task.tekton.dev/wget created + for runtest in ${all_tasks} + local runtestdir=write-file/0.1/tests + local testname=write-file + runtest=task/write-file/0.1/ + '[' '!' -d task/write-file ']' + runtest=task/write-file/0.1/write-file.yaml + skipit= + cat task/write-file/0.1/write-file.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking write-file' Checking write-file + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/write-file/0.1/write-file.yaml task.tekton.dev/write-file created + for runtest in ${all_tasks} + local runtestdir=yaml-lint/0.1/tests + local testname=yaml-lint + runtest=task/yaml-lint/0.1/ + '[' '!' -d task/yaml-lint ']' + runtest=task/yaml-lint/0.1/yaml-lint.yaml + skipit= + cat task/yaml-lint/0.1/yaml-lint.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking yaml-lint' Checking yaml-lint + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/yaml-lint/0.1/yaml-lint.yaml task.tekton.dev/yaml-lint created + for runtest in ${all_tasks} + local runtestdir=yq/0.1/tests + local testname=yq + runtest=task/yq/0.1/ + '[' '!' -d task/yq ']' + runtest=task/yq/0.1/yq.yaml + skipit= + cat task/yq/0.1/yq.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking yq' Checking yq + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/yq/0.1/yq.yaml task.tekton.dev/yq created + for runtest in ${all_tasks} + local runtestdir=yq/0.2/tests + local testname=yq + runtest=task/yq/0.2/ + '[' '!' -d task/yq ']' + runtest=task/yq/0.2/yq.yaml + skipit= + grep 'tekton.dev/deprecated: \"true\"' + cat task/yq/0.2/yq.yaml + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking yq' Checking yq + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/yq/0.2/yq.yaml task.tekton.dev/yq configured + for runtest in ${all_tasks} + local runtestdir=yq/0.3/tests + local testname=yq + runtest=task/yq/0.3/ + '[' '!' -d task/yq ']' + runtest=task/yq/0.3/yq.yaml + skipit= + cat task/yq/0.3/yq.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking yq' Checking yq + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/yq/0.3/yq.yaml task.tekton.dev/yq configured + for runtest in ${all_tasks} + local runtestdir=yq/0.4/tests + local testname=yq + runtest=task/yq/0.4/ + '[' '!' -d task/yq ']' + runtest=task/yq/0.4/yq.yaml + skipit= + cat task/yq/0.4/yq.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking yq' Checking yq + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/yq/0.4/yq.yaml task.tekton.dev/yq configured + test_resources 'stepaction/git-clone/0.1/tests stepaction/git-clone/0.2/tests stepaction/tekton-catalog-publish/0.1/tests stepaction/tekton-catalog-publish/0.2/tests stepaction/tekton-catalog-publish/0.3/tests' + local cnt=0 + local resource_to_tests= + for runtest in $@ + resource_to_tests=' stepaction/git-clone/0.1/tests' + [[ 0 == \7 ]] + cnt=1 + for runtest in $@ + resource_to_tests=' stepaction/git-clone/0.1/tests stepaction/git-clone/0.2/tests' + [[ 1 == \7 ]] + cnt=2 + for runtest in $@ + resource_to_tests=' stepaction/git-clone/0.1/tests stepaction/git-clone/0.2/tests stepaction/tekton-catalog-publish/0.1/tests' + [[ 2 == \7 ]] + cnt=3 + for runtest in $@ + resource_to_tests=' stepaction/git-clone/0.1/tests stepaction/git-clone/0.2/tests stepaction/tekton-catalog-publish/0.1/tests stepaction/tekton-catalog-publish/0.2/tests' + [[ 3 == \7 ]] + cnt=4 + for runtest in $@ + resource_to_tests=' stepaction/git-clone/0.1/tests stepaction/git-clone/0.2/tests stepaction/tekton-catalog-publish/0.1/tests stepaction/tekton-catalog-publish/0.2/tests stepaction/tekton-catalog-publish/0.3/tests' + [[ 4 == \7 ]] + cnt=5 + [[ -n stepaction/git-clone/0.1/tests stepaction/git-clone/0.2/tests stepaction/tekton-catalog-publish/0.1/tests stepaction/tekton-catalog-publish/0.2/tests stepaction/tekton-catalog-publish/0.3/tests ]] + test_resource_creation ' stepaction/git-clone/0.1/tests stepaction/git-clone/0.2/tests stepaction/tekton-catalog-publish/0.1/tests stepaction/tekton-catalog-publish/0.2/tests stepaction/tekton-catalog-publish/0.3/tests' + local runtest + declare -A resource_to_wait_for + for runtest in $@ + local runtestdir=git-clone/0.1/tests + local testname=git-clone ++++ dirname stepaction/git-clone/0.1/tests +++ basename stepaction/git-clone/0.1 ++ basename 0.1 + local version=0.1 + [[ 0.1 =~ ^[0-9]+\.[0-9]+$ ]] ++ echo 0.1 ++ tr . - + version=0-1 + local tns=git-clone-0-1 + local skipit= + for ignore in ${TEST_TASKRUN_IGNORES} + [[ maven == git-clone ]] + local resourcedir=stepaction/git-clone/0.1 + '[' '!' -d stepaction/git-clone/0.1/tests ']' + ls stepaction/git-clone/0.1/git-clone.yaml + cat stepaction/git-clone/0.1/git-clone.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in $@ + local runtestdir=git-clone/0.2/tests + local testname=git-clone ++++ dirname stepaction/git-clone/0.2/tests +++ basename stepaction/git-clone/0.2 ++ basename 0.2 + local version=0.2 + [[ 0.2 =~ ^[0-9]+\.[0-9]+$ ]] ++ echo 0.2 ++ tr . - + version=0-2 + local tns=git-clone-0-2 + local skipit= + for ignore in ${TEST_TASKRUN_IGNORES} + [[ maven == git-clone ]] + local resourcedir=stepaction/git-clone/0.2 + '[' '!' -d stepaction/git-clone/0.2/tests ']' + ls stepaction/git-clone/0.2/git-clone.yaml + cat stepaction/git-clone/0.2/git-clone.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + kubectl create namespace git-clone-0-2 ++ printf stepaction/git-clone/0.2/git-clone.yaml + yaml=stepaction/git-clone/0.2/git-clone.yaml ++ date +%Hh%M:%S + started=16h57:30 + echo '16h57:30 STARTING: git-clone/0-2 ' 16h57:30 STARTING: git-clone/0-2 + kubectl -n git-clone-0-2 create -f stepaction/git-clone/0.2/git-clone.yaml --dry-run=client -o yaml + [[ -f stepaction/git-clone/0.2/tests/pre-apply-task-hook.sh ]] + function_exists pre-apply-task-hook ++ type -t pre-apply-task-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + [[ -d stepaction/git-clone/0.2/tests/fixtures ]] + kubectl -n git-clone-0-2 delete -f /tmp/.mm.2R3qPA + true + kubectl -n git-clone-0-2 create -f /tmp/.mm.2R3qPA stepaction.tekton.dev/git-clone created + for yaml in ${runtest}/*.yaml + cp stepaction/git-clone/0.2/tests/run.yaml /tmp/.mm.2R3qPA + [[ -f stepaction/git-clone/0.2/tests/pre-apply-taskrun-hook.sh ]] + function_exists pre-apply-taskrun-hook ++ type -t pre-apply-taskrun-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + kubectl -n git-clone-0-2 delete -f /tmp/.mm.2R3qPA + true + kubectl -n git-clone-0-2 create -f /tmp/.mm.2R3qPA taskrun.tekton.dev/git-clone-run-noargs created taskrun.tekton.dev/git-clone-run-tag created taskrun.tekton.dev/git-clone-run-no-submodules created taskrun.tekton.dev/git-clone-run-no-depth-2 created taskrun.tekton.dev/git-clone-run-sslverify-none created taskrun.tekton.dev/git-clone-run-ssl-cadirectory-empty created taskrun.tekton.dev/git-clone-run-subdirectory created taskrun.tekton.dev/git-clone-run-delete-existing created taskrun.tekton.dev/git-clone-run-without-verbose created taskrun.tekton.dev/git-clone-sparse created + resource_to_wait_for["$testname/${version}"]='git-clone-0-2|16h57:30' + for runtest in $@ + local runtestdir=tekton-catalog-publish/0.1/tests + local testname=tekton-catalog-publish ++++ dirname stepaction/tekton-catalog-publish/0.1/tests +++ basename stepaction/tekton-catalog-publish/0.1 ++ basename 0.1 + local version=0.1 + [[ 0.1 =~ ^[0-9]+\.[0-9]+$ ]] ++ echo 0.1 ++ tr . - + version=0-1 + local tns=tekton-catalog-publish-0-1 + local skipit= + for ignore in ${TEST_TASKRUN_IGNORES} + [[ maven == tekton-catalog-publish ]] + local resourcedir=stepaction/tekton-catalog-publish/0.1 + '[' '!' -d stepaction/tekton-catalog-publish/0.1/tests ']' + ls stepaction/tekton-catalog-publish/0.1/tekton-catalog-publish.yaml + cat stepaction/tekton-catalog-publish/0.1/tekton-catalog-publish.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in $@ + local runtestdir=tekton-catalog-publish/0.2/tests + local testname=tekton-catalog-publish ++++ dirname stepaction/tekton-catalog-publish/0.2/tests +++ basename stepaction/tekton-catalog-publish/0.2 ++ basename 0.2 + local version=0.2 + [[ 0.2 =~ ^[0-9]+\.[0-9]+$ ]] ++ echo 0.2 ++ tr . - + version=0-2 + local tns=tekton-catalog-publish-0-2 + local skipit= + for ignore in ${TEST_TASKRUN_IGNORES} + [[ maven == tekton-catalog-publish ]] + local resourcedir=stepaction/tekton-catalog-publish/0.2 + '[' '!' -d stepaction/tekton-catalog-publish/0.2/tests ']' + ls stepaction/tekton-catalog-publish/0.2/tekton-catalog-publish.yaml + cat stepaction/tekton-catalog-publish/0.2/tekton-catalog-publish.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + kubectl create namespace tekton-catalog-publish-0-2 ++ printf stepaction/tekton-catalog-publish/0.2/tekton-catalog-publish.yaml + yaml=stepaction/tekton-catalog-publish/0.2/tekton-catalog-publish.yaml ++ date +%Hh%M:%S + started=16h57:31 + echo '16h57:31 STARTING: tekton-catalog-publish/0-2 ' 16h57:31 STARTING: tekton-catalog-publish/0-2 + kubectl -n tekton-catalog-publish-0-2 create -f stepaction/tekton-catalog-publish/0.2/tekton-catalog-publish.yaml --dry-run=client -o yaml + [[ -f stepaction/tekton-catalog-publish/0.2/tests/pre-apply-task-hook.sh ]] + source stepaction/tekton-catalog-publish/0.2/tests/pre-apply-task-hook.sh ++ add_stepaction git-clone latest ++ local array path_version stepaction ++ stepaction=git-clone ++ [[ latest == \l\a\t\e\s\t ]] ++ array=($(echo stepaction/${stepaction}/*/ | sort -u)) +++ echo stepaction/git-clone/0.1/ stepaction/git-clone/0.2/ +++ sort -u ++ path_version=stepaction/git-clone/0.2/ ++ kubectl -n tekton-catalog-publish-0-2 apply -f stepaction/git-clone/0.2//git-clone.yaml stepaction.tekton.dev/git-clone created + function_exists pre-apply-task-hook ++ type -t pre-apply-task-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + [[ -d stepaction/tekton-catalog-publish/0.2/tests/fixtures ]] + kubectl -n tekton-catalog-publish-0-2 delete -f /tmp/.mm.2R3qPA + true + kubectl -n tekton-catalog-publish-0-2 create -f /tmp/.mm.2R3qPA stepaction.tekton.dev/tekton-catalog-publish created + for yaml in ${runtest}/*.yaml + cp stepaction/tekton-catalog-publish/0.2/tests/run.yaml /tmp/.mm.2R3qPA + [[ -f stepaction/tekton-catalog-publish/0.2/tests/pre-apply-taskrun-hook.sh ]] + function_exists pre-apply-taskrun-hook ++ type -t pre-apply-taskrun-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + kubectl -n tekton-catalog-publish-0-2 delete -f /tmp/.mm.2R3qPA + true + kubectl -n tekton-catalog-publish-0-2 create -f /tmp/.mm.2R3qPA task.tekton.dev/catalog-publish-test-task created taskrun.tekton.dev/catalog-publish-test-task-run created + resource_to_wait_for["$testname/${version}"]='tekton-catalog-publish-0-2|16h57:31' + for runtest in $@ + local runtestdir=tekton-catalog-publish/0.3/tests + local testname=tekton-catalog-publish ++++ dirname stepaction/tekton-catalog-publish/0.3/tests +++ basename stepaction/tekton-catalog-publish/0.3 ++ basename 0.3 + local version=0.3 + [[ 0.3 =~ ^[0-9]+\.[0-9]+$ ]] ++ echo 0.3 ++ tr . - + version=0-3 + local tns=tekton-catalog-publish-0-3 + local skipit= + for ignore in ${TEST_TASKRUN_IGNORES} + [[ maven == tekton-catalog-publish ]] + local resourcedir=stepaction/tekton-catalog-publish/0.3 + '[' '!' -d stepaction/tekton-catalog-publish/0.3/tests ']' + ls stepaction/tekton-catalog-publish/0.3/tekton-catalog-publish.yaml + cat stepaction/tekton-catalog-publish/0.3/tekton-catalog-publish.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + kubectl create namespace tekton-catalog-publish-0-3 ++ printf stepaction/tekton-catalog-publish/0.3/tekton-catalog-publish.yaml + yaml=stepaction/tekton-catalog-publish/0.3/tekton-catalog-publish.yaml ++ date +%Hh%M:%S + started=16h57:32 + echo '16h57:32 STARTING: tekton-catalog-publish/0-3 ' 16h57:32 STARTING: tekton-catalog-publish/0-3 + kubectl -n tekton-catalog-publish-0-3 create -f stepaction/tekton-catalog-publish/0.3/tekton-catalog-publish.yaml --dry-run=client -o yaml + [[ -f stepaction/tekton-catalog-publish/0.3/tests/pre-apply-task-hook.sh ]] + source stepaction/tekton-catalog-publish/0.3/tests/pre-apply-task-hook.sh ++ add_stepaction git-clone latest ++ local array path_version stepaction ++ stepaction=git-clone ++ [[ latest == \l\a\t\e\s\t ]] ++ array=($(echo stepaction/${stepaction}/*/ | sort -u)) +++ echo stepaction/git-clone/0.1/ stepaction/git-clone/0.2/ +++ sort -u ++ path_version=stepaction/git-clone/0.2/ ++ kubectl -n tekton-catalog-publish-0-3 apply -f stepaction/git-clone/0.2//git-clone.yaml stepaction.tekton.dev/git-clone created + function_exists pre-apply-task-hook ++ type -t pre-apply-task-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + [[ -d stepaction/tekton-catalog-publish/0.3/tests/fixtures ]] + kubectl -n tekton-catalog-publish-0-3 delete -f /tmp/.mm.2R3qPA + true + kubectl -n tekton-catalog-publish-0-3 create -f /tmp/.mm.2R3qPA stepaction.tekton.dev/tekton-catalog-publish created + for yaml in ${runtest}/*.yaml + cp stepaction/tekton-catalog-publish/0.3/tests/run.yaml /tmp/.mm.2R3qPA + [[ -f stepaction/tekton-catalog-publish/0.3/tests/pre-apply-taskrun-hook.sh ]] + function_exists pre-apply-taskrun-hook ++ type -t pre-apply-taskrun-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + kubectl -n tekton-catalog-publish-0-3 delete -f /tmp/.mm.2R3qPA + true + kubectl -n tekton-catalog-publish-0-3 create -f /tmp/.mm.2R3qPA task.tekton.dev/catalog-publish-test-task created taskrun.tekton.dev/catalog-publish-test-task-run created + resource_to_wait_for["$testname/${version}"]='tekton-catalog-publish-0-3|16h57:32' + local cnt=0 + local all_status= + local reason= + local maxloop=60 + set +x 16h57:31::16h58:04 SUCCESS: tekton-catalog-publish/0-2 testrun has successfully executed 16h57:32::16h58:21 SUCCESS: tekton-catalog-publish/0-3 testrun has successfully executed 16h57:30::16h58:49 SUCCESS: git-clone/0-2 testrun has successfully executed + test_resources 'task/ansible-builder/0.1/tests task/ansible-runner/0.1/tests task/ansible-runner/0.2/tests task/asciidoctor/0.1/tests task/bentoml/0.1/tests task/black/0.1/tests task/black/0.2/tests task/blue-green-deploy/0.1/tests task/blue-green-deploy/0.2/tests task/buildah/0.1/tests task/buildah/0.2/tests task/buildah/0.3/tests task/buildah/0.4/tests task/buildah/0.5/tests task/buildah/0.6/tests task/buildah/0.7/tests task/buildah/0.8/tests task/buildah/0.9/tests task/buildpacks-phases/0.1/tests task/buildpacks-phases/0.2/tests task/buildpacks-phases/0.3/tests task/buildpacks/0.1/tests task/buildpacks/0.2/tests task/buildpacks/0.3/tests task/buildpacks/0.4/tests task/buildpacks/0.5/tests task/buildpacks/0.6/tests task/check-make/0.1/tests task/codecov/0.1/tests task/codecov/0.2/tests task/curl/0.1/tests task/docker-build/0.1/tests task/dockerslim-build/0.1/tests task/flake8/0.1/tests task/gcloud/0.3/tests task/generate-build-id/0.1/tests task/git-batch-merge/0.1/tests task/git-batch-merge/0.2/tests task/git-batch-merge/0.3/tests task/git-cli/0.1/tests task/git-cli/0.2/tests task/git-cli/0.3/tests task/git-cli/0.4/tests task/git-clone/0.1/tests task/git-clone/0.10/tests task/git-clone/0.2/tests task/git-clone/0.3/tests task/git-clone/0.4/tests task/git-clone/0.5/tests task/git-clone/0.6/tests task/git-clone/0.7/tests task/git-clone/0.8/tests task/git-clone/0.9/tests task/git-version/0.1/tests task/gitea-set-status/0.1/tests task/github-add-comment/0.1/tests task/github-add-comment/0.2/tests task/github-add-comment/0.3/tests task/github-add-comment/0.4/tests task/github-add-comment/0.5/tests task/github-add-comment/0.6/tests task/github-add-comment/0.7/tests task/github-add-gist/0.1/tests task/github-add-gist/0.2/tests task/github-create-deployment-status/0.1/tests task/github-create-deployment/0.2/tests task/github-open-pr/0.1/tests task/github-open-pr/0.2/tests task/github-request-reviewers/0.1/tests task/github-set-status/0.4/tests task/gitlab-set-status/0.1/tests task/gitlab-set-status/0.2/tests task/gitleaks/0.1/tests task/golang-build/0.1/tests task/golang-build/0.2/tests task/golang-build/0.3/tests task/golang-fuzz/0.1/tests task/golang-test/0.1/tests task/golang-test/0.2/tests task/golangci-lint/0.1/tests task/golangci-lint/0.2/tests task/gradle/0.1/tests task/gradle/0.2/tests task/gradle/0.3/tests task/gradle/0.4/tests task/grype/0.1/tests task/hadolint/0.1/tests task/helm-render-manifests-from-repo/0.1/tests task/helm-upgrade-from-repo/0.1/tests task/helm-upgrade-from-repo/0.2/tests task/helm-upgrade-from-repo/0.3/tests task/helm-upgrade-from-source/0.1/tests task/helm-upgrade-from-source/0.2/tests task/helm-upgrade-from-source/0.3/tests task/helm-upgrade-from-source/0.4/tests task/hugo/0.1/tests task/jenkins/0.1/tests task/jib-gradle/0.1/tests task/jib-gradle/0.2/tests task/jib-gradle/0.3/tests