Cloning into '/home/prow/go/src/github.com/google/licenseclassifier'... Docker in Docker enabled, initializing... ================================================================================ * Starting Docker: docker ...done. Waiting for docker to be ready, sleeping for 1 seconds. Cleaning up binfmt_misc ... ================================================================================ Done setting up docker in docker. Activated service account credentials for: [prow-account@tekton-releases.iam.gserviceaccount.com] == Running ./runner.sh backward compatibility test runner === + [[ 12 -ne 0 ]] + case $1 in ++ cut -d = -f2 + gcloud auth activate-service-account --key-file=/etc/test-account/service-account.json Activated service account credentials for: [prow-account@tekton-releases.iam.gserviceaccount.com] + shift + [[ 11 -ne 0 ]] + case $1 in + shift + [[ -- == \-\- ]] + shift + break + /usr/local/bin/kind-e2e --k8s-version v1.28.x --nodes 3 --e2e-script ./test/e2e-tests.sh --e2e-env ./test/e2e-tests-kind-prow.env + K8S_VERSION=v1.28.x + REGISTRY_NAME=registry.local + REGISTRY_PORT=5000 + CLUSTER_SUFFIX=cluster.local + NODE_COUNT=1 + REGISTRY_AUTH=0 + ESTARGZ_SUPPORT=0 + E2E_SCRIPT=test/e2e-tests.sh + E2E_ENV= + [[ 8 -ne 0 ]] + parameter=--k8s-version + case "${parameter}" in + shift + K8S_VERSION=v1.28.x + shift + [[ 6 -ne 0 ]] + parameter=--nodes + case "${parameter}" in + shift + NODE_COUNT=3 + shift + [[ 4 -ne 0 ]] + parameter=--e2e-script + case "${parameter}" in + shift + E2E_SCRIPT=./test/e2e-tests.sh + shift + [[ 2 -ne 0 ]] + parameter=--e2e-env + case "${parameter}" in + shift + E2E_ENV=./test/e2e-tests-kind-prow.env + shift + [[ 0 -ne 0 ]] + [[ ./test/e2e-tests-kind-prow.env != '' ]] + [[ ! -f ./test/e2e-tests-kind-prow.env ]] + case ${K8S_VERSION} in + K8S_VERSION=1.28.9 + KIND_IMAGE_SHA=sha256:dca54bc6a6079dd34699d53d7d4ffa2e853e46a20cd12d619a09207e35300bd0 + KIND_IMAGE=kindest/node:1.28.9@sha256:dca54bc6a6079dd34699d53d7d4ffa2e853e46a20cd12d619a09207e35300bd0 + echo '--- Setup KinD Cluster' --- Setup KinD Cluster + cat ++ seq 1 1 3 + for i in $(seq 1 1 "${NODE_COUNT}") + cat + for i in $(seq 1 1 "${NODE_COUNT}") + cat + for i in $(seq 1 1 "${NODE_COUNT}") + cat + cat ++ containerd_config ++ [[ 0 = \1 ]] ++ cat + echo '--- kind.yaml' --- kind.yaml + cat kind.yaml apiVersion: kind.x-k8s.io/v1alpha4 kind: Cluster nodes: - role: control-plane image: "kindest/node:1.28.9@sha256:dca54bc6a6079dd34699d53d7d4ffa2e853e46a20cd12d619a09207e35300bd0" - role: worker image: "kindest/node:1.28.9@sha256:dca54bc6a6079dd34699d53d7d4ffa2e853e46a20cd12d619a09207e35300bd0" - role: worker image: "kindest/node:1.28.9@sha256:dca54bc6a6079dd34699d53d7d4ffa2e853e46a20cd12d619a09207e35300bd0" - role: worker image: "kindest/node:1.28.9@sha256:dca54bc6a6079dd34699d53d7d4ffa2e853e46a20cd12d619a09207e35300bd0" kubeadmConfigPatches: # This is needed in order to support projected volumes with service account tokens. # See: https://kubernetes.slack.com/archives/CEKK1KTN2/p1600268272383600 - | apiVersion: kubeadm.k8s.io/v1beta2 kind: ClusterConfiguration metadata: name: config apiServer: extraArgs: "service-account-issuer": "kubernetes.default.svc" "service-account-signing-key-file": "/etc/kubernetes/pki/sa.key" networking: dnsDomain: "cluster.local" # This is needed to avoid filling our disk. # See: https://kubernetes.slack.com/archives/CEKK1KTN2/p1603391142276400 - | kind: KubeletConfiguration metadata: name: config imageGCHighThresholdPercent: 90 containerdConfigPatches: - |- [plugins."io.containerd.grpc.v1.cri".containerd] # Support many layered images: https://kubernetes.slack.com/archives/CEKK1KTN2/p1602770111199000 disable_snapshot_annotations = true # Support a local registry [plugins."io.containerd.grpc.v1.cri".registry.mirrors."registry.local:5000"] endpoint = ["http://registry.local:5000"] + kind --version kind version 0.23.0 + docker ps CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES + kind create cluster --config kind.yaml Creating cluster "kind" ... â€ĸ Ensuring node image (kindest/node:1.28.9) đŸ–ŧ ... ✓ Ensuring node image (kindest/node:1.28.9) đŸ–ŧ â€ĸ Preparing nodes đŸ“Ļ đŸ“Ļ đŸ“Ļ đŸ“Ļ ... ✓ Preparing nodes đŸ“Ļ đŸ“Ļ đŸ“Ļ đŸ“Ļ â€ĸ Writing configuration 📜 ... ✓ Writing configuration 📜 â€ĸ Starting control-plane đŸ•šī¸ ... ✓ Starting control-plane đŸ•šī¸ â€ĸ Installing CNI 🔌 ... ✓ Installing CNI 🔌 â€ĸ Installing StorageClass 💾 ... ✓ Installing StorageClass 💾 â€ĸ Joining worker nodes 🚜 ... ✓ Joining worker nodes 🚜 Set kubectl context to "kind-kind" You can now use your cluster with: kubectl cluster-info --context kind-kind Have a nice day! 👋 + echo '--- Setup metallb' --- Setup metallb + kubectl apply -f https://raw.githubusercontent.com/metallb/metallb/v0.13.10/config/manifests/metallb-native.yaml namespace/metallb-system created customresourcedefinition.apiextensions.k8s.io/addresspools.metallb.io created customresourcedefinition.apiextensions.k8s.io/bfdprofiles.metallb.io created customresourcedefinition.apiextensions.k8s.io/bgpadvertisements.metallb.io created customresourcedefinition.apiextensions.k8s.io/bgppeers.metallb.io created customresourcedefinition.apiextensions.k8s.io/communities.metallb.io created customresourcedefinition.apiextensions.k8s.io/ipaddresspools.metallb.io created customresourcedefinition.apiextensions.k8s.io/l2advertisements.metallb.io created serviceaccount/controller created serviceaccount/speaker created role.rbac.authorization.k8s.io/controller created role.rbac.authorization.k8s.io/pod-lister created clusterrole.rbac.authorization.k8s.io/metallb-system:controller created clusterrole.rbac.authorization.k8s.io/metallb-system:speaker created rolebinding.rbac.authorization.k8s.io/controller created rolebinding.rbac.authorization.k8s.io/pod-lister created clusterrolebinding.rbac.authorization.k8s.io/metallb-system:controller created clusterrolebinding.rbac.authorization.k8s.io/metallb-system:speaker created configmap/metallb-excludel2 created secret/webhook-server-cert created service/webhook-service created deployment.apps/controller created daemonset.apps/speaker created validatingwebhookconfiguration.admissionregistration.k8s.io/metallb-webhook-configuration created ++ openssl rand -base64 128 + kubectl create secret generic -n metallb-system memberlist '--from-literal=secretkey=6JwqB0Q17BBtU4LHiJNDPo7Q90gee+amKtc3NR4wG3eHjcBKLhf1e9nYVlaQpvrw bfW9JMAimyPn/oHDU/0nkoP293GjiGb1OljHrvLo+trIbvPLmmJlgcaNQFkBvexw ChW/+V19U+oubLdvOzTygLiiFT+yp6iF70a2E/mC4jo=' secret/memberlist created ++ docker network inspect kind -f '{{(index .IPAM.Config 0).Subnet}}' ++ cut -d . -f1,2 + network=fc00:f853:ccd:e793::/64 + cat + kubectl apply -f - configmap/config created + echo '--- Setup container registry' --- Setup container registry + EXTRA_ARGS=() + [[ 0 == \1 ]] + docker run -d --restart=always -p 5000:5000 --name registry.local registry:2 Unable to find image 'registry:2' locally 2: Pulling from library/registry 44cf07d57ee4: Pulling fs layer bbbdd6c6894b: Pulling fs layer 8e82f80af0de: Pulling fs layer 3493bf46cdec: Pulling fs layer 6d464ea18732: Pulling fs layer 3493bf46cdec: Waiting 6d464ea18732: Waiting bbbdd6c6894b: Verifying Checksum bbbdd6c6894b: Download complete 44cf07d57ee4: Verifying Checksum 44cf07d57ee4: Download complete 8e82f80af0de: Verifying Checksum 8e82f80af0de: Download complete 44cf07d57ee4: Pull complete 3493bf46cdec: Verifying Checksum 3493bf46cdec: Download complete 6d464ea18732: Verifying Checksum 6d464ea18732: Download complete bbbdd6c6894b: Pull complete 8e82f80af0de: Pull complete 3493bf46cdec: Pull complete 6d464ea18732: Pull complete Digest: sha256:a3d8aaa63ed8681a604f1dea0aa03f100d5895b6a58ace528858a7b332415373 Status: Downloaded newer image for registry:2 77770c4290dab3d19fe1401c49926d265f8e4e36db15182ba146de9d6443e86c + docker network