Cloning into '/home/prow/go/src/github.com/google/licenseclassifier'... Docker in Docker enabled, initializing... ================================================================================ * Starting Docker: docker ...done. Waiting for docker to be ready, sleeping for 1 seconds. Cleaning up binfmt_misc ... ================================================================================ Done setting up docker in docker. Activated service account credentials for: [prow-account@tekton-releases.iam.gserviceaccount.com] == Running ./runner.sh backward compatibility test runner === + [[ 12 -ne 0 ]] + case $1 in ++ cut -d = -f2 + gcloud auth activate-service-account --key-file=/etc/test-account/service-account.json Activated service account credentials for: [prow-account@tekton-releases.iam.gserviceaccount.com] + shift + [[ 11 -ne 0 ]] + case $1 in + shift + [[ -- == \-\- ]] + shift + break + /usr/local/bin/kind-e2e --k8s-version v1.28.x --nodes 3 --e2e-script ./test/e2e-tests.sh --e2e-env ./test/e2e-tests-kind-prow.env + K8S_VERSION=v1.28.x + REGISTRY_NAME=registry.local + REGISTRY_PORT=5000 + CLUSTER_SUFFIX=cluster.local + NODE_COUNT=1 + REGISTRY_AUTH=0 + ESTARGZ_SUPPORT=0 + E2E_SCRIPT=test/e2e-tests.sh + E2E_ENV= + [[ 8 -ne 0 ]] + parameter=--k8s-version + case "${parameter}" in + shift + K8S_VERSION=v1.28.x + shift + [[ 6 -ne 0 ]] + parameter=--nodes + case "${parameter}" in + shift + NODE_COUNT=3 + shift + [[ 4 -ne 0 ]] + parameter=--e2e-script + case "${parameter}" in + shift + E2E_SCRIPT=./test/e2e-tests.sh + shift + [[ 2 -ne 0 ]] + parameter=--e2e-env + case "${parameter}" in + shift + E2E_ENV=./test/e2e-tests-kind-prow.env + shift + [[ 0 -ne 0 ]] + [[ ./test/e2e-tests-kind-prow.env != '' ]] + [[ ! -f ./test/e2e-tests-kind-prow.env ]] + case ${K8S_VERSION} in + K8S_VERSION=1.28.9 + KIND_IMAGE_SHA=sha256:dca54bc6a6079dd34699d53d7d4ffa2e853e46a20cd12d619a09207e35300bd0 + KIND_IMAGE=kindest/node:1.28.9@sha256:dca54bc6a6079dd34699d53d7d4ffa2e853e46a20cd12d619a09207e35300bd0 + echo '--- Setup KinD Cluster' --- Setup KinD Cluster + cat ++ seq 1 1 3 + for i in $(seq 1 1 "${NODE_COUNT}") + cat + for i in $(seq 1 1 "${NODE_COUNT}") + cat + for i in $(seq 1 1 "${NODE_COUNT}") + cat + cat ++ containerd_config ++ [[ 0 = \1 ]] ++ cat + echo '--- kind.yaml' --- kind.yaml + cat kind.yaml apiVersion: kind.x-k8s.io/v1alpha4 kind: Cluster nodes: - role: control-plane image: "kindest/node:1.28.9@sha256:dca54bc6a6079dd34699d53d7d4ffa2e853e46a20cd12d619a09207e35300bd0" - role: worker image: "kindest/node:1.28.9@sha256:dca54bc6a6079dd34699d53d7d4ffa2e853e46a20cd12d619a09207e35300bd0" - role: worker image: "kindest/node:1.28.9@sha256:dca54bc6a6079dd34699d53d7d4ffa2e853e46a20cd12d619a09207e35300bd0" - role: worker image: "kindest/node:1.28.9@sha256:dca54bc6a6079dd34699d53d7d4ffa2e853e46a20cd12d619a09207e35300bd0" kubeadmConfigPatches: # This is needed in order to support projected volumes with service account tokens. # See: https://kubernetes.slack.com/archives/CEKK1KTN2/p1600268272383600 - | apiVersion: kubeadm.k8s.io/v1beta2 kind: ClusterConfiguration metadata: name: config apiServer: extraArgs: "service-account-issuer": "kubernetes.default.svc" "service-account-signing-key-file": "/etc/kubernetes/pki/sa.key" networking: dnsDomain: "cluster.local" # This is needed to avoid filling our disk. # See: https://kubernetes.slack.com/archives/CEKK1KTN2/p1603391142276400 - | kind: KubeletConfiguration metadata: name: config imageGCHighThresholdPercent: 90 containerdConfigPatches: - |- [plugins."io.containerd.grpc.v1.cri".containerd] # Support many layered images: https://kubernetes.slack.com/archives/CEKK1KTN2/p1602770111199000 disable_snapshot_annotations = true # Support a local registry [plugins."io.containerd.grpc.v1.cri".registry.mirrors."registry.local:5000"] endpoint = ["http://registry.local:5000"] + kind --version kind version 0.23.0 + docker ps CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES + kind create cluster --config kind.yaml Creating cluster "kind" ... â€ĸ Ensuring node image (kindest/node:1.28.9) đŸ–ŧ ... ✓ Ensuring node image (kindest/node:1.28.9) đŸ–ŧ â€ĸ Preparing nodes đŸ“Ļ đŸ“Ļ đŸ“Ļ đŸ“Ļ ... ✓ Preparing nodes đŸ“Ļ đŸ“Ļ đŸ“Ļ đŸ“Ļ â€ĸ Writing configuration 📜 ... ✓ Writing configuration 📜 â€ĸ Starting control-plane đŸ•šī¸ ... ✓ Starting control-plane đŸ•šī¸ â€ĸ Installing CNI 🔌 ... ✓ Installing CNI 🔌 â€ĸ Installing StorageClass 💾 ... ✓ Installing StorageClass 💾 â€ĸ Joining worker nodes 🚜 ... ✓ Joining worker nodes 🚜 Set kubectl context to "kind-kind" You can now use your cluster with: kubectl cluster-info --context kind-kind Have a nice day! 👋 + echo '--- Setup metallb' --- Setup metallb + kubectl apply -f https://raw.githubusercontent.com/metallb/metallb/v0.13.10/config/manifests/metallb-native.yaml namespace/metallb-system created customresourcedefinition.apiextensions.k8s.io/addresspools.metallb.io created customresourcedefinition.apiextensions.k8s.io/bfdprofiles.metallb.io created customresourcedefinition.apiextensions.k8s.io/bgpadvertisements.metallb.io created customresourcedefinition.apiextensions.k8s.io/bgppeers.metallb.io created customresourcedefinition.apiextensions.k8s.io/communities.metallb.io created customresourcedefinition.apiextensions.k8s.io/ipaddresspools.metallb.io created customresourcedefinition.apiextensions.k8s.io/l2advertisements.metallb.io created serviceaccount/controller created serviceaccount/speaker created role.rbac.authorization.k8s.io/controller created role.rbac.authorization.k8s.io/pod-lister created clusterrole.rbac.authorization.k8s.io/metallb-system:controller created clusterrole.rbac.authorization.k8s.io/metallb-system:speaker created rolebinding.rbac.authorization.k8s.io/controller created rolebinding.rbac.authorization.k8s.io/pod-lister created clusterrolebinding.rbac.authorization.k8s.io/metallb-system:controller created clusterrolebinding.rbac.authorization.k8s.io/metallb-system:speaker created configmap/metallb-excludel2 created secret/webhook-server-cert created service/webhook-service created deployment.apps/controller created daemonset.apps/speaker created validatingwebhookconfiguration.admissionregistration.k8s.io/metallb-webhook-configuration created ++ openssl rand -base64 128 + kubectl create secret generic -n metallb-system memberlist '--from-literal=secretkey=uDfgkJCgtBPi/GLKQVKV3aSe2vbFDFr3OlwESEd5g8sV7s0tKEfy5fmuG2H5zrJZ U9oNKBEFWMivyCH4TrKMcKw2+0ZFRm42wQpCO/+CKMN5hoaNAhFPhUTOLRRfblmQ /Qcc/dUy31c+b0YKpLhZj1nyXVupamsydnBv7glnNmE=' secret/memberlist created ++ cut -d . -f1,2 ++ docker network inspect kind -f '{{(index .IPAM.Config 0).Subnet}}' + network=fc00:f853:ccd:e793::/64 + cat + kubectl apply -f - configmap/config created + echo '--- Setup container registry' --- Setup container registry + EXTRA_ARGS=() + [[ 0 == \1 ]] + docker run -d --restart=always -p 5000:5000 --name registry.local registry:2 Unable to find image 'registry:2' locally 2: Pulling from library/registry 44cf07d57ee4: Pulling fs layer bbbdd6c6894b: Pulling fs layer 8e82f80af0de: Pulling fs layer 3493bf46cdec: Pulling fs layer 6d464ea18732: Pulling fs layer 3493bf46cdec: Waiting 6d464ea18732: Waiting bbbdd6c6894b: Verifying Checksum bbbdd6c6894b: Download complete 8e82f80af0de: Verifying Checksum 8e82f80af0de: Download complete 44cf07d57ee4: Download complete 3493bf46cdec: Verifying Checksum 3493bf46cdec: Download complete 6d464ea18732: Verifying Checksum 6d464ea18732: Download complete 44cf07d57ee4: Pull complete bbbdd6c6894b: Pull complete 8e82f80af0de: Pull complete 3493bf46cdec: Pull complete 6d464ea18732: Pull complete Digest: sha256:a3d8aaa63ed8681a604f1dea0aa03f100d5895b6a58ace528858a7b332415373 Status: Downloaded newer image for registry:2 57a31387c337b1d83968c67d3b156b9fdd131182caf771a616d3b9f5107bb48f + docker network connect kind registry.local + echo '127.0.0.1 registry.local' + tee -a /etc/hosts 127.0.0.1 registry.local + [[ 0 == \1 ]] + export KO_DOCKER_REPO=kind.local + KO_DOCKER_REPO=kind.local + [[ ./test/e2e-tests.sh == '' ]] + [[ ./test/e2e-tests-kind-prow.env != '' ]] + set -o allexport + source ./test/e2e-tests-kind-prow.env ++ E2E_SKIP_CLUSTER_CREATION=true ++ KO_DOCKER_REPO=registry.local:5000 ++ ARTIFACTS=/workspace/source/artifacts + set +o allexport + ./test/e2e-tests.sh ./test/../vendor/github.com/tektoncd/plumbing/scripts/library.sh: line 22: SERVING_GKE_VERSION: readonly variable ./test/../vendor/github.com/tektoncd/plumbing/scripts/library.sh: line 23: SERVING_GKE_IMAGE: readonly variable ./test/../vendor/github.com/tektoncd/plumbing/scripts/library.sh: line 34: IS_PROW: readonly variable ./test/../vendor/github.com/tektoncd/plumbing/scripts/library.sh: line 36: REPO_ROOT_DIR: readonly variable ./test/../vendor/github.com/tektoncd/plumbing/scripts/library.sh: line 37: REPO_NAME: readonly variable ./test/../vendor/github.com/tektoncd/plumbing/scripts/library.sh: line 402: _PLUMBING_SCRIPTS_DIR: readonly variable ./test/../vendor/github.com/tektoncd/plumbing/scripts/library.sh: line 403: REPO_NAME_FORMATTED: readonly variable ./test/../vendor/github.com/tektoncd/plumbing/scripts/e2e-tests.sh: line 47: E2E_CLUSTER_BACKUP_REGIONS: readonly variable ./test/../vendor/github.com/tektoncd/plumbing/scripts/e2e-tests.sh: line 48: E2E_CLUSTER_BACKUP_ZONES: readonly variable ./test/../vendor/github.com/tektoncd/plumbing/scripts/e2e-tests.sh: line 50: E2E_CLUSTER_MACHINE: readonly variable ./test/../vendor/github.com/tektoncd/plumbing/scripts/e2e-tests.sh: line 51: E2E_GKE_ENVIRONMENT: readonly variable ./test/../vendor/github.com/tektoncd/plumbing/scripts/e2e-tests.sh: line 52: E2E_GKE_COMMAND_GROUP: readonly variable ./test/../vendor/github.com/tektoncd/plumbing/scripts/e2e-tests.sh: line 57: E2E_MIN_CLUSTER_NODES: readonly variable ./test/../vendor/github.com/tektoncd/plumbing/scripts/e2e-tests.sh: line 58: E2E_MAX_CLUSTER_NODES: readonly variable ./test/../vendor/github.com/tektoncd/plumbing/scripts/e2e-tests.sh: line 60: E2E_BASE_NAME: readonly variable ./test/../vendor/github.com/tektoncd/plumbing/scripts/e2e-tests.sh: line 61: E2E_CLUSTER_NAME: readonly variable ./test/../vendor/github.com/tektoncd/plumbing/scripts/e2e-tests.sh: line 62: E2E_NETWORK_NAME: readonly variable ./test/../vendor/github.com/tektoncd/plumbing/scripts/e2e-tests.sh: line 63: TEST_RESULT_FILE: readonly variable >> Deploying Tekton Pipelines Installing https://github.com/tektoncd/pipeline/releases/download/v1.1.0/release.yaml namespace/tekton-pipelines created clusterrole.rbac.authorization.k8s.io/tekton-pipelines-controller-cluster-access created clusterrole.rbac.authorization.k8s.io/tekton-pipelines-controller-tenant-access created clusterrole.rbac.authorization.k8s.io/tekton-pipelines-webhook-cluster-access created clusterrole.rbac.authorization.k8s.io/tekton-events-controller-cluster-access created role.rbac.authorization.k8s.io/tekton-pipelines-controller created role.rbac.authorization.k8s.io/tekton-pipelines-webhook created role.rbac.authorization.k8s.io/tekton-pipelines-events-controller created role.rbac.authorization.k8s.io/tekton-pipelines-leader-election created role.rbac.authorization.k8s.io/tekton-pipelines-info created serviceaccount/tekton-pipelines-controller created serviceaccount/tekton-pipelines-webhook created serviceaccount/tekton-events-controller created clusterrolebinding.rbac.authorization.k8s.io/tekton-pipelines-controller-cluster-access created clusterrolebinding.rbac.authorization.k8s.io/tekton-pipelines-controller-tenant-access created clusterrolebinding.rbac.authorization.k8s.io/tekton-pipelines-webhook-cluster-access created clusterrolebinding.rbac.authorization.k8s.io/tekton-events-controller-cluster-access created rolebinding.rbac.authorization.k8s.io/tekton-pipelines-controller created rolebinding.rbac.authorization.k8s.io/tekton-pipelines-webhook created rolebinding.rbac.authorization.k8s.io/tekton-pipelines-controller-leaderelection created rolebinding.rbac.authorization.k8s.io/tekton-pipelines-webhook-leaderelection created rolebinding.rbac.authorization.k8s.io/tekton-pipelines-info created rolebinding.rbac.authorization.k8s.io/tekton-pipelines-events-controller created rolebinding.rbac.authorization.k8s.io/tekton-events-controller-leaderelection created customresourcedefinition.apiextensions.k8s.io/customruns.tekton.dev created customresourcedefinition.apiextensions.k8s.io/pipelines.tekton.dev created customresourcedefinition.apiextensions.k8s.io/pipelineruns.tekton.dev created customresourcedefinition.apiextensions.k8s.io/resolutionrequests.resolution.tekton.dev created customresourcedefinition.apiextensions.k8s.io/stepactions.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tasks.tekton.dev created customresourcedefinition.apiextensions.k8s.io/taskruns.tekton.dev created customresourcedefinition.apiextensions.k8s.io/verificationpolicies.tekton.dev created secret/webhook-certs created validatingwebhookconfiguration.admissionregistration.k8s.io/validation.webhook.pipeline.tekton.dev created mutatingwebhookconfiguration.admissionregistration.k8s.io/webhook.pipeline.tekton.dev created validatingwebhookconfiguration.admissionregistration.k8s.io/config.webhook.pipeline.tekton.dev created clusterrole.rbac.authorization.k8s.io/tekton-aggregate-edit created clusterrole.rbac.authorization.k8s.io/tekton-aggregate-view created configmap/config-defaults created configmap/config-events created configmap/feature-flags created configmap/pipelines-info created configmap/config-leader-election-controller created configmap/config-leader-election-events created configmap/config-leader-election-webhook created configmap/config-logging created configmap/config-observability created configmap/config-registry-cert created configmap/config-spire created configmap/config-tracing created deployment.apps/tekton-pipelines-controller created service/tekton-pipelines-controller created deployment.apps/tekton-events-controller created service/tekton-events-controller created namespace/tekton-pipelines-resolvers created clusterrole.rbac.authorization.k8s.io/tekton-pipelines-resolvers-resolution-request-updates created role.rbac.authorization.k8s.io/tekton-pipelines-resolvers-namespace-rbac created serviceaccount/tekton-pipelines-resolvers created clusterrolebinding.rbac.authorization.k8s.io/tekton-pipelines-resolvers created rolebinding.rbac.authorization.k8s.io/tekton-pipelines-resolvers-namespace-rbac created configmap/bundleresolver-config created configmap/cluster-resolver-config created configmap/resolvers-feature-flags created configmap/config-leader-election-resolvers created configmap/config-logging created configmap/config-observability created configmap/git-resolver-config created configmap/http-resolver-config created configmap/hubresolver-config created deployment.apps/tekton-pipelines-remote-resolvers created service/tekton-pipelines-remote-resolvers created horizontalpodautoscaler.autoscaling/tekton-pipelines-webhook created deployment.apps/tekton-pipelines-webhook created service/tekton-pipelines-webhook created Enabling StepActions on the cluster configmap/feature-flags patched (no change) No resources found No resources found No resources found No resources found No resources found Waiting until all pods in namespace tekton-pipelines are up..... All pods are up: tekton-events-controller-6b7779c458-x9sxw 1/1 Running 0 11s tekton-pipelines-controller-645847c466-jtpt4 1/1 Running 0 12s tekton-pipelines-webhook-5889b64bc-b7l79 1/1 Running 0 11s + set -o pipefail ++ echo stepaction/git-clone/0.1/tests stepaction/git-clone/0.2/tests stepaction/tekton-catalog-publish/0.1/tests stepaction/tekton-catalog-publish/0.2/tests stepaction/tekton-catalog-publish/0.3/tests + all_stepactions='stepaction/git-clone/0.1/tests stepaction/git-clone/0.2/tests stepaction/tekton-catalog-publish/0.1/tests stepaction/tekton-catalog-publish/0.2/tests stepaction/tekton-catalog-publish/0.3/tests' ++ echo task/ansible-builder/0.1/tests task/ansible-runner/0.1/tests task/ansible-runner/0.2/tests task/asciidoctor/0.1/tests task/bentoml/0.1/tests task/black/0.1/tests task/black/0.2/tests task/blue-green-deploy/0.1/tests task/blue-green-deploy/0.2/tests task/buildah/0.1/tests task/buildah/0.2/tests task/buildah/0.3/tests task/buildah/0.4/tests task/buildah/0.5/tests task/buildah/0.6/tests task/buildah/0.7/tests task/buildah/0.8/tests task/buildah/0.9/tests task/buildpacks-phases/0.1/tests task/buildpacks-phases/0.2/tests task/buildpacks-phases/0.3/tests task/buildpacks/0.1/tests task/buildpacks/0.2/tests task/buildpacks/0.3/tests task/buildpacks/0.4/tests task/buildpacks/0.5/tests task/buildpacks/0.6/tests task/check-make/0.1/tests task/codecov/0.1/tests task/codecov/0.2/tests task/curl/0.1/tests task/docker-build/0.1/tests task/dockerslim-build/0.1/tests task/flake8/0.1/tests task/gcloud/0.3/tests task/generate-build-id/0.1/tests task/git-batch-merge/0.1/tests task/git-batch-merge/0.2/tests task/git-batch-merge/0.3/tests task/git-cli/0.1/tests task/git-cli/0.2/tests task/git-cli/0.3/tests task/git-cli/0.4/tests task/git-clone/0.1/tests task/git-clone/0.10/tests task/git-clone/0.2/tests task/git-clone/0.3/tests task/git-clone/0.4/tests task/git-clone/0.5/tests task/git-clone/0.6/tests task/git-clone/0.7/tests task/git-clone/0.8/tests task/git-clone/0.9/tests task/git-version/0.1/tests task/gitea-set-status/0.1/tests task/github-add-comment/0.1/tests task/github-add-comment/0.2/tests task/github-add-comment/0.3/tests task/github-add-comment/0.4/tests task/github-add-comment/0.5/tests task/github-add-comment/0.6/tests task/github-add-comment/0.7/tests task/github-add-gist/0.1/tests task/github-add-gist/0.2/tests task/github-create-deployment-status/0.1/tests task/github-create-deployment/0.2/tests task/github-open-pr/0.1/tests task/github-open-pr/0.2/tests task/github-request-reviewers/0.1/tests task/github-set-status/0.4/tests task/gitlab-set-status/0.1/tests task/gitlab-set-status/0.2/tests task/gitleaks/0.1/tests task/golang-build/0.1/tests task/golang-build/0.2/tests task/golang-build/0.3/tests task/golang-fuzz/0.1/tests task/golang-test/0.1/tests task/golang-test/0.2/tests task/golangci-lint/0.1/tests task/golangci-lint/0.2/tests task/gradle/0.1/tests task/gradle/0.2/tests task/gradle/0.3/tests task/gradle/0.4/tests task/grype/0.1/tests task/hadolint/0.1/tests task/helm-render-manifests-from-repo/0.1/tests task/helm-upgrade-from-repo/0.1/tests task/helm-upgrade-from-repo/0.2/tests task/helm-upgrade-from-repo/0.3/tests task/helm-upgrade-from-source/0.1/tests task/helm-upgrade-from-source/0.2/tests task/helm-upgrade-from-source/0.3/tests task/helm-upgrade-from-source/0.4/tests task/hugo/0.1/tests task/jenkins/0.1/tests task/jib-gradle/0.1/tests task/jib-gradle/0.2/tests