task/jib-gradle/0.4/tests task/jib-maven/0.1/tests task/jib-maven/0.2/tests task/jib-maven/0.3/tests task/jib-maven/0.4/tests task/jib-maven/0.5/tests task/jq/0.1/tests task/kamel-run/0.1/tests task/kaniko/0.1/tests task/kaniko/0.2/tests task/kaniko/0.3/tests task/kaniko/0.4/tests task/kaniko/0.5/tests task/kaniko/0.6/tests task/kaniko/0.7/tests task/kind/0.1/tests task/ko/0.1/tests task/kube-linter/0.1/tests task/kubeconfig-creator/0.1/tests task/kubeconfig-creator/0.2/tests task/kubernetes-actions/0.2/tests task/kythe-go/0.1/tests task/kythe-go/0.2/tests task/markdown-lint/0.1/tests task/maven/0.1/tests task/maven/0.2/tests task/maven/0.3/tests task/maven/0.4/tests task/mypy-lint/0.1/tests task/mypy-lint/0.2/tests task/npm/0.1/tests task/openshift-client/0.1/tests task/openshift-client/0.2/tests task/orka-deploy/0.1/tests task/orka-deploy/0.2/tests task/orka-full/0.1/tests task/orka-full/0.2/tests task/orka-init/0.1/tests task/orka-init/0.2/tests task/orka-teardown/0.1/tests task/orka-teardown/0.2/tests task/pluto/0.1/tests task/powershell/0.1/tests task/prettier/0.1/tests task/pull-request/0.1/tests task/pull-request/0.2/tests task/pylint/0.1/tests task/pylint/0.2/tests task/pylint/0.3/tests task/pytest/0.1/tests task/pytest/0.2/tests task/python-coverage/0.1/tests task/redhat-codeready-dependency-analysis/0.1/tests task/redhat-dependency-analytics/0.1/tests task/redhat-dependency-analytics/0.2/tests task/replace-tokens/0.1/tests task/robot-framework/0.1/tests task/ruby-lint/0.1/tests task/s2i/0.1/tests task/s2i/0.2/tests task/s2i/0.3/tests task/shellcheck/0.1/tests task/shp/0.1/tests task/skopeo-copy/0.1/tests task/skopeo-copy/0.2/tests task/skopeo-copy/0.3/tests task/skopeo-copy/0.4/tests task/sonarqube-scanner/0.2/tests task/sonarqube-scanner/0.3/tests task/sonarqube-scanner/0.4/tests task/syft/0.1/tests task/tekton-catalog-publish/0.1/tests task/tekton-catalog-publish/0.2/tests task/tkn/0.2/tests task/tkn/0.3/tests task/tkn/0.4/tests task/tkn/0.5/tests task/trigger-jenkins-job/0.1/tests task/trivy-scanner/0.1/tests task/trivy-scanner/0.2/tests task/ts-lint/0.1/tests task/upload-pypi/0.2/tests task/valint/0.1/tests task/wget/0.1/tests task/write-file/0.1/tests task/yaml-lint/0.1/tests task/yq/0.1/tests task/yq/0.2/tests task/yq/0.3/tests task/yq/0.4/tests' + local cnt=0 + local resource_to_tests= + for runtest in $@ + resource_to_tests=' task/ansible-builder/0.1/tests' + [[ 0 == \7 ]] + cnt=1 + for runtest in $@ + resource_to_tests=' task/ansible-builder/0.1/tests task/ansible-runner/0.1/tests' + [[ 1 == \7 ]] + cnt=2 + for runtest in $@ + resource_to_tests=' task/ansible-builder/0.1/tests task/ansible-runner/0.1/tests task/ansible-runner/0.2/tests' + [[ 2 == \7 ]] + cnt=3 + for runtest in $@ + resource_to_tests=' task/ansible-builder/0.1/tests task/ansible-runner/0.1/tests task/ansible-runner/0.2/tests task/asciidoctor/0.1/tests' + [[ 3 == \7 ]] + cnt=4 + for runtest in $@ + resource_to_tests=' task/ansible-builder/0.1/tests task/ansible-runner/0.1/tests task/ansible-runner/0.2/tests task/asciidoctor/0.1/tests task/bentoml/0.1/tests' + [[ 4 == \7 ]] + cnt=5 + for runtest in $@ + resource_to_tests=' task/ansible-builder/0.1/tests task/ansible-runner/0.1/tests task/ansible-runner/0.2/tests task/asciidoctor/0.1/tests task/bentoml/0.1/tests task/black/0.1/tests' + [[ 5 == \7 ]] + cnt=6 + for runtest in $@ + resource_to_tests=' task/ansible-builder/0.1/tests task/ansible-runner/0.1/tests task/ansible-runner/0.2/tests task/asciidoctor/0.1/tests task/bentoml/0.1/tests task/black/0.1/tests task/black/0.2/tests' + [[ 6 == \7 ]] + cnt=7 + for runtest in $@ + resource_to_tests=' task/ansible-builder/0.1/tests task/ansible-runner/0.1/tests task/ansible-runner/0.2/tests task/asciidoctor/0.1/tests task/bentoml/0.1/tests task/black/0.1/tests task/black/0.2/tests task/blue-green-deploy/0.1/tests' + [[ 7 == \7 ]] + test_resource_creation ' task/ansible-builder/0.1/tests task/ansible-runner/0.1/tests task/ansible-runner/0.2/tests task/asciidoctor/0.1/tests task/bentoml/0.1/tests task/black/0.1/tests task/black/0.2/tests task/blue-green-deploy/0.1/tests' + local runtest + declare -A resource_to_wait_for + for runtest in $@ + local runtestdir=ansible-builder/0.1/tests + local testname=ansible-builder ++++ dirname task/ansible-builder/0.1/tests +++ basename task/ansible-builder/0.1 ++ basename 0.1 + local version=0.1 + [[ 0.1 =~ ^[0-9]+\.[0-9]+$ ]] ++ echo 0.1 ++ tr . - + version=0-1 + local tns=ansible-builder-0-1 + local skipit= + for ignore in ${TEST_TASKRUN_IGNORES} + [[ maven == ansible-builder ]] + local resourcedir=task/ansible-builder/0.1 + '[' '!' -d task/ansible-builder/0.1/tests ']' + ls task/ansible-builder/0.1/ansible-builder.yaml + cat task/ansible-builder/0.1/ansible-builder.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in $@ + local runtestdir=ansible-runner/0.1/tests + local testname=ansible-runner ++++ dirname task/ansible-runner/0.1/tests +++ basename task/ansible-runner/0.1 ++ basename 0.1 + local version=0.1 + [[ 0.1 =~ ^[0-9]+\.[0-9]+$ ]] ++ echo 0.1 ++ tr . - + version=0-1 + local tns=ansible-runner-0-1 + local skipit= + for ignore in ${TEST_TASKRUN_IGNORES} + [[ maven == ansible-runner ]] + local resourcedir=task/ansible-runner/0.1 + '[' '!' -d task/ansible-runner/0.1/tests ']' + ls task/ansible-runner/0.1/ansible-runner.yaml + cat task/ansible-runner/0.1/ansible-runner.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in $@ + local runtestdir=ansible-runner/0.2/tests + local testname=ansible-runner ++++ dirname task/ansible-runner/0.2/tests +++ basename task/ansible-runner/0.2 ++ basename 0.2 + local version=0.2 + [[ 0.2 =~ ^[0-9]+\.[0-9]+$ ]] ++ echo 0.2 ++ tr . - + version=0-2 + local tns=ansible-runner-0-2 + local skipit= + for ignore in ${TEST_TASKRUN_IGNORES} + [[ maven == ansible-runner ]] + local resourcedir=task/ansible-runner/0.2 + '[' '!' -d task/ansible-runner/0.2/tests ']' + ls task/ansible-runner/0.2/ansible-runner.yaml + cat task/ansible-runner/0.2/ansible-runner.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in $@ + local runtestdir=asciidoctor/0.1/tests + local testname=asciidoctor ++++ dirname task/asciidoctor/0.1/tests +++ basename task/asciidoctor/0.1 ++ basename 0.1 + local version=0.1 + [[ 0.1 =~ ^[0-9]+\.[0-9]+$ ]] ++ echo 0.1 ++ tr . - + version=0-1 + local tns=asciidoctor-0-1 + local skipit= + for ignore in ${TEST_TASKRUN_IGNORES} + [[ maven == asciidoctor ]] + local resourcedir=task/asciidoctor/0.1 + '[' '!' -d task/asciidoctor/0.1/tests ']' + ls task/asciidoctor/0.1/asciidoctor.yaml + cat task/asciidoctor/0.1/asciidoctor.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + kubectl create namespace asciidoctor-0-1 ++ printf task/asciidoctor/0.1/asciidoctor.yaml + yaml=task/asciidoctor/0.1/asciidoctor.yaml ++ date +%Hh%M:%S + started=16h58:59 + echo '16h58:59 STARTING: asciidoctor/0-1 ' 16h58:59 STARTING: asciidoctor/0-1 + kubectl -n asciidoctor-0-1 create -f task/asciidoctor/0.1/asciidoctor.yaml --dry-run=client -o yaml + [[ -f task/asciidoctor/0.1/tests/pre-apply-task-hook.sh ]] + source task/asciidoctor/0.1/tests/pre-apply-task-hook.sh ++ add_task git-clone latest ++ local array path_version task ++ task=git-clone ++ [[ latest == \l\a\t\e\s\t ]] ++ array=($(echo task/${task}/*/ | sort -u)) +++ echo task/git-clone/0.1/ task/git-clone/0.10/ task/git-clone/0.2/ task/git-clone/0.3/ task/git-clone/0.4/ task/git-clone/0.5/ task/git-clone/0.6/ task/git-clone/0.7/ task/git-clone/0.8/ task/git-clone/0.9/ +++ sort -u ++ path_version=task/git-clone/0.9/ ++ kubectl -n asciidoctor-0-1 apply -f task/git-clone/0.9//git-clone.yaml task.tekton.dev/git-clone created + function_exists pre-apply-task-hook ++ type -t pre-apply-task-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + [[ -d task/asciidoctor/0.1/tests/fixtures ]] + kubectl -n asciidoctor-0-1 delete -f /tmp/.mm.2R3qPA + true + kubectl -n asciidoctor-0-1 create -f /tmp/.mm.2R3qPA task.tekton.dev/asciidoctor created + for yaml in ${runtest}/*.yaml + cp task/asciidoctor/0.1/tests/pvc.yaml /tmp/.mm.2R3qPA + [[ -f task/asciidoctor/0.1/tests/pre-apply-taskrun-hook.sh ]] + function_exists pre-apply-taskrun-hook ++ type -t pre-apply-taskrun-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + kubectl -n asciidoctor-0-1 delete -f /tmp/.mm.2R3qPA + true + kubectl -n asciidoctor-0-1 create -f /tmp/.mm.2R3qPA persistentvolumeclaim/asciidoctor-pvc created + for yaml in ${runtest}/*.yaml + cp task/asciidoctor/0.1/tests/run.yaml /tmp/.mm.2R3qPA + [[ -f task/asciidoctor/0.1/tests/pre-apply-taskrun-hook.sh ]] + function_exists pre-apply-taskrun-hook ++ type -t pre-apply-taskrun-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + kubectl -n asciidoctor-0-1 delete -f /tmp/.mm.2R3qPA + true + kubectl -n asciidoctor-0-1 create -f /tmp/.mm.2R3qPA pipeline.tekton.dev/asciidoctor-pipeline created pipelinerun.tekton.dev/asciidoctor-pipelinerun created + resource_to_wait_for["$testname/${version}"]='asciidoctor-0-1|16h58:59' + for runtest in $@ + local runtestdir=bentoml/0.1/tests + local testname=bentoml ++++ dirname task/bentoml/0.1/tests +++ basename task/bentoml/0.1 ++ basename 0.1 + local version=0.1 + [[ 0.1 =~ ^[0-9]+\.[0-9]+$ ]] ++ echo 0.1 ++ tr . - + version=0-1 + local tns=bentoml-0-1 + local skipit= + for ignore in ${TEST_TASKRUN_IGNORES} + [[ maven == bentoml ]] + local resourcedir=task/bentoml/0.1 + '[' '!' -d task/bentoml/0.1/tests ']' + ls task/bentoml/0.1/bentoml.yaml + cat task/bentoml/0.1/bentoml.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + kubectl create namespace bentoml-0-1 ++ printf task/bentoml/0.1/bentoml.yaml + yaml=task/bentoml/0.1/bentoml.yaml ++ date +%Hh%M:%S + started=16h59:00 + echo '16h59:00 STARTING: bentoml/0-1 ' 16h59:00 STARTING: bentoml/0-1 + kubectl -n bentoml-0-1 create -f task/bentoml/0.1/bentoml.yaml --dry-run=client -o yaml + [[ -f task/bentoml/0.1/tests/pre-apply-task-hook.sh ]] + function_exists pre-apply-task-hook ++ type -t pre-apply-task-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + [[ -d task/bentoml/0.1/tests/fixtures ]] + kubectl -n bentoml-0-1 delete -f /tmp/.mm.2R3qPA + true + kubectl -n bentoml-0-1 create -f /tmp/.mm.2R3qPA task.tekton.dev/bentoml created + for yaml in ${runtest}/*.yaml + cp task/bentoml/0.1/tests/run.yaml /tmp/.mm.2R3qPA + [[ -f task/bentoml/0.1/tests/pre-apply-taskrun-hook.sh ]] + function_exists pre-apply-taskrun-hook ++ type -t pre-apply-taskrun-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + kubectl -n bentoml-0-1 delete -f /tmp/.mm.2R3qPA + true + kubectl -n bentoml-0-1 create -f /tmp/.mm.2R3qPA taskrun.tekton.dev/bentoml-list-run created + resource_to_wait_for["$testname/${version}"]='bentoml-0-1|16h59:00' + for runtest in $@ + local runtestdir=black/0.1/tests + local testname=black ++++ dirname task/black/0.1/tests +++ basename task/black/0.1 ++ basename 0.1 + local version=0.1 + [[ 0.1 =~ ^[0-9]+\.[0-9]+$ ]] ++ tr . - ++ echo 0.1 + version=0-1 + local tns=black-0-1 + local skipit= + for ignore in ${TEST_TASKRUN_IGNORES} + [[ maven == black ]] + local resourcedir=task/black/0.1 + '[' '!' -d task/black/0.1/tests ']' + ls task/black/0.1/black.yaml + grep 'tekton.dev/deprecated: \"true\"' + cat task/black/0.1/black.yaml + [[ -n '' ]] + [[ -n '' ]] + kubectl create namespace black-0-1 ++ printf task/black/0.1/black.yaml + yaml=task/black/0.1/black.yaml ++ date +%Hh%M:%S + started=16h59:00 + echo '16h59:00 STARTING: black/0-1 ' 16h59:00 STARTING: black/0-1 + kubectl -n black-0-1 create -f task/black/0.1/black.yaml --dry-run=client -o yaml + [[ -f task/black/0.1/tests/pre-apply-task-hook.sh ]] + source task/black/0.1/tests/pre-apply-task-hook.sh ++ add_task git-clone latest ++ local array path_version task ++ task=git-clone ++ [[ latest == \l\a\t\e\s\t ]] ++ array=($(echo task/${task}/*/ | sort -u)) +++ echo task/git-clone/0.1/ task/git-clone/0.10/ task/git-clone/0.2/ task/git-clone/0.3/ task/git-clone/0.4/ task/git-clone/0.5/ task/git-clone/0.6/ task/git-clone/0.7/ task/git-clone/0.8/ task/git-clone/0.9/ +++ sort -u ++ path_version=task/git-clone/0.9/ ++ kubectl -n black-0-1 apply -f task/git-clone/0.9//git-clone.yaml task.tekton.dev/git-clone created + function_exists pre-apply-task-hook ++ type -t pre-apply-task-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + [[ -d task/black/0.1/tests/fixtures ]] + kubectl -n black-0-1 delete -f /tmp/.mm.2R3qPA + true + kubectl -n black-0-1 create -f /tmp/.mm.2R3qPA task.tekton.dev/black created + for yaml in ${runtest}/*.yaml + cp task/black/0.1/tests/resources.yaml /tmp/.mm.2R3qPA + [[ -f task/black/0.1/tests/pre-apply-taskrun-hook.sh ]] + function_exists pre-apply-taskrun-hook ++ type -t pre-apply-taskrun-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + kubectl -n black-0-1 delete -f /tmp/.mm.2R3qPA + true + kubectl -n black-0-1 create -f /tmp/.mm.2R3qPA persistentvolumeclaim/black-python-pvc created + for yaml in ${runtest}/*.yaml + cp task/black/0.1/tests/run.yaml /tmp/.mm.2R3qPA + [[ -f task/black/0.1/tests/pre-apply-taskrun-hook.sh ]] + function_exists pre-apply-taskrun-hook ++ type -t pre-apply-taskrun-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + kubectl -n black-0-1 delete -f /tmp/.mm.2R3qPA + true + kubectl -n black-0-1 create -f /tmp/.mm.2R3qPA pipeline.tekton.dev/python-formatter-pipeline created pipelinerun.tekton.dev/python-formatter-pipeline-run created + resource_to_wait_for["$testname/${version}"]='black-0-1|16h59:00' + for runtest in $@ + local runtestdir=black/0.2/tests + local testname=black ++++ dirname task/black/0.2/tests +++ basename task/black/0.2 ++ basename 0.2 + local version=0.2 + [[ 0.2 =~ ^[0-9]+\.[0-9]+$ ]] ++ echo 0.2 ++ tr . - + version=0-2 + local tns=black-0-2 + local skipit= + for ignore in ${TEST_TASKRUN_IGNORES} + [[ maven == black ]] + local resourcedir=task/black/0.2 + '[' '!' -d task/black/0.2/tests ']' + ls task/black/0.2/black.yaml + cat task/black/0.2/black.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + kubectl create namespace black-0-2 ++ printf task/black/0.2/black.yaml + yaml=task/black/0.2/black.yaml ++ date +%Hh%M:%S + started=16h59:01 + echo '16h59:01 STARTING: black/0-2 ' 16h59:01 STARTING: black/0-2 + kubectl -n black-0-2 create -f task/black/0.2/black.yaml --dry-run=client -o yaml + [[ -f task/black/0.2/tests/pre-apply-task-hook.sh ]] + function_exists pre-apply-task-hook ++ type -t pre-apply-task-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + [[ -d task/black/0.2/tests/fixtures ]] + kubectl -n black-0-2 delete -f /tmp/.mm.2R3qPA + true + kubectl -n black-0-2 create -f /tmp/.mm.2R3qPA task.tekton.dev/black created + for yaml in ${runtest}/*.yaml + cp task/black/0.2/tests/resources.yaml /tmp/.mm.2R3qPA + [[ -f task/black/0.2/tests/pre-apply-taskrun-hook.sh ]] + function_exists pre-apply-taskrun-hook ++ type -t pre-apply-taskrun-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + kubectl -n black-0-2 delete -f /tmp/.mm.2R3qPA + true + kubectl -n black-0-2 create -f /tmp/.mm.2R3qPA configmap/black-python-configmap created + for yaml in ${runtest}/*.yaml + cp task/black/0.2/tests/run.yaml /tmp/.mm.2R3qPA + [[ -f task/black/0.2/tests/pre-apply-taskrun-hook.sh ]] + function_exists pre-apply-taskrun-hook ++ type -t pre-apply-taskrun-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + kubectl -n black-0-2 delete -f /tmp/.mm.2R3qPA + true + kubectl -n black-0-2 create -f /tmp/.mm.2R3qPA pipeline.tekton.dev/python-formatter-pipeline created pipelinerun.tekton.dev/python-formatter-pipeline-run created + resource_to_wait_for["$testname/${version}"]='black-0-2|16h59:01' + for runtest in $@ + local runtestdir=blue-green-deploy/0.1/tests + local testname=blue-green-deploy ++++ dirname task/blue-green-deploy/0.1/tests +++ basename task/blue-green-deploy/0.1 ++ basename 0.1 + local version=0.1 + [[ 0.1 =~ ^[0-9]+\.[0-9]+$ ]] ++ echo 0.1 ++ tr . - + version=0-1 + local tns=blue-green-deploy-0-1 + local skipit= + for ignore in ${TEST_TASKRUN_IGNORES} + [[ maven == blue-green-deploy ]] + local resourcedir=task/blue-green-deploy/0.1 + '[' '!' -d task/blue-green-deploy/0.1/tests ']' + ls task/blue-green-deploy/0.1/blue-green-deploy.yaml + cat task/blue-green-deploy/0.1/blue-green-deploy.