connect kind registry.local + tee -a /etc/hosts + echo '127.0.0.1 registry.local' 127.0.0.1 registry.local + [[ 0 == \1 ]] + export KO_DOCKER_REPO=kind.local + KO_DOCKER_REPO=kind.local + [[ ./test/e2e-tests.sh == '' ]] + [[ ./test/e2e-tests-kind-prow.env != '' ]] + set -o allexport + source ./test/e2e-tests-kind-prow.env ++ E2E_SKIP_CLUSTER_CREATION=true ++ KO_DOCKER_REPO=registry.local:5000 ++ ARTIFACTS=/workspace/source/artifacts + set +o allexport + ./test/e2e-tests.sh ================================ ==== SETTING UP ENVIRONMENT ==== ================================ Running fail tkn pipeline describe foo Test Error: no matches for tekton.dev/, Resource=pipelines Running fail tkn pipelinerun describe foo Test Error: failed to find pipelinerun "foo" Running fail tkn pipelinerun list foo Test Failed to list objects from default namespace Error: failed to list PipelineRuns from namespace default: no matches for tekton.dev/, Resource=pipelineruns Running fail tkn pipeline list Test Failed to list objects from default namespace Error: failed to list Pipelines from namespace default: no matches for tekton.dev/, Resource=pipelines Running fail tkn task list Test Failed to list objects from default namespace Error: failed to list Tasks from namespace default: no matches for tekton.dev/, Resource=tasks Running fail tkn taskrun list Test Failed to list objects from default namespace Error: failed to list TaskRuns from namespace default: no matches for tekton.dev/, Resource=taskruns Running fail tkn taskrun list foo Test Failed to list objects from default namespace Error: failed to list TaskRuns from namespace default: no matches for tekton.dev/, Resource=taskruns Running fail tkn pipelinerun logs foo Test Error: no matches for tekton.dev/, Resource=pipelineruns Running fail tkn taskrun logs foo Test Error: Unable to get TaskRun: no matches for tekton.dev/, Resource=taskruns Running fail tkn eventlistener ls Test Error: failed to list EventListeners from default namespace: no matches for triggers.tekton.dev/, Resource=eventlisteners Running fail tkn triggertemplate ls Test Error: failed to list TriggerTemplates from default namespace: no matches for triggers.tekton.dev/, Resource=triggertemplates Running fail tkn triggerbinding ls Test Error: failed to list TriggerBindings from default namespace: no matches for triggers.tekton.dev/, Resource=triggerbindings Running fail tkn clustertriggerbinding ls Test Error: failed to list ClusterTriggerBindings: no matches for triggers.tekton.dev/, Resource=clustertriggerbindings >> Deploying Tekton Pipelines namespace/tekton-pipelines created clusterrole.rbac.authorization.k8s.io/tekton-pipelines-controller-cluster-access created clusterrole.rbac.authorization.k8s.io/tekton-pipelines-controller-tenant-access created clusterrole.rbac.authorization.k8s.io/tekton-pipelines-webhook-cluster-access created clusterrole.rbac.authorization.k8s.io/tekton-events-controller-cluster-access created role.rbac.authorization.k8s.io/tekton-pipelines-controller created role.rbac.authorization.k8s.io/tekton-pipelines-webhook created role.rbac.authorization.k8s.io/tekton-pipelines-events-controller created role.rbac.authorization.k8s.io/tekton-pipelines-leader-election created role.rbac.authorization.k8s.io/tekton-pipelines-info created serviceaccount/tekton-pipelines-controller created serviceaccount/tekton-pipelines-webhook created serviceaccount/tekton-events-controller created clusterrolebinding.rbac.authorization.k8s.io/tekton-pipelines-controller-cluster-access created clusterrolebinding.rbac.authorization.k8s.io/tekton-pipelines-controller-tenant-access created clusterrolebinding.rbac.authorization.k8s.io/tekton-pipelines-webhook-cluster-access created clusterrolebinding.rbac.authorization.k8s.io/tekton-events-controller-cluster-access created rolebinding.rbac.authorization.k8s.io/tekton-pipelines-controller created