task/jib-gradle/0.3/tests task/jib-gradle/0.4/tests task/jib-maven/0.1/tests task/jib-maven/0.2/tests task/jib-maven/0.3/tests task/jib-maven/0.4/tests task/jib-maven/0.5/tests task/jq/0.1/tests task/kamel-run/0.1/tests task/kaniko/0.1/tests task/kaniko/0.2/tests task/kaniko/0.3/tests task/kaniko/0.4/tests task/kaniko/0.5/tests task/kaniko/0.6/tests task/kaniko/0.7/tests task/kind/0.1/tests task/ko/0.1/tests task/kube-linter/0.1/tests task/kubeconfig-creator/0.1/tests task/kubeconfig-creator/0.2/tests task/kubernetes-actions/0.2/tests task/kythe-go/0.1/tests task/kythe-go/0.2/tests task/markdown-lint/0.1/tests task/maven/0.1/tests task/maven/0.2/tests task/maven/0.3/tests task/maven/0.4/tests task/mypy-lint/0.1/tests task/mypy-lint/0.2/tests task/npm/0.1/tests task/openshift-client/0.1/tests task/openshift-client/0.2/tests task/orka-deploy/0.1/tests task/orka-deploy/0.2/tests task/orka-full/0.1/tests task/orka-full/0.2/tests task/orka-init/0.1/tests task/orka-init/0.2/tests task/orka-teardown/0.1/tests task/orka-teardown/0.2/tests task/pluto/0.1/tests task/powershell/0.1/tests task/prettier/0.1/tests task/pull-request/0.1/tests task/pull-request/0.2/tests task/pylint/0.1/tests task/pylint/0.2/tests task/pylint/0.3/tests task/pytest/0.1/tests task/pytest/0.2/tests task/python-coverage/0.1/tests task/redhat-codeready-dependency-analysis/0.1/tests task/redhat-dependency-analytics/0.1/tests task/redhat-dependency-analytics/0.2/tests task/replace-tokens/0.1/tests task/robot-framework/0.1/tests task/ruby-lint/0.1/tests task/s2i/0.1/tests task/s2i/0.2/tests task/s2i/0.3/tests task/shellcheck/0.1/tests task/shp/0.1/tests task/skopeo-copy/0.1/tests task/skopeo-copy/0.2/tests task/skopeo-copy/0.3/tests task/skopeo-copy/0.4/tests task/sonarqube-scanner/0.2/tests task/sonarqube-scanner/0.3/tests task/sonarqube-scanner/0.4/tests task/syft/0.1/tests task/tekton-catalog-publish/0.1/tests task/tekton-catalog-publish/0.2/tests task/tkn/0.2/tests task/tkn/0.3/tests task/tkn/0.4/tests task/tkn/0.5/tests task/trigger-jenkins-job/0.1/tests task/trivy-scanner/0.1/tests task/trivy-scanner/0.2/tests task/ts-lint/0.1/tests task/upload-pypi/0.2/tests task/valint/0.1/tests task/wget/0.1/tests task/write-file/0.1/tests task/yaml-lint/0.1/tests task/yq/0.1/tests task/yq/0.2/tests task/yq/0.3/tests task/yq/0.4/tests + all_tests='task/ansible-builder/0.1/tests task/ansible-runner/0.1/tests task/ansible-runner/0.2/tests task/asciidoctor/0.1/tests task/bentoml/0.1/tests task/black/0.1/tests task/black/0.2/tests task/blue-green-deploy/0.1/tests task/blue-green-deploy/0.2/tests task/buildah/0.1/tests task/buildah/0.2/tests task/buildah/0.3/tests task/buildah/0.4/tests task/buildah/0.5/tests task/buildah/0.6/tests task/buildah/0.7/tests task/buildah/0.8/tests task/buildah/0.9/tests task/buildpacks-phases/0.1/tests task/buildpacks-phases/0.2/tests task/buildpacks-phases/0.3/tests task/buildpacks/0.1/tests task/buildpacks/0.2/tests task/buildpacks/0.3/tests task/buildpacks/0.4/tests task/buildpacks/0.5/tests task/buildpacks/0.6/tests task/check-make/0.1/tests task/codecov/0.1/tests task/codecov/0.2/tests task/curl/0.1/tests task/docker-build/0.1/tests task/dockerslim-build/0.1/tests task/flake8/0.1/tests task/gcloud/0.3/tests task/generate-build-id/0.1/tests task/git-batch-merge/0.1/tests task/git-batch-merge/0.2/tests task/git-batch-merge/0.3/tests task/git-cli/0.1/tests task/git-cli/0.2/tests task/git-cli/0.3/tests task/git-cli/0.4/tests task/git-clone/0.1/tests task/git-clone/0.10/tests task/git-clone/0.2/tests task/git-clone/0.3/tests task/git-clone/0.4/tests task/git-clone/0.5/tests task/git-clone/0.6/tests task/git-clone/0.7/tests task/git-clone/0.8/tests task/git-clone/0.9/tests task/git-version/0.1/tests task/gitea-set-status/0.1/tests task/github-add-comment/0.1/tests task/github-add-comment/0.2/tests task/github-add-comment/0.3/tests task/github-add-comment/0.4/tests task/github-add-comment/0.5/tests task/github-add-comment/0.6/tests task/github-add-comment/0.7/tests task/github-add-gist/0.1/tests task/github-add-gist/0.2/tests task/github-create-deployment-status/0.1/tests task/github-create-deployment/0.2/tests task/github-open-pr/0.1/tests task/github-open-pr/0.2/tests task/github-request-reviewers/0.1/tests task/github-set-status/0.4/tests task/gitlab-set-status/0.1/tests task/gitlab-set-status/0.2/tests task/gitleaks/0.1/tests task/golang-build/0.1/tests task/golang-build/0.2/tests task/golang-build/0.3/tests task/golang-fuzz/0.1/tests task/golang-test/0.1/tests task/golang-test/0.2/tests task/golangci-lint/0.1/tests task/golangci-lint/0.2/tests task/gradle/0.1/tests task/gradle/0.2/tests task/gradle/0.3/tests task/gradle/0.4/tests task/grype/0.1/tests task/hadolint/0.1/tests task/helm-render-manifests-from-repo/0.1/tests task/helm-upgrade-from-repo/0.1/tests task/helm-upgrade-from-repo/0.2/tests task/helm-upgrade-from-repo/0.3/tests task/helm-upgrade-from-source/0.1/tests task/helm-upgrade-from-source/0.2/tests task/helm-upgrade-from-source/0.3/tests task/helm-upgrade-from-source/0.4/tests task/hugo/0.1/tests task/jenkins/0.1/tests task/jib-gradle/0.1/tests task/jib-gradle/0.2/tests task/jib-gradle/0.3/tests task/jib-gradle/0.4/tests task/jib-maven/0.1/tests task/jib-maven/0.2/tests task/jib-maven/0.3/tests task/jib-maven/0.4/tests task/jib-maven/0.5/tests task/jq/0.1/tests task/kamel-run/0.1/tests task/kaniko/0.1/tests task/kaniko/0.2/tests task/kaniko/0.3/tests task/kaniko/0.4/tests task/kaniko/0.5/tests task/kaniko/0.6/tests task/kaniko/0.7/tests task/kind/0.1/tests task/ko/0.1/tests task/kube-linter/0.1/tests task/kubeconfig-creator/0.1/tests task/kubeconfig-creator/0.2/tests task/kubernetes-actions/0.2/tests task/kythe-go/0.1/tests task/kythe-go/0.2/tests task/markdown-lint/0.1/tests task/maven/0.1/tests task/maven/0.2/tests task/maven/0.3/tests task/maven/0.4/tests task/mypy-lint/0.1/tests task/mypy-lint/0.2/tests task/npm/0.1/tests task/openshift-client/0.1/tests task/openshift-client/0.2/tests task/orka-deploy/0.1/tests task/orka-deploy/0.2/tests task/orka-full/0.1/tests task/orka-full/0.2/tests task/orka-init/0.1/tests task/orka-init/0.2/tests task/orka-teardown/0.1/tests task/orka-teardown/0.2/tests task/pluto/0.1/tests task/powershell/0.1/tests task/prettier/0.1/tests task/pull-request/0.1/tests task/pull-request/0.2/tests task/pylint/0.1/tests task/pylint/0.2/tests task/pylint/0.3/tests task/pytest/0.1/tests task/pytest/0.2/tests task/python-coverage/0.1/tests task/redhat-codeready-dependency-analysis/0.1/tests task/redhat-dependency-analytics/0.1/tests task/redhat-dependency-analytics/0.2/tests task/replace-tokens/0.1/tests task/robot-framework/0.1/tests task/ruby-lint/0.1/tests task/s2i/0.1/tests task/s2i/0.2/tests task/s2i/0.3/tests task/shellcheck/0.1/tests task/shp/0.1/tests task/skopeo-copy/0.1/tests task/skopeo-copy/0.2/tests task/skopeo-copy/0.3/tests task/skopeo-copy/0.4/tests task/sonarqube-scanner/0.2/tests task/sonarqube-scanner/0.3/tests task/sonarqube-scanner/0.4/tests task/syft/0.1/tests task/tekton-catalog-publish/0.1/tests task/tekton-catalog-publish/0.2/tests task/tkn/0.2/tests task/tkn/0.3/tests task/tkn/0.4/tests task/tkn/0.5/tests task/trigger-jenkins-job/0.1/tests task/trivy-scanner/0.1/tests task/trivy-scanner/0.2/tests task/ts-lint/0.1/tests task/upload-pypi/0.2/tests task/valint/0.1/tests task/wget/0.1/tests task/write-file/0.1/tests task/yaml-lint/0.1/tests task/yq/0.1/tests task/yq/0.2/tests task/yq/0.3/tests task/yq/0.4/tests' + [[ -z '' ]] ++ detect_changed_e2e_test ++ git --no-pager diff --name-only c9818f3dcecde0bc48b88749675eb13f0d314707..27bc1aa69093a7f4e10ad8af37a141d83939e9f4 ++ egrep '^(hack/setup-kind.sh|test/[^/]*)' + [[ ! -z hack/setup-kind.sh test/e2e-tests-kind-gha.env test/e2e-tests.sh ]] + TEST_RUN_ALL_TESTS=1 + [[ -z 1 ]] + test_yaml_can_install stepactions 'stepaction/git-clone/0.1/tests stepaction/git-clone/0.2/tests stepaction/tekton-catalog-publish/0.1/tests stepaction/tekton-catalog-publish/0.2/tests stepaction/tekton-catalog-publish/0.3/tests' + ns=stepactions-ns + shift + all_tasks='stepaction/git-clone/0.1/tests stepaction/git-clone/0.2/tests stepaction/tekton-catalog-publish/0.1/tests stepaction/tekton-catalog-publish/0.2/tests stepaction/tekton-catalog-publish/0.3/tests' + kubectl create ns stepactions-ns namespace/stepactions-ns created + local runtest + for runtest in ${all_tasks} + local runtestdir=git-clone/0.1/tests + local testname=git-clone + runtest=stepaction/git-clone/0.1/ + '[' '!' -d stepaction/git-clone ']' + runtest=stepaction/git-clone/0.1/git-clone.yaml + skipit= + cat stepaction/git-clone/0.1/git-clone.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=git-clone/0.2/tests + local testname=git-clone + runtest=stepaction/git-clone/0.2/ + '[' '!' -d stepaction/git-clone ']' + runtest=stepaction/git-clone/0.2/git-clone.yaml + skipit= + grep 'tekton.dev/deprecated: \"true\"' + cat stepaction/git-clone/0.2/git-clone.yaml + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking git-clone' Checking git-clone + kubectl -n stepactions-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' stepaction/git-clone/0.2/git-clone.yaml stepaction.tekton.dev/git-clone created + for runtest in ${all_tasks} + local runtestdir=tekton-catalog-publish/0.1/tests + local testname=tekton-catalog-publish + runtest=stepaction/tekton-catalog-publish/0.1/ + '[' '!' -d stepaction/tekton-catalog-publish ']' + runtest=stepaction/tekton-catalog-publish/0.1/tekton-catalog-publish.yaml + skipit= + grep 'tekton.dev/deprecated: \"true\"' + cat stepaction/tekton-catalog-publish/0.1/tekton-catalog-publish.yaml tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=tekton-catalog-publish/0.2/tests + local testname=tekton-catalog-publish + runtest=stepaction/tekton-catalog-publish/0.2/ + '[' '!' -d stepaction/tekton-catalog-publish ']' + runtest=stepaction/tekton-catalog-publish/0.2/tekton-catalog-publish.yaml + skipit= + cat stepaction/tekton-catalog-publish/0.2/tekton-catalog-publish.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=tekton-catalog-publish/0.3/tests + local testname=tekton-catalog-publish + runtest=stepaction/tekton-catalog-publish/0.3/ + '[' '!' -d stepaction/tekton-catalog-publish ']' + runtest=stepaction/tekton-catalog-publish/0.3/tekton-catalog-publish.yaml + skipit= + cat stepaction/tekton-catalog-publish/0.3/tekton-catalog-publish.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking tekton-catalog-publish' Checking tekton-catalog-publish + kubectl -n stepactions-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' stepaction/tekton-catalog-publish/0.3/tekton-catalog-publish.yaml stepaction.tekton.dev/tekton-catalog-publish created + test_yaml_can_install tasks 'task/ansible-builder/0.1/tests task/ansible-runner/0.1/tests task/ansible-runner/0.2/tests task/asciidoctor/0.1/tests task/bentoml/0.1/tests task/black/0.1/tests task/black/0.2/tests task/blue-green-deploy/0.1/tests task/blue-green-deploy/0.2/tests task/buildah/0.1/tests task/buildah/0.2/tests task/buildah/0.3/tests task/buildah/0.4/tests task/buildah/0.5/tests task/buildah/0.6/tests task/buildah/0.7/tests task/buildah/0.8/tests task/buildah/0.9/tests task/buildpacks-phases/0.1/tests task/buildpacks-phases/0.2/tests task/buildpacks-phases/0.3/tests task/buildpacks/0.1/tests task/buildpacks/0.2/tests task/buildpacks/0.3/tests task/buildpacks/0.4/tests task/buildpacks/0.5/tests task/buildpacks/0.6/tests task/check-make/0.1/tests task/codecov/0.1/tests task/codecov/0.2/tests task/curl/0.1/tests task/docker-build/0.1/tests task/dockerslim-build/0.1/tests task/flake8/0.1/tests task/gcloud/0.3/tests task/generate-build-id/0.1/tests task/git-batch-merge/0.1/tests task/git-batch-merge/0.2/tests task/git-batch-merge/0.3/tests task/git-cli/0.1/tests task/git-cli/0.2/tests task/git-cli/0.3/tests task/git-cli/0.4/tests task/git-clone/0.1/tests task/git-clone/0.10/tests task/git-clone/0.2/tests task/git-clone/0.3/tests task/git-clone/0.4/tests task/git-clone/0.5/tests task/git-clone/0.6/tests task/git-clone/0.7/tests task/git-clone/0.8/tests task/git-clone/0.9/tests task/git-version/0.1/tests task/gitea-set-status/0.1/tests task/github-add-comment/0.1/tests task/github-add-comment/0.2/tests task/github-add-comment/0.3/tests task/github-add-comment/0.4/tests task/github-add-comment/0.5/tests task/github-add-comment/0.6/tests task/github-add-comment/0.7/tests task/github-add-gist/0.1/tests task/github-add-gist/0.2/tests task/github-create-deployment-status/0.1/tests task/github-create-deployment/0.2/tests task/github-open-pr/0.1/tests task/github-open-pr/0.2/tests task/github-request-reviewers/0.1/tests task/github-set-status/0.4/tests task/gitlab-set-status/0.1/tests task/gitlab-set-status/0.2/tests task/gitleaks/0.1/tests task/golang-build/0.1/tests task/golang-build/0.2/tests task/golang-build/0.3/tests task/golang-fuzz/0.1/tests task/golang-test/0.1/tests task/golang-test/0.2/tests task/golangci-lint/0.1/tests task/golangci-lint/0.2/tests task/gradle/0.1/tests task/gradle/0.2/tests task/gradle/0.3/tests task/gradle/0.4/tests task/grype/0.1/tests task/hadolint/0.1/tests task/helm-render-manifests-from-repo/0.1/tests task/helm-upgrade-from-repo/0.1/tests task/helm-upgrade-from-repo/0.2/tests task/helm-upgrade-from-repo/0.3/tests task/helm-upgrade-from-source/0.1/tests task/helm-upgrade-from-source/0.2/tests task/helm-upgrade-from-source/0.3/tests task/helm-upgrade-from-source/0.4/tests task/hugo/0.1/tests task/jenkins/0.1/tests task/jib-gradle/0.1/tests task/jib-gradle/0.2/tests task/jib-gradle/0.3/tests task/jib-gradle/0.4/tests task/jib-maven/0.1/tests task/jib-maven/0.2/tests task/jib-maven/0.3/tests task/jib-maven/0.4/tests task/jib-maven/0.5/tests task/jq/0.1/tests task/kamel-run/0.1/tests task/kaniko/0.1/tests task/kaniko/0.2/tests task/kaniko/0.3/tests task/kaniko/0.4/tests task/kaniko/0.5/tests task/kaniko/0.6/tests task/kaniko/0.7/tests task/kind/0.1/tests task/ko/0.1/tests task/kube-linter/0.1/tests task/kubeconfig-creator/0.1/tests task/kubeconfig-creator/0.2/tests task/kubernetes-actions/0.2/tests task/kythe-go/0.1/tests task/kythe-go/0.2/tests task/markdown-lint/0.1/tests task/maven/0.1/tests task/maven/0.2/tests task/maven/0.3/tests task/maven/0.4/tests task/mypy-lint/0.1/tests task/mypy-lint/0.2/tests task/npm/0.1/tests task/openshift-client/0.1/tests task/openshift-client/0.2/tests task/orka-deploy/0.1/tests task/orka-deploy/0.2/tests task/orka-full/0.1/tests task/orka-full/0.2/tests task/orka-init/0.1/tests task/orka-init/0.2/tests task/orka-teardown/0.1/tests task/orka-teardown/0.2/tests task/pluto/0.1/tests task/powershell/0.1/tests task/prettier/0.1/tests task/pull-request/0.1/tests task/pull-request/0.2/tests task/pylint/0.1/tests task/pylint/0.2/tests task/pylint/0.3/tests task/pytest/0.1/tests task/pytest/0.2/tests task/python-coverage/0.1/tests task/redhat-codeready-dependency-analysis/0.1/tests task/redhat-dependency-analytics/0.1/tests task/redhat-dependency-analytics/0.2/tests task/replace-tokens/0.1/tests task/robot-framework/0.1/tests task/ruby-lint/0.1/tests task/s2i/0.1/tests task/s2i/0.2/tests task/s2i/0.3/tests task/shellcheck/0.1/tests task/shp/0.1/tests task/skopeo-copy/0.1/tests task/skopeo-copy/0.2/tests task/skopeo-copy/0.3/tests task/skopeo-copy/0.4/tests task/sonarqube-scanner/0.2/tests task/sonarqube-scanner/0.3/tests task/sonarqube-scanner/0.4/tests task/syft/0.1/tests task/tekton-catalog-publish/0.1/tests task/tekton-catalog-publish/0.2/tests task/tkn/0.2/tests task/tkn/0.3/tests task/tkn/0.4/tests task/tkn/0.5/tests task/trigger-jenkins-job/0.1/tests task/trivy-scanner/0.1/tests task/trivy-scanner/0.2/tests task/ts-lint/0.1/tests task/upload-pypi/0.2/tests task/valint/0.1/tests task/wget/0.1/tests task/write-file/0.1/tests task/yaml-lint/0.1/tests task/yq/0.1/tests task/yq/0.2/tests task/yq/0.3/tests task/yq/0.4/tests' + ns=tasks-ns + shift + all_tasks='task/ansible-builder/0.1/tests task/ansible-runner/0.1/tests task/ansible-runner/0.2/tests task/asciidoctor/0.1/tests task/bentoml/0.1/tests task/black/0.1/tests task/black/0.2/tests task/blue-green-deploy/0.1/tests task/blue-green-deploy/0.2/tests task/buildah/0.1/tests task/buildah/0.2/tests task/buildah/0.3/tests task/buildah/0.4/tests task/buildah/0.5/tests task/buildah/0.6/tests task/buildah/0.7/tests task/buildah/0.8/tests task/buildah/0.9/tests task/buildpacks-phases/0.1/tests task/buildpacks-phases/0.2/tests task/buildpacks-phases/0.3/tests task/buildpacks/0.1/tests task/buildpacks/0.2/tests task/buildpacks/0.3/tests task/buildpacks/0.4/tests task/buildpacks/0.5/tests task/buildpacks/0.6/tests task/check-make/0.1/tests task/codecov/0.1/tests task/codecov/0.2/tests task/curl/0.1/tests task/docker-build/0.1/tests task/dockerslim-build/0.1/tests task/flake8/0.1/tests task/gcloud/0.3/tests task/generate-build-id/0.1/tests task/git-batch-merge/0.1/tests task/git-batch-merge/0.2/tests task/git-batch-merge/0.3/tests task/git-cli/0.1/tests task/git-cli/0.2/tests task/git-cli/0.3/tests task/git-cli/0.4/tests task/git-clone/0.1/tests task/git-clone/0.10/tests task/git-clone/0.2/tests task/git-clone/0.3/tests task/git-clone/0.4/tests task/git-clone/0.5/tests task/git-clone/0.6/tests task/git-clone/0.7/tests task/git-clone/0.8/tests task/git-clone/0.9/tests task/git-version/0.1/tests task/gitea-set-status/0.1/tests task/github-add-comment/0.1/tests task/github-add-comment/0.2/tests task/github-add-comment/0.3/tests task/github-add-comment/0.4/tests task/github-add-comment/0.5/tests task/github-add-comment/0.6/tests task/github-add-comment/0.7/tests task/github-add-gist/0.1/tests task/github-add-gist/0.2/tests task/github-create-deployment-status/0.1/tests task/github-create-deployment/0.2/tests task/github-open-pr/0.1/tests task/github-open-pr/0.2/tests task/github-request-reviewers/0.1/tests task/github-set-status/0.4/tests task/gitlab-set-status/0.1/tests task/gitlab-set-status/0.2/tests task/gitleaks/0.1/tests task/golang-build/0.1/tests task/golang-build/0.2/tests task/golang-build/0.3/tests task/golang-fuzz/0.1/tests task/golang-test/0.1/tests task/golang-test/0.2/tests task/golangci-lint/0.1/tests task/golangci-lint/0.2/tests task/gradle/0.1/tests task/gradle/0.2/tests task/gradle/0.3/tests task/gradle/0.4/tests task/grype/0.1/tests task/hadolint/0.1/tests task/helm-render-manifests-from-repo/0.1/tests task/helm-upgrade-from-repo/0.1/tests task/helm-upgrade-from-repo/0.2/tests task/helm-upgrade-from-repo/0.3/tests task/helm-upgrade-from-source/0.1/tests task/helm-upgrade-from-source/0.2/tests task/helm-upgrade-from-source/0.3/tests task/helm-upgrade-from-source/0.4/tests task/hugo/0.1/tests task/jenkins/0.1/tests task/jib-gradle/0.1/tests task/jib-gradle/0.2/tests task/jib-gradle/0.3/tests task/jib-gradle/0.4/tests task/jib-maven/0.1/tests task/jib-maven/0.2/tests task/jib-maven/0.3/tests task/jib-maven/0.4/tests task/jib-maven/0.5/tests task/jq/0.1/tests task/kamel-run/0.1/tests task/kaniko/0.1/tests task/kaniko/0.2/tests task/kaniko/0.3/tests task/kaniko/0.4/tests task/kaniko/0.5/tests task/kaniko/0.6/tests task/kaniko/0.7/tests task/kind/0.1/tests task/ko/0.1/tests task/kube-linter/0.1/tests task/kubeconfig-creator/0.1/tests task/kubeconfig-creator/0.2/tests task/kubernetes-actions/0.2/tests task/kythe-go/0.1/tests task/kythe-go/0.2/tests task/markdown-lint/0.1/tests task/maven/0.1/tests task/maven/0.2/tests task/maven/0.3/tests task/maven/0.4/tests task/mypy-lint/0.1/tests task/mypy-lint/0.2/tests task/npm/0.1/tests task/openshift-client/0.1/tests task/openshift-client/0.2/tests task/orka-deploy/0.1/tests task/orka-deploy/0.2/tests task/orka-full/0.1/tests task/orka-full/0.2/tests task/orka-init/0.1/tests task/orka-init/0.2/tests task/orka-teardown/0.1/tests task/orka-teardown/0.2/tests task/pluto/0.1/tests task/powershell/0.1/tests task/prettier/0.1/tests task/pull-request/0.1/tests task/pull-request/0.2/tests task/pylint/0.1/tests task/pylint/0.2/tests task/pylint/0.3/tests task/pytest/0.1/tests task/pytest/0.2/tests task/python-coverage/0.1/tests task/redhat-codeready-dependency-analysis/0.1/tests task/redhat-dependency-analytics/0.1/tests task/redhat-dependency-analytics/0.2/tests task/replace-tokens/0.1/tests task/robot-framework/0.1/tests task/ruby-lint/0.1/tests task/s2i/0.1/tests task/s2i/0.2/tests task/s2i/0.3/tests task/shellcheck/0.1/tests task/shp/0.1/tests task/skopeo-copy/0.1/tests task/skopeo-copy/0.2/tests task/skopeo-copy/0.3/tests task/skopeo-copy/0.4/tests task/sonarqube-scanner/0.2/tests task/sonarqube-scanner/0.3/tests task/sonarqube-scanner/0.4/tests task/syft/0.1/tests task/tekton-catalog-publish/0.1/tests task/tekton-catalog-publish/0.2/tests task/tkn/0.2/tests task/tkn/0.3/tests task/tkn/0.4/tests task/tkn/0.5/tests task/trigger-jenkins-job/0.1/tests task/trivy-scanner/0.1/tests task/trivy-scanner/0.2/tests task/ts-lint/0.1/tests task/upload-pypi/0.2/tests task/valint/0.1/tests task/wget/0.1/tests task/write-file/0.1/tests task/yaml-lint/0.1/tests task/yq/0.1/tests task/yq/0.2/tests task/yq/0.3/tests task/yq/0.4/tests' + kubectl create ns tasks-ns namespace/tasks-ns created + local runtest + for runtest in ${all_tasks} + local runtestdir=ansible-builder/0.1/tests + local testname=ansible-builder + runtest=task/ansible-builder/0.1/ + '[' '!' -d task/ansible-builder ']' + runtest=task/ansible-builder/0.1/ansible-builder.yaml + skipit= + cat task/ansible-builder/0.1/ansible-builder.