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + kubectl create namespace blue-green-deploy-0-1 ++ printf task/blue-green-deploy/0.1/blue-green-deploy.yaml + yaml=task/blue-green-deploy/0.1/blue-green-deploy.yaml ++ date +%Hh%M:%S + started=16h59:02 + echo '16h59:02 STARTING: blue-green-deploy/0-1 ' 16h59:02 STARTING: blue-green-deploy/0-1 + kubectl -n blue-green-deploy-0-1 create -f task/blue-green-deploy/0.1/blue-green-deploy.yaml --dry-run=client -o yaml + [[ -f task/blue-green-deploy/0.1/tests/pre-apply-task-hook.sh ]] + source task/blue-green-deploy/0.1/tests/pre-apply-task-hook.sh ++ cat ++ kubectl apply -f- -n blue-green-deploy-0-1 deployment.apps/myapp-v1 created service/myapp created ++ kubectl -n blue-green-deploy-0-1 wait --for=condition=available --timeout=600s deployment/myapp-v1 deployment.apps/myapp-v1 condition met + function_exists pre-apply-task-hook ++ type -t pre-apply-task-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + [[ -d task/blue-green-deploy/0.1/tests/fixtures ]] + kubectl -n blue-green-deploy-0-1 delete -f /tmp/.mm.2R3qPA + true + kubectl -n blue-green-deploy-0-1 create -f /tmp/.mm.2R3qPA task.tekton.dev/blue-green-deploy created + for yaml in ${runtest}/*.yaml + cp task/blue-green-deploy/0.1/tests/resources.yaml /tmp/.mm.2R3qPA + [[ -f task/blue-green-deploy/0.1/tests/pre-apply-taskrun-hook.sh ]] + function_exists pre-apply-taskrun-hook ++ type -t pre-apply-taskrun-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + kubectl -n blue-green-deploy-0-1 delete -f /tmp/.mm.2R3qPA + true + kubectl -n blue-green-deploy-0-1 create -f /tmp/.mm.2R3qPA serviceaccount/blue-green-account created clusterrole.rbac.authorization.k8s.io/blue-green-cluster-role created clusterrolebinding.rbac.authorization.k8s.io/blue-green-binding created + for yaml in ${runtest}/*.yaml + cp task/blue-green-deploy/0.1/tests/run.yaml /tmp/.mm.2R3qPA + [[ -f task/blue-green-deploy/0.1/tests/pre-apply-taskrun-hook.sh ]] + function_exists pre-apply-taskrun-hook ++ type -t pre-apply-taskrun-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + kubectl -n blue-green-deploy-0-1 delete -f /tmp/.mm.2R3qPA + true + kubectl -n blue-green-deploy-0-1 create -f /tmp/.mm.2R3qPA taskrun.tekton.dev/blue-green-deploy-run created + resource_to_wait_for["$testname/${version}"]='blue-green-deploy-0-1|16h59:02' + local cnt=0 + local all_status= + local reason= + local maxloop=60 + set +x 16h59:00::17h00:05 SUCCESS: bentoml/0-1 testrun has successfully executed 16h59:00::17h00:17 SUCCESS: black/0-1 testrun has successfully executed 16h59:01::17h00:22 SUCCESS: black/0-2 testrun has successfully executed 16h59:02::17h00:54 SUCCESS: blue-green-deploy/0-1 testrun has successfully executed 16h58:59::17h01:05 SUCCESS: asciidoctor/0-1 testrun has successfully executed + cnt=0 + resource_to_tests= + continue + for runtest in $@ + resource_to_tests=' task/blue-green-deploy/0.2/tests' + [[ 0 == \7 ]] + cnt=1 + for runtest in $@ + resource_to_tests=' task/blue-green-deploy/0.2/tests task/buildah/0.1/tests' + [[ 1 == \7 ]] + cnt=2 + for runtest in $@ + resource_to_tests=' task/blue-green-deploy/0.2/tests task/buildah/0.1/tests task/buildah/0.2/tests' + [[ 2 == \7 ]] + cnt=3 + for runtest in $@ + resource_to_tests=' task/blue-green-deploy/0.2/tests task/buildah/0.1/tests task/buildah/0.2/tests task/buildah/0.3/tests' + [[ 3 == \7 ]] + cnt=4 + for runtest in $@ + resource_to_tests=' task/blue-green-deploy/0.2/tests task/buildah/0.1/tests task/buildah/0.2/tests task/buildah/0.3/tests task/buildah/0.4/tests' + [[ 4 == \7 ]] + cnt=5 + for runtest in $@ + resource_to_tests=' task/blue-green-deploy/0.2/tests task/buildah/0.1/tests task/buildah/0.2/tests task/buildah/0.3/tests task/buildah/0.4/tests task/buildah/0.5/tests' + [[ 5 == \7 ]] + cnt=6 + for runtest in $@ + resource_to_tests=' task/blue-green-deploy/0.2/tests task/buildah/0.1/tests task/buildah/0.2/tests task/buildah/0.3/tests task/buildah/0.4/tests task/buildah/0.5/tests task/buildah/0.6/tests' + [[ 6 == \7 ]] + cnt=7 + for runtest in $@ + resource_to_tests=' task/blue-green-deploy/0.2/tests task/buildah/0.1/tests task/buildah/0.2/tests task/buildah/0.3/tests task/buildah/0.4/tests task/buildah/0.5/tests task/buildah/0.6/tests task/buildah/0.7/tests' + [[ 7 == \7 ]] + test_resource_creation ' task/blue-green-deploy/0.2/tests task/buildah/0.1/tests task/buildah/0.2/tests task/buildah/0.3/tests task/buildah/0.4/tests task/buildah/0.5/tests task/buildah/0.6/tests task/buildah/0.7/tests' + local runtest + declare -A resource_to_wait_for + for runtest in $@ + local runtestdir=blue-green-deploy/0.2/tests + local testname=blue-green-deploy ++++ dirname task/blue-green-deploy/0.2/tests +++ basename task/blue-green-deploy/0.2 ++ basename 0.2 + local version=0.2 + [[ 0.2 =~ ^[0-9]+\.[0-9]+$ ]] ++ echo 0.2 ++ tr . - + version=0-2 + local tns=blue-green-deploy-0-2 + local skipit= + for ignore in ${TEST_TASKRUN_IGNORES} + [[ maven == blue-green-deploy ]] + local resourcedir=task/blue-green-deploy/0.2 + '[' '!' -d task/blue-green-deploy/0.2/tests ']' + ls task/blue-green-deploy/0.2/blue-green-deploy.yaml + cat task/blue-green-deploy/0.2/blue-green-deploy.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + kubectl create namespace blue-green-deploy-0-2 ++ printf task/blue-green-deploy/0.2/blue-green-deploy.yaml + yaml=task/blue-green-deploy/0.2/blue-green-deploy.yaml ++ date +%Hh%M:%S + started=17h01:15 + echo '17h01:15 STARTING: blue-green-deploy/0-2 ' 17h01:15 STARTING: blue-green-deploy/0-2 + kubectl -n blue-green-deploy-0-2 create -f task/blue-green-deploy/0.2/blue-green-deploy.yaml --dry-run=client -o yaml + [[ -f task/blue-green-deploy/0.2/tests/pre-apply-task-hook.sh ]] + source task/blue-green-deploy/0.2/tests/pre-apply-task-hook.sh ++ cat ++ kubectl apply -f- -n blue-green-deploy-0-2 deployment.apps/myapp-v1 created service/myapp created ++ kubectl -n blue-green-deploy-0-2 wait --for=condition=available --timeout=600s deployment/myapp-v1 deployment.apps/myapp-v1 condition met + function_exists pre-apply-task-hook ++ type -t pre-apply-task-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + [[ -d task/blue-green-deploy/0.2/tests/fixtures ]] + kubectl -n blue-green-deploy-0-2 delete -f /tmp/.mm.2R3qPA + true + kubectl -n blue-green-deploy-0-2 create -f /tmp/.mm.2R3qPA task.tekton.dev/blue-green-deploy created + for yaml in ${runtest}/*.yaml + cp task/blue-green-deploy/0.2/tests/resources.yaml /tmp/.mm.2R3qPA + [[ -f task/blue-green-deploy/0.2/tests/pre-apply-taskrun-hook.sh ]] + function_exists pre-apply-taskrun-hook ++ type -t pre-apply-taskrun-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + kubectl -n blue-green-deploy-0-2 delete -f /tmp/.mm.2R3qPA + true + kubectl -n blue-green-deploy-0-2 create -f /tmp/.mm.2R3qPA serviceaccount/blue-green-account created clusterrole.rbac.authorization.k8s.io/blue-green-cluster-role created clusterrolebinding.rbac.authorization.k8s.io/blue-green-binding created + for yaml in ${runtest}/*.yaml + cp task/blue-green-deploy/0.2/tests/run.yaml /tmp/.mm.2R3qPA + [[ -f task/blue-green-deploy/0.2/tests/pre-apply-taskrun-hook.sh ]] + function_exists pre-apply-taskrun-hook ++ type -t pre-apply-taskrun-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + kubectl -n blue-green-deploy-0-2 delete -f /tmp/.mm.2R3qPA + true + kubectl -n blue-green-deploy-0-2 create -f /tmp/.mm.2R3qPA taskrun.tekton.dev/blue-green-deploy-run created + resource_to_wait_for["$testname/${version}"]='blue-green-deploy-0-2|17h01:15' + for runtest in $@ + local runtestdir=buildah/0.1/tests + local testname=buildah ++++ dirname task/buildah/0.1/tests +++ basename task/buildah/0.1 ++ basename 0.1 + local version=0.1 + [[ 0.1 =~ ^[0-9]+\.[0-9]+$ ]] ++ echo 0.1 ++ tr . - + version=0-1 + local tns=buildah-0-1 + local skipit= + for ignore in ${TEST_TASKRUN_IGNORES} + [[ maven == buildah ]] + local resourcedir=task/buildah/0.1 + '[' '!' -d task/buildah/0.1/tests ']' + ls task/buildah/0.1/buildah.yaml + grep 'tekton.dev/deprecated: \"true\"' + cat task/buildah/0.1/buildah.yaml + [[ -n '' ]] + [[ -n '' ]] + kubectl create namespace buildah-0-1 ++ printf task/buildah/0.1/buildah.yaml + yaml=task/buildah/0.1/buildah.yaml ++ date +%Hh%M:%S + started=17h01:17 + echo '17h01:17 STARTING: buildah/0-1 ' 17h01:17 STARTING: buildah/0-1 + kubectl -n buildah-0-1 create -f task/buildah/0.1/buildah.yaml --dry-run=client -o yaml + [[ -f task/buildah/0.1/tests/pre-apply-task-hook.sh ]] + source task/buildah/0.1/tests/pre-apply-task-hook.sh ++ add_sidecar_registry /tmp/.mm.2R3qPA ++ add_sidecars /tmp/.mm.2R3qPA '{'\''image'\'':registry, '\''name'\'': '\''registry'\''}' ++ cp /tmp/.mm.2R3qPA /tmp/.mm.2R3qPA.read ++ SCRIPT=' import sys, yaml f=open(0, encoding="utf-8") data=yaml.load(f.read(), Loader=yaml.FullLoader) sidecars = map(lambda v: yaml.safe_load(v), sys.argv[1:]) # after -c for sidecar in sidecars: if "sidecars" in data["spec"]: data["spec"]["sidecars"].append(sidecar) else: data["spec"]["sidecars"] = [sidecar] print(yaml.dump(data, default_flow_style=False)) ' ++ cat /tmp/.mm.2R3qPA.read ++ python3 -c ' import sys, yaml f=open(0, encoding="utf-8") data=yaml.load(f.read(), Loader=yaml.FullLoader) sidecars = map(lambda v: yaml.safe_load(v), sys.argv[1:]) # after -c for sidecar in sidecars: if "sidecars" in data["spec"]: data["spec"]["sidecars"].append(sidecar) else: data["spec"]["sidecars"] = [sidecar] print(yaml.dump(data, default_flow_style=False)) ' '{'\''image'\'':registry, '\''name'\'': '\''registry'\''}' ++ rm -f /tmp/.mm.2R3qPA.read ++ add_task git-clone latest ++ local array path_version task ++ task=git-clone ++ [[ latest == \l\a\t\e\s\t ]] ++ array=($(echo task/${task}/*/ | sort -u)) +++ sort -u +++ echo task/git-clone/0.1/ task/git-clone/0.10/ task/git-clone/0.2/ task/git-clone/0.3/ task/git-clone/0.4/ task/git-clone/0.5/ task/git-clone/0.6/ task/git-clone/0.7/ task/git-clone/0.8/ task/git-clone/0.9/ ++ path_version=task/git-clone/0.9/ ++ kubectl -n buildah-0-1 apply -f task/git-clone/0.9//git-clone.yaml task.tekton.dev/git-clone created + function_exists pre-apply-task-hook ++ type -t pre-apply-task-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + [[ -d task/buildah/0.1/tests/fixtures ]] + kubectl -n buildah-0-1 delete -f /tmp/.mm.2R3qPA + true + kubectl -n buildah-0-1 create -f /tmp/.mm.2R3qPA task.tekton.dev/buildah created + for yaml in ${runtest}/*.yaml + cp task/buildah/0.1/tests/resources.yaml /tmp/.mm.2R3qPA + [[ -f task/buildah/0.1/tests/pre-apply-taskrun-hook.sh ]] + function_exists pre-apply-taskrun-hook ++ type -t pre-apply-taskrun-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + kubectl -n buildah-0-1 delete -f /tmp/.mm.2R3qPA + true + kubectl -n buildah-0-1 create -f /tmp/.mm.2R3qPA persistentvolumeclaim/buildah-source-pvc created + for yaml in ${runtest}/*.yaml + cp task/buildah/0.1/tests/run.yaml /tmp/.mm.2R3qPA + [[ -f task/buildah/0.1/tests/pre-apply-taskrun-hook.sh ]] + function_exists pre-apply-taskrun-hook ++ type -t pre-apply-taskrun-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + kubectl -n buildah-0-1 delete -f /tmp/.mm.2R3qPA + true + kubectl -n buildah-0-1 create -f /tmp/.mm.2R3qPA pipeline.tekton.dev/buildah-test-pipeline created pipelinerun.tekton.dev/buildah-test-pipeline-run created + resource_to_wait_for["$testname/${version}"]='buildah-0-1|17h01:17' + for runtest in $@ + local runtestdir=buildah/0.2/tests + local testname=buildah ++++ dirname task/buildah/0.2/tests +++ basename task/buildah/0.2 ++ basename 0.2 + local version=0.2 + [[ 0.2 =~ ^[0-9]+\.[0-9]+$ ]] ++ echo 0.2 ++ tr . - + version=0-2 + local tns=buildah-0-2 + local skipit= + for ignore in ${TEST_TASKRUN_IGNORES} + [[ maven == buildah ]] + local resourcedir=task/buildah/0.2 + '[' '!' -d task/buildah/0.2/tests ']' + ls task/buildah/0.2/buildah.yaml + cat task/buildah/0.2/buildah.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + kubectl create namespace buildah-0-2 ++ printf task/buildah/0.2/buildah.yaml + yaml=task/buildah/0.2/buildah.yaml ++ date +%Hh%M:%S + started=17h01:18 + echo '17h01:18 STARTING: buildah/0-2 ' 17h01:18 STARTING: buildah/0-2 + kubectl -n buildah-0-2 create -f task/buildah/0.2/buildah.yaml --dry-run=client -o yaml + [[ -f task/buildah/0.2/tests/pre-apply-task-hook.sh ]] + source task/buildah/0.2/tests/pre-apply-task-hook.sh ++ add_sidecar_secure_registry +++ mktemp -d ++ TMD=/tmp/tmp.WpMJFm7zD3 ++ openssl req -newkey rsa:4096 -nodes -sha256 -keyout /tmp/tmp.WpMJFm7zD3/ca.key -x509 -days 365 -addext 'subjectAltName = DNS:registry' -out /tmp/tmp.WpMJFm7zD3/ca.crt -subj /C=FR/ST=IDF/L=Paris/O=Tekton/OU=Catalog/CN=registry ....+........+......+.+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*.+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*..+.......+......+.................+....+......+..................+......+..............+....+...............+..+.+........+.......+.................+.+......+........................+..............+...+.......+........+....+.......................+..........+.....+......+.......+...+............+..+.+.....+.......+.........+...+............+...........+............+................+..+....+........+..........+............+...............+..............+....+..+.........+......+...+...+............+......+.......+..+.+......+...............+......+...+.....+...............+......+.........................+.........+............+............+..+....+.....+.+.............................+....+...+...+.................+.............+.....+....+........+...+.+.......................+..................+....+.....+......+.........+....+......+...+..................+.................+.......+.....+...+...+......................+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ......+.....+.+.....+..........+...+.....+...+....+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*.....+......+..+.......+.....+......+...+.+.........+.........+...+..+...+....+.....+......+....+..................+..+................+..+.+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*..+..................+...+...+...........+....+......+..................+.....+.+.....+.+........+............+.....................+....+..................+..+.+.....+....+...+..+......+....+...+........+...+.+.................................+...+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ----- ++ kubectl create -n buildah-0-2 configmap sslcert --from-file=ca.crt=/tmp/tmp.WpMJFm7zD3/ca.crt --from-file=ca.key=/tmp/tmp.WpMJFm7zD3/ca.key configmap/sslcert created ++ kubectl create -n buildah-0-2 -f task/buildah/0.2/tests/internal-registry/internal-registry.yaml deployment.apps/registry created service/registry created ++ add_task git-clone latest ++ local array path_version task ++ task=git-clone ++ [[ latest == \l\a\t\e\s\t ]] ++ array=($(echo task/${task}/*/ | sort -u)) +++ echo task/git-clone/0.1/ task/git-clone/0.10/ task/git-clone/0.2/ task/git-clone/0.3/ task/git-clone/0.4/ task/git-clone/0.5/ task/git-clone/0.6/ task/git-clone/0.7/ task/git-clone/0.8/ task/git-clone/0.9/ +++ sort -u ++ path_version=task/git-clone/0.9/ ++ kubectl -n buildah-0-2 apply -f task/git-clone/0.9//git-clone.yaml task.tekton.dev/git-clone created + function_exists pre-apply-task-hook ++ type -t pre-apply-task-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + [[ -d task/buildah/0.2/tests/fixtures ]] + kubectl -n buildah-0-2 delete -f /tmp/.mm.2R3qPA + true + kubectl -n buildah-0-2 create -f /tmp/.mm.2R3qPA task.tekton.dev/buildah created + for yaml in ${runtest}/*.yaml + cp task/buildah/0.2/tests/run.yaml /tmp/.mm.2R3qPA + [[ -f task/buildah/0.2/tests/pre-apply-taskrun-hook.sh ]] + function_exists pre-apply-taskrun-hook ++ type -t pre-apply-taskrun-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + kubectl -n buildah-0-2 delete -f /tmp/.mm.2R3qPA + true + kubectl -n buildah-0-2 create -f /tmp/.mm.2R3qPA pipelinerun.tekton.dev/buildah-test-pipeline-run created + resource_to_wait_for["$testname/${version}"]='buildah-0-2|17h01:18' + for runtest in $@ + local runtestdir=buildah/0.3/tests + local testname=buildah ++++ dirname task/buildah/0.3/tests +++ basename task/buildah/0.3 ++ basename 0.3 + local version=0.3 + [[ 0.3 =~ ^[0-9]+\.[0-9]+$ ]] ++ echo 0.3 ++ tr . - + version=0-3 + local tns=buildah-0-3 + local skipit= + for ignore in ${TEST_TASKRUN_IGNORES} + [[ maven == buildah ]] + local resourcedir=task/buildah/0.3 + '[' '!' -d task/buildah/0.3/tests ']' + ls task/buildah/0.3/buildah.yaml + cat task/buildah/0.3/buildah.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + kubectl create namespace buildah-0-3 ++ printf task/buildah/0.3/buildah.yaml + yaml=task/buildah/0.3/buildah.yaml ++ date +%Hh%M:%S + started=17h01:22 + echo '17h01:22 STARTING: buildah/0-3 ' 17h01:22 STARTING: buildah/0-3 + kubectl -n buildah-0-3 create -f task/buildah/0.3/buildah.yaml --dry-run=client -o yaml + [[ -f task/buildah/0.3/tests/pre-apply-task-hook.sh ]] + source task/buildah/0.3/tests/pre-apply-task-hook.sh ++ add_sidecar_secure_registry +++ mktemp -d ++ TMD=/tmp/tmp.5W0ShoXT5C ++ openssl req -newkey rsa:4096 -nodes -sha256 -keyout /tmp/tmp.5W0ShoXT5C/ca.key -x509 -days 365 -addext 'subjectAltName = DNS:registry' -out /tmp/tmp.5W0ShoXT5C/ca.crt -subj /C=FR/ST=IDF/L=Paris/O=Tekton/OU=Catalog/CN=registry .