rolebinding.rbac.authorization.k8s.io/tekton-pipelines-webhook created rolebinding.rbac.authorization.k8s.io/tekton-pipelines-controller-leaderelection created rolebinding.rbac.authorization.k8s.io/tekton-pipelines-webhook-leaderelection created rolebinding.rbac.authorization.k8s.io/tekton-pipelines-info created rolebinding.rbac.authorization.k8s.io/tekton-pipelines-events-controller created rolebinding.rbac.authorization.k8s.io/tekton-events-controller-leaderelection created customresourcedefinition.apiextensions.k8s.io/customruns.tekton.dev created customresourcedefinition.apiextensions.k8s.io/pipelines.tekton.dev created customresourcedefinition.apiextensions.k8s.io/pipelineruns.tekton.dev created customresourcedefinition.apiextensions.k8s.io/resolutionrequests.resolution.tekton.dev created customresourcedefinition.apiextensions.k8s.io/stepactions.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tasks.tekton.dev created customresourcedefinition.apiextensions.k8s.io/taskruns.tekton.dev created customresourcedefinition.apiextensions.k8s.io/verificationpolicies.tekton.dev created secret/webhook-certs created validatingwebhookconfiguration.admissionregistration.k8s.io/validation.webhook.pipeline.tekton.dev created mutatingwebhookconfiguration.admissionregistration.k8s.io/webhook.pipeline.tekton.dev created validatingwebhookconfiguration.admissionregistration.k8s.io/config.webhook.pipeline.tekton.dev created clusterrole.rbac.authorization.k8s.io/tekton-aggregate-edit created clusterrole.rbac.authorization.k8s.io/tekton-aggregate-view created configmap/config-defaults created configmap/config-events created configmap/feature-flags created configmap/pipelines-info created configmap/config-leader-election-controller created configmap/config-leader-election-events created configmap/config-leader-election-webhook created configmap/config-logging created configmap/config-observability created configmap/config-registry-cert created configmap/config-spire created configmap/config-tracing created deployment.apps/tekton-pipelines-controller created service/tekton-pipelines-controller created deployment.apps/tekton-events-controller created service/tekton-events-controller created namespace/tekton-pipelines-resolvers created clusterrole.rbac.authorization.k8s.io/tekton-pipelines-resolvers-resolution-request-updates created role.rbac.authorization.k8s.io/tekton-pipelines-resolvers-namespace-rbac created serviceaccount/tekton-pipelines-resolvers created clusterrolebinding.rbac.authorization.k8s.io/tekton-pipelines-resolvers created rolebinding.rbac.authorization.k8s.io/tekton-pipelines-resolvers-namespace-rbac created configmap/bundleresolver-config created configmap/cluster-resolver-config created configmap/resolvers-feature-flags created configmap/config-leader-election-resolvers created configmap/config-logging created configmap/config-observability created configmap/git-resolver-config created configmap/http-resolver-config created configmap/hubresolver-config created deployment.apps/tekton-pipelines-remote-resolvers created service/tekton-pipelines-remote-resolvers created horizontalpodautoscaler.autoscaling/tekton-pipelines-webhook created deployment.apps/tekton-pipelines-webhook created service/tekton-pipelines-webhook created No resources found No resources found No resources found No resources found Waiting until all pods in namespace tekton-pipelines are up..... All pods are up: tekton-events-controller-8555df779-4mvkz 1/1 Running 0 11s tekton-pipelines-controller-568454644d-h8dwn 1/1 Running 0 11s tekton-pipelines-webhook-6ccc779958-jmxjj 1/1 Running 0 11s >> Deploying Tekton Triggers clusterrole.rbac.authorization.k8s.io/tekton-triggers-admin created clusterrole.rbac.authorization.k8s.io/tekton-triggers-core-interceptors created clusterrole.rbac.authorization.k8s.io/tekton-triggers-core-interceptors-secrets created clusterrole.rbac.authorization.k8s.io/tekton-triggers-eventlistener-roles