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=ansible-runner/0.1/tests + local testname=ansible-runner + runtest=task/ansible-runner/0.1/ + '[' '!' -d task/ansible-runner ']' + runtest=task/ansible-runner/0.1/ansible-runner.yaml + skipit= + cat task/ansible-runner/0.1/ansible-runner.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=ansible-runner/0.2/tests + local testname=ansible-runner + runtest=task/ansible-runner/0.2/ + '[' '!' -d task/ansible-runner ']' + runtest=task/ansible-runner/0.2/ansible-runner.yaml + skipit= + cat task/ansible-runner/0.2/ansible-runner.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=asciidoctor/0.1/tests + local testname=asciidoctor + runtest=task/asciidoctor/0.1/ + '[' '!' -d task/asciidoctor ']' + runtest=task/asciidoctor/0.1/asciidoctor.yaml + skipit= + cat task/asciidoctor/0.1/asciidoctor.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking asciidoctor' Checking asciidoctor + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/asciidoctor/0.1/asciidoctor.yaml task.tekton.dev/asciidoctor created + for runtest in ${all_tasks} + local runtestdir=bentoml/0.1/tests + local testname=bentoml + runtest=task/bentoml/0.1/ + '[' '!' -d task/bentoml ']' + runtest=task/bentoml/0.1/bentoml.yaml + skipit= + cat task/bentoml/0.1/bentoml.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking bentoml' Checking bentoml + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/bentoml/0.1/bentoml.yaml task.tekton.dev/bentoml created + for runtest in ${all_tasks} + local runtestdir=black/0.1/tests + local testname=black + runtest=task/black/0.1/ + '[' '!' -d task/black ']' + runtest=task/black/0.1/black.yaml + skipit= + cat task/black/0.1/black.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=black/0.2/tests + local testname=black + runtest=task/black/0.2/ + '[' '!' -d task/black ']' + runtest=task/black/0.2/black.yaml + skipit= + cat task/black/0.2/black.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking black' Checking black + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/black/0.2/black.yaml task.tekton.dev/black created + for runtest in ${all_tasks} + local runtestdir=blue-green-deploy/0.1/tests + local testname=blue-green-deploy + runtest=task/blue-green-deploy/0.1/ + '[' '!' -d task/blue-green-deploy ']' + runtest=task/blue-green-deploy/0.1/blue-green-deploy.yaml + skipit= + cat task/blue-green-deploy/0.1/blue-green-deploy.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=blue-green-deploy/0.2/tests + local testname=blue-green-deploy + runtest=task/blue-green-deploy/0.2/ + '[' '!' -d task/blue-green-deploy ']' + runtest=task/blue-green-deploy/0.2/blue-green-deploy.yaml + skipit= + cat task/blue-green-deploy/0.2/blue-green-deploy.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking blue-green-deploy' Checking blue-green-deploy + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/blue-green-deploy/0.2/blue-green-deploy.yaml task.tekton.dev/blue-green-deploy created + for runtest in ${all_tasks} + local runtestdir=buildah/0.1/tests + local testname=buildah + runtest=task/buildah/0.1/ + '[' '!' -d task/buildah ']' + runtest=task/buildah/0.1/buildah.yaml + skipit= + cat task/buildah/0.1/buildah.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=buildah/0.2/tests + local testname=buildah + runtest=task/buildah/0.2/ + '[' '!' -d task/buildah ']' + runtest=task/buildah/0.2/buildah.yaml + skipit= + cat task/buildah/0.2/buildah.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=buildah/0.3/tests + local testname=buildah + runtest=task/buildah/0.3/ + '[' '!' -d task/buildah ']' + runtest=task/buildah/0.3/buildah.yaml + skipit= + cat task/buildah/0.3/buildah.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=buildah/0.4/tests + local testname=buildah + runtest=task/buildah/0.4/ + '[' '!' -d task/buildah ']' + runtest=task/buildah/0.4/buildah.yaml + skipit= + cat task/buildah/0.4/buildah.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=buildah/0.5/tests + local testname=buildah + runtest=task/buildah/0.5/ + '[' '!' -d task/buildah ']' + runtest=task/buildah/0.5/buildah.yaml + skipit= + cat task/buildah/0.5/buildah.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=buildah/0.6/tests + local testname=buildah + runtest=task/buildah/0.6/ + '[' '!' -d task/buildah ']' + runtest=task/buildah/0.6/buildah.yaml + skipit= + cat task/buildah/0.6/buildah.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=buildah/0.7/tests + local testname=buildah + runtest=task/buildah/0.7/ + '[' '!' -d task/buildah ']' + runtest=task/buildah/0.7/buildah.yaml + skipit= + cat task/buildah/0.7/buildah.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=buildah/0.8/tests + local testname=buildah + runtest=task/buildah/0.8/ + '[' '!' -d task/buildah ']' + runtest=task/buildah/0.8/buildah.yaml + skipit= + cat task/buildah/0.8/buildah.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=buildah/0.9/tests + local testname=buildah + runtest=task/buildah/0.9/ + '[' '!' -d task/buildah ']' + runtest=task/buildah/0.9/buildah.yaml + skipit= + cat task/buildah/0.9/buildah.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking buildah' Checking buildah + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/buildah/0.9/buildah.yaml task.tekton.dev/buildah created + for runtest in ${all_tasks} + local runtestdir=buildpacks-phases/0.1/tests + local testname=buildpacks-phases + runtest=task/buildpacks-phases/0.1/ + '[' '!' -d task/buildpacks-phases ']' + runtest=task/buildpacks-phases/0.1/buildpacks-phases.yaml + skipit= + cat task/buildpacks-phases/0.1/buildpacks-phases.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=buildpacks-phases/0.2/tests + local testname=buildpacks-phases + runtest=task/buildpacks-phases/0.2/ + '[' '!' -d task/buildpacks-phases ']' + runtest=task/buildpacks-phases/0.2/buildpacks-phases.yaml + skipit= + cat task/buildpacks-phases/0.2/buildpacks-phases.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=buildpacks-phases/0.3/tests + local testname=buildpacks-phases + runtest=task/buildpacks-phases/0.3/ + '[' '!' -d task/buildpacks-phases ']' + runtest=task/buildpacks-phases/0.3/buildpacks-phases.yaml + skipit= + cat task/buildpacks-phases/0.3/buildpacks-phases.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking buildpacks-phases' Checking buildpacks-phases + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/buildpacks-phases/0.3/buildpacks-phases.yaml task.tekton.dev/buildpacks-phases created + for runtest in ${all_tasks} + local runtestdir=buildpacks/0.1/tests + local testname=buildpacks + runtest=task/buildpacks/0.1/ + '[' '!' -d task/buildpacks ']' + runtest=task/buildpacks/0.1/buildpacks.yaml + skipit= + cat task/buildpacks/0.1/buildpacks.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=buildpacks/0.2/tests + local testname=buildpacks + runtest=task/buildpacks/0.2/ + '[' '!' -d task/buildpacks ']' + runtest=task/buildpacks/0.2/buildpacks.yaml + skipit= + cat task/buildpacks/0.2/buildpacks.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=buildpacks/0.3/tests + local testname=buildpacks + runtest=task/buildpacks/0.3/ + '[' '!' -d task/buildpacks ']' + runtest=task/buildpacks/0.3/buildpacks.yaml + skipit= + cat task/buildpacks/0.3/buildpacks.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=buildpacks/0.4/tests + local testname=buildpacks + runtest=task/buildpacks/0.4/ + '[' '!' -d task/buildpacks ']' + runtest=task/buildpacks/0.4/buildpacks.yaml + skipit= + cat task/buildpacks/0.4/buildpacks.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=buildpacks/0.5/tests + local testname=buildpacks + runtest=task/buildpacks/0.5/ + '[' '!' -d task/buildpacks ']' + runtest=task/buildpacks/0.5/buildpacks.yaml + skipit= + cat task/buildpacks/0.5/buildpacks.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=buildpacks/0.6/tests + local testname=buildpacks + runtest=task/buildpacks/0.6/ + '[' '!' -d task/buildpacks ']' + runtest=task/buildpacks/0.6/buildpacks.yaml + skipit= + cat task/buildpacks/0.6/buildpacks.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking buildpacks' Checking buildpacks + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/buildpacks/0.6/buildpacks.yaml task.tekton.dev/buildpacks created + for runtest in ${all_tasks} + local runtestdir=check-make/0.1/tests + local testname=check-make + runtest=task/check-make/0.1/ + '[' '!' -d task/check-make ']' + runtest=task/check-make/0.1/check-make.yaml + skipit= + cat task/check-make/0.1/check-make.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking check-make' Checking check-make + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/check-make/0.1/check-make.yaml task.tekton.dev/check-make created + for runtest in ${all_tasks} + local runtestdir=codecov/0.1/tests + local testname=codecov + runtest=task/codecov/0.1/ + '[' '!' -d task/codecov ']' + runtest=task/codecov/0.1/codecov.yaml + skipit= + cat task/codecov/0.1/codecov.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=codecov/0.2/tests + local testname=codecov + runtest=task/codecov/0.2/ + '[' '!' -d task/codecov ']' + runtest=task/codecov/0.2/codecov.yaml + skipit= + cat task/codecov/0.2/codecov.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking codecov' Checking codecov + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/codecov/0.2/codecov.yaml task.tekton.dev/codecov created + for runtest in ${all_tasks} + local runtestdir=curl/0.1/tests + local testname=curl + runtest=task/curl/0.1/ + '[' '!' -d task/curl ']' + runtest=task/curl/0.1/curl.yaml + skipit= + cat task/curl/0.1/curl.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking curl' Checking curl + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/curl/0.1/curl.yaml task.tekton.dev/curl created + for runtest in ${all_tasks} + local runtestdir=docker-build/0.1/tests + local testname=docker-build + runtest=task/docker-build/0.1/ + '[' '!' -d task/docker-build ']' + runtest=task/docker-build/0.1/docker-build.yaml + skipit= + cat task/docker-build/0.1/docker-build.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking docker-build' Checking docker-build + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/docker-build/0.1/docker-build.yaml task.tekton.dev/docker-build created + for runtest in ${all_tasks} + local runtestdir=dockerslim-build/0.1/tests + local testname=dockerslim-build + runtest=task/dockerslim-build/0.1/ + '[' '!' -d task/dockerslim-build ']' + runtest=task/dockerslim-build/0.1/dockerslim-build.yaml + skipit= + cat task/dockerslim-build/0.1/dockerslim-build.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=flake8/0.1/tests + local testname=flake8 + runtest=task/flake8/0.1/ + '[' '!' -d task/flake8 ']' + runtest=task/flake8/0.1/flake8.yaml + skipit= + cat task/flake8/0.1/flake8.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking flake8' Checking flake8 + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/flake8/0.1/flake8.yaml task.tekton.dev/flake8 created + for runtest in ${all_tasks} + local runtestdir=gcloud/0.3/tests + local testname=gcloud + runtest=task/gcloud/0.3/ + '[' '!' -d task/gcloud ']' + runtest=task/gcloud/0.3/gcloud.yaml + skipit= + cat task/gcloud/0.3/gcloud.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking gcloud' Checking gcloud + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/gcloud/0.3/gcloud.yaml task.tekton.dev/gcloud created + for runtest in ${all_tasks} + local runtestdir=generate-build-id/0.1/tests + local testname=generate-build-id + runtest=task/generate-build-id/0.1/ + '[' '!' -d task/generate-build-id ']' + runtest=task/generate-build-id/0.1/generate-build-id.yaml + skipit= + cat task/generate-build-id/0.1/generate-build-id.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking generate-build-id' Checking generate-build-id + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/generate-build-id/0.1/generate-build-id.yaml task.tekton.dev/generate-build-id created + for runtest in ${all_tasks} + local runtestdir=git-batch-merge/0.1/tests + local testname=git-batch-merge + runtest=task/git-batch-merge/0.1/ + '[' '!' -d task/git-batch-merge ']' + runtest=task/git-batch-merge/0.1/git-batch-merge.yaml + skipit= + cat task/git-batch-merge/0.1/git-batch-merge.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=git-batch-merge/0.2/tests + local testname=git-batch-merge + runtest=task/git-batch-merge/0.2/ + '[' '!' -d task/git-batch-merge ']' + runtest=task/git-batch-merge/0.2/git-batch-merge.yaml + skipit= + cat task/git-batch-merge/0.2/git-batch-merge.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=git-batch-merge/0.3/tests + local testname=git-batch-merge + runtest=task/git-batch-merge/0.3/ + '[' '!' -d task/git-batch-merge ']' + runtest=task/git-batch-merge/0.3/git-batch-merge.yaml + skipit= + cat task/git-batch-merge/0.3/git-batch-merge.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking git-batch-merge' Checking git-batch-merge + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/git-batch-merge/0.3/git-batch-merge.yaml task.tekton.dev/git-batch-merge created + for runtest in ${all_tasks} + local runtestdir=git-cli/0.1/tests + local testname=git-cli + runtest=task/git-cli/0.1/ + '[' '!' -d task/git-cli ']' + runtest=task/git-cli/0.1/git-cli.yaml + skipit= + cat task/git-cli/0.1/git-cli.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=git-cli/0.2/tests + local testname=git-cli + runtest=task/git-cli/0.2/ + '[' '!' -d task/git-cli ']' + runtest=task/git-cli/0.2/git-cli.yaml + skipit= + cat task/git-cli/0.2/git-cli.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=git-cli/0.3/tests + local testname=git-cli + runtest=task/git-cli/0.3/ + '[' '!' -d task/git-cli ']' + runtest=task/git-cli/0.3/git-cli.yaml + skipit= + cat task/git-cli/0.3/git-cli.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=git-cli/0.4/tests + local testname=git-cli + runtest=task/git-cli/0.4/ + '[' '!' -d task/git-cli ']' + runtest=task/git-cli/0.4/git-cli.yaml + skipit= + cat task/git-cli/0.4/git-cli.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking git-cli' Checking git-cli + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/git-cli/0.4/git-cli.yaml task.tekton.dev/git-cli created + for runtest in ${all_tasks} + local runtestdir=git-clone/0.1/tests + local testname=git-clone + runtest=task/git-clone/0.1/ + '[' '!' -d task/git-clone ']' + runtest=task/git-clone/0.1/git-clone.yaml + skipit= + cat task/git-clone/0.1/git-clone.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=git-clone/0.10/tests + local testname=git-clone + runtest=task/git-clone/0.10/ + '[' '!' -d task/git-clone ']' + runtest=task/git-clone/0.10/git-clone.yaml + skipit= + cat task/git-clone/0.10/git-clone.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking git-clone' Checking git-clone + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/git-clone/0.10/git-clone.yaml task.tekton.dev/git-clone created + for runtest in ${all_tasks} + local runtestdir=git-clone/0.2/tests + local testname=git-clone + runtest=task/git-clone/0.2/ + '[' '!' -d task/git-clone ']' + runtest=task/git-clone/0.2/git-clone.yaml + skipit= + cat task/git-clone/0.2/git-clone.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=git-clone/0.3/tests + local testname=git-clone + runtest=task/git-clone/0.3/ + '[' '!' -d task/git-clone ']' + runtest=task/git-clone/0.3/git-clone.yaml + skipit= + grep 'tekton.dev/deprecated: \"true\"' + cat task/git-clone/0.3/git-clone.yaml tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=git-clone/0.4/tests + local testname=git-clone + runtest=task/git-clone/0.4/ + '[' '!' -d task/git-clone ']' + runtest=task/git-clone/0.4/git-clone.yaml + skipit= + cat task/git-clone/0.4/git-clone.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=git-clone/0.5/tests + local testname=git-clone + runtest=task/git-clone/0.5/ + '[' '!' -d task/git-clone ']' + runtest=task/git-clone/0.5/git-clone.yaml + skipit= + cat task/git-clone/0.5/git-clone.