+....+...+..+..........+...........+............+......+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*........+..............+...+.+.....+.+..............+.......+.....+..........+..+...+..................+.+........+.+.....+.......+..............+...+...+...+......+...+......+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*....+.........+......+...............+....+...+.....+.+..+.........+..........+.....+...+.............+..............+...............+..........+...+..+.........+..........+..+...+......+....+............+.....+....+...+...+...........................+........+....+..............+.........+......+.......+.................+...+.......+............+...+.....................+..+....+..............+.........+...............+.............+...+.....+.+....................+.............+..+...+.+...........+...+.+............+...+.....+..........+.....+......+..........+.....+.+.....+..........+........+.....................+......+.............+...........+...+......+.......+..+.+..+.....................................+.................+...+.+.....+.......+.....+.......+.....+.......+.....+.........+....+...........+..........+.....+.......+.........+...+..+....+......+......+..+......................+.....+....+..+...+.+....................+......+...+....+.....................+............+........+....+..+...+............+.............+........+..........+...+..+...............+............+.+.....+.....................+.+.................+.+..+...+.+.....+.+..............+.+...............+..+..........+..+...+.............+.........+........+.......+...............+.....+...+.......+...+..+.+...+.........+........+.......+.....+..........+...+.....+...+.+...+......+......+........+............+.........+..........+...............+...........+...................+..+....+......+...+.....+.+..............+.......+..+...+...............+.........+....+.........+........+.......+...........+.......+...+......+....................+.........+.+.......................+...+.........+...+...+.........................+...+.....+......+.+...+..+.......+..+.+..+..........+.......................+....+.....+.............+...+...+..+...+......+...+......+......+...+......+...............+.+..............+....+.....+..........+......+..+............+......+......+.+..+.+......+..............+.+.....+.+.....+....+...+......+.........+.....+......................+.......................+......+.........+.+.........+...+........+....+..+.+...+.....+.......+.........+........+......+.......+.....+....+..........................+...+.+......+........+............+............+................+.....+....+......+..+.........+....+.....................+...+..+...+...+...+..........+..............+.+..+....+...+.....+.+......+.........+..+.......+...+..................+......+.....+...............+.+.....+...+....+.....+...+.............+.........+......+......+........+............+......+....+........+.......+.........+..+.......+..+...................+............+.........+.........+.....+.+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ .....+............+...........+.......+..+.........................+......+.........+......+............+..+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*..+..+.+..+..........+..+.+...+.................+.........+...+.+..+.......+...........+.........+.............+.....+...+.........+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*.........+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ----- ++ kubectl create -n buildah-0-3 configmap sslcert --from-file=ca.crt=/tmp/tmp.5W0ShoXT5C/ca.crt --from-file=ca.key=/tmp/tmp.5W0ShoXT5C/ca.key configmap/sslcert created ++ kubectl create -n buildah-0-3 -f task/buildah/0.3/tests/internal-registry/internal-registry.yaml deployment.apps/registry created service/registry created ++ add_task git-clone latest ++ local array path_version task ++ task=git-clone ++ [[ latest == \l\a\t\e\s\t ]] ++ array=($(echo task/${task}/*/ | sort -u)) +++ echo task/git-clone/0.1/ task/git-clone/0.10/ task/git-clone/0.2/ task/git-clone/0.3/ task/git-clone/0.4/ task/git-clone/0.5/ task/git-clone/0.6/ task/git-clone/0.7/ task/git-clone/0.8/ task/git-clone/0.9/ +++ sort -u ++ path_version=task/git-clone/0.9/ ++ kubectl -n buildah-0-3 apply -f task/git-clone/0.9//git-clone.yaml task.tekton.dev/git-clone created + function_exists pre-apply-task-hook ++ type -t pre-apply-task-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + [[ -d task/buildah/0.3/tests/fixtures ]] + kubectl -n buildah-0-3 delete -f /tmp/.mm.2R3qPA + true + kubectl -n buildah-0-3 create -f /tmp/.mm.2R3qPA task.tekton.dev/buildah created + for yaml in ${runtest}/*.yaml + cp task/buildah/0.3/tests/run.yaml /tmp/.mm.2R3qPA + [[ -f task/buildah/0.3/tests/pre-apply-taskrun-hook.sh ]] + function_exists pre-apply-taskrun-hook ++ type -t pre-apply-taskrun-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + kubectl -n buildah-0-3 delete -f /tmp/.mm.2R3qPA + true + kubectl -n buildah-0-3 create -f /tmp/.mm.2R3qPA pipelinerun.tekton.dev/buildah-test-pipeline-run created pipelinerun.tekton.dev/buildah-test-skip-push-pipeline-run created + resource_to_wait_for["$testname/${version}"]='buildah-0-3|17h01:22' + for runtest in $@ + local runtestdir=buildah/0.4/tests + local testname=buildah ++++ dirname task/buildah/0.4/tests +++ basename task/buildah/0.4 ++ basename 0.4 + local version=0.4 + [[ 0.4 =~ ^[0-9]+\.[0-9]+$ ]] ++ echo 0.4 ++ tr . - + version=0-4 + local tns=buildah-0-4 + local skipit= + for ignore in ${TEST_TASKRUN_IGNORES} + [[ maven == buildah ]] + local resourcedir=task/buildah/0.4 + '[' '!' -d task/buildah/0.4/tests ']' + ls task/buildah/0.4/buildah.yaml + cat task/buildah/0.4/buildah.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + kubectl create namespace buildah-0-4 ++ printf task/buildah/0.4/buildah.yaml + yaml=task/buildah/0.4/buildah.yaml ++ date +%Hh%M:%S + started=17h01:28 + echo '17h01:28 STARTING: buildah/0-4 ' 17h01:28 STARTING: buildah/0-4 + kubectl -n buildah-0-4 create -f task/buildah/0.4/buildah.yaml --dry-run=client -o yaml + [[ -f task/buildah/0.4/tests/pre-apply-task-hook.sh ]] + source task/buildah/0.4/tests/pre-apply-task-hook.sh ++ add_sidecar_secure_registry +++ mktemp -d ++ TMD=/tmp/tmp.bNoCpAeI2O ++ openssl req -newkey rsa:4096 -nodes -sha256 -keyout /tmp/tmp.bNoCpAeI2O/ca.key -x509 -days 365 -addext 'subjectAltName = DNS:registry' -out /tmp/tmp.bNoCpAeI2O/ca.crt -subj /C=FR/ST=IDF/L=Paris/O=Tekton/OU=Catalog/CN=registry ....+.+..+............+.......+...+......+.................+...+......+.........+.+...+...+.....+...+......+.+..+.+.........+.....+......+....+.....+.+.........+...+.........+.....+.........+.+......+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*.+.+..............+.+.........+...........+.+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*...+...+.....+.+...+...+...............+...............+...+...........+......+....+........+...+....+...+...........+......+...+...+...+...................+........+...................+..................+...........+....+......+......+......+...+.....+......+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ...+..+.+............+..+....+..+.........+......+............+.+.....+.+...+..+...+......+......+...+...+.......+............+.........+............+.....+.......+........+...+....+...........+.+......+...+.....+..........+.........+...+........+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*..+.+..+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*..........+..........+...+..+.........+..........+...........+...+....+...+........+.....................+...+.+.....+....+..+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ----- ++ kubectl create -n buildah-0-4 configmap sslcert --from-file=ca.crt=/tmp/tmp.bNoCpAeI2O/ca.crt --from-file=ca.key=/tmp/tmp.bNoCpAeI2O/ca.key configmap/sslcert created ++ kubectl create -n buildah-0-4 -f task/buildah/0.4/tests/internal-registry/internal-registry.yaml deployment.apps/registry created service/registry created ++ add_task git-clone latest ++ local array path_version task ++ task=git-clone ++ [[ latest == \l\a\t\e\s\t ]] ++ array=($(echo task/${task}/*/ | sort -u)) +++ echo task/git-clone/0.1/ task/git-clone/0.10/ task/git-clone/0.2/ task/git-clone/0.3/ task/git-clone/0.4/ task/git-clone/0.5/ task/git-clone/0.6/ task/git-clone/0.7/ task/git-clone/0.8/ task/git-clone/0.9/ +++ sort -u ++ path_version=task/git-clone/0.9/ ++ kubectl -n buildah-0-4 apply -f task/git-clone/0.9//git-clone.yaml task.tekton.dev/git-clone created + function_exists pre-apply-task-hook ++ type -t pre-apply-task-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + [[ -d task/buildah/0.4/tests/fixtures ]] + kubectl -n buildah-0-4 delete -f /tmp/.mm.2R3qPA + true + kubectl -n buildah-0-4 create -f /tmp/.mm.2R3qPA task.tekton.dev/buildah created + for yaml in ${runtest}/*.yaml + cp task/buildah/0.4/tests/run.yaml /tmp/.mm.2R3qPA + [[ -f task/buildah/0.4/tests/pre-apply-taskrun-hook.sh ]] + function_exists pre-apply-taskrun-hook ++ type -t pre-apply-taskrun-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + kubectl -n buildah-0-4 delete -f /tmp/.mm.2R3qPA + true + kubectl -n buildah-0-4 create -f /tmp/.mm.2R3qPA pipelinerun.tekton.dev/buildah-test-pipeline-run created pipelinerun.tekton.dev/buildah-test-skip-push-pipeline-run created + resource_to_wait_for["$testname/${version}"]='buildah-0-4|17h01:28' + for runtest in $@ + local runtestdir=buildah/0.5/tests + local testname=buildah ++++ dirname task/buildah/0.5/tests +++ basename task/buildah/0.5 ++ basename 0.5 + local version=0.5 + [[ 0.5 =~ ^[0-9]+\.[0-9]+$ ]] ++ echo 0.5 ++ tr . - + version=0-5 + local tns=buildah-0-5 + local skipit= + for ignore in ${TEST_TASKRUN_IGNORES} + [[ maven == buildah ]] + local resourcedir=task/buildah/0.5 + '[' '!' -d task/buildah/0.5/tests ']' + ls task/buildah/0.5/buildah.yaml + cat task/buildah/0.5/buildah.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + kubectl create namespace buildah-0-5 ++ printf task/buildah/0.5/buildah.yaml + yaml=task/buildah/0.5/buildah.yaml ++ date +%Hh%M:%S + started=17h01:31 + echo '17h01:31 STARTING: buildah/0-5 ' 17h01:31 STARTING: buildah/0-5 + kubectl -n buildah-0-5 create -f task/buildah/0.5/buildah.yaml --dry-run=client -o yaml + [[ -f task/buildah/0.5/tests/pre-apply-task-hook.sh ]] + source task/buildah/0.5/tests/pre-apply-task-hook.sh ++ add_sidecar_secure_registry +++ mktemp -d ++ TMD=/tmp/tmp.7ugQuX2txD ++ openssl req -newkey rsa:4096 -nodes -sha256 -keyout /tmp/tmp.7ugQuX2txD/ca.key -x509 -days 365 -addext 'subjectAltName = DNS:registry' -out /tmp/tmp.7ugQuX2txD/ca.crt -subj /C=FR/ST=IDF/L=Paris/O=Tekton/OU=Catalog/CN=registry .+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*.....+.+...+......+...........+.+.........+.........+..+...+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*.........+.....+....+...+......+.....+...............+.......+..+.+..............+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ...........+.....+...+.+......+......+...+.....+....+........+...+......+....+..............+.+..............+...+.......+.....+.......+........+......+.+.....+.+..+...+....+......+..+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*...+....+.....+.+.....+.......+..................+..+.......+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*..+....+.........+......+.....+.+..+.............+........+....+.....................+..............................+.....+....+...........+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ----- ++ kubectl create -n buildah-0-5 configmap sslcert --from-file=ca.crt=/tmp/tmp.7ugQuX2txD/ca.crt --from-file=ca.key=/tmp/tmp.7ugQuX2txD/ca.key configmap/sslcert created ++ kubectl create -n buildah-0-5 -f task/buildah/0.5/tests/internal-registry/internal-registry.yaml deployment.apps/registry created service/registry created ++ add_task git-clone latest ++ local array path_version task ++ task=git-clone ++ [[ latest == \l\a\t\e\s\t ]] ++ array=($(echo task/${task}/*/ | sort -u)) +++ echo task/git-clone/0.1/ task/git-clone/0.10/ task/git-clone/0.2/ task/git-clone/0.3/ task/git-clone/0.4/ task/git-clone/0.5/ task/git-clone/0.6/ task/git-clone/0.7/ task/git-clone/0.8/ task/git-clone/0.9/ +++ sort -u ++ path_version=task/git-clone/0.9/ ++ kubectl -n buildah-0-5 apply -f task/git-clone/0.9//git-clone.yaml task.tekton.dev/git-clone created + function_exists pre-apply-task-hook ++ type -t pre-apply-task-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + [[ -d task/buildah/0.5/tests/fixtures ]] + kubectl -n buildah-0-5 delete -f /tmp/.mm.2R3qPA + true + kubectl -n buildah-0-5 create -f /tmp/.mm.2R3qPA task.tekton.dev/buildah created + for yaml in ${runtest}/*.yaml + cp task/buildah/0.5/tests/run.yaml /tmp/.mm.2R3qPA + [[ -f task/buildah/0.5/tests/pre-apply-taskrun-hook.sh ]] + function_exists pre-apply-taskrun-hook ++ type -t pre-apply-taskrun-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + kubectl -n buildah-0-5 delete -f /tmp/.mm.2R3qPA + true + kubectl -n buildah-0-5 create -f /tmp/.mm.2R3qPA pipelinerun.tekton.dev/buildah-test-pipeline-run created pipelinerun.tekton.dev/buildah-test-skip-push-pipeline-run created + resource_to_wait_for["$testname/${version}"]='buildah-0-5|17h01:31' + for runtest in $@ + local runtestdir=buildah/0.6/tests + local testname=buildah ++++ dirname task/buildah/0.6/tests +++ basename task/buildah/0.6 ++ basename 0.6 + local version=0.6 + [[ 0.6 =~ ^[0-9]+\.[0-9]+$ ]] ++ echo 0.6 ++ tr . - + version=0-6 + local tns=buildah-0-6 + local skipit= + for ignore in ${TEST_TASKRUN_IGNORES} + [[ maven == buildah ]] + local resourcedir=task/buildah/0.6 + '[' '!' -d task/buildah/0.6/tests ']' + ls task/buildah/0.6/buildah.yaml + cat task/buildah/0.6/buildah.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + kubectl create namespace buildah-0-6 ++ printf task/buildah/0.6/buildah.yaml + yaml=task/buildah/0.6/buildah.yaml ++ date +%Hh%M:%S + started=17h01:34 + echo '17h01:34 STARTING: buildah/0-6 ' 17h01:34 STARTING: buildah/0-6 + kubectl -n buildah-0-6 create -f task/buildah/0.6/buildah.yaml --dry-run=client -o yaml + [[ -f task/buildah/0.6/tests/pre-apply-task-hook.sh ]] + source task/buildah/0.6/tests/pre-apply-task-hook.sh ++ add_sidecar_secure_registry +++ mktemp -d ++ TMD=/tmp/tmp.lmEzWRekDU ++ openssl req -newkey rsa:4096 -nodes -sha256 -keyout /tmp/tmp.lmEzWRekDU/ca.key -x509 -days 365 -addext 'subjectAltName = DNS:registry' -out /tmp/tmp.lmEzWRekDU/ca.crt -subj /C=FR/ST=IDF/L=Paris/O=Tekton/OU=Catalog/CN=registry .....+.....+.+...+......+......+..+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*.+...+....+...+..+......+.......+..+.+.........+...+...........+.+........+...+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*.......+..............................+........+...............+.+..+..........+..+.......+.....+......+..........+........+......+....+.....+.......+.................+.+..+...+...............+.+......+...+...............+.........+.....+............+......+.......+...+..+...+....+...+....................+.......+....................+.+.....+....+.....+...+......+........................+.+..+....+.......................+...+............+.+......+......+..+......+......................+...+.........+.....+.......+.........+.....+....+..................+...+.....+.........+.+......+...........+....+...+........+...+..........+...............+.....+.......+.........+...+...........+.......+..+.......+...........+....+...+......+..+...+......+.+..+.......+........+.......+.........+......+.....+.+..+......+..........+..+.......+.....+.......+...........+............+...............+...+...................+...+...+..+......+.......+..+...............+.......+......+...+.........+..+.+.........+.........+..+.......+.....+.+...........+..................+...+....+........+................+..+......................+..+.............+.....+......+......+..........+..............+.+.....................+............+........+....+...........+....+..............+........................+...+...+.......+............+......+.....+.........+.......+...+.....+.......+........+.+......+........+.............+.....+........................+......+...+............+.........+....+.........+...........+.+...+...+...+.....+.+.....+...+...+.......+........+....+.........+...........+.+..+...+............+...+...+.+...+........+.........+...............+.............+...+........+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ...+..+.............+..+.......+......+.....+....+..+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*.......+...+....+.....................+...+...........+.+..+.+.....+.......+...+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*.+......+.....+............+....+.....+....+..............+.+..+...+.........+................+...........+.+.........+...........+.......+.....+...+.......+......+.....+.+..............+.......+..+.......+.....+...+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ----- ++ kubectl create -n buildah-0-6 configmap sslcert --from-file=ca.crt=/tmp/tmp.lmEzWRekDU/ca.crt --from-file=ca.key=/tmp/tmp.lmEzWRekDU/ca.key configmap/sslcert created ++ kubectl create -n buildah-0-6 -f task/buildah/0.6/tests/internal-registry/internal-registry.yaml deployment.apps/registry created service/registry created ++ add_task git-clone latest ++ local array path_version task ++ task=git-clone ++ [[ latest == \l\a\t\e\s\t ]] ++ array=($(echo task/${task}/*/ | sort -u)) +++ echo task/git-clone/0.1/ task/git-clone/0.10/ task/git-clone/0.2/ task/git-clone/0.3/ task/git-clone/0.4/ task/git-clone/0.5/ task/git-clone/0.6/ task/git-clone/0.7/ task/git-clone/0.8/ task/git-clone/0.9/ +++ sort -u ++ path_version=task/git-clone/0.9/ ++ kubectl -n buildah-0-6 apply -f task/git-clone/0.9//git-clone.yaml task.tekton.dev/git-clone created + function_exists pre-apply-task-hook ++ type -t pre-apply-task-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + [[ -d task/buildah/0.6/tests/fixtures ]] + kubectl -n buildah-0-6 delete -f /tmp/.mm.2R3qPA + true + kubectl -n buildah-0-6 create -f /tmp/.mm.2R3qPA task.tekton.dev/buildah created + for yaml in ${runtest}/*.yaml + cp task/buildah/0.6/tests/run.yaml /tmp/.mm.2R3qPA + [[ -f task/buildah/0.6/tests/pre-apply-taskrun-hook.sh ]] + function_exists pre-apply-taskrun-hook ++ type -t pre-apply-taskrun-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + kubectl -n buildah-0-6 delete -f /tmp/.mm.2R3qPA + true + kubectl -n buildah-0-6 create -f /tmp/.mm.2R3qPA pipelinerun.tekton.dev/buildah-test-pipeline-run created pipelinerun.tekton.dev/buildah-test-skip-push-pipeline-run created + resource_to_wait_for["$testname/${version}"]='buildah-0-6|17h01:34' + for runtest in $@ + local runtestdir=buildah/0.7/tests + local testname=buildah ++++ dirname task/buildah/0.7/tests +++ basename task/buildah/0.7 ++ basename 0.7 + local version=0.7 + [[ 0.7 =~ ^[0-9]+\.[0-9]+$ ]] ++ tr . - ++ echo 0.7 + version=0-7 + local tns=buildah-0-7 + local skipit= + for ignore in ${TEST_TASKRUN_IGNORES} + [[ maven == buildah ]] + local resourcedir=task/buildah/0.7 + '[' '!' -d task/buildah/0.7/tests ']' + ls task/buildah/0.7/buildah.yaml + cat task/buildah/0.7/buildah.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + kubectl create namespace buildah-0-7 ++ printf task/buildah/0.7/buildah.yaml + yaml=task/buildah/0.7/buildah.yaml ++ date +%Hh%M:%S + started=17h01:39 + echo '17h01:39 STARTING: buildah/0-7 ' 17h01:39 STARTING: buildah/0-7 + kubectl -n buildah-0-7 create -f task/buildah/0.7/buildah.yaml --dry-run=client -o yaml + [[ -f task/buildah/0.7/tests/pre-apply-task-hook.sh ]] + source task/buildah/0.7/tests/pre-apply-task-hook.sh ++ add_sidecar_secure_registry +++ mktemp -d ++ TMD=/tmp/tmp.Us0YUXDUOv ++ openssl req -newkey rsa:4096 -nodes -sha256 -keyout /tmp/tmp.Us0YUXDUOv/ca.key -x509 -days 365 -addext 'subjectAltName = DNS:registry' -out /tmp/tmp.Us0YUXDUOv/ca.crt -subj /C=FR/ST=IDF/L=Paris/O=Tekton/OU=Catalog/CN=registry ...+.+......+...+...........+.........+..........+...+.....+...+..........+..+...+.......+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*....+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*..+......+.............+..+.........+..........+.........+...+.................+..........+..+.+..+...+...+.+..............+.......+.........+...............+.........+.....+.+.....+....+...........+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ .............+....+.....+......+.........+...+.......+.........+..+..........+..+......+.+..............+......+.........+.+...+..+.+........+.+.....+.........+....+.....+.+.........+..+...+.............+............+..+....+.....+.+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*..+...+...........+......+....+...+...........+....+..+......+...+....+............+........+.+..+.............+...........+.+.................+.+.....+......+.+..+.............+...+...........+..........+.....+...+.+..+..........+..+.+..+..........+..+.......+..............+.......+.....+...+.+...+......+.....+.........................+..........................+...+.+...........+.+...+.....+......+..........+.........+..+...+....+...+.....+....+...+........+.......+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*....+.....+.......+.....+..........+........+.............+..+.........+...+.+..+.............+.........+..+.+..+.+......+.....+....+..+.........+.........+..........+.....+............+.........+..........+........+.....................+.+..........................+...+.......+.................+.+......+.....+...+.......+...+.....+.+.....+..........+.....+.........+.+.........+...+..+..........+......+...........+......+.......+......+............+.....+...+....+...........+.........+......+.........+..........+......+...........+......+............+.+..+.......+...........+.+........+.......+.....+.+.............................................+...+.........+..+................+.................+......+......+....+..+..........+.........+......+........+....+...+..+..........+..+......+...+.+...+...........+.+....................+...+.+...........+.........+.+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ----- ++ kubectl create -n buildah-0-7 configmap sslcert --from-file=ca.crt=/tmp/tmp.Us0YUXDUOv/ca.crt --from-file=ca.key=/tmp/tmp.Us0YUXDUOv/ca.key configmap/sslcert created ++ kubectl create -n buildah-0-7 -f task/buildah/0.7/tests/internal-registry/internal-registry.yaml deployment.apps/registry created service/registry created ++ add_task git-clone latest ++ local array path_version task ++ task=git-clone ++ [[ latest == \l\a\t\e\s\t ]] ++ array=($(echo task/${task}/*/ | sort -u)) +++ echo task/git-clone/0.1/ task/git-clone/0.10/ task/git-clone/0.2/ task/git-clone/0.3/ task/git-clone/0.4/ task/git-clone/0.5/ task/git-clone/0.6/ task/git-clone/0.7/ task/git-clone/0.8/ task/git-clone/0.9/ +++ sort -u ++ path_version=task/git-clone/0.9/ ++ kubectl -n buildah-0-7 apply -f task/git-clone/0.9//git-clone.yaml task.tekton.dev/git-clone created + function_exists pre-apply-task-hook ++ type -t pre-apply-task-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + [[ -d task/buildah/0.7/tests/fixtures ]] + kubectl -n buildah-0-7 delete -f /tmp/.mm.2R3qPA + true + kubectl -n buildah-0-7 create -f /tmp/.mm.2R3qPA task.tekton.dev/buildah created + for yaml in ${runtest}/*.yaml + cp task/buildah/0.7/tests/run.yaml /tmp/.mm.2R3qPA + [[ -f task/buildah/0.7/tests/pre-apply-taskrun-hook.sh ]] + function_exists pre-apply-taskrun-hook ++ type -t pre-apply-taskrun-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + kubectl -n buildah-0-7 delete -f /tmp/.mm.2R3qPA + true + kubectl -n buildah-0-7 create -f /tmp/.mm.2R3qPA pipelinerun.tekton.dev/buildah-test-pipeline-run created pipelinerun.tekton.dev/buildah-test-skip-push-pipeline-run created + resource_to_wait_for["$testname/${version}"]='buildah-0-7|17h01:39' + local cnt=0 + local all_status= + local reason= + local maxloop=60 + set +x 17h01:15::17h02:35 SUCCESS: blue-green-deploy/0-2 testrun has successfully executed 17h01:18::17h02:48 SUCCESS: buildah/0-2 testrun has successfully executed 17h01:22::17h03:01 SUCCESS: buildah/0-3 testrun has successfully executed 17h01:28::17h03:07 SUCCESS: buildah/0-4 testrun has successfully executed 17h01:31::17h03:19 SUCCESS: buildah/0-5 testrun has successfully executed 17h01:17::17h03:39 SUCCESS: buildah/0-1 testrun has successfully executed 17h01:34::17h03:46 SUCCESS: buildah/0-6 testrun has successfully executed 17h01:39::17h03:57 SUCCESS: buildah/0-7 testrun has successfully executed + cnt=0 + resource_to_tests= + continue + for runtest in $@ + resource_to_tests=' task/buildah/0.8/tests' + [[ 0 == \7 ]] + cnt=1 + for runtest in $@ + resource_to_tests=' task/buildah/0.8/tests task/buildah/0.9/tests' + [[ 1 == \7 ]] + cnt=2 + for runtest in $@ + resource_to_tests=' task/buildah/0.8/tests task/buildah/0.9/tests task/buildpacks-phases/0.1/tests' + [[ 2 == \7 ]] + cnt=3 + for runtest in $@ + resource_to_tests=' task/buildah/0.8/tests task/buildah/0.9/tests task/buildpacks-phases/0.1/tests task/buildpacks-phases/0.2/tests' + [[ 3 == \7 ]] + cnt=4 + for runtest in $@ + resource_to_tests=' task/buildah/0.8/tests task/buildah/0.9/tests task/buildpacks-phases/0.1/tests task/buildpacks-phases/0.2/tests task/buildpacks-phases/0.3/tests' + [[ 4 == \7 ]] + cnt=5 + for runtest in $@ + resource_to_tests=' task/buildah/0.8/tests task/buildah/0.9/tests task/buildpacks-phases/0.1/tests task/buildpacks-phases/0.2/tests task/buildpacks-phases/0.3/tests task/buildpacks/0.1/tests' + [[ 5 == \7 ]] + cnt=6 + for runtest in $@ + resource_to_tests=' task/buildah/0.8/tests task/buildah/0.9/tests task/buildpacks-phases/0.1/tests task/buildpacks-phases/0.2/tests task/buildpacks-phases/0.3/tests task/buildpacks/0.1/tests task/buildpacks/0.2/tests' + [[ 6 == \7 ]] + cnt=7 + for runtest in $@ + resource_to_tests=' task/buildah/0.8/tests task/buildah/0.9/tests task/buildpacks-phases/0.1/tests task/buildpacks-phases/0.2/tests task/buildpacks-phases/0.3/tests task/buildpacks/0.1/tests task/buildpacks/0.2/tests task/buildpacks/0.3/tests' + [[ 7 == \7 ]] + test_resource_creation ' task/buildah/0.8/tests task/buildah/0.9/tests task/buildpacks-phases/0.1/tests task/buildpacks-phases/0.2/tests task/buildpacks-phases/0.3/tests task/buildpacks/0.1/tests task/buildpacks/0.2/tests task/buildpacks/0.3/tests' + local runtest + declare -A resource_to_wait_for + for runtest in $@ + local runtestdir=buildah/0.8/tests + local testname=buildah ++++ dirname task/buildah/0.8/tests +++ basename task/buildah/0.8 ++ basename 0.8 + local version=0.8 + [[ 0.8 =~ ^[0-9]+\.[0-9]+$ ]] ++ echo 0.8 ++ tr . - + version=0-8 + local tns=buildah-0-8 + local skipit= + for ignore in ${TEST_TASKRUN_IGNORES} + [[ maven == buildah ]] + local resourcedir=task/buildah/0.8 + '[' '!' -d task/buildah/0.8/tests ']' + ls task/buildah/0.8/buildah.yaml + cat task/buildah/0.8/buildah.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + kubectl create namespace buildah-0-8 ++ printf task/buildah/0.8/buildah.yaml + yaml=task/buildah/0.8/buildah.yaml ++ date +%Hh%M:%S + started=17h04:07 + echo '17h04:07 STARTING: buildah/0-8 ' 17h04:07 STARTING: buildah/0-8 + kubectl -n buildah-0-8 create -f task/buildah/0.8/buildah.yaml --dry-run=client -o yaml + [[ -f task/buildah/0.8/tests/pre-apply-task-hook.sh ]] + source task/buildah/0.8/tests/pre-apply-task-hook.sh ++ add_sidecar_secure_registry +++ mktemp -d ++ TMD=/tmp/tmp.orUn9Ee22W ++ openssl req -newkey rsa:4096 -nodes -sha256 -keyout /tmp/tmp.orUn9Ee22W/ca.key -x509 -days 365 -addext 'subjectAltName = DNS:registry' -out /tmp/tmp.orUn9Ee22W/ca.crt -subj /C=FR/ST=IDF/L=Paris/O=Tekton/OU=Catalog/CN=registry ..............+...+...+.+...............+.....+.........+.........+.+.........+..+.+.....+...+.+...........+.......+......+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*..+..........+...+.....+.........+......+...............+......+.+...+.....+....+.....+.+...........+......+....+........+.......+...+..+.+..+.+.....+.+.....+...+.............+........+.+...........+..........+.....+.......+...........+....+...+........+......+...+.+.....+......+.........+.+.....+.+.........+......+...+...............+..+....+.....+....+..+....+...+.....+......+.+......+.........+......+.....+....+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*.........+..+.+.........+..+..................+.............+..+.+....................+....+........+...+..........+.....+.......+.........+...+...............+......+.....+......+.+..+.......+.....+.........................+...+..+......+...+....+..+..................+.............+...+.........+...+..+.............+.........+...+...+..+......+....+...+.................+...+....+.........+.................+.........+..........+.....+..........+...+..+...+......+.....................+....+.................+....+.........+..+...+......+.+........+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ..+...+......+...........+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*.........+....+..+....+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*....+...............+...+.....+......+...............+.+........+....+..+....+.........+..+.............+.....+.+.....+.........+...+....+.....+.+.........+........+.+.....+...............+.......+.....+.............+................................+....+...+.....+......+......+.+...+...........+.........+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ----- ++ kubectl create -n buildah-0-8 configmap sslcert --from-file=ca.crt=/tmp/tmp.orUn9Ee22W/ca.crt --from-file=ca.key=/tmp/tmp.orUn9Ee22W/ca.key configmap/sslcert created ++ kubectl create -n buildah-0-8 -f task/buildah/0.8/tests/internal-registry/internal-registry.yaml deployment.apps/registry created service/registry created ++ add_task git-clone latest ++ local array path_version task ++ task=git-clone ++ [[ latest == \l\a\t\e\s\t ]] ++ array=($(echo task/${task}/*/ | sort -u)) +++ echo task/git-clone/0.1/ task/git-clone/0.10/ task/git-clone/0.2/ task/git-clone/0.3/ task/git-clone/0.4/ task/git-clone/0.5/ task/git-clone/0.6/ task/git-clone/0.7/ task/git-clone/0.8/ task/git-clone/0.9/ +++ sort -u ++ path_version=task/git-clone/0.9/ ++ kubectl -n buildah-0-8 apply -f task/git-clone/0.9//git-clone.yaml task.tekton.dev/git-clone created + function_exists pre-apply-task-hook ++ type -t pre-apply-task-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + [[ -d task/buildah/0.8/tests/fixtures ]] + kubectl -n buildah-0-8 delete -f /tmp/.mm.2R3qPA + true + kubectl -n buildah-0-8 create -f /tmp/.mm.2R3qPA task.tekton.dev/buildah created + for yaml in ${runtest}/*.yaml + cp task/buildah/0.8/tests/run.yaml /tmp/.mm.2R3qPA + [[ -f task/buildah/0.8/tests/pre-apply-taskrun-hook.sh ]] + function_exists pre-apply-taskrun-hook ++ type -t pre-apply-taskrun-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + kubectl -n buildah-0-8 delete -f /tmp/.mm.2R3qPA + true + kubectl -n buildah-0-8 create -f /tmp/.mm.2R3qPA pipelinerun.tekton.dev/buildah-test-pipeline-run created pipelinerun.tekton.dev/buildah-test-skip-push-pipeline-run created + resource_to_wait_for["$testname/${version}"]='buildah-0-8|17h04:07' + for runtest in $@ + local runtestdir=buildah/0.9/tests + local testname=buildah ++++ dirname task/buildah/0.9/tests +++ basename task/buildah/0.9 ++ basename 0.9 + local version=0.9 + [[ 0.9 =~ ^[0-9]+\.[0-9]+$ ]] ++ echo 0.9 ++ tr . - + version=0-9 + local tns=buildah-0-9 + local skipit= + for ignore in ${TEST_TASKRUN_IGNORES} + [[ maven == buildah ]] + local resourcedir=task/buildah/0.9 + '[' '!' -d task/buildah/0.9/tests ']' + ls task/buildah/0.9/buildah.yaml + cat task/buildah/0.9/buildah.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + kubectl create namespace buildah-0-9 ++ printf task/buildah/0.9/buildah.yaml + yaml=task/buildah/0.9/buildah.yaml ++ date +%Hh%M:%S + started=17h04:09 + echo '17h04:09 STARTING: buildah/0-9 ' 17h04:09 STARTING: buildah/0-9 + kubectl -n buildah-0-9 create -f task/buildah/0.9/buildah.yaml --dry-run=client -o yaml + [[ -f task/buildah/0.9/tests/pre-apply-task-hook.sh ]] + source task/buildah/0.9/tests/pre-apply-task-hook.sh ++ add_sidecar_secure_registry +++ mktemp -d ++ TMD=/tmp/tmp.lsGQG1qBpl ++ openssl req -newkey rsa:4096 -nodes -sha256 -keyout /tmp/tmp.lsGQG1qBpl/ca.key -x509 -days 365 -addext 'subjectAltName = DNS:registry' -out /tmp/tmp.lsGQG1qBpl/ca.crt -subj /C=FR/ST=IDF/L=Paris/O=Tekton/OU=Catalog/CN=registry .+...+.+..+...+....+..+...+...+.......+...............+...+.....+.......+..+......+...+.+........+.............+..+.......+.....+...+.+..+....+.....+...+..........+..+....+.....+......+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*...+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*.........+.....+.........+...............+......+.+..+..........+.....+...............+.+......+...+............+.....+...+............+...................+..+...+......+..........+...+.....................+.....+....+.....+......+.......+.........+...........+...+.......+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ .....+.......+.....+...+......+....+.....+..........+...........+...+......+.....................+.+..+.......+.....+...+.+.........+...........+.+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*.......+..........+.......................+..........+..+....+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*....+.........+...+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ----- ++ kubectl create -n buildah-0-9 configmap sslcert --from-file=ca.crt=/tmp/tmp.lsGQG1qBpl/ca.crt --from-file=ca.key=/tmp/tmp.lsGQG1qBpl/ca.key configmap/sslcert created ++ kubectl create -n buildah-0-9 -f task/buildah/0.9/tests/internal-registry/internal-registry.yaml deployment.apps/registry created service/registry created ++ add_task git-clone latest ++ local array path_version task ++ task=git-clone ++ [[ latest == \l\a\t\e\s\t ]] ++ array=($(echo task/${task}/*/ | sort -u)) +++ echo task/git-clone/0.1/ task/git-clone/0.10/ task/git-clone/0.2/ task/git-clone/0.3/ task/git-clone/0.4/ task/git-clone/0.5/ task/git-clone/0.6/ task/git-clone/0.7/ task/git-clone/0.8/ task/git-clone/0.9/ +++ sort -u ++ path_version=task/git-clone/0.9/ ++ kubectl -n buildah-0-9 apply -f task/git-clone/0.9//git-clone.yaml task.tekton.dev/git-clone created + function_exists pre-apply-task-hook ++ type -t pre-apply-task-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + [[ -d task/buildah/0.9/tests/fixtures ]] + kubectl -n buildah-0-9 delete -f /tmp/.mm.2R3qPA + true + kubectl -n buildah-0-9 create -f /tmp/.mm.2R3qPA task.tekton.dev/buildah created + for yaml in ${runtest}/*.yaml + cp task/buildah/0.9/tests/run.yaml /tmp/.mm.2R3qPA + [[ -f task/buildah/0.9/tests/pre-apply-taskrun-hook.sh ]] + function_exists pre-apply-taskrun-hook ++ type -t pre-apply-taskrun-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + kubectl -n buildah-0-9 delete -f /tmp/.mm.2R3qPA + true + kubectl -n buildah-0-9 create -f /tmp/.mm.2R3qPA pipelinerun.tekton.dev/buildah-test-pipeline-run created pipelinerun.tekton.dev/buildah-test-skip-push-pipeline-run created + resource_to_wait_for["$testname/${version}"]='buildah-0-9|17h04:09' + for runtest in $@ + local runtestdir=buildpacks-phases/0.1/tests + local testname=buildpacks-phases ++++ dirname task/buildpacks-phases/0.1/tests +++ basename task/buildpacks-phases/0.1 ++ basename 0.1 + local version=0.1 + [[ 0.1 =~ ^[0-9]+\.[0-9]+$ ]] ++ echo 0.1 ++ tr . - + version=0-1 + local tns=buildpacks-phases-0-1 + local skipit= + for ignore in ${TEST_TASKRUN_IGNORES} + [[ maven == buildpacks-phases ]] + local resourcedir=task/buildpacks-phases/0.1 + '[' '!' -d task/buildpacks-phases/0.1/tests ']' + ls task/buildpacks-phases/0.1/buildpacks-phases.yaml + cat task/buildpacks-phases/0.1/buildpacks-phases.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in $@ + local runtestdir=buildpacks-phases/0.2/tests + local testname=buildpacks-phases ++++ dirname task/buildpacks-phases/0.2/tests +++ basename task/buildpacks-phases/0.2 ++ basename 0.2 + local version=0.2 + [[ 0.2 =~ ^[0-9]+\.[0-9]+$ ]] ++ echo 0.2 ++ tr . - + version=0-2 + local tns=buildpacks-phases-0-2 + local skipit= + for ignore in ${TEST_TASKRUN_IGNORES} + [[ maven == buildpacks-phases ]] + local resourcedir=task/buildpacks-phases/0.2 + '[' '!' -d task/buildpacks-phases/0.2/tests ']' + ls task/buildpacks-phases/0.2/buildpacks-phases.yaml + cat task/buildpacks-phases/0.2/buildpacks-phases.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + kubectl create namespace buildpacks-phases-0-2 ++ printf task/buildpacks-phases/0.2/buildpacks-phases.yaml + yaml=task/buildpacks-phases/0.2/buildpacks-phases.yaml ++ date +%Hh%M:%S + started=17h04:11 + echo '17h04:11 STARTING: buildpacks-phases/0-2 ' 17h04:11 STARTING: buildpacks-phases/0-2 + kubectl -n buildpacks-phases-0-2 create -f task/buildpacks-phases/0.2/buildpacks-phases.yaml --dry-run=client -o yaml + [[ -f task/buildpacks-phases/0.2/tests/pre-apply-task-hook.sh ]] + source task/buildpacks-phases/0.2/tests/pre-apply-task-hook.sh ++ add_sidecar_registry /tmp/.mm.2R3qPA ++ add_sidecars /tmp/.mm.2R3qPA '{'\''image'\'':registry, '\''name'\'': '\''registry'\''}' ++ cp /tmp/.mm.2R3qPA /tmp/.mm.2R3qPA.read ++ SCRIPT=' import sys, yaml f=open(0, encoding="utf-8") data=yaml.load(f.read(), Loader=yaml.FullLoader) sidecars = map(lambda v: yaml.safe_load(v), sys.argv[1:]) # after -c for sidecar in sidecars: if "sidecars" in data["spec"]: data["spec"]["sidecars"].append(sidecar) else: data["spec"]["sidecars"] = [sidecar] print(yaml.dump(data, default_flow_style=False)) ' ++ cat /tmp/.mm.2R3qPA.read ++ python3 -c ' import sys, yaml f=open(0, encoding="utf-8") data=yaml.load(f.read(), Loader=yaml.FullLoader) sidecars = map(lambda v: yaml.safe_load(v), sys.argv[1:]) # after -c for sidecar in sidecars: if "sidecars" in data["spec"]: data["spec"]["sidecars"].append(sidecar) else: data["spec"]["sidecars"] = [sidecar] print(yaml.dump(data, default_flow_style=False)) ' '{'\''image'\'':registry, '\''name'\'': '\''registry'\''}' ++ rm -f /tmp/.mm.2R3qPA.read ++ add_task git-clone latest ++ local array path_version task ++ task=git-clone ++ [[ latest == \l\a\t\e\s\t ]] ++ array=($(echo task/${task}/*/ | sort -u)) +++ sort -u +++ echo task/git-clone/0.1/ task/git-clone/0.10/ task/git-clone/0.2/ task/git-clone/0.3/ task/git-clone/0.4/ task/git-clone/0.5/ task/git-clone/0.6/ task/git-clone/0.7/ task/git-clone/0.8/ task/git-clone/0.9/ ++ path_version=task/git-clone/0.9/ ++ kubectl -n buildpacks-phases-0-2 apply -f task/git-clone/0.9//git-clone.yaml task.tekton.dev/git-clone created + function_exists pre-apply-task-hook ++ type -t pre-apply-task-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + [[ -d task/buildpacks-phases/0.2/tests/fixtures ]] + kubectl -n buildpacks-phases-0-2 delete -f /tmp/.mm.2R3qPA + true + kubectl -n buildpacks-phases-0-2 create -f /tmp/.mm.2R3qPA task.tekton.dev/buildpacks-phases created + for yaml in ${runtest}/*.yaml + cp task/buildpacks-phases/0.2/tests/resources.yaml /tmp/.mm.2R3qPA + [[ -f task/buildpacks-phases/0.2/tests/pre-apply-taskrun-hook.sh ]] + function_exists pre-apply-taskrun-hook ++ type -t pre-apply-taskrun-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + kubectl -n buildpacks-phases-0-2 delete -f /tmp/.mm.2R3qPA + true + kubectl -n buildpacks-phases-0-2 create -f /tmp/.mm.2R3qPA persistentvolumeclaim/buildpacks-pvc created + for yaml in ${runtest}/*.yaml + cp task/buildpacks-phases/0.2/tests/run.yaml /tmp/.mm.2R3qPA + [[ -f task/buildpacks-phases/0.2/tests/pre-apply-taskrun-hook.sh ]] + function_exists pre-apply-taskrun-hook ++ type -t pre-apply-taskrun-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + kubectl -n buildpacks-phases-0-2 delete -f /tmp/.mm.2R3qPA + true + kubectl -n buildpacks-phases-0-2 create -f /tmp/.mm.2R3qPA pipeline.tekton.dev/buildpacks-phases-test-pipeline created pipelinerun.tekton.dev/buildpacks-phases-test-pipeline-run created + resource_to_wait_for["$testname/${version}"]='buildpacks-phases-0-2|17h04:11' + for runtest in $@ + local runtestdir=buildpacks-phases/0.3/tests + local testname=buildpacks-phases ++++ dirname task/buildpacks-phases/0.3/tests +++ basename task/buildpacks-phases/0.3 ++ basename 0.3 + local version=0.3 + [[ 0.3 =~ ^[0-9]+\.[0-9]+$ ]] ++ tr . - ++ echo 0.3 + version=0-3 + local tns=buildpacks-phases-0-3 + local skipit= + for ignore in ${TEST_TASKRUN_IGNORES} + [[ maven == buildpacks-phases ]] + local resourcedir=task/buildpacks-phases/0.3 + '[' '!' -d task/buildpacks-phases/0.3/tests ']' + ls task/buildpacks-phases/0.3/buildpacks-phases.yaml + cat task/buildpacks-phases/0.3/buildpacks-phases.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + kubectl create namespace buildpacks-phases-0-3 ++ printf task/buildpacks-phases/0.3/buildpacks-phases.yaml + yaml=task/buildpacks-phases/0.3/buildpacks-phases.yaml ++ date +%Hh%M:%S + started=17h04:13 + echo '17h04:13 STARTING: buildpacks-phases/0-3 ' 17h04:13 STARTING: buildpacks-phases/0-3 + kubectl -n buildpacks-phases-0-3 create -f task/buildpacks-phases/0.3/buildpacks-phases.yaml --dry-run=client -o yaml + [[ -f task/buildpacks-phases/0.3/tests/pre-apply-task-hook.sh ]] + source task/buildpacks-phases/0.3/tests/pre-apply-task-hook.sh ++ add_sidecar_registry /tmp/.mm.2R3qPA ++ add_sidecars /tmp/.mm.2R3qPA '{'\''image'\'':registry, '\''name'\'': '\''registry'\''}' ++ cp /tmp/.mm.2R3qPA /tmp/.mm.2R3qPA.read ++ SCRIPT=' import sys, yaml f=open(0, encoding="utf-8") data=yaml.load(f.read(), Loader=yaml.FullLoader) sidecars = map(lambda v: yaml.safe_load(v), sys.argv[1:]) # after -c for sidecar in sidecars: if "sidecars" in data["spec"]: data["spec"]["sidecars"].append(sidecar) else: data["spec"]["sidecars"] = [sidecar] print(yaml.dump(data, default_flow_style=False)) ' ++ cat /tmp/.mm.2R3qPA.read ++ python3 -c ' import sys, yaml f=open(0, encoding="utf-8") data=yaml.load(f.read(), Loader=yaml.FullLoader) sidecars = map(lambda v: yaml.safe_load(v), sys.argv[1:]) # after -c for sidecar in sidecars: if "sidecars" in data["spec"]: data["spec"]["sidecars"].append(sidecar) else: data["spec"]["sidecars"] = [sidecar] print(yaml.dump(data, default_flow_style=False)) ' '{'\''image'\'':registry, '\''name'\'': '\''registry'\''}' ++ rm -f /tmp/.mm.2R3qPA.read + function_exists pre-apply-task-hook ++ type -t pre-apply-task-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + [[ -d task/buildpacks-phases/0.3/tests/fixtures ]] + kubectl -n buildpacks-phases-0-3 delete -f /tmp/.mm.2R3qPA + true + kubectl -n buildpacks-phases-0-3 create -f /tmp/.mm.2R3qPA task.tekton.dev/buildpacks-phases created + for yaml in ${runtest}/*.yaml + cp task/buildpacks-phases/0.3/tests/resources.yaml /tmp/.mm.2R3qPA + [[ -f task/buildpacks-phases/0.3/tests/pre-apply-taskrun-hook.sh ]] + function_exists pre-apply-taskrun-hook ++ type -t pre-apply-taskrun-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + kubectl -n buildpacks-phases-0-3 delete -f /tmp/.mm.2R3qPA + true + kubectl -n buildpacks-phases-0-3 create -f /tmp/.mm.2R3qPA persistentvolumeclaim/buildpacks-pvc created + for yaml in ${runtest}/*.yaml + cp task/buildpacks-phases/0.3/tests/run.yaml /tmp/.mm.2R3qPA + [[ -f task/buildpacks-phases/0.3/tests/pre-apply-taskrun-hook.sh ]] + function_exists pre-apply-taskrun-hook ++ type -t pre-apply-taskrun-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + kubectl -n buildpacks-phases-0-3 delete -f /tmp/.mm.2R3qPA + true + kubectl -n buildpacks-phases-0-3 create -f /tmp/.mm.2R3qPA serviceaccount/sa-without-creds created pipeline.tekton.dev/buildpacks-phases-test-pipeline created pipelinerun.tekton.dev/buildpacks-phases-test-pipeline-run created + resource_to_wait_for["$testname/${version}"]='buildpacks-phases-0-3|17h04:13' + for runtest in $@ + local runtestdir=buildpacks/0.1/tests + local testname=buildpacks ++++ dirname task/buildpacks/0.1/tests +++ basename task/buildpacks/0.1 ++ basename 0.1 + local version=0.1 + [[ 0.1 =~ ^[0-9]+\.[0-9]+$ ]] ++ echo 0.1 ++ tr . - + version=0-1 + local tns=buildpacks-0-1 + local skipit= + for ignore in ${TEST_TASKRUN_IGNORES} + [[ maven == buildpacks ]] + local resourcedir=task/buildpacks/0.1 + '[' '!' -d task/buildpacks/0.1/tests ']' + ls task/buildpacks/0.1/buildpacks.yaml + cat task/buildpacks/0.1/buildpacks.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in $@ + local runtestdir=buildpacks/0.2/tests + local testname=buildpacks ++++ dirname task/buildpacks/0.2/tests +++ basename task/buildpacks/0.2 ++ basename 0.2 + local version=0.2 + [[ 0.2 =~ ^[0-9]+\.[0-9]+$ ]] ++ echo 0.2 ++ tr . - + version=0-2 + local tns=buildpacks-0-2 + local skipit= + for ignore in ${TEST_TASKRUN_IGNORES} + [[ maven == buildpacks ]] + local resourcedir=task/buildpacks/0.2 + '[' '!' -d task/buildpacks/0.2/tests ']' + ls task/buildpacks/0.2/buildpacks.yaml + cat task/buildpacks/0.2/buildpacks.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in $@ + local runtestdir=buildpacks/0.3/tests + local testname=buildpacks ++++ dirname task/buildpacks/0.3/tests +++ basename task/buildpacks/0.3 ++ basename 0.3 + local version=0.3 + [[ 0.3 =~ ^[0-9]+\.[0-9]+$ ]] ++ tr . - ++ echo 0.3 + version=0-3 + local tns=buildpacks-0-3 + local skipit= + for ignore in ${TEST_TASKRUN_IGNORES} + [[ maven == buildpacks ]] + local resourcedir=task/buildpacks/0.3 + '[' '!' -d task/buildpacks/0.3/tests ']' + ls task/buildpacks/0.3/buildpacks.yaml + grep 'tekton.dev/deprecated: \"true\"' + cat task/buildpacks/0.3/buildpacks.yaml + [[ -n '' ]] + [[ -n '' ]] + kubectl create namespace buildpacks-0-3 ++ printf task/buildpacks/0.3/buildpacks.yaml + yaml=task/buildpacks/0.3/buildpacks.yaml ++ date +%Hh%M:%S + started=17h04:14 + echo '17h04:14 STARTING: buildpacks/0-3 ' 17h04:14 STARTING: buildpacks/0-3 + kubectl -n buildpacks-0-3 create -f task/buildpacks/0.3/buildpacks.yaml --dry-run=client -o yaml + [[ -f task/buildpacks/0.3/tests/pre-apply-task-hook.sh ]] + source task/buildpacks/0.3/tests/pre-apply-task-hook.sh ++ add_sidecar_registry /tmp/.mm.2R3qPA ++ add_sidecars /tmp/.mm.2R3qPA '{'\''image'\'':registry, '\''name'\'': '\''registry'\''}' ++ cp /tmp/.mm.2R3qPA /tmp/.mm.2R3qPA.read ++ SCRIPT=' import sys, yaml f=open(0, encoding="utf-8") data=yaml.load(f.read(), Loader=yaml.FullLoader) sidecars = map(lambda v: yaml.safe_load(v), sys.argv[1:]) # after -c for sidecar in sidecars: if "sidecars" in data["spec"]: data["spec"]["sidecars"].append(sidecar) else: data["spec"]["sidecars"] = [sidecar] print(yaml.dump(data, default_flow_style=False)) ' ++ python3 -c ' import sys, yaml f=open(0, encoding="utf-8") data=yaml.load(f.read(), Loader=yaml.FullLoader) sidecars = map(lambda v: yaml.safe_load(v), sys.argv[1:]) # after -c for sidecar in sidecars: if "sidecars" in data["spec"]: data["spec"]["sidecars"].append(sidecar) else: data["spec"]["sidecars"] = [sidecar] print(yaml.dump(data, default_flow_style=False)) ' '{'\''image'\'':registry, '\''name'\'': '\''registry'\''}' ++ cat /tmp/.mm.2R3qPA.read ++ rm -f /tmp/.mm.2R3qPA.read ++ add_task git-clone latest ++ local array path_version task ++ task=git-clone ++ [[ latest == \l\a\t\e\s\t ]] ++ array=($(echo task/${task}/*/ | sort -u)) +++ echo task/git-clone/0.1/ task/git-clone/0.10/ task/git-clone/0.2/ task/git-clone/0.3/ task/git-clone/0.4/ task/git-clone/0.5/ task/git-clone/0.6/ task/git-clone/0.7/ task/git-clone/0.8/ task/git-clone/0.9/ +++ sort -u ++ path_version=task/git-clone/0.9/ ++ kubectl -n buildpacks-0-3 apply -f task/git-clone/0.9//git-clone.yaml task.tekton.dev/git-clone created + function_exists pre-apply-task-hook ++ type -t pre-apply-task-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + [[ -d task/buildpacks/0.3/tests/fixtures ]] + kubectl -n buildpacks-0-3 delete -f /tmp/.mm.2R3qPA + true + kubectl -n buildpacks-0-3 create -f /tmp/.mm.2R3qPA task.tekton.dev/buildpacks created + for yaml in ${runtest}/*.yaml + cp task/buildpacks/0.3/tests/resources.yaml /tmp/.mm.2R3qPA + [[ -f task/buildpacks/0.3/tests/pre-apply-taskrun-hook.sh ]] + function_exists pre-apply-taskrun-hook ++ type -t pre-apply-taskrun-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + kubectl -n buildpacks-0-3 delete -f /tmp/.mm.2R3qPA + true + kubectl -n buildpacks-0-3 create -f /tmp/.mm.2R3qPA persistentvolumeclaim/buildpacks-pvc created + for yaml in ${runtest}/*.yaml + cp task/buildpacks/0.3/tests/run.yaml /tmp/.mm.2R3qPA + [[ -f task/buildpacks/0.3/tests/pre-apply-taskrun-hook.sh ]] + function_exists pre-apply-taskrun-hook ++ type -t pre-apply-taskrun-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + kubectl -n buildpacks-0-3 delete -f /tmp/.mm.2R3qPA + true + kubectl -n buildpacks-0-3 create -f /tmp/.mm.2R3qPA pipeline.tekton.dev/buildpacks-test-pipeline created pipelinerun.tekton.dev/buildpacks-test-pipeline-run created + resource_to_wait_for["$testname/${version}"]='buildpacks-0-3|17h04:14' + local cnt=0 + local all_status= + local reason= + local maxloop=60 + set +x 17h04:07::17h04:50 SUCCESS: buildah/0-8 testrun has successfully executed 17h04:09::17h05:03 SUCCESS: buildah/0-9 testrun has successfully executed FAILED: buildpacks-phases/0-3 task has failed to comeback properly NAME SHORTNAMES APIVERSION NAMESPACED KIND bindings v1 true Binding componentstatuses cs v1 false ComponentStatus configmaps cm v1 true ConfigMap endpoints ep v1 true Endpoints events ev v1 true Event limitranges limits v1 true LimitRange namespaces ns v1 false Namespace nodes no v1 false Node persistentvolumeclaims pvc v1 true PersistentVolumeClaim persistentvolumes pv v1 false PersistentVolume pods po v1 true Pod podtemplates v1 true PodTemplate replicationcontrollers rc v1 true ReplicationController resourcequotas quota v1 true ResourceQuota secrets v1 true Secret serviceaccounts