created clusterrole.rbac.authorization.k8s.io/tekton-triggers-eventlistener-clusterroles created role.rbac.authorization.k8s.io/tekton-triggers-admin-webhook created role.rbac.authorization.k8s.io/tekton-triggers-core-interceptors created role.rbac.authorization.k8s.io/tekton-triggers-info created serviceaccount/tekton-triggers-controller created serviceaccount/tekton-triggers-webhook created serviceaccount/tekton-triggers-core-interceptors created clusterrolebinding.rbac.authorization.k8s.io/tekton-triggers-controller-admin created clusterrolebinding.rbac.authorization.k8s.io/tekton-triggers-webhook-admin created clusterrolebinding.rbac.authorization.k8s.io/tekton-triggers-core-interceptors created clusterrolebinding.rbac.authorization.k8s.io/tekton-triggers-core-interceptors-secrets created rolebinding.rbac.authorization.k8s.io/tekton-triggers-webhook-admin created rolebinding.rbac.authorization.k8s.io/tekton-triggers-core-interceptors created rolebinding.rbac.authorization.k8s.io/tekton-triggers-info created customresourcedefinition.apiextensions.k8s.io/clusterinterceptors.triggers.tekton.dev created customresourcedefinition.apiextensions.k8s.io/clustertriggerbindings.triggers.tekton.dev created customresourcedefinition.apiextensions.k8s.io/eventlisteners.triggers.tekton.dev created customresourcedefinition.apiextensions.k8s.io/interceptors.triggers.tekton.dev created customresourcedefinition.apiextensions.k8s.io/triggers.triggers.tekton.dev created customresourcedefinition.apiextensions.k8s.io/triggerbindings.triggers.tekton.dev created customresourcedefinition.apiextensions.k8s.io/triggertemplates.triggers.tekton.dev created secret/triggers-webhook-certs created validatingwebhookconfiguration.admissionregistration.k8s.io/validation.webhook.triggers.tekton.dev created mutatingwebhookconfiguration.admissionregistration.k8s.io/webhook.triggers.tekton.dev created validatingwebhookconfiguration.admissionregistration.k8s.io/config.webhook.triggers.tekton.dev created clusterrole.rbac.authorization.k8s.io/tekton-triggers-aggregate-edit created clusterrole.rbac.authorization.k8s.io/tekton-triggers-aggregate-view created configmap/config-defaults-triggers created configmap/feature-flags-triggers created configmap/triggers-info created configmap/config-leader-election-triggers-controller created configmap/config-leader-election-triggers-webhook created configmap/config-logging-triggers created configmap/config-observability-triggers created service/tekton-triggers-controller created deployment.apps/tekton-triggers-controller created service/tekton-triggers-webhook created deployment.apps/tekton-triggers-webhook created Waiting until all pods in namespace tekton-pipelines are up... All pods are up: tekton-events-controller-8555df779-4mvkz 1/1 Running 0 19s tekton-pipelines-controller-568454644d-h8dwn 1/1 Running 0 19s tekton-pipelines-webhook-6ccc779958-jmxjj 1/1 Running 0 19s tekton-triggers-controller-85b68f7749-8f6jz 1/1 Running 0 6s tekton-triggers-webhook-769b959b77-gtlrz 1/1 Running 0 6s customresourcedefinition.apiextensions.k8s.io/clusterinterceptors.triggers.tekton.dev condition met secret/tekton-triggers-core-interceptors-certs created deployment.apps/tekton-triggers-core-interceptors created service/tekton-triggers-core-interceptors created clusterinterceptor.triggers.tekton.dev/cel created clusterinterceptor.triggers.tekton.dev/bitbucket created clusterinterceptor.triggers.tekton.dev/slack created clusterinterceptor.triggers.tekton.dev/github created clusterinterceptor.triggers.tekton.dev/gitlab created No resources found No resources found No resources found No resources found Waiting until all pods in namespace tekton-pipelines are up..... All pods are up: tekton-events-controller-8555df779-4mvkz 1/1 Running 0 30s tekton-pipelines-controller-568454644d-h8dwn 1/1 Running 0 30s tekton-pipelines-webhook-6ccc779958-jmxjj 