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=git-clone/0.6/tests + local testname=git-clone + runtest=task/git-clone/0.6/ + '[' '!' -d task/git-clone ']' + runtest=task/git-clone/0.6/git-clone.yaml + skipit= + grep 'tekton.dev/deprecated: \"true\"' + cat task/git-clone/0.6/git-clone.yaml tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=git-clone/0.7/tests + local testname=git-clone + runtest=task/git-clone/0.7/ + '[' '!' -d task/git-clone ']' + runtest=task/git-clone/0.7/git-clone.yaml + skipit= + cat task/git-clone/0.7/git-clone.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=git-clone/0.8/tests + local testname=git-clone + runtest=task/git-clone/0.8/ + '[' '!' -d task/git-clone ']' + runtest=task/git-clone/0.8/git-clone.yaml + skipit= + cat task/git-clone/0.8/git-clone.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=git-clone/0.9/tests + local testname=git-clone + runtest=task/git-clone/0.9/ + '[' '!' -d task/git-clone ']' + runtest=task/git-clone/0.9/git-clone.yaml + skipit= + cat task/git-clone/0.9/git-clone.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=git-version/0.1/tests + local testname=git-version + runtest=task/git-version/0.1/ + '[' '!' -d task/git-version ']' + runtest=task/git-version/0.1/git-version.yaml + skipit= + cat task/git-version/0.1/git-version.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking git-version' Checking git-version + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/git-version/0.1/git-version.yaml task.tekton.dev/git-version created + for runtest in ${all_tasks} + local runtestdir=gitea-set-status/0.1/tests + local testname=gitea-set-status + runtest=task/gitea-set-status/0.1/ + '[' '!' -d task/gitea-set-status ']' + runtest=task/gitea-set-status/0.1/gitea-set-status.yaml + skipit= + cat task/gitea-set-status/0.1/gitea-set-status.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking gitea-set-status' Checking gitea-set-status + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/gitea-set-status/0.1/gitea-set-status.yaml task.tekton.dev/gitea-set-status created + for runtest in ${all_tasks} + local runtestdir=github-add-comment/0.1/tests + local testname=github-add-comment + runtest=task/github-add-comment/0.1/ + '[' '!' -d task/github-add-comment ']' + runtest=task/github-add-comment/0.1/github-add-comment.yaml + skipit= + grep 'tekton.dev/deprecated: \"true\"' + cat task/github-add-comment/0.1/github-add-comment.yaml tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=github-add-comment/0.2/tests + local testname=github-add-comment + runtest=task/github-add-comment/0.2/ + '[' '!' -d task/github-add-comment ']' + runtest=task/github-add-comment/0.2/github-add-comment.yaml + skipit= + cat task/github-add-comment/0.2/github-add-comment.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=github-add-comment/0.3/tests + local testname=github-add-comment + runtest=task/github-add-comment/0.3/ + '[' '!' -d task/github-add-comment ']' + runtest=task/github-add-comment/0.3/github-add-comment.yaml + skipit= + cat task/github-add-comment/0.3/github-add-comment.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=github-add-comment/0.4/tests + local testname=github-add-comment + runtest=task/github-add-comment/0.4/ + '[' '!' -d task/github-add-comment ']' + runtest=task/github-add-comment/0.4/github-add-comment.yaml + skipit= + cat task/github-add-comment/0.4/github-add-comment.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=github-add-comment/0.5/tests + local testname=github-add-comment + runtest=task/github-add-comment/0.5/ + '[' '!' -d task/github-add-comment ']' + runtest=task/github-add-comment/0.5/github-add-comment.yaml + skipit= + cat task/github-add-comment/0.5/github-add-comment.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=github-add-comment/0.6/tests + local testname=github-add-comment + runtest=task/github-add-comment/0.6/ + '[' '!' -d task/github-add-comment ']' + runtest=task/github-add-comment/0.6/github-add-comment.yaml + skipit= + cat task/github-add-comment/0.6/github-add-comment.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=github-add-comment/0.7/tests + local testname=github-add-comment + runtest=task/github-add-comment/0.7/ + '[' '!' -d task/github-add-comment ']' + runtest=task/github-add-comment/0.7/github-add-comment.yaml + skipit= + cat task/github-add-comment/0.7/github-add-comment.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking github-add-comment' Checking github-add-comment + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/github-add-comment/0.7/github-add-comment.yaml task.tekton.dev/github-add-comment created + for runtest in ${all_tasks} + local runtestdir=github-add-gist/0.1/tests + local testname=github-add-gist + runtest=task/github-add-gist/0.1/ + '[' '!' -d task/github-add-gist ']' + runtest=task/github-add-gist/0.1/github-add-gist.yaml + skipit= + cat task/github-add-gist/0.1/github-add-gist.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=github-add-gist/0.2/tests + local testname=github-add-gist + runtest=task/github-add-gist/0.2/ + '[' '!' -d task/github-add-gist ']' + runtest=task/github-add-gist/0.2/github-add-gist.yaml + skipit= + cat task/github-add-gist/0.2/github-add-gist.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking github-add-gist' Checking github-add-gist + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/github-add-gist/0.2/github-add-gist.yaml task.tekton.dev/github-add-gist created + for runtest in ${all_tasks} + local runtestdir=github-create-deployment-status/0.1/tests + local testname=github-create-deployment-status + runtest=task/github-create-deployment-status/0.1/ + '[' '!' -d task/github-create-deployment-status ']' + runtest=task/github-create-deployment-status/0.1/github-create-deployment-status.yaml + skipit= + cat task/github-create-deployment-status/0.1/github-create-deployment-status.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking github-create-deployment-status' Checking github-create-deployment-status + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/github-create-deployment-status/0.1/github-create-deployment-status.yaml task.tekton.dev/github-create-deployment-status created + for runtest in ${all_tasks} + local runtestdir=github-create-deployment/0.2/tests + local testname=github-create-deployment + runtest=task/github-create-deployment/0.2/ + '[' '!' -d task/github-create-deployment ']' + runtest=task/github-create-deployment/0.2/github-create-deployment.yaml + skipit= + cat task/github-create-deployment/0.2/github-create-deployment.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking github-create-deployment' Checking github-create-deployment + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/github-create-deployment/0.2/github-create-deployment.yaml task.tekton.dev/github-create-deployment created + for runtest in ${all_tasks} + local runtestdir=github-open-pr/0.1/tests + local testname=github-open-pr + runtest=task/github-open-pr/0.1/ + '[' '!' -d task/github-open-pr ']' + runtest=task/github-open-pr/0.1/github-open-pr.yaml + skipit= + cat task/github-open-pr/0.1/github-open-pr.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=github-open-pr/0.2/tests + local testname=github-open-pr + runtest=task/github-open-pr/0.2/ + '[' '!' -d task/github-open-pr ']' + runtest=task/github-open-pr/0.2/github-open-pr.yaml + skipit= + cat task/github-open-pr/0.2/github-open-pr.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking github-open-pr' Checking github-open-pr + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/github-open-pr/0.2/github-open-pr.yaml task.tekton.dev/github-open-pr created + for runtest in ${all_tasks} + local runtestdir=github-request-reviewers/0.1/tests + local testname=github-request-reviewers + runtest=task/github-request-reviewers/0.1/ + '[' '!' -d task/github-request-reviewers ']' + runtest=task/github-request-reviewers/0.1/github-request-reviewers.yaml + skipit= + cat task/github-request-reviewers/0.1/github-request-reviewers.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking github-request-reviewers' Checking github-request-reviewers + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/github-request-reviewers/0.1/github-request-reviewers.yaml task.tekton.dev/github-request-reviewers created + for runtest in ${all_tasks} + local runtestdir=github-set-status/0.4/tests + local testname=github-set-status + runtest=task/github-set-status/0.4/ + '[' '!' -d task/github-set-status ']' + runtest=task/github-set-status/0.4/github-set-status.yaml + skipit= + cat task/github-set-status/0.4/github-set-status.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking github-set-status' Checking github-set-status + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/github-set-status/0.4/github-set-status.yaml task.tekton.dev/github-set-status created + for runtest in ${all_tasks} + local runtestdir=gitlab-set-status/0.1/tests + local testname=gitlab-set-status + runtest=task/gitlab-set-status/0.1/ + '[' '!' -d task/gitlab-set-status ']' + runtest=task/gitlab-set-status/0.1/gitlab-set-status.yaml + skipit= + cat task/gitlab-set-status/0.1/gitlab-set-status.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=gitlab-set-status/0.2/tests + local testname=gitlab-set-status + runtest=task/gitlab-set-status/0.2/ + '[' '!' -d task/gitlab-set-status ']' + runtest=task/gitlab-set-status/0.2/gitlab-set-status.yaml + skipit= + cat task/gitlab-set-status/0.2/gitlab-set-status.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking gitlab-set-status' Checking gitlab-set-status + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/gitlab-set-status/0.2/gitlab-set-status.yaml task.tekton.dev/gitlab-set-status created + for runtest in ${all_tasks} + local runtestdir=gitleaks/0.1/tests + local testname=gitleaks + runtest=task/gitleaks/0.1/ + '[' '!' -d task/gitleaks ']' + runtest=task/gitleaks/0.1/gitleaks.yaml + skipit= + cat task/gitleaks/0.1/gitleaks.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=golang-build/0.1/tests + local testname=golang-build + runtest=task/golang-build/0.1/ + '[' '!' -d task/golang-build ']' + runtest=task/golang-build/0.1/golang-build.yaml + skipit= + cat task/golang-build/0.1/golang-build.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=golang-build/0.2/tests + local testname=golang-build + runtest=task/golang-build/0.2/ + '[' '!' -d task/golang-build ']' + runtest=task/golang-build/0.2/golang-build.yaml + skipit= + cat task/golang-build/0.2/golang-build.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=golang-build/0.3/tests + local testname=golang-build + runtest=task/golang-build/0.3/ + '[' '!' -d task/golang-build ']' + runtest=task/golang-build/0.3/golang-build.yaml + skipit= + cat task/golang-build/0.3/golang-build.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking golang-build' Checking golang-build + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/golang-build/0.3/golang-build.yaml task.tekton.dev/golang-build created + for runtest in ${all_tasks} + local runtestdir=golang-fuzz/0.1/tests + local testname=golang-fuzz + runtest=task/golang-fuzz/0.1/ + '[' '!' -d task/golang-fuzz ']' + runtest=task/golang-fuzz/0.1/golang-fuzz.yaml + skipit= + cat task/golang-fuzz/0.1/golang-fuzz.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=golang-test/0.1/tests + local testname=golang-test + runtest=task/golang-test/0.1/ + '[' '!' -d task/golang-test ']' + runtest=task/golang-test/0.1/golang-test.yaml + skipit= + cat task/golang-test/0.1/golang-test.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=golang-test/0.2/tests + local testname=golang-test + runtest=task/golang-test/0.2/ + '[' '!' -d task/golang-test ']' + runtest=task/golang-test/0.2/golang-test.yaml + skipit= + cat task/golang-test/0.2/golang-test.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking golang-test' Checking golang-test + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/golang-test/0.2/golang-test.yaml task.tekton.dev/golang-test created + for runtest in ${all_tasks} + local runtestdir=golangci-lint/0.1/tests + local testname=golangci-lint + runtest=task/golangci-lint/0.1/ + '[' '!' -d task/golangci-lint ']' + runtest=task/golangci-lint/0.1/golangci-lint.yaml + skipit= + cat task/golangci-lint/0.1/golangci-lint.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=golangci-lint/0.2/tests + local testname=golangci-lint + runtest=task/golangci-lint/0.2/ + '[' '!' -d task/golangci-lint ']' + runtest=task/golangci-lint/0.2/golangci-lint.yaml + skipit= + cat task/golangci-lint/0.2/golangci-lint.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking golangci-lint' Checking golangci-lint + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/golangci-lint/0.2/golangci-lint.yaml task.tekton.dev/golangci-lint created + for runtest in ${all_tasks} + local runtestdir=gradle/0.1/tests + local testname=gradle + runtest=task/gradle/0.1/ + '[' '!' -d task/gradle ']' + runtest=task/gradle/0.1/gradle.yaml + skipit= + cat task/gradle/0.1/gradle.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=gradle/0.2/tests + local testname=gradle + runtest=task/gradle/0.2/ + '[' '!' -d task/gradle ']' + runtest=task/gradle/0.2/gradle.yaml + skipit= + grep 'tekton.dev/deprecated: \"true\"' + cat task/gradle/0.2/gradle.yaml tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=gradle/0.3/tests + local testname=gradle + runtest=task/gradle/0.3/ + '[' '!' -d task/gradle ']' + runtest=task/gradle/0.3/gradle.yaml + skipit= + cat task/gradle/0.3/gradle.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=gradle/0.4/tests + local testname=gradle + runtest=task/gradle/0.4/ + '[' '!' -d task/gradle ']' + runtest=task/gradle/0.4/gradle.yaml + skipit= + cat task/gradle/0.4/gradle.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking gradle' Checking gradle + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/gradle/0.4/gradle.yaml task.tekton.dev/gradle created + for runtest in ${all_tasks} + local runtestdir=grype/0.1/tests + local testname=grype + runtest=task/grype/0.1/ + '[' '!' -d task/grype ']' + runtest=task/grype/0.1/grype.yaml + skipit= + grep 'tekton.dev/deprecated: \"true\"' + cat task/grype/0.1/grype.yaml tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=hadolint/0.1/tests + local testname=hadolint + runtest=task/hadolint/0.1/ + '[' '!' -d task/hadolint ']' + runtest=task/hadolint/0.1/hadolint.yaml + skipit= + cat task/hadolint/0.1/hadolint.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking hadolint' Checking hadolint + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/hadolint/0.1/hadolint.yaml task.tekton.dev/hadolint created + for runtest in ${all_tasks} + local runtestdir=helm-render-manifests-from-repo/0.1/tests + local testname=helm-render-manifests-from-repo + runtest=task/helm-render-manifests-from-repo/0.1/ + '[' '!' -d task/helm-render-manifests-from-repo ']' + runtest=task/helm-render-manifests-from-repo/0.1/helm-render-manifests-from-repo.yaml + skipit= + cat task/helm-render-manifests-from-repo/0.1/helm-render-manifests-from-repo.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking helm-render-manifests-from-repo' Checking helm-render-manifests-from-repo + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/helm-render-manifests-from-repo/0.1/helm-render-manifests-from-repo.yaml task.tekton.dev/helm-render-manifests-from-repo created + for runtest in ${all_tasks} + local runtestdir=helm-upgrade-from-repo/0.1/tests + local testname=helm-upgrade-from-repo + runtest=task/helm-upgrade-from-repo/0.1/ + '[' '!' -d task/helm-upgrade-from-repo ']' + runtest=task/helm-upgrade-from-repo/0.1/helm-upgrade-from-repo.yaml + skipit= + grep 'tekton.dev/deprecated: \"true\"' + cat task/helm-upgrade-from-repo/0.1/helm-upgrade-from-repo.yaml tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=helm-upgrade-from-repo/0.2/tests + local testname=helm-upgrade-from-repo + runtest=task/helm-upgrade-from-repo/0.2/ + '[' '!' -d task/helm-upgrade-from-repo ']' + runtest=task/helm-upgrade-from-repo/0.2/helm-upgrade-from-repo.yaml + skipit= + cat task/helm-upgrade-from-repo/0.2/helm-upgrade-from-repo.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=helm-upgrade-from-repo/0.3/tests + local testname=helm-upgrade-from-repo + runtest=task/helm-upgrade-from-repo/0.3/ + '[' '!' -d task/helm-upgrade-from-repo ']' + runtest=task/helm-upgrade-from-repo/0.3/helm-upgrade-from-repo.yaml + skipit= + grep 'tekton.dev/deprecated: \"true\"' + cat task/helm-upgrade-from-repo/0.3/helm-upgrade-from-repo.yaml + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking helm-upgrade-from-repo' Checking helm-upgrade-from-repo + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/helm-upgrade-from-repo/0.3/helm-upgrade-from-repo.yaml task.tekton.dev/helm-upgrade-from-repo created + for runtest in ${all_tasks} + local runtestdir=helm-upgrade-from-source/0.1/tests + local testname=helm-upgrade-from-source + runtest=task/helm-upgrade-from-source/0.1/ + '[' '!' -d task/helm-upgrade-from-source ']' + runtest=task/helm-upgrade-from-source/0.1/helm-upgrade-from-source.yaml + skipit= + cat task/helm-upgrade-from-source/0.1/helm-upgrade-from-source.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=helm-upgrade-from-source/0.2/tests + local testname=helm-upgrade-from-source + runtest=task/helm-upgrade-from-source/0.2/ + '[' '!' -d task/helm-upgrade-from-source ']' + runtest=task/helm-upgrade-from-source/0.2/helm-upgrade-from-source.yaml + skipit= + cat task/helm-upgrade-from-source/0.2/helm-upgrade-from-source.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=helm-upgrade-from-source/0.3/tests + local testname=helm-upgrade-from-source + runtest=task/helm-upgrade-from-source/0.3/ + '[' '!' -d task/helm-upgrade-from-source ']' + runtest=task/helm-upgrade-from-source/0.3/helm-upgrade-from-source.yaml + skipit= + grep 'tekton.dev/deprecated: \"true\"' + cat task/helm-upgrade-from-source/0.3/helm-upgrade-from-source.yaml tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=helm-upgrade-from-source/0.4/tests + local testname=helm-upgrade-from-source + runtest=task/helm-upgrade-from-source/0.4/ + '[' '!' -d task/helm-upgrade-from-source ']' + runtest=task/helm-upgrade-from-source/0.4/helm-upgrade-from-source.yaml + skipit= + cat task/helm-upgrade-from-source/0.4/helm-upgrade-from-source.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking helm-upgrade-from-source' Checking helm-upgrade-from-source + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/helm-upgrade-from-source/0.4/helm-upgrade-from-source.yaml task.tekton.dev/helm-upgrade-from-source created + for runtest in ${all_tasks} + local runtestdir=hugo/0.1/tests + local testname=hugo + runtest=task/hugo/0.1/ + '[' '!' -d task/hugo ']' + runtest=task/hugo/0.1/hugo.yaml + skipit= + cat task/hugo/0.1/hugo.