sa v1 true ServiceAccount services svc v1 true Service mutatingwebhookconfigurations admissionregistration.k8s.io/v1 false MutatingWebhookConfiguration validatingwebhookconfigurations admissionregistration.k8s.io/v1 false ValidatingWebhookConfiguration customresourcedefinitions crd,crds apiextensions.k8s.io/v1 false CustomResourceDefinition apiservices apiregistration.k8s.io/v1 false APIService controllerrevisions apps/v1 true ControllerRevision daemonsets ds apps/v1 true DaemonSet deployments deploy apps/v1 true Deployment replicasets rs apps/v1 true ReplicaSet statefulsets sts apps/v1 true StatefulSet selfsubjectreviews authentication.k8s.io/v1 false SelfSubjectReview tokenreviews authentication.k8s.io/v1 false TokenReview localsubjectaccessreviews authorization.k8s.io/v1 true LocalSubjectAccessReview selfsubjectaccessreviews authorization.k8s.io/v1 false SelfSubjectAccessReview selfsubjectrulesreviews authorization.k8s.io/v1 false SelfSubjectRulesReview subjectaccessreviews authorization.k8s.io/v1 false SubjectAccessReview horizontalpodautoscalers hpa autoscaling/v2 true HorizontalPodAutoscaler cronjobs cj batch/v1 true CronJob jobs batch/v1 true Job certificatesigningrequests csr certificates.k8s.io/v1 false CertificateSigningRequest leases coordination.k8s.io/v1 true Lease endpointslices discovery.k8s.io/v1 true EndpointSlice events ev events.k8s.io/v1 true Event flowschemas flowcontrol.apiserver.k8s.io/v1beta3 false FlowSchema prioritylevelconfigurations flowcontrol.apiserver.k8s.io/v1beta3 false PriorityLevelConfiguration addresspools metallb.io/v1beta1 true AddressPool bfdprofiles metallb.io/v1beta1 true BFDProfile bgpadvertisements metallb.io/v1beta1 true BGPAdvertisement bgppeers metallb.io/v1beta2 true BGPPeer communities metallb.io/v1beta1 true Community ipaddresspools metallb.io/v1beta1 true IPAddressPool l2advertisements metallb.io/v1beta1 true L2Advertisement ingressclasses networking.k8s.io/v1 false IngressClass ingresses ing networking.k8s.io/v1 true Ingress networkpolicies netpol networking.k8s.io/v1 true NetworkPolicy runtimeclasses node.k8s.io/v1 false RuntimeClass poddisruptionbudgets pdb policy/v1 true PodDisruptionBudget clusterrolebindings rbac.authorization.k8s.io/v1 false ClusterRoleBinding clusterroles rbac.authorization.k8s.io/v1 false ClusterRole rolebindings rbac.authorization.k8s.io/v1 true RoleBinding roles rbac.authorization.k8s.io/v1 true Role resolutionrequests resolutionrequest,resolutionrequests resolution.tekton.dev/v1beta1 true ResolutionRequest priorityclasses pc scheduling.k8s.io/v1 false PriorityClass csidrivers storage.k8s.io/v1 false CSIDriver csinodes storage.k8s.io/v1 false CSINode csistoragecapacities storage.k8s.io/v1 true CSIStorageCapacity storageclasses sc storage.k8s.io/v1 false StorageClass volumeattachments storage.k8s.io/v1 false VolumeAttachment customruns tekton.dev/v1beta1 true CustomRun pipelineruns pr,prs tekton.dev/v1 true PipelineRun pipelines tekton.dev/v1 true Pipeline stepactions tekton.dev/v1beta1 true StepAction taskruns tr,trs tekton.dev/v1 true TaskRun tasks tekton.dev/v1 true Task verificationpolicies tekton.dev/v1alpha1 true VerificationPolicy Namespace: buildpacks-phases-0-3 --- TaskRun Dump apiVersion: v1 items: - apiVersion: tekton.dev/v1 kind: TaskRun metadata: annotations: pipeline.tekton.dev/affinity-assistant: affinity-assistant-2533167c5a pipeline.tekton.dev/release: 43c0bb9 tekton.dev/categories: Git tekton.dev/displayName: git clone tekton.dev/pipelines.minVersion: 0.38.0 tekton.dev/platforms: linux/amd64,linux/s390x,linux/ppc64le,linux/arm64 tekton.dev/tags: git creationTimestamp: "2025-07-16T17:04:16Z" generation: 1 labels: app.kubernetes.io/managed-by: tekton-pipelines app.kubernetes.io/version: "0.9" tekton.dev/memberOf: tasks tekton.dev/pipeline: buildpacks-phases-test-pipeline tekton.dev/pipelineRun: buildpacks-phases-test-pipeline-run tekton.dev/pipelineRunUID: 60287447-bc11-4b70-ba4e-569c8a8fb57f tekton.dev/pipelineTask: fetch-repository tekton.dev/task: git-clone name: buildpacks-phases-test-pipeline-run-fetch-repository namespace: buildpacks-phases-0-3 ownerReferences: - apiVersion: tekton.dev/v1 blockOwnerDeletion: true controller: true kind: PipelineRun name: buildpacks-phases-test-pipeline-run uid: 60287447-bc11-4b70-ba4e-569c8a8fb57f resourceVersion: "8554" uid: 325940c2-b900-4ccc-89ca-9b6bd6f336f3 spec: params: - name: url value: https://github.com/buildpacks/samples - name: subdirectory value: "" - name: deleteExisting value: "true" serviceAccountName: sa-without-creds taskRef: params: - name: url value: https://github.com/tektoncd/catalog.git - name: revision value: main - name: pathInRepo value: task/git-clone/0.9/git-clone.yaml resolver: git timeout: 1h0m0s workspaces: - name: output persistentVolumeClaim: claimName: buildpacks-pvc subPath: source status: completionTime: "2025-07-16T17:04:39Z" conditions: - lastTransitionTime: "2025-07-16T17:04:39Z" message: 'the step "clone" in TaskRun "buildpacks-phases-test-pipeline-run-fetch-repository" failed to pull the image "". The pod errored with the message: "Back-off pulling image "gcr.io/tekton-releases/github.com/tektoncd/pipeline/cmd/git-init:v0.40.2"."' reason: TaskRunImagePullFailed status: "False" type: Succeeded podName: buildpacks-phases-test-pipeline-run-fetch-repository-pod provenance: featureFlags: awaitSidecarReadiness: true coschedule: workspaces enableAPIFields: beta enableProvenanceInStatus: true enforceNonfalsifiability: none maxResultSize: 4096 resultExtractionMethod: termination-message runningInEnvWithInjectedSidecars: true verificationNoMatchPolicy: ignore refSource: digest: sha1: c0af2a65816543066849335acda68393e9685418 entryPoint: task/git-clone/0.9/git-clone.yaml uri: git+https://github.com/tektoncd/catalog.git startTime: "2025-07-16T17:04:16Z" steps: - container: step-clone name: clone terminated: exitCode: 1 finishedAt: "2025-07-16T17:04:39Z" message: Step clone terminated as pod buildpacks-phases-test-pipeline-run-fetch-repository-pod is terminated reason: TaskRunImagePullFailed startedAt: "2025-07-16T17:04:16Z" terminationReason: TaskRunImagePullFailed taskSpec: description: |- These Tasks are Git tasks to work with repositories used by other tasks in your Pipeline. The git-clone Task will clone a repo from the provided url into the output Workspace. By default the repo will be cloned into the root of your Workspace. You can clone into a subdirectory by setting this Task's subdirectory param. This Task also supports sparse checkouts. To perform a sparse checkout, pass a list of comma separated directory patterns to this Task's sparseCheckoutDirectories param. params: - description: Repository URL to clone from. name: url type: string - default: "" description: Revision to checkout. (branch, tag, sha, ref, etc...) name: revision type: string - default: "" description: Refspec to fetch before checking out revision. name: refspec type: string - default: "true" description: Initialize and fetch git submodules. name: submodules type: string - default: "1" description: Perform a shallow clone, fetching only the most recent N commits. name: depth type: string - default: "true" description: Set the `http.sslVerify` global git config. Setting this to `false` is not advised unless you are sure that you trust your git remote. name: sslVerify type: string - default: ca-bundle.crt description: file name of mounted crt using ssl-ca-directory workspace. default value is ca-bundle.crt. name: crtFileName type: string - default: "" description: Subdirectory inside the `output` Workspace to clone the repo into. name: subdirectory type: string - default: "" description: Define the directory patterns to match or exclude when performing a sparse checkout. name: sparseCheckoutDirectories type: string - default: "true" description: Clean out the contents of the destination directory if it already exists before cloning. name: deleteExisting type: string - default: "" description: HTTP proxy server for non-SSL requests. name: httpProxy type: string - default: "" description: HTTPS proxy server for SSL requests. name: httpsProxy type: string - default: "" description: Opt out of proxying HTTP/HTTPS requests. name: noProxy type: string - default: "true" description: Log the commands that are executed during `git-clone`'s operation. name: verbose type: string - default: gcr.io/tekton-releases/github.com/tektoncd/pipeline/cmd/git-init:v0.40.2 description: The image providing the git-init binary that this Task runs. name: gitInitImage type: string - default: /home/git description: | Absolute path to the user's home directory. name: userHome type: string results: - description: The precise commit SHA that was fetched by this Task. name: commit type: string - description: The precise URL that was fetched by this Task. name: url type: string - description: The epoch timestamp of the commit that was fetched by this Task. name: committer-date type: string steps: - computeResources: {} env: - name: HOME value: /home/git - name: PARAM_URL value: https://github.com/buildpacks/samples - name: PARAM_REVISION - name: PARAM_REFSPEC - name: PARAM_SUBMODULES value: "true" - name: PARAM_DEPTH value: "1" - name: PARAM_SSL_VERIFY value: "true" - name: PARAM_CRT_FILENAME value: ca-bundle.crt - name: PARAM_SUBDIRECTORY - name: PARAM_DELETE_EXISTING value: "true" - name: PARAM_HTTP_PROXY - name: PARAM_HTTPS_PROXY - name: PARAM_NO_PROXY - name: PARAM_VERBOSE value: "true" - name: PARAM_SPARSE_CHECKOUT_DIRECTORIES - name: PARAM_USER_HOME value: /home/git - name: WORKSPACE_OUTPUT_PATH value: /workspace/output - name: WORKSPACE_SSH_DIRECTORY_BOUND value: "false" - name: WORKSPACE_SSH_DIRECTORY_PATH - name: WORKSPACE_BASIC_AUTH_DIRECTORY_BOUND value: "false" - name: WORKSPACE_BASIC_AUTH_DIRECTORY_PATH - name: WORKSPACE_SSL_CA_DIRECTORY_BOUND value: "false" - name: WORKSPACE_SSL_CA_DIRECTORY_PATH image: gcr.io/tekton-releases/github.com/tektoncd/pipeline/cmd/git-init:v0.40.2 name: clone script: | #!/usr/bin/env sh set -eu if [ "${PARAM_VERBOSE}" = "true" ] ; then set -x fi if [ "${WORKSPACE_BASIC_AUTH_DIRECTORY_BOUND}" = "true" ] ; then cp "${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.git-credentials" "${PARAM_USER_HOME}/.git-credentials" cp "${WORKSPACE_BASIC_AUTH_DIRECTORY_PATH}/.gitconfig" "${PARAM_USER_HOME}/.gitconfig" chmod 400 "${PARAM_USER_HOME}/.git-credentials" chmod 400 "${PARAM_USER_HOME}/.gitconfig" fi if [ "${WORKSPACE_SSH_DIRECTORY_BOUND}" = "true" ] ; then cp -R "${WORKSPACE_SSH_DIRECTORY_PATH}" "${PARAM_USER_HOME}"/.ssh chmod 700 "${PARAM_USER_HOME}"/.ssh chmod -R 400 "${PARAM_USER_HOME}"/.ssh/* fi if [ "${WORKSPACE_SSL_CA_DIRECTORY_BOUND}" = "true" ] ; then export GIT_SSL_CAPATH="${WORKSPACE_SSL_CA_DIRECTORY_PATH}" if [ "${PARAM_CRT_FILENAME}" != "" ] ; then export GIT_SSL_CAINFO="${WORKSPACE_SSL_CA_DIRECTORY_PATH}/${PARAM_CRT_FILENAME}" fi fi CHECKOUT_DIR="${WORKSPACE_OUTPUT_PATH}/${PARAM_SUBDIRECTORY}" cleandir() { # Delete any existing contents of the repo directory if it exists. # # We don't just "rm -rf ${CHECKOUT_DIR}" because ${CHECKOUT_DIR} might be "/" # or the root of a mounted volume. if [ -d "${CHECKOUT_DIR}" ] ; then # Delete non-hidden files and directories rm -rf "${CHECKOUT_DIR:?}"/* # Delete files and directories starting with . but excluding .. rm -rf "${CHECKOUT_DIR}"/.[!.]* # Delete files and directories starting with .. plus any other character rm -rf "${CHECKOUT_DIR}"/..?* fi } if [ "${PARAM_DELETE_EXISTING}" = "true" ] ; then cleandir || true fi test -z "${PARAM_HTTP_PROXY}" || export HTTP_PROXY="${PARAM_HTTP_PROXY}" test -z "${PARAM_HTTPS_PROXY}" || export HTTPS_PROXY="${PARAM_HTTPS_PROXY}" test -z "${PARAM_NO_PROXY}" || export NO_PROXY="${PARAM_NO_PROXY}" git config --global --add safe.directory "${WORKSPACE_OUTPUT_PATH}" /ko-app/git-init \ -url="${PARAM_URL}" \ -revision="${PARAM_REVISION}" \ -refspec="${PARAM_REFSPEC}" \ -path="${CHECKOUT_DIR}" \ -sslVerify="${PARAM_SSL_VERIFY}" \ -submodules="${PARAM_SUBMODULES}" \ -depth="${PARAM_DEPTH}" \ -sparseCheckoutDirectories="${PARAM_SPARSE_CHECKOUT_DIRECTORIES}" cd "${CHECKOUT_DIR}" RESULT_SHA="$(git rev-parse HEAD)" EXIT_CODE="$?" if [ "${EXIT_CODE}" != 0 ] ; then exit "${EXIT_CODE}" fi RESULT_COMMITTER_DATE="$(git log -1 --pretty=%ct)" printf "%s" "${RESULT_COMMITTER_DATE}" > "/tekton/results/committer-date" printf "%s" "${RESULT_SHA}" > "/tekton/results/commit" printf "%s" "${PARAM_URL}" > "/tekton/results/url" securityContext: runAsNonRoot: true runAsUser: 65532 workspaces: - description: The git repo will be cloned onto the volume backing this Workspace. name: output - description: | A .ssh directory with private key, known_hosts, config, etc. Copied to the user's home before git commands are executed. Used to authenticate with the git remote when performing the clone. Binding a Secret to this Workspace is strongly recommended over other volume types. name: ssh-directory optional: true - description: | A Workspace containing a .gitconfig and .git-credentials file. These will be copied to the user's home before any git commands are run. Any other files in this Workspace are ignored. It is strongly recommended to use ssh-directory over basic-auth whenever possible and to bind a Secret to this Workspace over other volume types. name: basic-auth optional: true - description: | A workspace containing CA certificates, this will be used by Git to verify the peer with when fetching or pushing over HTTPS. name: ssl-ca-directory optional: true kind: List metadata: resourceVersion: "" --- Task Dump apiVersion: v1 items: - apiVersion: tekton.dev/v1 kind: Task metadata: annotations: tekton.dev/categories: Image Build, Security tekton.dev/displayName: Buildpacks phases tekton.dev/pipelines.minVersion: 0.62.0 tekton.dev/platforms: linux/amd64 tekton.dev/tags: image-build creationTimestamp: "2025-07-16T17:04:13Z" generation: 1 labels: app.kubernetes.io/version: "0.3" name: buildpacks-phases namespace: buildpacks-phases-0-3 resourceVersion: "7672" uid: d1f30566-0489-4871-92d1-c9062f550dcc spec: description: |- The Buildpacks-Phases task builds source into a container image and pushes it to a registry, using Cloud Native Buildpacks - https://buildpacks.io/. This task separately calls the aspects of the Cloud Native Buildpacks lifecycle, to provide increased security via container isolation. When the builder image includes extensions (= Dockerfiles), then this task will execute them. That allows to by example install packages, rpm, etc and to customize the build process according to your needs. This task supports the Platform spec 0.13: https://github.com/buildpacks/spec/blob/platform/v0.13/platform.md params: - default: "" description: Reference to the current build image in an OCI registry (if used must be provided) name: CNB_BUILD_IMAGE type: string - description: The Builder image which includes the lifecycle tool, the buildpacks and metadata. name: CNB_BUILDER_IMAGE type: string - default: "" description: Reference to a cache image in an OCI registry (if no cache workspace is provided). name: CNB_CACHE_IMAGE type: string - default: [] description: Environment variables to set during _build-time_. name: CNB_ENV_VARS type: array - default: silent description: Control the lifecycle's execution according to the mode silent, warn, error for the experimental features. name: CNB_EXPERIMENTAL_MODE type: string - default: "" description: The group ID of the builder image user. name: CNB_GROUP_ID type: string - default: "" description: List of registries separated by a comma having a self-signed certificate where TLS verification will be skipped. name: CNB_INSECURE_REGISTRIES type: string - default: /layers description: Path to layers directory name: CNB_LAYERS_DIR type: string - default: info description: Logging level values info, warning, error, debug name: CNB_LOG_LEVEL type: string - default: "0.13" description: Buildpack Platform API supported by the Tekton task name: CNB_PLATFORM_API_SUPPORTED type: string - default: "" description: User's Buildpack Platform API name: CNB_PLATFORM_API type: string - default: /platform description: Path to the platform directory name: CNB_PLATFORM_DIR type: string - default: web description: Default process type to set in the exported image name: CNB_PROCESS_TYPE type: string - default: "" description: Reference to an image which is packaging the application runtime to be launched. name: CNB_RUN_IMAGE type: string - default: "false" description: Do not restore SBOM layer from previous image name: CNB_SKIP_LAYERS type: string - default: "" description: The user ID of the builder image user. name: CNB_USER_ID type: string - description: The name of the container image for your application. name: APP_IMAGE type: string - default: "" description: A subpath within the `source` input where the source to build is located. name: SOURCE_SUBPATH type: string - default: "" description: Additional tag to apply to the exported image name: TAGS type: string - default: /tekton/home description: Absolute path to the user's home directory. name: USER_HOME type: string - default: quay.io/halkyonio/skopeo-jq:0.1.3@sha256:1b3d21ad541227dc9d3e793d18cef9eb00a969c0c01eb09cab88997bc63680c6 description: Image packaging tools like skopeo and jq to inspect the builder images name: INSPECT_TOOLS_IMAGE type: string results: - description: The digest of the built `APP_IMAGE`. name: APP_IMAGE_DIGEST type: string sidecars: - computeResources: {} image: registry name: registry stepTemplate: computeResources: {} env: - name: CNB_EXPERIMENTAL_MODE value: $(params.CNB_EXPERIMENTAL_MODE) - name: HOME value: $(params.USER_HOME) steps: - computeResources: {} env: - name: PARAM_VERBOSE value: $(params.CNB_LOG_LEVEL) - name: PARAM_BUILDER_IMAGE value: $(params.CNB_BUILDER_IMAGE) - name: PARAM_CNB_PLATFORM_API value: $(params.CNB_PLATFORM_API) - name: PARAM_CNB_PLATFORM_API_SUPPORTED value: $(params.CNB_PLATFORM_API_SUPPORTED) image: $(params.INSPECT_TOOLS_IMAGE) name: get-labels-and-env onError: stopAndFail results: - description: UID of the user specified in the Builder image name: UID - description: GID of the user specified in the Builder image name: GID - description: 'Extensions labels: io.buildpacks.extension.layers defined in the Builder image' name: EXTENSION_LABELS - description: The CNB_PLATFORM_API to be used by lifecycle and verified against the one supported by this task name: CNB_PLATFORM_API script: | #!