1/1 Running 0 30s tekton-triggers-controller-85b68f7749-8f6jz 1/1 Running 0 17s tekton-triggers-core-interceptors-5bf4f4556b-q8c4k 1/1 Running 0 11s tekton-triggers-webhook-769b959b77-gtlrz 1/1 Running 0 17s Context "kind-kind" modified. Running tkn version Test Client version: dev Pipeline version: v1.2.0 Triggers version: v20250710-3dd8193657 Running tkn pipelinerun list foo Test No PipelineRuns found Running tkn pipelinerun list Test No PipelineRuns found Running tkn pipeline list Test No Pipelines found Running tkn task list Test No Tasks found Running tkn taskrun list foo Test No TaskRuns found Running tkn taskrun list Test No TaskRuns found Running tkn eventlistener ls Test No eventlisteners found Running tkn triggertemplate ls Test No TriggerTemplates found Running tkn triggerbinding ls Test No TriggerBindings found Running tkn clustertriggerbinding ls Test No ClusterTriggerBindings found ............................... Running fail tkn pipeline describe foo Test Error: pipelines.tekton.dev "foo" not found Running fail tkn pipelinerun describe foo Test Error: failed to find pipelinerun "foo" Running fail tkn pipelinerun logs foo Test Error: pipelineruns.tekton.dev "foo" not found Running fail tkn taskrun logs foo Test Error: Unable to get TaskRun: taskruns.tekton.dev "foo" not found Running fail tkn eventlistener describe foo Test Error: failed to get EventListener foo: failed to get EventListener foo: eventlisteners.triggers.tekton.dev "foo" not found Running fail tkn triggertemplate describe foo Test Error: failed to get TriggerTemplate foo from default namespace: triggertemplates.triggers.tekton.dev "foo" not found ..................... namespace/tektoncd created Context "kind-kind" modified. task.tekton.dev/create-file-verify created pipeline.tekton.dev/output-pipeline created pipelinerun.tekton.dev/output-pipeline-run created task.tekton.dev/task-volume created taskrun.tekton.dev/test-template-volume created eventlistener.triggers.tekton.dev/github-listener-interceptor created Waiting for resources to be ready --------------------------------- Waiting for pipelinerun/output-pipeline-run to be ready; timeout: 600 ... [2] status is Unknown ... [4] status is Unknown ... [6] status is Unknown ... [8] status is Unknown ... [10] status is Unknown ... [12] status is Unknown Waiting for taskrun/test-template-volume to be ready; timeout: 600 --------------------------------- Running tests --------------------------------- Running tkn pipelinerun list output-pipeline Test NAME STARTED DURATION STATUS output-pipeline-run 15 seconds ago 12s Succeeded Running tkn pipelinerun list Test NAME STARTED DURATION STATUS output-pipeline-run 16 seconds ago 12s Succeeded Running tkn pipeline list Test NAME AGE LAST RUN STARTED DURATION STATUS output-pipeline 18 seconds ago output-pipeline-run 18 seconds ago 12s Succeeded Running tkn task list Test NAME DESCRIPTION AGE create-file-verify 19 seconds ago task-volume 18 seconds ago Running tkn taskrun list task-volume Test NAME STARTED DURATION STATUS test-template-volume 20 seconds ago 11s Succeeded Running tkn taskrun list Test NAME STARTED DURATION STATUS test-template-volume 21 seconds ago 11s Succeeded output-pipeline-run-first-create-file 22 seconds ago 12s Succeeded Running tkn eventlistener list Test NAME AGE URL AVAILABLE github-listener-interceptor 22 seconds ago http://el-github-listener-interceptor.tektoncd.svc.cluster.local:8080 False Running tkn pipeline describe output-pipeline Test Name: output-pipeline Namespace: tektoncd Params NAME TYPE DESCRIPTION DEFAULT VALUE message string hello filename string --- Workspaces NAME DESCRIPTION OPTIONAL shared-data false Tasks NAME TASKREF RUNAFTER TIMEOUT PARAMS first-create-file create-file-verify --- message: hello, filename: string PipelineRuns NAME STARTED DURATION STATUS output-pipeline-run 25 seconds ago 12s Succeeded Running tkn pipelinerun