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking hugo' Checking hugo + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/hugo/0.1/hugo.yaml task.tekton.dev/hugo created + for runtest in ${all_tasks} + local runtestdir=jenkins/0.1/tests + local testname=jenkins + runtest=task/jenkins/0.1/ + '[' '!' -d task/jenkins ']' + runtest=task/jenkins/0.1/jenkins.yaml + skipit= + cat task/jenkins/0.1/jenkins.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking jenkins' Checking jenkins + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/jenkins/0.1/jenkins.yaml task.tekton.dev/jenkins created + for runtest in ${all_tasks} + local runtestdir=jib-gradle/0.1/tests + local testname=jib-gradle + runtest=task/jib-gradle/0.1/ + '[' '!' -d task/jib-gradle ']' + runtest=task/jib-gradle/0.1/jib-gradle.yaml + skipit= + cat task/jib-gradle/0.1/jib-gradle.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=jib-gradle/0.2/tests + local testname=jib-gradle + runtest=task/jib-gradle/0.2/ + '[' '!' -d task/jib-gradle ']' + runtest=task/jib-gradle/0.2/jib-gradle.yaml + skipit= + grep 'tekton.dev/deprecated: \"true\"' + cat task/jib-gradle/0.2/jib-gradle.yaml tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=jib-gradle/0.3/tests + local testname=jib-gradle + runtest=task/jib-gradle/0.3/ + '[' '!' -d task/jib-gradle ']' + runtest=task/jib-gradle/0.3/jib-gradle.yaml + skipit= + grep 'tekton.dev/deprecated: \"true\"' + cat task/jib-gradle/0.3/jib-gradle.yaml tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=jib-gradle/0.4/tests + local testname=jib-gradle + runtest=task/jib-gradle/0.4/ + '[' '!' -d task/jib-gradle ']' + runtest=task/jib-gradle/0.4/jib-gradle.yaml + skipit= + cat task/jib-gradle/0.4/jib-gradle.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking jib-gradle' Checking jib-gradle + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/jib-gradle/0.4/jib-gradle.yaml task.tekton.dev/jib-gradle created + for runtest in ${all_tasks} + local runtestdir=jib-maven/0.1/tests + local testname=jib-maven + runtest=task/jib-maven/0.1/ + '[' '!' -d task/jib-maven ']' + runtest=task/jib-maven/0.1/jib-maven.yaml + skipit= + cat task/jib-maven/0.1/jib-maven.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=jib-maven/0.2/tests + local testname=jib-maven + runtest=task/jib-maven/0.2/ + '[' '!' -d task/jib-maven ']' + runtest=task/jib-maven/0.2/jib-maven.yaml + skipit= + cat task/jib-maven/0.2/jib-maven.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=jib-maven/0.3/tests + local testname=jib-maven + runtest=task/jib-maven/0.3/ + '[' '!' -d task/jib-maven ']' + runtest=task/jib-maven/0.3/jib-maven.yaml + skipit= + cat task/jib-maven/0.3/jib-maven.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=jib-maven/0.4/tests + local testname=jib-maven + runtest=task/jib-maven/0.4/ + '[' '!' -d task/jib-maven ']' + runtest=task/jib-maven/0.4/jib-maven.yaml + skipit= + cat task/jib-maven/0.4/jib-maven.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=jib-maven/0.5/tests + local testname=jib-maven + runtest=task/jib-maven/0.5/ + '[' '!' -d task/jib-maven ']' + runtest=task/jib-maven/0.5/jib-maven.yaml + skipit= + cat task/jib-maven/0.5/jib-maven.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking jib-maven' Checking jib-maven + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/jib-maven/0.5/jib-maven.yaml task.tekton.dev/jib-maven created + for runtest in ${all_tasks} + local runtestdir=jq/0.1/tests + local testname=jq + runtest=task/jq/0.1/ + '[' '!' -d task/jq ']' + runtest=task/jq/0.1/jq.yaml + skipit= + cat task/jq/0.1/jq.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking jq' Checking jq + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/jq/0.1/jq.yaml task.tekton.dev/jq created + for runtest in ${all_tasks} + local runtestdir=kamel-run/0.1/tests + local testname=kamel-run + runtest=task/kamel-run/0.1/ + '[' '!' -d task/kamel-run ']' + runtest=task/kamel-run/0.1/kamel-run.yaml + skipit= + cat task/kamel-run/0.1/kamel-run.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking kamel-run' Checking kamel-run + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/kamel-run/0.1/kamel-run.yaml task.tekton.dev/kamel-run created + for runtest in ${all_tasks} + local runtestdir=kaniko/0.1/tests + local testname=kaniko + runtest=task/kaniko/0.1/ + '[' '!' -d task/kaniko ']' + runtest=task/kaniko/0.1/kaniko.yaml + skipit= + cat task/kaniko/0.1/kaniko.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=kaniko/0.2/tests + local testname=kaniko + runtest=task/kaniko/0.2/ + '[' '!' -d task/kaniko ']' + runtest=task/kaniko/0.2/kaniko.yaml + skipit= + cat task/kaniko/0.2/kaniko.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=kaniko/0.3/tests + local testname=kaniko + runtest=task/kaniko/0.3/ + '[' '!' -d task/kaniko ']' + runtest=task/kaniko/0.3/kaniko.yaml + skipit= + cat task/kaniko/0.3/kaniko.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=kaniko/0.4/tests + local testname=kaniko + runtest=task/kaniko/0.4/ + '[' '!' -d task/kaniko ']' + runtest=task/kaniko/0.4/kaniko.yaml + skipit= + cat task/kaniko/0.4/kaniko.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=kaniko/0.5/tests + local testname=kaniko + runtest=task/kaniko/0.5/ + '[' '!' -d task/kaniko ']' + runtest=task/kaniko/0.5/kaniko.yaml + skipit= + grep 'tekton.dev/deprecated: \"true\"' + cat task/kaniko/0.5/kaniko.yaml tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=kaniko/0.6/tests + local testname=kaniko + runtest=task/kaniko/0.6/ + '[' '!' -d task/kaniko ']' + runtest=task/kaniko/0.6/kaniko.yaml + skipit= + cat task/kaniko/0.6/kaniko.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=kaniko/0.7/tests + local testname=kaniko + runtest=task/kaniko/0.7/ + '[' '!' -d task/kaniko ']' + runtest=task/kaniko/0.7/kaniko.yaml + skipit= + cat task/kaniko/0.7/kaniko.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=kind/0.1/tests + local testname=kind + runtest=task/kind/0.1/ + '[' '!' -d task/kind ']' + runtest=task/kind/0.1/kind.yaml + skipit= + grep 'tekton.dev/deprecated: \"true\"' + cat task/kind/0.1/kind.yaml + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking kind' Checking kind + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/kind/0.1/kind.yaml task.tekton.dev/kind created + for runtest in ${all_tasks} + local runtestdir=ko/0.1/tests + local testname=ko + runtest=task/ko/0.1/ + '[' '!' -d task/ko ']' + runtest=task/ko/0.1/ko.yaml + skipit= + cat task/ko/0.1/ko.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking ko' Checking ko + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/ko/0.1/ko.yaml task.tekton.dev/ko created + for runtest in ${all_tasks} + local runtestdir=kube-linter/0.1/tests + local testname=kube-linter + runtest=task/kube-linter/0.1/ + '[' '!' -d task/kube-linter ']' + runtest=task/kube-linter/0.1/kube-linter.yaml + skipit= + cat task/kube-linter/0.1/kube-linter.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking kube-linter' Checking kube-linter + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/kube-linter/0.1/kube-linter.yaml task.tekton.dev/kube-linter created + for runtest in ${all_tasks} + local runtestdir=kubeconfig-creator/0.1/tests + local testname=kubeconfig-creator + runtest=task/kubeconfig-creator/0.1/ + '[' '!' -d task/kubeconfig-creator ']' + runtest=task/kubeconfig-creator/0.1/kubeconfig-creator.yaml + skipit= + cat task/kubeconfig-creator/0.1/kubeconfig-creator.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=kubeconfig-creator/0.2/tests + local testname=kubeconfig-creator + runtest=task/kubeconfig-creator/0.2/ + '[' '!' -d task/kubeconfig-creator ']' + runtest=task/kubeconfig-creator/0.2/kubeconfig-creator.yaml + skipit= + cat task/kubeconfig-creator/0.2/kubeconfig-creator.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking kubeconfig-creator' Checking kubeconfig-creator + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/kubeconfig-creator/0.2/kubeconfig-creator.yaml task.tekton.dev/kubeconfig-creator created + for runtest in ${all_tasks} + local runtestdir=kubernetes-actions/0.2/tests + local testname=kubernetes-actions + runtest=task/kubernetes-actions/0.2/ + '[' '!' -d task/kubernetes-actions ']' + runtest=task/kubernetes-actions/0.2/kubernetes-actions.yaml + skipit= + grep 'tekton.dev/deprecated: \"true\"' + cat task/kubernetes-actions/0.2/kubernetes-actions.yaml + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking kubernetes-actions' Checking kubernetes-actions + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/kubernetes-actions/0.2/kubernetes-actions.yaml task.tekton.dev/kubernetes-actions created + for runtest in ${all_tasks} + local runtestdir=kythe-go/0.1/tests + local testname=kythe-go + runtest=task/kythe-go/0.1/ + '[' '!' -d task/kythe-go ']' + runtest=task/kythe-go/0.1/kythe-go.yaml + skipit= + cat task/kythe-go/0.1/kythe-go.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=kythe-go/0.2/tests + local testname=kythe-go + runtest=task/kythe-go/0.2/ + '[' '!' -d task/kythe-go ']' + runtest=task/kythe-go/0.2/kythe-go.yaml + skipit= + cat task/kythe-go/0.2/kythe-go.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=markdown-lint/0.1/tests + local testname=markdown-lint + runtest=task/markdown-lint/0.1/ + '[' '!' -d task/markdown-lint ']' + runtest=task/markdown-lint/0.1/markdown-lint.yaml + skipit= + cat task/markdown-lint/0.1/markdown-lint.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking markdown-lint' Checking markdown-lint + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/markdown-lint/0.1/markdown-lint.yaml task.tekton.dev/markdown-lint created + for runtest in ${all_tasks} + local runtestdir=maven/0.1/tests + local testname=maven + runtest=task/maven/0.1/ + '[' '!' -d task/maven ']' + runtest=task/maven/0.1/maven.yaml + skipit= + cat task/maven/0.1/maven.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=maven/0.2/tests + local testname=maven + runtest=task/maven/0.2/ + '[' '!' -d task/maven ']' + runtest=task/maven/0.2/maven.yaml + skipit= + cat task/maven/0.2/maven.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=maven/0.3/tests + local testname=maven + runtest=task/maven/0.3/ + '[' '!' -d task/maven ']' + runtest=task/maven/0.3/maven.yaml + skipit= + cat task/maven/0.3/maven.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=maven/0.4/tests + local testname=maven + runtest=task/maven/0.4/ + '[' '!' -d task/maven ']' + runtest=task/maven/0.4/maven.yaml + skipit= + cat task/maven/0.4/maven.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking maven' Checking maven + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/maven/0.4/maven.yaml task.tekton.dev/maven created + for runtest in ${all_tasks} + local runtestdir=mypy-lint/0.1/tests + local testname=mypy-lint + runtest=task/mypy-lint/0.1/ + '[' '!' -d task/mypy-lint ']' + runtest=task/mypy-lint/0.1/mypy-lint.yaml + skipit= + cat task/mypy-lint/0.1/mypy-lint.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=mypy-lint/0.2/tests + local testname=mypy-lint + runtest=task/mypy-lint/0.2/ + '[' '!' -d task/mypy-lint ']' + runtest=task/mypy-lint/0.2/mypy-lint.yaml + skipit= + cat task/mypy-lint/0.2/mypy-lint.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking mypy-lint' Checking mypy-lint + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/mypy-lint/0.2/mypy-lint.yaml task.tekton.dev/mypy-lint created + for runtest in ${all_tasks} + local runtestdir=npm/0.1/tests + local testname=npm + runtest=task/npm/0.1/ + '[' '!' -d task/npm ']' + runtest=task/npm/0.1/npm.yaml + skipit= + cat task/npm/0.1/npm.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking npm' Checking npm + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/npm/0.1/npm.yaml task.tekton.dev/npm created + for runtest in ${all_tasks} + local runtestdir=openshift-client/0.1/tests + local testname=openshift-client + runtest=task/openshift-client/0.1/ + '[' '!' -d task/openshift-client ']' + runtest=task/openshift-client/0.1/openshift-client.yaml + skipit= + cat task/openshift-client/0.1/openshift-client.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=openshift-client/0.2/tests + local testname=openshift-client + runtest=task/openshift-client/0.2/ + '[' '!' -d task/openshift-client ']' + runtest=task/openshift-client/0.2/openshift-client.yaml + skipit= + cat task/openshift-client/0.2/openshift-client.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking openshift-client' Checking openshift-client + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/openshift-client/0.2/openshift-client.yaml task.tekton.dev/openshift-client created + for runtest in ${all_tasks} + local runtestdir=orka-deploy/0.1/tests + local testname=orka-deploy + runtest=task/orka-deploy/0.1/ + '[' '!' -d task/orka-deploy ']' + runtest=task/orka-deploy/0.1/orka-deploy.yaml + skipit= + cat task/orka-deploy/0.1/orka-deploy.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=orka-deploy/0.2/tests + local testname=orka-deploy + runtest=task/orka-deploy/0.2/ + '[' '!' -d task/orka-deploy ']' + runtest=task/orka-deploy/0.2/orka-deploy.yaml + skipit= + cat task/orka-deploy/0.2/orka-deploy.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=orka-full/0.1/tests + local testname=orka-full + runtest=task/orka-full/0.1/ + '[' '!' -d task/orka-full ']' + runtest=task/orka-full/0.1/orka-full.yaml + skipit= + cat task/orka-full/0.1/orka-full.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=orka-full/0.2/tests + local testname=orka-full + runtest=task/orka-full/0.2/ + '[' '!' -d task/orka-full ']' + runtest=task/orka-full/0.2/orka-full.yaml + skipit= + cat task/orka-full/0.2/orka-full.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=orka-init/0.1/tests + local testname=orka-init + runtest=task/orka-init/0.1/ + '[' '!' -d task/orka-init ']' + runtest=task/orka-init/0.1/orka-init.yaml + skipit= + cat task/orka-init/0.1/orka-init.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=orka-init/0.2/tests + local testname=orka-init + runtest=task/orka-init/0.2/ + '[' '!' -d task/orka-init ']' + runtest=task/orka-init/0.2/orka-init.yaml + skipit= + cat task/orka-init/0.2/orka-init.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=orka-teardown/0.1/tests + local testname=orka-teardown + runtest=task/orka-teardown/0.1/ + '[' '!' -d task/orka-teardown ']' + runtest=task/orka-teardown/0.1/orka-teardown.yaml + skipit= + cat task/orka-teardown/0.1/orka-teardown.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=orka-teardown/0.2/tests + local testname=orka-teardown + runtest=task/orka-teardown/0.2/ + '[' '!' -d task/orka-teardown ']' + runtest=task/orka-teardown/0.2/orka-teardown.yaml + skipit= + cat task/orka-teardown/0.2/orka-teardown.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=pluto/0.1/tests + local testname=pluto + runtest=task/pluto/0.1/ + '[' '!' -d task/pluto ']' + runtest=task/pluto/0.1/pluto.yaml + skipit= + cat task/pluto/0.1/pluto.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking pluto' Checking pluto + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/pluto/0.1/pluto.yaml task.tekton.dev/pluto created + for runtest in ${all_tasks} + local runtestdir=powershell/0.1/tests + local testname=powershell + runtest=task/powershell/0.1/ + '[' '!' -d task/powershell ']' + runtest=task/powershell/0.1/powershell.yaml + skipit= + cat task/powershell/0.1/powershell.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking powershell' Checking powershell + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/powershell/0.1/powershell.yaml task.tekton.dev/powershell created + for runtest in ${all_tasks} + local runtestdir=prettier/0.1/tests + local testname=prettier + runtest=task/prettier/0.1/ + '[' '!' -d task/prettier ']' + runtest=task/prettier/0.1/prettier.yaml + skipit= + cat task/prettier/0.1/prettier.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking prettier' Checking prettier + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/prettier/0.1/prettier.yaml task.tekton.dev/prettier created + for runtest in ${all_tasks} + local runtestdir=pull-request/0.1/tests + local testname=pull-request + runtest=task/pull-request/0.1/ + '[' '!' -d task/pull-request ']' + runtest=task/pull-request/0.1/pull-request.yaml + skipit= + cat task/pull-request/0.1/pull-request.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=pull-request/0.2/tests + local testname=pull-request + runtest=task/pull-request/0.2/ + '[' '!' -d task/pull-request ']' + runtest=task/pull-request/0.2/pull-request.yaml + skipit= + cat task/pull-request/0.2/pull-request.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking pull-request' Checking pull-request + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/pull-request/0.2/pull-request.yaml task.tekton.dev/pull-request created + for runtest in ${all_tasks} + local runtestdir=pylint/0.1/tests + local testname=pylint + runtest=task/pylint/0.1/ + '[' '!' -d task/pylint ']' + runtest=task/pylint/0.1/pylint.yaml + skipit= + cat task/pylint/0.1/pylint.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=pylint/0.2/tests + local testname=pylint + runtest=task/pylint/0.2/ + '[' '!' -d task/pylint ']' + runtest=task/pylint/0.2/pylint.yaml + skipit= + cat task/pylint/0.2/pylint.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=pylint/0.3/tests + local testname=pylint + runtest=task/pylint/0.3/ + '[' '!' -d task/pylint ']' + runtest=task/pylint/0.3/pylint.yaml + skipit= + cat task/pylint/0.3/pylint.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking pylint' Checking pylint + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/pylint/0.3/pylint.yaml task.tekton.dev/pylint created + for runtest in ${all_tasks} + local runtestdir=pytest/0.1/tests + local testname=pytest + runtest=task/pytest/0.1/ + '[' '!' -d task/pytest ']' + runtest=task/pytest/0.1/pytest.yaml + skipit= + cat task/pytest/0.1/pytest.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=pytest/0.2/tests + local testname=pytest + runtest=task/pytest/0.2/ + '[' '!' -d task/pytest ']' + runtest=task/pytest/0.2/pytest.yaml + skipit= + cat task/pytest/0.2/pytest.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking pytest' Checking pytest + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/pytest/0.2/pytest.yaml task.tekton.dev/pytest created + for runtest in ${all_tasks} + local runtestdir=python-coverage/0.1/tests + local testname=python-coverage + runtest=task/python-coverage/0.1/ + '[' '!' -d task/python-coverage ']' + runtest=task/python-coverage/0.1/python-coverage.yaml + skipit= + cat task/python-coverage/0.1/python-coverage.