/usr/bin/env bash set -eu if [ "${PARAM_VERBOSE}" = "debug" ] ; then set -x fi echo # Check if registry creds docker file has been mounted from a secret" if [[ -f "$HOME/.docker/config.json" ]]; then printf %"s\n" "The docker config.json file exists !" else printf %"s\n" "!!!!! Warning: No registry credentials file exist. So it could be possible that the task will fail due to docker rate limit, etc !!!" fi printf %"s\n" "Remove the @sha from the image as not supported by skopeo to inspect an image" CLEANED_IMAGE="${PARAM_BUILDER_IMAGE%@*}" EXT_LABEL_1="io.buildpacks.extension.layers" EXT_LABEL_2="io.buildpacks.buildpack.order-extensions" BUILDER_LABEL="io.buildpacks.builder.metadata" IMG_MANIFEST=$(skopeo inspect --authfile $HOME/.docker/config.json "docker://${CLEANED_IMAGE}") # # The following test should be reviewed as : # # 1) we get from non ubi images a {} value as you can see hereafter # "io.buildpacks.extension.layers": "{}", # # 2) Do we have to check the content of this label too ? # "io.buildpacks.buildpack.order-extensions": "null", # IMG_LABELS=$(echo $IMG_MANIFEST | jq -e '.Labels') if [[ $(echo "$IMG_LABELS" | jq -r '.["'${BUILDER_LABEL}'"]') != "{}" ]] > /dev/null; then printf %"s\n" "## The builder image ${PARAM_BUILDER_IMAGE} includes the label: \"${BUILDER_LABEL}\" :" builderLabel=$(echo -n "$IMG_LABELS" | jq -r '.["'${BUILDER_LABEL}'"]') platforms=($(echo $builderLabel | jq -r '.lifecycle.apis.platform.supported')) printf %"s\n" "Lifecycle platforms API supported: ${platforms[@]}" CNB_PLATFORM_API=${PARAM_CNB_PLATFORM_API:-$PARAM_CNB_PLATFORM_API_SUPPORTED} echo "Platform API selected: $CNB_PLATFORM_API" printf %"s\n" "Platform API supported by this task: $PARAM_CNB_PLATFORM_API_SUPPORTED" if [[ "${platforms[@]}" =~ "$CNB_PLATFORM_API" && "$CNB_PLATFORM_API" == "$PARAM_CNB_PLATFORM_API_SUPPORTED" ]]; then echo -n "$CNB_PLATFORM_API" > "$(step.results.CNB_PLATFORM_API.path)" printf %"s\n" "$CNB_PLATFORM_API is in the list of the platform supported by lifecycle like also this Tekton task :-)" else echo "$PARAM_CNB_PLATFORM_API is not in the list of the supported platform by lifecycle or is not supported by this tekton task: ${PARAM_CNB_PLATFORM_API_SUPPORTED} !" exit 1 fi fi if [[ $(echo "$IMG_LABELS" | jq -r '.["'${EXT_LABEL_1}'"]') != "{}" ]] > /dev/null; then echo "## The builder image ${PARAM_BUILDER_IMAGE} includes some extensions as the extension label \"${EXT_LABEL_1}\" is NOT empty:" echo -n "$IMG_LABELS" | jq -r '.["'${EXT_LABEL_1}'"]' | tee "$(step.results.EXTENSION_LABELS.path)" echo "" else echo "## The builder image ${PARAM_BUILDER_IMAGE} dot not include extensions as the extension label \"${EXT_LABEL_1}\" is empty !" echo -n "empty" | tee "$(step.results.EXTENSION_LABELS.path)" fi CNB_USER_ID=$(echo $IMG_MANIFEST | jq -r '.Env' | jq -r '.[] | select(test("^CNB_USER_ID="))' | cut -d '=' -f 2) CNB_GROUP_ID=$(echo $IMG_MANIFEST | jq -r '.Env' | jq -r '.[] | select(test("^CNB_GROUP_ID="))' | cut -d '=' -f 2) echo "## The CNB_USER_ID & CNB_GROUP_ID defined within the builder image: ${PARAM_BUILDER_IMAGE} are:" echo -n "$CNB_USER_ID" | tee "$(step.results.UID.path)" echo "" echo -n "$CNB_GROUP_ID" | tee "$(step.results.GID.path)" - args: - --env-vars - $(params.CNB_ENV_VARS[*]) computeResources: {} env: - name: CNB_USER_ID value: $(steps.get-labels-and-env.results.UID) - name: CNB_GROUP_ID value: $(steps.get-labels-and-env.results.GID) image: registry.access.redhat.com/ubi8/ubi-minimal@sha256:b2a1bec3dfbc7a14a1d84d98934dfe8fdde6eb822a211286601cf109cbccb075 name: prepare script: | #!/usr/bin/env bash set -eu echo "CNB UID: $CNB_USER_ID" echo "CNB GID: $CNB_GROUP_ID" if [[ "$(workspaces.cache.bound)" == "true" ]]; then echo "--> Setting permissions on '$(workspaces.cache.path)'..." chown -R "$CNB_USER_ID:$CNB_GROUP_ID" "$(workspaces.cache.path)" fi echo "--> Creating .docker folder" mkdir -p "/tekton/home/.docker" for path in "/tekton/home" "/tekton/home/.docker" "/tekton/creds" "/layers" "$(workspaces.source.path)"; do echo "--> Setting permissions on '$path'..." chown -R "$CNB_USER_ID:$CNB_GROUP_ID" "$path" done echo "--> Parsing additional configuration..." parsing_flag="" envs=() for arg in "$@"; do if [[ "$arg" == "--env-vars" ]]; then echo "-> Parsing env variables..." parsing_flag="env-vars" elif [[ "$parsing_flag" == "env-vars" ]]; then envs+=("$arg") fi done echo "--> Processing any environment variables..." ENV_DIR="/platform/env" echo "--> Creating 'env' directory: $ENV_DIR" mkdir -p "$ENV_DIR" for env in "${envs[@]}"; do IFS='=' read -r key value string <<< "$env" if [[ "$key" != "" && "$value" != "" ]]; then path="${ENV_DIR}/${key}" echo "--> Writing ${path}..." echo -n "$value" > "$path" fi done echo "--> Content of $(params.CNB_PLATFORM_DIR)/env" ls -la $(params.CNB_PLATFORM_DIR)/env echo "--> Show the project cloned within the workspace ..." ls -la $(workspaces.source.path)/$(params.SOURCE_SUBPATH) volumeMounts: - mountPath: /layers name: layers-dir - mountPath: $(params.CNB_PLATFORM_DIR) name: platform-dir - args: - -log-level=$(params.CNB_LOG_LEVEL) - -layers=$(params.CNB_LAYERS_DIR) - -run-image=$(params.CNB_RUN_IMAGE) - -cache-image=$(params.CNB_CACHE_IMAGE) - -uid=$(steps.get-labels-and-env.results.UID) - -gid=$(steps.get-labels-and-env.results.GID) - -insecure-registry=$(params.CNB_INSECURE_REGISTRIES) - -tag=$(params.TAGS) - -skip-layers=$(params.CNB_SKIP_LAYERS) - $(params.APP_IMAGE) command: - /cnb/lifecycle/analyzer computeResources: {} env: - name: CNB_PLATFORM_API value: $(steps.get-labels-and-env.results.CNB_PLATFORM_API) image: $(params.CNB_BUILDER_IMAGE) imagePullPolicy: Always name: analyze volumeMounts: - mountPath: /layers name: layers-dir - args: - -log-level=$(params.CNB_LOG_LEVEL) - -app=$(workspaces.source.path)/$(params.SOURCE_SUBPATH) - -group=/layers/group.toml - -plan=/layers/plan.toml - -layers=$(params.CNB_LAYERS_DIR) - -platform=$(params.CNB_PLATFORM_DIR) command: - /cnb/lifecycle/detector computeResources: {} env: - name: CNB_PLATFORM_API value: $(steps.get-labels-and-env.results.CNB_PLATFORM_API) image: $(params.CNB_BUILDER_IMAGE) imagePullPolicy: Always name: detect volumeMounts: - mountPath: /layers name: layers-dir - mountPath: $(params.CNB_PLATFORM_DIR) name: platform-dir - mountPath: /tekton/home name: tekton-home-dir - computeResources: {} env: - name: UID value: $(steps.get-labels-and-env.results.UID) - name: GID value: $(steps.get-labels-and-env.results.GID) - name: CNB_LOG_LEVEL value: $(params.CNB_LOG_LEVEL) - name: CNB_BUILD_IMAGE value: $(params.CNB_BUILD_IMAGE) - name: CNB_BUILDER_IMAGE value: $(params.CNB_BUILDER_IMAGE) - name: CNB_CACHE_IMAGE value: $(params.CNB_CACHE_IMAGE) - name: CNB_INSECURE_REGISTRIES value: $(params.CNB_INSECURE_REGISTRIES) - name: CNB_SKIP_LAYERS value: $(params.CNB_SKIP_LAYERS) - name: CNB_PLATFORM_API value: $(steps.get-labels-and-env.results.CNB_PLATFORM_API) image: $(params.CNB_BUILDER_IMAGE) imagePullPolicy: Always name: restore script: | #!/usr/bin/env bash export BUILD_IMAGE=${CNB_BUILD_IMAGE:-${CNB_BUILDER_IMAGE}} /cnb/lifecycle/restorer \ -log-level=${CNB_LOG_LEVEL} \ -build-image=${BUILD_IMAGE} \ -group=/layers/group.toml \ -layers=${CNB_LAYERS_DIR} \ -cache-dir=$(workspaces.cache.path) \ -cache-image=${CNB_CACHE_IMAGE} \ -uid=${UID} \ -gid=${GID} \ -insecure-registry=${CNB_INSECURE_REGISTRIES} \ -skip-layers=${CNB_SKIP_LAYERS} volumeMounts: - mountPath: /layers name: layers-dir - mountPath: /kaniko name: kaniko-dir - args: - -log-level=$(params.CNB_LOG_LEVEL) - -app=$(workspaces.source.path)/$(params.SOURCE_SUBPATH) - -generated=/layers/generated - -uid=$(steps.get-labels-and-env.results.UID) - -gid=$(steps.get-labels-and-env.results.GID) - -platform=$(params.CNB_PLATFORM_DIR) command: - /cnb/lifecycle/extender computeResources: {} env: - name: CNB_PLATFORM_API value: $(steps.get-labels-and-env.results.CNB_PLATFORM_API) image: $(params.CNB_BUILDER_IMAGE) imagePullPolicy: Always name: extender securityContext: capabilities: add: - SYS_ADMIN - SETFCAP runAsGroup: 0 runAsUser: 0 volumeMounts: - mountPath: /layers name: layers-dir - mountPath: /kaniko name: kaniko-dir - mountPath: /tekton/home name: tekton-home-dir - mountPath: $(params.CNB_PLATFORM_DIR) name: platform-dir when: - input: $(steps.get-labels-and-env.results.EXTENSION_LABELS) operator: notin values: - empty - args: - -log-level=$(params.CNB_LOG_LEVEL) - -app=$(workspaces.source.path)/$(params.SOURCE_SUBPATH) - -layers=$(params.CNB_LAYERS_DIR) - -group=/layers/group.toml - -plan=/layers/plan.toml - -platform=$(params.CNB_PLATFORM_DIR) command: - /cnb/lifecycle/builder computeResources: {} env: - name: CNB_PLATFORM_API value: $(steps.get-labels-and-env.results.CNB_PLATFORM_API) image: $(params.CNB_BUILDER_IMAGE) imagePullPolicy: Always name: build volumeMounts: - mountPath: /layers name: layers-dir - mountPath: $(params.CNB_PLATFORM_DIR) name: platform-dir - mountPath: /tekton/home name: tekton-home-dir when: - input: $(steps.get-labels-and-env.results.EXTENSION_LABELS) operator: in values: - empty - args: - -log-level=$(params.CNB_LOG_LEVEL) - -app=$(workspaces.source.path)/$(params.SOURCE_SUBPATH) - -layers=$(params.CNB_LAYERS_DIR) - -group=/layers/group.toml - -cache-dir=$(workspaces.cache.path) - -cache-image=$(params.CNB_CACHE_IMAGE) - -report=/layers/report.toml - -process-type=$(params.CNB_PROCESS_TYPE) - -uid=$(steps.get-labels-and-env.results.UID) - -gid=$(steps.get-labels-and-env.results.GID) - -insecure-registry=$(params.CNB_INSECURE_REGISTRIES) - $(params.APP_IMAGE) command: - /cnb/lifecycle/exporter computeResources: {} env: - name: CNB_PLATFORM_API value: $(steps.get-labels-and-env.results.CNB_PLATFORM_API) image: $(params.CNB_BUILDER_IMAGE) imagePullPolicy: Always name: export volumeMounts: - mountPath: /layers name: layers-dir - computeResources: {} image: registry.access.redhat.com/ubi8/python-311@sha256:43605cb2491ef2297a7acf4b4bf0b7f54f0c91b96daf12ae41c49cc7f192b153 name: results script: | #!/usr/bin/env python3 import tomllib def write_to_file(filename, content): with open(filename, "w") as f: f.write(content) with open("/layers/report.toml", "rb") as f: data = tomllib.load(f) img_data = data.get("image") tags = img_data.get("tags") digest = img_data.get("digest") image_id = img_data.get("image_id") manifest_size = img_data.get("manifest_size") print("#### Image data ####") print(f"tags: {tags}") print(f"Digest: {digest}") if None not in (image_id, manifest_size): print(f"image container id (when using daemon): {image_id}, manifest size: {manifest_size}") write_to_file('$(results.APP_IMAGE_DIGEST.path)',digest) volumeMounts: - mountPath: /layers name: layers-dir volumes: - emptyDir: {} name: tekton-home-dir - emptyDir: {} name: layers-dir - emptyDir: {} name: kaniko-dir - emptyDir: {} name: platform-dir workspaces: - description: Directory where application source is located. name: source - description: Directory where cache is stored (when no cache image is provided). name: cache optional: true kind: List metadata: resourceVersion: "" --- PipelineRun Dump apiVersion: v1 items: - apiVersion: tekton.dev/v1 kind: PipelineRun metadata: creationTimestamp: "2025-07-16T17:04:14Z" generation: 1 labels: tekton.dev/pipeline: buildpacks-phases-test-pipeline name: buildpacks-phases-test-pipeline-run namespace: buildpacks-phases-0-3 resourceVersion: "8557" uid: 60287447-bc11-4b70-ba4e-569c8a8fb57f spec: pipelineRef: name: buildpacks-phases-test-pipeline taskRunTemplate: serviceAccountName: sa-without-creds timeouts: pipeline: 1h0m0s workspaces: - name: source-ws persistentVolumeClaim: claimName: buildpacks-pvc subPath: source status: childReferences: - apiVersion: tekton.dev/v1 kind: TaskRun name: buildpacks-phases-test-pipeline-run-fetch-repository pipelineTaskName: fetch-repository completionTime: "2025-07-16T17:04:39Z" conditions: - lastTransitionTime: "2025-07-16T17:04:39Z" message: 'Tasks Completed: 1 (Failed: 1, Cancelled 0), Skipped: 1' reason: Failed status: "False" type: Succeeded pipelineSpec: tasks: - name: fetch-repository params: - name: url value: https://github.com/buildpacks/samples - name: subdirectory value: "" - name: deleteExisting value: "true" taskRef: params: - name: url value: https://github.com/tektoncd/catalog.git - name: revision value: main - name: pathInRepo value: task/git-clone/0.9/git-clone.yaml resolver: git workspaces: - name: output workspace: source-ws - name: buildpacks-phases params: - name: APP_IMAGE value: localhost:5000/buildpacks-app - name: SOURCE_SUBPATH value: apps/java-maven - name: CNB_BUILDER_IMAGE value: paketobuildpacks/builder-ubi8-base:0.1.0@sha256:1ba4bf4b29abef28a0d364591becdc402a3bdec62662393b9457b2bd419f307b - name: CNB_ENV_VARS value: - BP_JVM_VERSION=21 runAfter: - fetch-repository taskRef: kind: Task name: buildpacks-phases workspaces: - name: source workspace: source-ws workspaces: - name: source-ws provenance: featureFlags: awaitSidecarReadiness: true coschedule: workspaces enableAPIFields: beta enableProvenanceInStatus: true enforceNonfalsifiability: none maxResultSize: 4096 resultExtractionMethod: termination-message runningInEnvWithInjectedSidecars: true verificationNoMatchPolicy: ignore skippedTasks: - name: buildpacks-phases reason: PipelineRun was stopping startTime: "2025-07-16T17:04:14Z" kind: List metadata: resourceVersion: "" --- Pipeline Dump apiVersion: v1 items: - apiVersion: tekton.dev/v1 kind: Pipeline metadata: creationTimestamp: "2025-07-16T17:04:14Z" generation: 1 name: buildpacks-phases-test-pipeline namespace: buildpacks-phases-0-3 resourceVersion: "7693" uid: d479fead-6eeb-4bc9-bf48-0e8c630efba0 spec: tasks: - name: fetch-repository params: - name: url value: https://github.com/buildpacks/samples - name: subdirectory value: "" - name: deleteExisting value: "true" taskRef: params: - name: url value: https://github.com/tektoncd/catalog.git - name: revision value: main - name: pathInRepo value: task/git-clone/0.9/git-clone.yaml resolver: git workspaces: - name: output workspace: source-ws - name: buildpacks-phases params: - name: APP_IMAGE value: localhost:5000/buildpacks-app - name: SOURCE_SUBPATH value: apps/java-maven - name: CNB_BUILDER_IMAGE value: paketobuildpacks/builder-ubi8-base:0.1.0@sha256:1ba4bf4b29abef28a0d364591becdc402a3bdec62662393b9457b2bd419f307b - name: CNB_ENV_VARS value: - BP_JVM_VERSION=21 runAfter: - fetch-repository taskRef: kind: Task name: buildpacks-phases workspaces: - name: source workspace: source-ws workspaces: - name: source-ws kind: List metadata: resourceVersion: "" --- StepAction Dump --- Container Logs + EXIT_VALUE=1 + set +o xtrace Cleaning up after docker in docker. ================================================================================ Cleaning up binfmt_misc ... ================================================================================ Done cleaning up after docker in docker.