describe output-pipeline-run Test Name: output-pipeline-run Namespace: tektoncd Pipeline Ref: output-pipeline Service Account: default Labels: tekton.dev/pipeline=output-pipeline Status STARTED DURATION STATUS 26 seconds ago 12s Succeeded Timeouts Pipeline: 1h0m0s Params NAME VALUE filename output message test-e2e Workspaces NAME SUB PATH WORKSPACE BINDING shared-data --- EmptyDir (emptyDir=) Taskruns NAME TASK NAME STARTED DURATION STATUS output-pipeline-run-first-create-file first-create-file 26 seconds ago 12s Succeeded Running tkn eventlistener describe github-listener-interceptor Test Name: github-listener-interceptor Namespace: tektoncd Service Account: tekton-triggers-github-sa URL: http://el-github-listener-interceptor.tektoncd.svc.cluster.local:8080 EventListnerServiceName: el-github-listener-interceptor EventListenerTriggers NAME github-listener BINDINGS REF KIND APIVERSION github-pr-binding TriggerBinding TEMPLATE REF APIVERSION github-template INTERCEPTORS - params: - name: secretRef value: secretKey: secretToken secretName: github-secret - name: eventTypes value: - pull_request ref: kind: ClusterInterceptor name: github - params: - name: filter value: body.action in ['opened', 'synchronize', 'reopened'] - name: overlays value: null ref: kind: ClusterInterceptor name: cel Running tkn pipelinerun logs output-pipeline-run Test [first-create-file : read] test-e2e Running tkn taskrun logs test-template-volume Test [read] some stuff Running tkn pipeline delete output-pipeline -f Test Pipelines deleted: "output-pipeline" Running tkn pipelinerun delete output-pipeline-run -f Test PipelineRuns deleted: "output-pipeline-run" Running tkn task delete create-file-verify -f Test Tasks deleted: "create-file-verify" Running tkn taskrun delete test-template-volume -f Test TaskRuns deleted: "test-template-volume" Running tkn eventlistener delete github-listener-interceptor -f Test EventListeners deleted: "github-listener-interceptor" Running fail tkn pipeline describe output-pipeline Test Error: pipelines.tekton.dev "output-pipeline" not found Running fail tkn pipelinerun describe output-pipeline-run Test Error: failed to find pipelinerun "output-pipeline-run" Running fail tkn taskrun logs test-template-volume Test Error: Unable to get TaskRun: taskruns.tekton.dev "test-template-volume" not found Running fail tkn eventlistener describe github-listener-interceptor Test Error: failed to get EventListener github-listener-interceptor: failed to get EventListener github-listener-interceptor: eventlisteners.triggers.tekton.dev "github-listener-interceptor" not found Hub ..................... Running tkn hub --help Test Interact with tekton hub Usage: tkn hub [flags] tkn hub [command] Available Commands: check-upgrade Check for upgrades of resources if present downgrade Downgrade an installed resource get Get resource manifest by its name, kind, catalog, and version info Display info of resource by its name, kind, catalog, and version install Install a resource from a catalog by its kind, name and version reinstall Reinstall a resource by its kind and name search Search resource by a combination of name, kind, categories, platforms, and tags upgrade Upgrade an installed resource Flags: --api-server string Hub API Server URL (default 'https://api.hub.tekton.dev' for 'tekton' type; default 'https://artifacthub.io' for 'artifact' type). URL can also be defined in a file '$HOME/.tekton/hub-config' with a variable 'TEKTON_HUB_API_SERVER'/'ARTIFACT_HUB_API_SERVER'. -h, --help help for hub --type string The type of Hub from where to pull the resource. Either 'artifact' or 'tekton' (default "tekton") Use "tkn hub [command] --help" for more information about a command. Running tkn hub search --help Test Search resource by a combination of name, kind, categories, platforms, and tags Usage: tkn hub search [flags] Examples: Search a resource of name 'foo': tkn hub search foo or Search resources using tag 'cli': tkn hub search --tags cli Flags: --categories stringArray Accepts a comma separated list of categories -h, --help help for search --kinds stringArray Accepts a comma separated list of kinds -l, --limit uint Max number of resources to fetch --match string Accept type of search. 