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking python-coverage' Checking python-coverage + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/python-coverage/0.1/python-coverage.yaml task.tekton.dev/python-coverage created + for runtest in ${all_tasks} + local runtestdir=redhat-codeready-dependency-analysis/0.1/tests + local testname=redhat-codeready-dependency-analysis + runtest=task/redhat-codeready-dependency-analysis/0.1/ + '[' '!' -d task/redhat-codeready-dependency-analysis ']' + runtest=task/redhat-codeready-dependency-analysis/0.1/redhat-codeready-dependency-analysis.yaml + skipit= + cat task/redhat-codeready-dependency-analysis/0.1/redhat-codeready-dependency-analysis.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=redhat-dependency-analytics/0.1/tests + local testname=redhat-dependency-analytics + runtest=task/redhat-dependency-analytics/0.1/ + '[' '!' -d task/redhat-dependency-analytics ']' + runtest=task/redhat-dependency-analytics/0.1/redhat-dependency-analytics.yaml + skipit= + cat task/redhat-dependency-analytics/0.1/redhat-dependency-analytics.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=redhat-dependency-analytics/0.2/tests + local testname=redhat-dependency-analytics + runtest=task/redhat-dependency-analytics/0.2/ + '[' '!' -d task/redhat-dependency-analytics ']' + runtest=task/redhat-dependency-analytics/0.2/redhat-dependency-analytics.yaml + skipit= + cat task/redhat-dependency-analytics/0.2/redhat-dependency-analytics.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=replace-tokens/0.1/tests + local testname=replace-tokens + runtest=task/replace-tokens/0.1/ + '[' '!' -d task/replace-tokens ']' + runtest=task/replace-tokens/0.1/replace-tokens.yaml + skipit= + cat task/replace-tokens/0.1/replace-tokens.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking replace-tokens' Checking replace-tokens + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/replace-tokens/0.1/replace-tokens.yaml task.tekton.dev/replace-tokens created + for runtest in ${all_tasks} + local runtestdir=robot-framework/0.1/tests + local testname=robot-framework + runtest=task/robot-framework/0.1/ + '[' '!' -d task/robot-framework ']' + runtest=task/robot-framework/0.1/robot-framework.yaml + skipit= + cat task/robot-framework/0.1/robot-framework.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking robot-framework' Checking robot-framework + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/robot-framework/0.1/robot-framework.yaml task.tekton.dev/robot-framework created + for runtest in ${all_tasks} + local runtestdir=ruby-lint/0.1/tests + local testname=ruby-lint + runtest=task/ruby-lint/0.1/ + '[' '!' -d task/ruby-lint ']' + runtest=task/ruby-lint/0.1/ruby-lint.yaml + skipit= + cat task/ruby-lint/0.1/ruby-lint.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking ruby-lint' Checking ruby-lint + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/ruby-lint/0.1/ruby-lint.yaml task.tekton.dev/ruby-lint created + for runtest in ${all_tasks} + local runtestdir=s2i/0.1/tests + local testname=s2i + runtest=task/s2i/0.1/ + '[' '!' -d task/s2i ']' + runtest=task/s2i/0.1/s2i.yaml + skipit= + cat task/s2i/0.1/s2i.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=s2i/0.2/tests + local testname=s2i + runtest=task/s2i/0.2/ + '[' '!' -d task/s2i ']' + runtest=task/s2i/0.2/s2i.yaml + skipit= + cat task/s2i/0.2/s2i.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=s2i/0.3/tests + local testname=s2i + runtest=task/s2i/0.3/ + '[' '!' -d task/s2i ']' + runtest=task/s2i/0.3/s2i.yaml + skipit= + cat task/s2i/0.3/s2i.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking s2i' Checking s2i + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/s2i/0.3/s2i.yaml task.tekton.dev/s2i created + for runtest in ${all_tasks} + local runtestdir=shellcheck/0.1/tests + local testname=shellcheck + runtest=task/shellcheck/0.1/ + '[' '!' -d task/shellcheck ']' + runtest=task/shellcheck/0.1/shellcheck.yaml + skipit= + cat task/shellcheck/0.1/shellcheck.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking shellcheck' Checking shellcheck + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/shellcheck/0.1/shellcheck.yaml task.tekton.dev/shellcheck created + for runtest in ${all_tasks} + local runtestdir=shp/0.1/tests + local testname=shp + runtest=task/shp/0.1/ + '[' '!' -d task/shp ']' + runtest=task/shp/0.1/shp.yaml + skipit= + cat task/shp/0.1/shp.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking shp' Checking shp + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/shp/0.1/shp.yaml task.tekton.dev/shp created + for runtest in ${all_tasks} + local runtestdir=skopeo-copy/0.1/tests + local testname=skopeo-copy + runtest=task/skopeo-copy/0.1/ + '[' '!' -d task/skopeo-copy ']' + runtest=task/skopeo-copy/0.1/skopeo-copy.yaml + skipit= + grep 'tekton.dev/deprecated: \"true\"' + cat task/skopeo-copy/0.1/skopeo-copy.yaml tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=skopeo-copy/0.2/tests + local testname=skopeo-copy + runtest=task/skopeo-copy/0.2/ + '[' '!' -d task/skopeo-copy ']' + runtest=task/skopeo-copy/0.2/skopeo-copy.yaml + skipit= + cat task/skopeo-copy/0.2/skopeo-copy.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=skopeo-copy/0.3/tests + local testname=skopeo-copy + runtest=task/skopeo-copy/0.3/ + '[' '!' -d task/skopeo-copy ']' + runtest=task/skopeo-copy/0.3/skopeo-copy.yaml + skipit= + cat task/skopeo-copy/0.3/skopeo-copy.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=skopeo-copy/0.4/tests + local testname=skopeo-copy + runtest=task/skopeo-copy/0.4/ + '[' '!' -d task/skopeo-copy ']' + runtest=task/skopeo-copy/0.4/skopeo-copy.yaml + skipit= + cat task/skopeo-copy/0.4/skopeo-copy.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking skopeo-copy' Checking skopeo-copy + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/skopeo-copy/0.4/skopeo-copy.yaml task.tekton.dev/skopeo-copy created + for runtest in ${all_tasks} + local runtestdir=sonarqube-scanner/0.2/tests + local testname=sonarqube-scanner + runtest=task/sonarqube-scanner/0.2/ + '[' '!' -d task/sonarqube-scanner ']' + runtest=task/sonarqube-scanner/0.2/sonarqube-scanner.yaml + skipit= + cat task/sonarqube-scanner/0.2/sonarqube-scanner.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=sonarqube-scanner/0.3/tests + local testname=sonarqube-scanner + runtest=task/sonarqube-scanner/0.3/ + '[' '!' -d task/sonarqube-scanner ']' + runtest=task/sonarqube-scanner/0.3/sonarqube-scanner.yaml + skipit= + cat task/sonarqube-scanner/0.3/sonarqube-scanner.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=sonarqube-scanner/0.4/tests + local testname=sonarqube-scanner + runtest=task/sonarqube-scanner/0.4/ + '[' '!' -d task/sonarqube-scanner ']' + runtest=task/sonarqube-scanner/0.4/sonarqube-scanner.yaml + skipit= + cat task/sonarqube-scanner/0.4/sonarqube-scanner.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=syft/0.1/tests + local testname=syft + runtest=task/syft/0.1/ + '[' '!' -d task/syft ']' + runtest=task/syft/0.1/syft.yaml + skipit= + cat task/syft/0.1/syft.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking syft' Checking syft + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/syft/0.1/syft.yaml task.tekton.dev/syft created + for runtest in ${all_tasks} + local runtestdir=tekton-catalog-publish/0.1/tests + local testname=tekton-catalog-publish + runtest=task/tekton-catalog-publish/0.1/ + '[' '!' -d task/tekton-catalog-publish ']' + runtest=task/tekton-catalog-publish/0.1/tekton-catalog-publish.yaml + skipit= + grep 'tekton.dev/deprecated: \"true\"' + cat task/tekton-catalog-publish/0.1/tekton-catalog-publish.yaml tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=tekton-catalog-publish/0.2/tests + local testname=tekton-catalog-publish + runtest=task/tekton-catalog-publish/0.2/ + '[' '!' -d task/tekton-catalog-publish ']' + runtest=task/tekton-catalog-publish/0.2/tekton-catalog-publish.yaml + skipit= + cat task/tekton-catalog-publish/0.2/tekton-catalog-publish.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking tekton-catalog-publish' Checking tekton-catalog-publish + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/tekton-catalog-publish/0.2/tekton-catalog-publish.yaml task.tekton.dev/tekton-catalog-publish created + for runtest in ${all_tasks} + local runtestdir=tkn/0.2/tests + local testname=tkn + runtest=task/tkn/0.2/ + '[' '!' -d task/tkn ']' + runtest=task/tkn/0.2/tkn.yaml + skipit= + cat task/tkn/0.2/tkn.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=tkn/0.3/tests + local testname=tkn + runtest=task/tkn/0.3/ + '[' '!' -d task/tkn ']' + runtest=task/tkn/0.3/tkn.yaml + skipit= + cat task/tkn/0.3/tkn.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=tkn/0.4/tests + local testname=tkn + runtest=task/tkn/0.4/ + '[' '!' -d task/tkn ']' + runtest=task/tkn/0.4/tkn.yaml + skipit= + cat task/tkn/0.4/tkn.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=tkn/0.5/tests + local testname=tkn + runtest=task/tkn/0.5/ + '[' '!' -d task/tkn ']' + runtest=task/tkn/0.5/tkn.yaml + skipit= + cat task/tkn/0.5/tkn.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking tkn' Checking tkn + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/tkn/0.5/tkn.yaml task.tekton.dev/tkn created + for runtest in ${all_tasks} + local runtestdir=trigger-jenkins-job/0.1/tests + local testname=trigger-jenkins-job + runtest=task/trigger-jenkins-job/0.1/ + '[' '!' -d task/trigger-jenkins-job ']' + runtest=task/trigger-jenkins-job/0.1/trigger-jenkins-job.yaml + skipit= + cat task/trigger-jenkins-job/0.1/trigger-jenkins-job.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking trigger-jenkins-job' Checking trigger-jenkins-job + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/trigger-jenkins-job/0.1/trigger-jenkins-job.yaml task.tekton.dev/trigger-jenkins-job created + for runtest in ${all_tasks} + local runtestdir=trivy-scanner/0.1/tests + local testname=trivy-scanner + runtest=task/trivy-scanner/0.1/ + '[' '!' -d task/trivy-scanner ']' + runtest=task/trivy-scanner/0.1/trivy-scanner.yaml + skipit= + cat task/trivy-scanner/0.1/trivy-scanner.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=trivy-scanner/0.2/tests + local testname=trivy-scanner + runtest=task/trivy-scanner/0.2/ + '[' '!' -d task/trivy-scanner ']' + runtest=task/trivy-scanner/0.2/trivy-scanner.yaml + skipit= + cat task/trivy-scanner/0.2/trivy-scanner.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking trivy-scanner' Checking trivy-scanner + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/trivy-scanner/0.2/trivy-scanner.yaml task.tekton.dev/trivy-scanner created + for runtest in ${all_tasks} + local runtestdir=ts-lint/0.1/tests + local testname=ts-lint + runtest=task/ts-lint/0.1/ + '[' '!' -d task/ts-lint ']' + runtest=task/ts-lint/0.1/ts-lint.yaml + skipit= + cat task/ts-lint/0.1/ts-lint.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking ts-lint' Checking ts-lint + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/ts-lint/0.1/ts-lint.yaml task.tekton.dev/ts-lint created + for runtest in ${all_tasks} + local runtestdir=upload-pypi/0.2/tests + local testname=upload-pypi + runtest=task/upload-pypi/0.2/ + '[' '!' -d task/upload-pypi ']' + runtest=task/upload-pypi/0.2/upload-pypi.yaml + skipit= + grep 'tekton.dev/deprecated: \"true\"' + cat task/upload-pypi/0.2/upload-pypi.yaml + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking upload-pypi' Checking upload-pypi + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/upload-pypi/0.2/upload-pypi.yaml task.tekton.dev/upload-pypi created + for runtest in ${all_tasks} + local runtestdir=valint/0.1/tests + local testname=valint + runtest=task/valint/0.1/ + '[' '!' -d task/valint ']' + runtest=task/valint/0.1/valint.yaml + skipit= + cat task/valint/0.1/valint.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking valint' Checking valint + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/valint/0.1/valint.yaml task.tekton.dev/valint created + for runtest in ${all_tasks} + local runtestdir=wget/0.1/tests + local testname=wget + runtest=task/wget/0.1/ + '[' '!' -d task/wget ']' + runtest=task/wget/0.1/wget.yaml + skipit= + cat task/wget/0.1/wget.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking wget' Checking wget ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/wget/0.1/wget.yaml + kubectl -n tasks-ns apply -f /dev/fd/63 task.tekton.dev/wget created + for runtest in ${all_tasks} + local runtestdir=write-file/0.1/tests + local testname=write-file + runtest=task/write-file/0.1/ + '[' '!' -d task/write-file ']' + runtest=task/write-file/0.1/write-file.yaml + skipit= + cat task/write-file/0.1/write-file.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking write-file' Checking write-file + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/write-file/0.1/write-file.yaml task.tekton.dev/write-file created + for runtest in ${all_tasks} + local runtestdir=yaml-lint/0.1/tests + local testname=yaml-lint + runtest=task/yaml-lint/0.1/ + '[' '!' -d task/yaml-lint ']' + runtest=task/yaml-lint/0.1/yaml-lint.yaml + skipit= + grep 'tekton.dev/deprecated: \"true\"' + cat task/yaml-lint/0.1/yaml-lint.yaml + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking yaml-lint' Checking yaml-lint + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/yaml-lint/0.1/yaml-lint.yaml task.tekton.dev/yaml-lint created + for runtest in ${all_tasks} + local runtestdir=yq/0.1/tests + local testname=yq + runtest=task/yq/0.1/ + '[' '!' -d task/yq ']' + runtest=task/yq/0.1/yq.yaml + skipit= + cat task/yq/0.1/yq.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=yq/0.2/tests + local testname=yq + runtest=task/yq/0.2/ + '[' '!' -d task/yq ']' + runtest=task/yq/0.2/yq.yaml + skipit= + cat task/yq/0.2/yq.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=yq/0.3/tests + local testname=yq + runtest=task/yq/0.3/ + '[' '!' -d task/yq ']' + runtest=task/yq/0.3/yq.yaml + skipit= + grep 'tekton.dev/deprecated: \"true\"' + cat task/yq/0.3/yq.yaml tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in ${all_tasks} + local runtestdir=yq/0.4/tests + local testname=yq + runtest=task/yq/0.4/ + '[' '!' -d task/yq ']' + runtest=task/yq/0.4/yq.yaml + skipit= + cat task/yq/0.4/yq.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + echo 'Checking yq' Checking yq + kubectl -n tasks-ns apply -f /dev/fd/63 ++ sed 's/namespace:.*/namespace: task-stepaction-ns/' task/yq/0.4/yq.yaml task.tekton.dev/yq created + test_resources 'stepaction/git-clone/0.1/tests stepaction/git-clone/0.2/tests stepaction/tekton-catalog-publish/0.1/tests stepaction/tekton-catalog-publish/0.2/tests stepaction/tekton-catalog-publish/0.3/tests' + local cnt=0 + local resource_to_tests= + for runtest in $@ + resource_to_tests=' stepaction/git-clone/0.1/tests' + [[ 0 == \7 ]] + cnt=1 + for runtest in $@ + resource_to_tests=' stepaction/git-clone/0.1/tests stepaction/git-clone/0.2/tests' + [[ 1 == \7 ]] + cnt=2 + for runtest in $@ + resource_to_tests=' stepaction/git-clone/0.1/tests stepaction/git-clone/0.2/tests stepaction/tekton-catalog-publish/0.1/tests' + [[ 2 == \7 ]] + cnt=3 + for runtest in $@ + resource_to_tests=' stepaction/git-clone/0.1/tests stepaction/git-clone/0.2/tests stepaction/tekton-catalog-publish/0.1/tests stepaction/tekton-catalog-publish/0.2/tests' + [[ 3 == \7 ]] + cnt=4 + for runtest in $@ + resource_to_tests=' stepaction/git-clone/0.1/tests stepaction/git-clone/0.2/tests stepaction/tekton-catalog-publish/0.1/tests stepaction/tekton-catalog-publish/0.2/tests stepaction/tekton-catalog-publish/0.3/tests' + [[ 4 == \7 ]] + cnt=5 + [[ -n stepaction/git-clone/0.1/tests stepaction/git-clone/0.2/tests stepaction/tekton-catalog-publish/0.1/tests stepaction/tekton-catalog-publish/0.2/tests stepaction/tekton-catalog-publish/0.3/tests ]] + test_resource_creation ' stepaction/git-clone/0.1/tests stepaction/git-clone/0.2/tests stepaction/tekton-catalog-publish/0.1/tests stepaction/tekton-catalog-publish/0.2/tests stepaction/tekton-catalog-publish/0.3/tests' + local runtest + declare -A resource_to_wait_for + for runtest in $@ + local runtestdir=git-clone/0.1/tests + local testname=git-clone ++++ dirname stepaction/git-clone/0.1/tests +++ basename stepaction/git-clone/0.1 ++ basename 0.1 + local version=0.1 + [[ 0.1 =~ ^[0-9]+\.[0-9]+$ ]] ++ echo 0.1 ++ tr . - + version=0-1 + local tns=git-clone-0-1 + local skipit= + for ignore in ${TEST_TASKRUN_IGNORES} + [[ maven == git-clone ]] + local resourcedir=stepaction/git-clone/0.1 + '[' '!' -d stepaction/git-clone/0.1/tests ']' + ls stepaction/git-clone/0.1/git-clone.yaml + cat stepaction/git-clone/0.1/git-clone.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in $@ + local runtestdir=git-clone/0.2/tests + local testname=git-clone ++++ dirname stepaction/git-clone/0.2/tests +++ basename stepaction/git-clone/0.2 ++ basename 0.2 + local version=0.2 + [[ 0.2 =~ ^[0-9]+\.[0-9]+$ ]] ++ echo 0.2 ++ tr . - + version=0-2 + local tns=git-clone-0-2 + local skipit= + for ignore in ${TEST_TASKRUN_IGNORES} + [[ maven == git-clone ]] + local resourcedir=stepaction/git-clone/0.2 + '[' '!' -d stepaction/git-clone/0.2/tests ']' + ls stepaction/git-clone/0.2/git-clone.yaml + cat stepaction/git-clone/0.2/git-clone.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + kubectl create namespace git-clone-0-2 ++ printf stepaction/git-clone/0.2/git-clone.yaml + yaml=stepaction/git-clone/0.2/git-clone.yaml ++ date +%Hh%M:%S + started=20h34:53 + echo '20h34:53 STARTING: git-clone/0-2 ' 20h34:53 STARTING: git-clone/0-2 + kubectl -n git-clone-0-2 create -f stepaction/git-clone/0.2/git-clone.yaml --dry-run=client -o yaml + [[ -f stepaction/git-clone/0.2/tests/pre-apply-task-hook.sh ]] + function_exists pre-apply-task-hook ++ type -t pre-apply-task-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + [[ -d stepaction/git-clone/0.2/tests/fixtures ]] + kubectl -n git-clone-0-2 delete -f /tmp/.mm.VheCIL + true + kubectl -n git-clone-0-2 create -f /tmp/.mm.VheCIL stepaction.tekton.dev/git-clone created + for yaml in ${runtest}/*.yaml + cp stepaction/git-clone/0.2/tests/run.yaml /tmp/.mm.VheCIL + [[ -f stepaction/git-clone/0.2/tests/pre-apply-taskrun-hook.sh ]] + function_exists pre-apply-taskrun-hook ++ type -t pre-apply-taskrun-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + kubectl -n git-clone-0-2 delete -f /tmp/.mm.VheCIL + true + kubectl -n git-clone-0-2 create -f /tmp/.mm.VheCIL taskrun.tekton.dev/git-clone-run-noargs created taskrun.tekton.dev/git-clone-run-tag created taskrun.tekton.dev/git-clone-run-no-submodules created taskrun.tekton.dev/git-clone-run-no-depth-2 created taskrun.tekton.dev/git-clone-run-sslverify-none created taskrun.tekton.dev/git-clone-run-ssl-cadirectory-empty created taskrun.tekton.dev/git-clone-run-subdirectory created taskrun.tekton.dev/git-clone-run-delete-existing created taskrun.tekton.dev/git-clone-run-without-verbose created taskrun.tekton.dev/git-clone-sparse created + resource_to_wait_for["$testname/${version}"]='git-clone-0-2|20h34:53' + for runtest in $@ + local runtestdir=tekton-catalog-publish/0.1/tests + local testname=tekton-catalog-publish ++++ dirname stepaction/tekton-catalog-publish/0.1/tests +++ basename stepaction/tekton-catalog-publish/0.1 ++ basename 0.1 + local version=0.1 + [[ 0.1 =~ ^[0-9]+\.