'exact' or 'contains'. (default "contains") -o, --output string Accepts output format: [table, json, wide] (default "table") --platforms stringArray Accepts a comma separated list of platforms --tags stringArray Accepts a comma separated list of tags Global Flags: --api-server string Hub API Server URL (default 'https://api.hub.tekton.dev' for 'tekton' type; default 'https://artifacthub.io' for 'artifact' type). URL can also be defined in a file '$HOME/.tekton/hub-config' with a variable 'TEKTON_HUB_API_SERVER'/'ARTIFACT_HUB_API_SERVER'. --type string The type of Hub from where to pull the resource. Either 'artifact' or 'tekton' (default "tekton") Running tkn hub get --help Test Get resource manifest by its name, kind, catalog, and version Usage: tkn hub get [flags] tkn hub get [command] Available Commands: pipeline Get Pipeline by name, catalog and version task Get Task by name, catalog and version Flags: --from string Name of Catalog to which resource belongs to. -h, --help help for get --version string Version of Resource Global Flags: --api-server string Hub API Server URL (default 'https://api.hub.tekton.dev' for 'tekton' type; default 'https://artifacthub.io' for 'artifact' type). URL can also be defined in a file '$HOME/.tekton/hub-config' with a variable 'TEKTON_HUB_API_SERVER'/'ARTIFACT_HUB_API_SERVER'. --type string The type of Hub from where to pull the resource. Either 'artifact' or 'tekton' (default "tekton") Use "tkn hub get [command] --help" for more information about a command. Running fail tkn hub --api-server=api.nonexistent.server search cli Test Error: parse "api.nonexistent.server": invalid URI for request Running fail tkn hub --api-server=api.nonexistent.server get task cli Test Error: parse "api.nonexistent.server": invalid URI for request task.tekton.dev "task-volume" deleted No resources found No resources found No resources found No resources found No resources found No resources found No resources found ============================== ==== RUNNING GO E2E TESTS ==== ============================== Go Build successfull Running tests with 'go test -race -v -count=1 -tags=e2e ./test/e2e/... ' 2025/07/28 12:24:08 Running main e2e Test suite testing: warning: no tests to run PASS ok github.com/tektoncd/cli/test/e2e 1.025s [no tests to run] === RUN TestCustomRunListE2E === PAUSE TestCustomRunListE2E === CONT TestCustomRunListE2E I0728 12:25:43.039778 35209 envvar.go:172] "Feature gate default state" feature="ClientsPreferCBOR" enabled=false I0728 12:25:43.039923 35209 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false I0728 12:25:43.039970 35209 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false I0728 12:25:43.040011 35209 envvar.go:172] "Feature gate default state" feature="ClientsAllowCBOR" enabled=false 2025/07/28 12:25:43 Create namespace testcli-2n6jt to deploy to 2025/07/28 12:25:43 Verify SA "default" is created in namespace "testcli-2n6jt" list_test.go:42: Creating CustomRun customrun-foo in namespace: testcli-2n6jt === RUN TestCustomRunListE2E/List_customrun_in_namespace_testcli-2n6jt === NAME TestCustomRunListE2E list_test.go:50: Deleting namespace testcli-2n6jt --- PASS: TestCustomRunListE2E (1.53s) --- PASS: TestCustomRunListE2E/List_customrun_in_namespace_testcli-2n6jt (0.17s) PASS ok github.com/tektoncd/cli/test/e2e/customrun 2.651s {"component":"entrypoint","file":"k8s.io/test-infra/prow/entrypoint/run.go:169","func":"k8s.io/test-infra/prow/entrypoint.Options.ExecuteProcess","level":"error","msg":"Entrypoint received interrupt: terminated","severity":"error","time":"2025-07-28T12:25:53Z"}