[0-9]+$ ]] ++ echo 0.1 ++ tr . - + version=0-1 + local tns=tekton-catalog-publish-0-1 + local skipit= + for ignore in ${TEST_TASKRUN_IGNORES} + [[ maven == tekton-catalog-publish ]] + local resourcedir=stepaction/tekton-catalog-publish/0.1 + '[' '!' -d stepaction/tekton-catalog-publish/0.1/tests ']' + ls stepaction/tekton-catalog-publish/0.1/tekton-catalog-publish.yaml + cat stepaction/tekton-catalog-publish/0.1/tekton-catalog-publish.yaml + grep 'tekton.dev/deprecated: \"true\"' tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in $@ + local runtestdir=tekton-catalog-publish/0.2/tests + local testname=tekton-catalog-publish ++++ dirname stepaction/tekton-catalog-publish/0.2/tests +++ basename stepaction/tekton-catalog-publish/0.2 ++ basename 0.2 + local version=0.2 + [[ 0.2 =~ ^[0-9]+\.[0-9]+$ ]] ++ echo 0.2 ++ tr . - + version=0-2 + local tns=tekton-catalog-publish-0-2 + local skipit= + for ignore in ${TEST_TASKRUN_IGNORES} + [[ maven == tekton-catalog-publish ]] + local resourcedir=stepaction/tekton-catalog-publish/0.2 + '[' '!' -d stepaction/tekton-catalog-publish/0.2/tests ']' + ls stepaction/tekton-catalog-publish/0.2/tekton-catalog-publish.yaml + grep 'tekton.dev/deprecated: \"true\"' + cat stepaction/tekton-catalog-publish/0.2/tekton-catalog-publish.yaml tekton.dev/deprecated: "true" + skipit=True + [[ -n '' ]] + [[ -n True ]] + continue + for runtest in $@ + local runtestdir=tekton-catalog-publish/0.3/tests + local testname=tekton-catalog-publish ++++ dirname stepaction/tekton-catalog-publish/0.3/tests +++ basename stepaction/tekton-catalog-publish/0.3 ++ basename 0.3 + local version=0.3 + [[ 0.3 =~ ^[0-9]+\.[0-9]+$ ]] ++ echo 0.3 ++ tr . - + version=0-3 + local tns=tekton-catalog-publish-0-3 + local skipit= + for ignore in ${TEST_TASKRUN_IGNORES} + [[ maven == tekton-catalog-publish ]] + local resourcedir=stepaction/tekton-catalog-publish/0.3 + '[' '!' -d stepaction/tekton-catalog-publish/0.3/tests ']' + ls stepaction/tekton-catalog-publish/0.3/tekton-catalog-publish.yaml + cat stepaction/tekton-catalog-publish/0.3/tekton-catalog-publish.yaml + grep 'tekton.dev/deprecated: \"true\"' + [[ -n '' ]] + [[ -n '' ]] + kubectl create namespace tekton-catalog-publish-0-3 ++ printf stepaction/tekton-catalog-publish/0.3/tekton-catalog-publish.yaml + yaml=stepaction/tekton-catalog-publish/0.3/tekton-catalog-publish.yaml ++ date +%Hh%M:%S + started=20h34:54 + echo '20h34:54 STARTING: tekton-catalog-publish/0-3 ' 20h34:54 STARTING: tekton-catalog-publish/0-3 + kubectl -n tekton-catalog-publish-0-3 create -f stepaction/tekton-catalog-publish/0.3/tekton-catalog-publish.yaml --dry-run=client -o yaml + [[ -f stepaction/tekton-catalog-publish/0.3/tests/pre-apply-task-hook.sh ]] + source stepaction/tekton-catalog-publish/0.3/tests/pre-apply-task-hook.sh ++ add_stepaction git-clone latest ++ local array path_version stepaction ++ stepaction=git-clone ++ [[ latest == \l\a\t\e\s\t ]] ++ array=($(echo stepaction/${stepaction}/*/ | sort -u)) +++ echo stepaction/git-clone/0.1/ stepaction/git-clone/0.2/ +++ sort -u ++ path_version=stepaction/git-clone/0.2/ ++ kubectl -n tekton-catalog-publish-0-3 apply -f stepaction/git-clone/0.2//git-clone.yaml stepaction.tekton.dev/git-clone created + function_exists pre-apply-task-hook ++ type -t pre-apply-task-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + [[ -d stepaction/tekton-catalog-publish/0.3/tests/fixtures ]] + kubectl -n tekton-catalog-publish-0-3 delete -f /tmp/.mm.VheCIL + true + kubectl -n tekton-catalog-publish-0-3 create -f /tmp/.mm.VheCIL stepaction.tekton.dev/tekton-catalog-publish created + for yaml in ${runtest}/*.yaml + cp stepaction/tekton-catalog-publish/0.3/tests/run.yaml /tmp/.mm.VheCIL + [[ -f stepaction/tekton-catalog-publish/0.3/tests/pre-apply-taskrun-hook.sh ]] + function_exists pre-apply-taskrun-hook ++ type -t pre-apply-taskrun-hook + [[ '' == \f\u\n\c\t\i\o\n ]] + kubectl -n tekton-catalog-publish-0-3 delete -f /tmp/.mm.VheCIL + true + kubectl -n tekton-catalog-publish-0-3 create -f /tmp/.mm.VheCIL task.tekton.dev/catalog-publish-test-task created taskrun.tekton.dev/catalog-publish-test-task-run created + resource_to_wait_for["$testname/${version}"]='tekton-catalog-publish-0-3|20h34:54' + local cnt=0 + local all_status= + local reason= + local maxloop=60 + set +x FAILED: tekton-catalog-publish/0-3 task has failed to comeback properly NAME SHORTNAMES APIVERSION NAMESPACED KIND bindings v1 true Binding componentstatuses cs v1 false ComponentStatus configmaps cm v1 true ConfigMap endpoints ep v1 true Endpoints events ev v1 true Event limitranges limits v1 true LimitRange namespaces ns v1 false Namespace nodes no v1 false Node persistentvolumeclaims pvc v1 true PersistentVolumeClaim persistentvolumes pv v1 false PersistentVolume pods po v1 true Pod podtemplates v1 true PodTemplate replicationcontrollers rc v1 true ReplicationController resourcequotas quota v1 true ResourceQuota secrets v1 true Secret serviceaccounts sa v1 true ServiceAccount services svc v1 true Service mutatingwebhookconfigurations admissionregistration.k8s.io/v1 false MutatingWebhookConfiguration validatingwebhookconfigurations admissionregistration.k8s.io/v1 false ValidatingWebhookConfiguration customresourcedefinitions crd,crds apiextensions.k8s.io/v1 false CustomResourceDefinition apiservices apiregistration.k8s.io/v1 false APIService controllerrevisions apps/v1 true ControllerRevision daemonsets ds apps/v1 true DaemonSet deployments deploy apps/v1 true Deployment replicasets rs apps/v1 true ReplicaSet statefulsets sts apps/v1 true StatefulSet selfsubjectreviews authentication.k8s.io/v1 false SelfSubjectReview tokenreviews authentication.k8s.io/v1 false TokenReview localsubjectaccessreviews authorization.k8s.io/v1 true LocalSubjectAccessReview selfsubjectaccessreviews authorization.k8s.io/v1 false SelfSubjectAccessReview selfsubjectrulesreviews authorization.k8s.io/v1 false SelfSubjectRulesReview subjectaccessreviews authorization.k8s.io/v1 false SubjectAccessReview horizontalpodautoscalers hpa autoscaling/v2 true HorizontalPodAutoscaler cronjobs cj batch/v1 true CronJob jobs batch/v1 true Job certificatesigningrequests csr certificates.k8s.io/v1 false CertificateSigningRequest leases coordination.k8s.io/v1 true Lease endpointslices discovery.k8s.io/v1 true EndpointSlice events ev events.k8s.io/v1 true Event flowschemas flowcontrol.apiserver.k8s.io/v1beta3 false FlowSchema prioritylevelconfigurations flowcontrol.apiserver.k8s.io/v1beta3 false PriorityLevelConfiguration addresspools metallb.io/v1beta1 true AddressPool bfdprofiles metallb.io/v1beta1 true BFDProfile bgpadvertisements metallb.io/v1beta1 true BGPAdvertisement bgppeers metallb.io/v1beta2 true BGPPeer communities metallb.io/v1beta1 true Community ipaddresspools metallb.io/v1beta1 true IPAddressPool l2advertisements metallb.io/v1beta1 true L2Advertisement ingressclasses networking.k8s.io/v1 false IngressClass ingresses ing networking.k8s.io/v1 true Ingress networkpolicies netpol networking.k8s.io/v1 true NetworkPolicy runtimeclasses node.k8s.io/v1 false RuntimeClass poddisruptionbudgets pdb policy/v1 true PodDisruptionBudget clusterrolebindings rbac.authorization.k8s.io/v1 false ClusterRoleBinding clusterroles rbac.authorization.k8s.io/v1 false ClusterRole rolebindings rbac.authorization.k8s.io/v1 true RoleBinding roles rbac.authorization.k8s.io/v1 true Role resolutionrequests resolutionrequest,resolutionrequests resolution.tekton.dev/v1beta1 true ResolutionRequest priorityclasses pc scheduling.k8s.io/v1 false PriorityClass csidrivers storage.k8s.io/v1 false CSIDriver csinodes storage.k8s.io/v1 false CSINode csistoragecapacities storage.k8s.io/v1 true CSIStorageCapacity storageclasses sc storage.k8s.io/v1 false StorageClass volumeattachments storage.k8s.io/v1 false VolumeAttachment customruns tekton.dev/v1beta1 true CustomRun pipelineruns pr,prs tekton.dev/v1 true PipelineRun pipelines tekton.dev/v1 true Pipeline stepactions tekton.dev/v1beta1 true StepAction taskruns tr,trs tekton.dev/v1 true TaskRun tasks tekton.dev/v1 true Task verificationpolicies tekton.dev/v1alpha1 true VerificationPolicy Namespace: tekton-catalog-publish-0-3 --- TaskRun Dump apiVersion: v1 items: - apiVersion: tekton.dev/v1 kind: TaskRun metadata: annotations: pipeline.tekton.dev/release: 43c0bb9 creationTimestamp: "2025-07-17T20:34:55Z" generation: 1 labels: app.kubernetes.io/managed-by: tekton-pipelines tekton.dev/task: catalog-publish-test-task name: catalog-publish-test-task-run namespace: tekton-catalog-publish-0-3 resourceVersion: "1643" uid: 53957bba-f90c-46c0-9edf-9dde3a06a572 spec: serviceAccountName: default taskRef: kind: Task name: catalog-publish-test-task timeout: 1h0m0s workspaces: - emptyDir: {} name: shared-workspace status: conditions: - lastTransitionTime: "2025-07-17T20:35:15Z" message: 'build step "sidecar-registry" is pending with reason "failed to pull and unpack image \"docker.io/library/registry:latest\": failed to copy: httpReadSeeker: failed open: unexpected status code https://registry-1.docker.io/v2/library/registry/manifests/sha256:42be4a75b921489e51574e12889b71484a6524a02c4008c52c6f26ce30c7b990: 429 Too Many Requests - Server message: toomanyrequests: You have reached your unauthenticated pull rate limit. https://www.docker.com/increase-rate-limit"' reason: PullImageFailed status: Unknown type: Succeeded podName: catalog-publish-test-task-run-pod provenance: featureFlags: awaitSidecarReadiness: true coschedule: workspaces enableAPIFields: beta enableProvenanceInStatus: true enforceNonfalsifiability: none maxResultSize: 4096 resultExtractionMethod: termination-message runningInEnvWithInjectedSidecars: true verificationNoMatchPolicy: ignore sidecars: - container: sidecar-registry name: registry waiting: message: 'failed to pull and unpack image "docker.io/library/registry:latest": failed to copy: httpReadSeeker: failed open: unexpected status code https://registry-1.docker.io/v2/library/registry/manifests/sha256:42be4a75b921489e51574e12889b71484a6524a02c4008c52c6f26ce30c7b990: 429 Too Many Requests - Server message: toomanyrequests: You have reached your unauthenticated pull rate limit. https://www.docker.com/increase-rate-limit' reason: ErrImagePull startTime: "2025-07-17T20:34:58Z" steps: - container: step-fetch-repository imageID: ghcr.io/tektoncd/github.com/tektoncd/pipeline/cmd/git-init@sha256:28ff94e63e4058afc3f15b4c11c08cf3b54fa91faa646a4bbac90380cd7158df name: fetch-repository running: startedAt: "2025-07-17T20:35:10Z" - container: step-reduce imageID: docker.io/library/alpine@sha256:4bcff63911fcb4448bd4fdacec207030997caf25e9bea4045fa6c8c44de311d1 name: reduce running: startedAt: "2025-07-17T20:35:11Z" - container: step-publish imageID: ghcr.io/tektoncd/plumbing/tkn@sha256:328b4a98eb566ccad4aafcd7fb8307a97c5771e681d85bda669e21e37c071a81 name: publish running: startedAt: "2025-07-17T20:35:13Z" taskSpec: sidecars: - computeResources: {} image: registry name: registry steps: - computeResources: {} env: - name: HOME value: /home/git - name: PARAM_URL value: https://github.com/tektoncd/catalog - name: PARAM_REVISION - name: PARAM_REFSPEC - name: PARAM_SUBMODULES value: "true" - name: PARAM_DEPTH value: "1" - name: PARAM_SSL_VERIFY value: "true" - name: PARAM_CRT_FILENAME value: ca-bundle.crt - name: PARAM_SUBDIRECTORY - name: PARAM_DELETE_EXISTING value: "true" - name: PARAM_HTTP_PROXY - name: PARAM_HTTPS_PROXY - name: PARAM_NO_PROXY - name: PARAM_VERBOSE value: "true" - name: PARAM_SPARSE_CHECKOUT_DIRECTORIES - name: PARAM_USER_HOME value: /home/git - name: PARAM_OUTPUT_PATH value: /workspace/shared-workspace - name: PARAM_SSH_DIRECTORY_PATH value: no-path - name: PARAM_BASIC_AUTH_DIRECTORY_PATH value: no-path - name: PARAM_SSL_CA_DIRECTORY_PATH value: no-path image: ghcr.io/tektoncd/github.com/tektoncd/pipeline/cmd/git-init:v0.40.2 name: fetch-repository results: - description: The precise commit SHA that was fetched by this StepAction. name: commit type: string - description: The precise URL that was fetched by this StepAction. name: url type: string - description: The epoch timestamp of the commit that was fetched by this StepAction. name: committer-date type: string script: | #!/usr/bin/env sh set -eu if [ "${PARAM_VERBOSE}" = "true" ] ; then set -x fi if [ "${PARAM_BASIC_AUTH_DIRECTORY_PATH}" != "no-path" ] ; then cp "${PARAM_BASIC_AUTH_DIRECTORY_PATH}/.git-credentials" "${PARAM_USER_HOME}/.git-credentials" cp "${PARAM_BASIC_AUTH_DIRECTORY_PATH}/.gitconfig" "${PARAM_USER_HOME}/.gitconfig" chmod 400 "${PARAM_USER_HOME}/.git-credentials" chmod 400 "${PARAM_USER_HOME}/.gitconfig" fi if [ "${PARAM_SSH_DIRECTORY_PATH}" != "no-path" ] ; then cp -R "${PARAM_SSH_DIRECTORY_PATH}" "${PARAM_USER_HOME}"/.ssh chmod 700 "${PARAM_USER_HOME}"/.ssh chmod -R 400 "${PARAM_USER_HOME}"/.ssh/* fi if [ "${PARAM_SSL_CA_DIRECTORY_PATH}" != "no-path" ] ; then export GIT_SSL_CAPATH="${PARAM_SSL_CA_DIRECTORY_PATH}" if [ "${PARAM_CRT_FILENAME}" != "" ] ; then export GIT_SSL_CAINFO="${PARAM_SSL_CA_DIRECTORY_PATH}/${PARAM_CRT_FILENAME}" fi fi CHECKOUT_DIR="${PARAM_OUTPUT_PATH}/${PARAM_SUBDIRECTORY}" cleandir() { # Delete any existing contents of the repo directory if it exists. # # We don't just "rm -rf ${CHECKOUT_DIR}" because ${CHECKOUT_DIR} might be "/" # or the root of a mounted volume. if [ -d "${CHECKOUT_DIR}" ] ; then # Delete non-hidden files and directories rm -rf "${CHECKOUT_DIR:?}"/* # Delete files and directories starting with . but excluding .. rm -rf "${CHECKOUT_DIR}"/.[!.]* # Delete files and directories starting with .. plus any other character rm -rf "${CHECKOUT_DIR}"/..?* fi } if [ "${PARAM_DELETE_EXISTING}" = "true" ] ; then cleandir || true fi test -z "${PARAM_HTTP_PROXY}" || export HTTP_PROXY="${PARAM_HTTP_PROXY}" test -z "${PARAM_HTTPS_PROXY}" || export HTTPS_PROXY="${PARAM_HTTPS_PROXY}" test -z "${PARAM_NO_PROXY}" || export NO_PROXY="${PARAM_NO_PROXY}" git config --global --add safe.directory "${PARAM_OUTPUT_PATH}" /ko-app/git-init \ -url="${PARAM_URL}" \ -revision="${PARAM_REVISION}" \ -refspec="${PARAM_REFSPEC}" \ -path="${CHECKOUT_DIR}" \ -sslVerify="${PARAM_SSL_VERIFY}" \ -submodules="${PARAM_SUBMODULES}" \ -depth="${PARAM_DEPTH}" \ -sparseCheckoutDirectories="${PARAM_SPARSE_CHECKOUT_DIRECTORIES}" cd "${CHECKOUT_DIR}" RESULT_SHA="$(git rev-parse HEAD)" EXIT_CODE="$?" if [ "${EXIT_CODE}" != 0 ] ; then exit "${EXIT_CODE}" fi RESULT_COMMITTER_DATE="$(git log -1 --pretty=%ct)" printf "%s" "${RESULT_COMMITTER_DATE}" > "/tekton/steps/step-fetch-repository/results/committer-date" printf "%s" "${RESULT_SHA}" > "/tekton/steps/step-fetch-repository/results/commit" printf "%s" "${PARAM_URL}" > "/tekton/steps/step-fetch-repository/results/url" securityContext: runAsNonRoot: true runAsUser: 65532 - computeResources: {} image: alpine name: reduce script: | set -e cd "/workspace/shared-workspace/stepaction" ls | grep -v 'git-clone' | xargs rm -rf - computeResources: {} env: - name: REGISTRY value: localhost:5000 - name: REGISTRY_PATH value: tekton/catalog/stepactions - name: TAG value: $(steps.fetch-repository.results.commit) - name: DOCKER_CONFIG_PATH value: no-path - name: RESOURCE value: stepaction - name: TKN_ARGS image: ghcr.io/tektoncd/plumbing/tkn@sha256:328b4a98eb566ccad4aafcd7fb8307a97c5771e681d85bda669e21e37c071a81 name: publish script: | #!/usr/bin/env sh set -e -o pipefail TARGET="${REGISTRY}" [ "${REGISTRY_PATH}" != "" ] && TARGET="${TARGET}/${REGISTRY_PATH}" # If a dockerconfig workspace was provided, set DOCKER_CONFIG to point to it if [ -d "$DOCKER_CONFIG_PATH" ]; then export DOCKER_CONFIG="${DOCKER_CONFIG_PATH}" fi find ${RESOURCE} -type f -mindepth 3 -maxdepth 3 -name '*.yaml' -o -name '*.yml'| while read -r resource_version_dir; do FOLDER=$(dirname "$resource_version_dir") VERSION=$(basename "$FOLDER") RESOURCE_NAME=$(basename "$(dirname "$FOLDER")") tkn bundle push \ --label org.opencontainers.image.description="${RESOURCE_NAME}" \ --label org.opencontainers.image.version="${VERSION}" \ ${TKN_ARGS} "${TARGET}/${RESOURCE_NAME}:${VERSION}" -f "$resource_version_dir" [ "${TAG}" != "" ] && \ tkn bundle push \ --label org.opencontainers.image.description="${RESOURCE_NAME}" \ --label org.opencontainers.image.version="${TAG}" \ ${TKN_ARGS} "${TARGET}/${RESOURCE_NAME}:${TAG}" -f "$resource_version_dir" sleep 0.1 done workingDir: /workspace/shared-workspace workspaces: - name: shared-workspace kind: List metadata: resourceVersion: "" --- Task Dump apiVersion: v1 items: - apiVersion: tekton.dev/v1 kind: Task metadata: creationTimestamp: "2025-07-17T20:34:55Z" generation: 1 name: catalog-publish-test-task namespace: tekton-catalog-publish-0-3 resourceVersion: "1235" uid: 05158c96-e408-4eba-9319-ddd0de9d92ee spec: sidecars: - computeResources: {} image: registry name: registry steps: - computeResources: {} name: fetch-repository params: - name: url value: https://github.com/tektoncd/catalog - name: subdirectory value: "" - name: deleteExisting value: "true" - name: output-path value: $(workspaces.shared-workspace.path) ref: name: git-clone - computeResources: {} image: alpine name: reduce script: | set -e cd "$(workspaces.shared-workspace.path)/stepaction" ls | grep -v 'git-clone' | xargs rm -rf - computeResources: {} name: publish params: - name: REGISTRY value: localhost:5000 - name: RESOURCE value: stepaction - name: PATH value: tekton/catalog/stepactions - name: TAG value: $(steps.fetch-repository.results.commit) - name: catalogPath value: $(workspaces.shared-workspace.path) ref: name: tekton-catalog-publish workspaces: - name: shared-workspace kind: List metadata: resourceVersion: "" --- PipelineRun Dump --- Pipeline Dump --- StepAction Dump apiVersion: v1 items: - apiVersion: tekton.dev/v1beta1 kind: StepAction metadata: annotations: kubectl.kubernetes.io/last-applied-configuration: | {"apiVersion":"tekton.dev/v1beta1","kind":"StepAction","metadata":{"annotations":{"tekton.dev/categories":"Git","tekton.dev/displayName":"git clone","tekton.dev/pipelines.minVersion":"0.54.0","tekton.dev/platforms":"linux/amd64,linux/s390x,linux/ppc64le,linux/arm64","tekton.dev/tags":"git"},"labels":{"app.kubernetes.io/version":"0.2"},"name":"git-clone","namespace":"tekton-catalog-publish-0-3"},"spec":{"env":[{"name":"HOME","value":"$(params.userHome)"},{"name":"PARAM_URL","value":"$(params.url)"},{"name":"PARAM_REVISION","value":"$(params.revision)"},{"name":"PARAM_REFSPEC","value":"$(params.refspec)"},{"name":"PARAM_SUBMODULES","value":"$(params.submodules)"},{"name":"PARAM_DEPTH","value":"$(params.depth)"},{"name":"PARAM_SSL_VERIFY","value":"$(params.sslVerify)"},{"name":"PARAM_CRT_FILENAME","value":"$(params.crtFileName)"},{"name":"PARAM_SUBDIRECTORY","value":"$(params.subdirectory)"},{"name":"PARAM_DELETE_EXISTING","value":"$(params.deleteExisting)"},{"name":"PARAM_HTTP_PROXY","value":"$(params.httpProxy)"},{"name":"PARAM_HTTPS_PROXY","value":"$(params.httpsProxy)"},{"name":"PARAM_NO_PROXY","value":"$(params.noProxy)"},{"name":"PARAM_VERBOSE","value":"$(params.verbose)"},{"name":"PARAM_SPARSE_CHECKOUT_DIRECTORIES","value":"$(params.sparseCheckoutDirectories)"},{"name":"PARAM_USER_HOME","value":"$(params.userHome)"},{"name":"PARAM_OUTPUT_PATH","value":"$(params.output-path)"},{"name":"PARAM_SSH_DIRECTORY_PATH","value":"$(params.ssh-directory-path)"},{"name":"PARAM_BASIC_AUTH_DIRECTORY_PATH","value":"$(params.basic-auth-path)"},{"name":"PARAM_SSL_CA_DIRECTORY_PATH","value":"$(params.ssl-ca-directory-path)"}],"image":"$(params.gitInitImage)","params":[{"description":"The git repo will be cloned onto this path","name":"output-path"},{"default":"no-path","description":"A .ssh directory with private key, known_hosts, config, etc. Copied to\nthe user's home before git commands are executed. Used to authenticate\nwith the git remote when performing the clone. We recommend providing this\npath from a workspace that is bound by a Secret over other volume types.\n","name":"ssh-directory-path"},{"default":"no-path","description":"A directory path containing a .gitconfig and .git-credentials file. These\nwill be copied to the user's home before any git commands are run. Any\nother files in this directory are ignored. It is strongly recommended\nto use ssh-directory over basic-auth whenever possible and to bind a\nSecret to the Workspace providing this path over other volume types.\n","name":"basic-auth-path"},{"default":"no-path","description":"A directory containing CA certificates, this will be used by Git to\nverify the peer with when fetching or pushing over HTTPS.\n","name":"ssl-ca-directory-path"},{"description":"Repository URL to clone from.","name":"url","type":"string"},{"default":"","description":"Revision to checkout. (branch, tag, sha, ref, etc...)","name":"revision","type":"string"},{"default":"","description":"Refspec to fetch before checking out revision.","name":"refspec"},{"default":"true","description":"Initialize and fetch git submodules.","name":"submodules","type":"string"},{"default":"1","description":"Perform a shallow clone, fetching only the most recent N commits.","name":"depth","type":"string"},{"default":"true","description":"Set the `http.sslVerify` global git config. Setting this to `false` is not advised unless you are sure that you trust your git remote.","name":"sslVerify","type":"string"},{"default":"ca-bundle.crt","description":"file name of mounted crt using ssl-ca-directory workspace. default value is ca-bundle.crt.","name":"crtFileName","type":"string"},{"default":"","description":"Subdirectory inside the `output` Workspace to clone the repo into.","name":"subdirectory","type":"string"},{"default":"","description":"Define the directory patterns to match or exclude when performing a sparse checkout.","name":"sparseCheckoutDirectories","type":"string"},{"default":"true","description":"Clean out the contents of the destination directory if it already exists before cloning.","name":"deleteExisting","type":"string"},{"default":"","description":"HTTP proxy server for non-SSL requests.","name":"httpProxy","type":"string"},{"default":"","description":"HTTPS proxy server for SSL requests.","name":"httpsProxy","type":"string"},{"default":"","description":"Opt out of proxying HTTP/HTTPS requests.","name":"noProxy","type":"string"},{"default":"true","description":"Log the commands that are executed during `git-clone`'s operation.","name":"verbose","type":"string"},{"default":"ghcr.io/tektoncd/github.com/tektoncd/pipeline/cmd/git-init:v0.40.2","description":"The image providing the git-init binary that this StepAction runs.","name":"gitInitImage","type":"string"},{"default":"/home/git","description":"Absolute path to the user's home directory.\n","name":"userHome","type":"string"}],"results":[{"description":"The precise commit SHA that was fetched by this StepAction.","name":"commit"},{"description":"The precise URL that was fetched by this StepAction.","name":"url"},{"description":"The epoch timestamp of the commit that was fetched by this StepAction.","name":"committer-date"}],"script":"#!/usr/bin/env sh\nset -eu\n\nif [ \"${PARAM_VERBOSE}\" = \"true\" ] ; then\n set -x\nfi\n\nif [ \"${PARAM_BASIC_AUTH_DIRECTORY_PATH}\" != \"no-path\" ] ; then\n cp \"${PARAM_BASIC_AUTH_DIRECTORY_PATH}/.git-credentials\" \"${PARAM_USER_HOME}/.git-credentials\"\n cp \"${PARAM_BASIC_AUTH_DIRECTORY_PATH}/.gitconfig\" \"${PARAM_USER_HOME}/.gitconfig\"\n chmod 400 \"${PARAM_USER_HOME}/.git-credentials\"\n chmod 400 \"${PARAM_USER_HOME}/.gitconfig\"\nfi\n\nif [ \"${PARAM_SSH_DIRECTORY_PATH}\" != \"no-path\" ] ; then\n cp -R \"${PARAM_SSH_DIRECTORY_PATH}\" \"${PARAM_USER_HOME}\"/.ssh\n chmod 700 \"${PARAM_USER_HOME}\"/.ssh\n chmod -R 400 \"${PARAM_USER_HOME}\"/.ssh/*\nfi\n\nif [ \"${PARAM_SSL_CA_DIRECTORY_PATH}\" != \"no-path\" ] ; then\n export GIT_SSL_CAPATH=\"${PARAM_SSL_CA_DIRECTORY_PATH}\"\n if [ \"${PARAM_CRT_FILENAME}\" != \"\" ] ; then\n export GIT_SSL_CAINFO=\"${PARAM_SSL_CA_DIRECTORY_PATH}/${PARAM_CRT_FILENAME}\"\n fi\nfi\nCHECKOUT_DIR=\"${PARAM_OUTPUT_PATH}/${PARAM_SUBDIRECTORY}\"\n\ncleandir() {\n # Delete any existing contents of the repo directory if it exists.\n #\n # We don't just \"rm -rf ${CHECKOUT_DIR}\" because ${CHECKOUT_DIR} might be \"/\"\n # or the root of a mounted volume.\n if [ -d \"${CHECKOUT_DIR}\" ] ; then\n # Delete non-hidden files and directories\n rm -rf \"${CHECKOUT_DIR:?}\"/*\n # Delete files and directories starting with . but excluding ..\n rm -rf \"${CHECKOUT_DIR}\"/.[!.]*\n # Delete files and directories starting with .. plus any other character\n rm -rf \"${CHECKOUT_DIR}\"/..?*\n fi\n}\n\nif [ \"${PARAM_DELETE_EXISTING}\" = \"true\" ] ; then\n cleandir || true\nfi\n\ntest -z \"${PARAM_HTTP_PROXY}\" || export HTTP_PROXY=\"${PARAM_HTTP_PROXY}\"\ntest -z \"${PARAM_HTTPS_PROXY}\" || export HTTPS_PROXY=\"${PARAM_HTTPS_PROXY}\"\ntest -z \"${PARAM_NO_PROXY}\" || export NO_PROXY=\"${PARAM_NO_PROXY}\"\n\ngit config --global --add safe.directory \"${PARAM_OUTPUT_PATH}\"\n/ko-app/git-init \\\n -url=\"${PARAM_URL}\" \\\n -revision=\"${PARAM_REVISION}\" \\\n -refspec=\"${PARAM_REFSPEC}\" \\\n -path=\"${CHECKOUT_DIR}\" \\\n -sslVerify=\"${PARAM_SSL_VERIFY}\" \\\n -submodules=\"${PARAM_SUBMODULES}\" \\\n -depth=\"${PARAM_DEPTH}\" \\\n -sparseCheckoutDirectories=\"${PARAM_SPARSE_CHECKOUT_DIRECTORIES}\"\ncd \"${CHECKOUT_DIR}\"\nRESULT_SHA=\"$(git rev-parse HEAD)\"\nEXIT_CODE=\"$?\"\nif [ \"${EXIT_CODE}\" != 0 ] ; then\n exit \"${EXIT_CODE}\"\nfi\nRESULT_COMMITTER_DATE=\"$(git log -1 --pretty=%ct)\"\nprintf \"%s\" \"${RESULT_COMMITTER_DATE}\" \u003e \"$(step.results.committer-date.path)\"\nprintf \"%s\" \"${RESULT_SHA}\" \u003e \"$(step.results.commit.path)\"\nprintf \"%s\" \"${PARAM_URL}\" \u003e \"$(step.results.url.path)\"\n","securityContext":{"runAsNonRoot":true,"runAsUser":65532}}} tekton.dev/categories: Git tekton.dev/displayName: git clone tekton.dev/pipelines.minVersion: 0.54.0 tekton.dev/platforms: linux/amd64,linux/s390x,linux/ppc64le,linux/arm64 tekton.dev/tags: git creationTimestamp: "2025-07-17T20:34:54Z" generation: 1 labels: app.kubernetes.io/version: "0.2" name: git-clone namespace: tekton-catalog-publish-0-3 resourceVersion: "1215" uid: 18a11a37-27d8-4df4-afce-0ac5c9f77c27 spec: env: - name: HOME value: $(params.userHome) - name: PARAM_URL value: $(params.url) - name: PARAM_REVISION value: $(params.revision) - name: PARAM_REFSPEC value: $(params.refspec) - name: PARAM_SUBMODULES value: $(params.submodules) - name: PARAM_DEPTH value: $(params.depth) - name: PARAM_SSL_VERIFY value: $(params.sslVerify) - name: PARAM_CRT_FILENAME value: $(params.crtFileName) - name: PARAM_SUBDIRECTORY value: $(params.subdirectory) - name: PARAM_DELETE_EXISTING value: $(params.deleteExisting) - name: PARAM_HTTP_PROXY value: $(params.httpProxy) - name: PARAM_HTTPS_PROXY value: $(params.httpsProxy) - name: PARAM_NO_PROXY value: $(params.noProxy) - name: PARAM_VERBOSE value: $(params.verbose) - name: PARAM_SPARSE_CHECKOUT_DIRECTORIES value: $(params.sparseCheckoutDirectories) - name: PARAM_USER_HOME value: $(params.userHome) - name: PARAM_OUTPUT_PATH value: $(params.output-path) - name: PARAM_SSH_DIRECTORY_PATH value: $(params.ssh-directory-path) - name: PARAM_BASIC_AUTH_DIRECTORY_PATH value: $(params.basic-auth-path) - name: PARAM_SSL_CA_DIRECTORY_PATH value: $(params.ssl-ca-directory-path) image: $(params.gitInitImage) params: - description: The git repo will be cloned onto this path name: output-path type: string - default: no-path description: | A .ssh directory with private key, known_hosts, config, etc. Copied to the user's home before git commands are executed. Used to authenticate with the git remote when performing the clone. We recommend providing this path from a workspace that is bound by a Secret over other volume types. name: ssh-directory-path type: string - default: no-path description: | A directory path containing a .gitconfig and .git-credentials file. These will be copied to the user's home before any git commands are run. Any other files in this directory are ignored. It is strongly recommended to use ssh-directory over basic-auth whenever possible and to bind a Secret to the Workspace providing this path over other volume types. name: basic-auth-path type: string - default: no-path description: | A directory containing CA certificates, this will be used by Git to verify the peer with when fetching or pushing over HTTPS. name: ssl-ca-directory-path type: string - description: Repository URL to clone from. name: url type: string - default: "" description: Revision to checkout. (branch, tag, sha, ref, etc...) name: revision type: string - default: "" description: Refspec to fetch before checking out revision. name: refspec type: string - default: "true" description: Initialize and fetch git submodules. name: submodules type: string - default: "1" description: Perform a shallow clone, fetching only the most recent N commits. name: depth type: string - default: "true" description: Set the `http.sslVerify` global git config. Setting this to `false` is not advised unless you are sure that you trust your git remote. name: sslVerify type: string - default: ca-bundle.crt description: file name of mounted crt using ssl-ca-directory workspace. default value is ca-bundle.crt. name: crtFileName type: string - default: "" description: Subdirectory inside the `output` Workspace to clone the repo into. name: subdirectory type: string - default: "" description: Define the directory patterns to match or exclude when performing a sparse checkout. name: sparseCheckoutDirectories type: string - default: "true" description: Clean out the contents of the destination directory if it already exists before cloning. name: deleteExisting type: string - default: "" description: HTTP proxy server for non-SSL requests. name: httpProxy type: string - default: "" description: HTTPS proxy server for SSL requests. name: httpsProxy type: string - default: "" description: Opt out of proxying HTTP/HTTPS requests. name: noProxy type: string - default: "true" description: Log the commands that are executed during `git-clone`'s operation. name: verbose type: string - default: ghcr.io/tektoncd/github.com/tektoncd/pipeline/cmd/git-init:v0.40.2 description: The image providing the git-init binary that this StepAction runs. name: gitInitImage type: string - default: /home/git description: | Absolute path to the user's home directory. name: userHome type: string results: - description: The precise commit SHA that was fetched by this StepAction. name: commit type: string - description: The precise URL that was fetched by this StepAction. name: url type: string - description: The epoch timestamp of the commit that was fetched by this StepAction. name: committer-date type: string script: | #!/usr/bin/env sh set -eu if [ "${PARAM_VERBOSE}" = "true" ] ; then set -x fi if [ "${PARAM_BASIC_AUTH_DIRECTORY_PATH}" != "no-path" ] ; then cp "${PARAM_BASIC_AUTH_DIRECTORY_PATH}/.git-credentials" "${PARAM_USER_HOME}/.git-credentials" cp "${PARAM_BASIC_AUTH_DIRECTORY_PATH}/.gitconfig" "${PARAM_USER_HOME}/.gitconfig" chmod 400 "${PARAM_USER_HOME}/.git-credentials" chmod 400 "${PARAM_USER_HOME}/.gitconfig" fi if [ "${PARAM_SSH_DIRECTORY_PATH}" != "no-path" ] ; then cp -R "${PARAM_SSH_DIRECTORY_PATH}" "${PARAM_USER_HOME}"/.ssh chmod 700 "${PARAM_USER_HOME}"/.ssh chmod -R 400 "${PARAM_USER_HOME}"/.ssh/* fi if [ "${PARAM_SSL_CA_DIRECTORY_PATH}" != "no-path" ] ; then export GIT_SSL_CAPATH="${PARAM_SSL_CA_DIRECTORY_PATH}" if [ "${PARAM_CRT_FILENAME}" != "" ] ; then export GIT_SSL_CAINFO="${PARAM_SSL_CA_DIRECTORY_PATH}/${PARAM_CRT_FILENAME}" fi fi CHECKOUT_DIR="${PARAM_OUTPUT_PATH}/${PARAM_SUBDIRECTORY}" cleandir() { # Delete any existing contents of the repo directory if it exists. # # We don't just "rm -rf ${CHECKOUT_DIR}" because ${CHECKOUT_DIR} might be "/" # or the root of a mounted volume. if [ -d "${CHECKOUT_DIR}" ] ; then # Delete non-hidden files and directories rm -rf "${CHECKOUT_DIR:?}"/* # Delete files and directories starting with . but excluding .. rm -rf "${CHECKOUT_DIR}"/.[!.]* # Delete files and directories starting with .. plus any other character rm -rf "${CHECKOUT_DIR}"/..?* fi } if [ "${PARAM_DELETE_EXISTING}" = "true" ] ; then cleandir || true fi test -z "${PARAM_HTTP_PROXY}" || export HTTP_PROXY="${PARAM_HTTP_PROXY}" test -z "${PARAM_HTTPS_PROXY}" || export HTTPS_PROXY="${PARAM_HTTPS_PROXY}" test -z "${PARAM_NO_PROXY}" || export NO_PROXY="${PARAM_NO_PROXY}" git config --global --add safe.directory "${PARAM_OUTPUT_PATH}" /ko-app/git-init \ -url="${PARAM_URL}" \ -revision="${PARAM_REVISION}" \ -refspec="${PARAM_REFSPEC}" \ -path="${CHECKOUT_DIR}" \ -sslVerify="${PARAM_SSL_VERIFY}" \ -submodules="${PARAM_SUBMODULES}" \ -depth="${PARAM_DEPTH}" \ -sparseCheckoutDirectories="${PARAM_SPARSE_CHECKOUT_DIRECTORIES}" cd "${CHECKOUT_DIR}" RESULT_SHA="$(git rev-parse HEAD)" EXIT_CODE="$?" if [ "${EXIT_CODE}" != 0 ] ; then exit "${EXIT_CODE}" fi RESULT_COMMITTER_DATE="$(git log -1 --pretty=%ct)" printf "%s" "${RESULT_COMMITTER_DATE}" > "$(step.results.committer-date.path)" printf "%s" "${RESULT_SHA}" > "$(step.results.commit.path)" printf "%s" "${PARAM_URL}" > "$(step.results.url.path)" securityContext: runAsNonRoot: true runAsUser: 65532 - apiVersion: tekton.dev/v1beta1 kind: StepAction metadata: annotations: tekton.dev/categories: Publishing tekton.dev/cli.minVersion: 0.34.0 tekton.dev/displayName: Publish a Tekton Catalog tekton.dev/pipelines.minVersion: 0.54.0 tekton.dev/platforms: linux/amd64,linux/s390x,linux/ppc64le tekton.dev/tags: catalog, bundles creationTimestamp: "2025-07-17T20:34:54Z" generation: 1 labels: app.kubernetes.io/version: "0.3" name: tekton-catalog-publish namespace: tekton-catalog-publish-0-3 resourceVersion: "1226" uid: 2c49dfe5-11c0-44d3-a0cd-033c07ec3578 spec: env: - name: REGISTRY value: $(params.REGISTRY) - name: REGISTRY_PATH value: $(params.PATH) - name: TAG value: $(params.TAG) - name: DOCKER_CONFIG_PATH value: $(params.dockerconfigPath) - name: RESOURCE value: $(params.RESOURCE) - name: TKN_ARGS value: $(params.TKN_ARGS) image: $(params.TKN_IMAGE) params: - default: ghcr.io/tektoncd/plumbing/tkn@sha256:328b4a98eb566ccad4aafcd7fb8307a97c5771e681d85bda669e21e37c071a81 description: tkn CLI container image to run this stepaction name: TKN_IMAGE type: string - default: "" description: Extra args to be passed to tkn, as a single string name: TKN_ARGS type: string - description: The registry where bundles are published to name: REGISTRY type: string - default: tekton/catalog/tasks description: The path in the registry name: PATH type: string - default: task description: task or stepaction. It must match the resource name in the root of the catalog path. name: RESOURCE type: string - default: "" description: An optional extra tag. If provided, tasks are tagged with it too. name: TAG type: string - description: A directory that holds the catalog to be published. The catalog must be stored in the root of the directory, and is must follow the [Tetkon Catalog](https://github.com/tektoncd/catalog#catalog-structure) structure. name: catalogPath type: string - default: no-path description: An optional directory that allows providing a .docker/config.json file for tkn to access the container registry. The file should be placed at the root of the Directory with name config.json. name: dockerconfigPath type: string script: | #!/usr/bin/env sh set -e -o pipefail TARGET="${REGISTRY}" [ "${REGISTRY_PATH}" != "" ] && TARGET="${TARGET}/${REGISTRY_PATH}" # If a dockerconfig workspace was provided, set DOCKER_CONFIG to point to it if [ -d "$DOCKER_CONFIG_PATH" ]; then export DOCKER_CONFIG="${DOCKER_CONFIG_PATH}" fi find ${RESOURCE} -type f -mindepth 3 -maxdepth 3 -name '*.yaml' -o -name '*.yml'| while read -r resource_version_dir; do FOLDER=$(dirname "$resource_version_dir") VERSION=$(basename "$FOLDER") RESOURCE_NAME=$(basename "$(dirname "$FOLDER")") tkn bundle push \ --label org.opencontainers.image.description="${RESOURCE_NAME}" \ --label org.opencontainers.image.version="${VERSION}" \ ${TKN_ARGS} "${TARGET}/${RESOURCE_NAME}:${VERSION}" -f "$resource_version_dir" [ "${TAG}" != "" ] && \ tkn bundle push \ --label org.opencontainers.image.description="${RESOURCE_NAME}" \ --label org.opencontainers.image.version="${TAG}" \ ${TKN_ARGS} "${TARGET}/${RESOURCE_NAME}:${TAG}" -f "$resource_version_dir" sleep 0.1 done workingDir: $(params.catalogPath) kind: List metadata: resourceVersion: "" --- Container Logs ----POD_NAME: pod/catalog-publish-test-task-run-pod--- Error from server (BadRequest): container "sidecar-registry" in pod "catalog-publish-test-task-run-pod" is waiting to start: image can't be pulled + EXIT_VALUE=1 + set +o xtrace Cleaning up after docker in docker. ================================================================================ Cleaning up binfmt_misc ... ================================================================================ Done cleaning up after docker in docker.