Cloning into '/home/prow/go/src/github.com/google/licenseclassifier'... Docker in Docker enabled, initializing... ================================================================================ * Starting Docker: docker ...done. Waiting for docker to be ready, sleeping for 1 seconds. Cleaning up binfmt_misc ... ================================================================================ Done setting up docker in docker. Activated service account credentials for: [prow-account@tekton-releases.iam.gserviceaccount.com] == Running ./runner.sh backward compatibility test runner === + [[ 5 -ne 0 ]] + case $1 in ++ cut -d = -f2 + gcloud auth activate-service-account --key-file=/etc/test-account/service-account.json Activated service account credentials for: [prow-account@tekton-releases.iam.gserviceaccount.com] + shift + [[ 4 -ne 0 ]] + case $1 in + shift + [[ -- == \-\- ]] + shift + break + ./test/presubmit-tests.sh --integration-tests Changed files in commit efa0b4312611dada5b9063a4278baddf03aa095e: go.mod go.sum vendor/cloud.google.com/go/auth/CHANGES.md vendor/cloud.google.com/go/auth/auth.go vendor/cloud.google.com/go/auth/credentials/detect.go vendor/cloud.google.com/go/compute/metadata/CHANGES.md vendor/cloud.google.com/go/compute/metadata/metadata.go vendor/github.com/googleapis/gax-go/v2/.release-please-manifest.json vendor/github.com/googleapis/gax-go/v2/CHANGES.md vendor/github.com/googleapis/gax-go/v2/apierror/apierror.go vendor/github.com/googleapis/gax-go/v2/internal/version.go vendor/google.golang.org/api/iamcredentials/v1/iamcredentials-api.json vendor/google.golang.org/api/idtoken/idtoken.go vendor/google.golang.org/api/internal/gensupport/resumable.go vendor/google.golang.org/api/internal/version.go vendor/google.golang.org/api/storage/v1/storage-api.json vendor/google.golang.org/api/storage/v1/storage-gen.go vendor/google.golang.org/protobuf/encoding/protowire/wire.go vendor/google.golang.org/protobuf/internal/editiondefaults/editions_defaults.binpb vendor/google.golang.org/protobuf/internal/filedesc/editions.go vendor/google.golang.org/protobuf/internal/filedesc/presence.go vendor/google.golang.org/protobuf/internal/genid/descriptor_gen.go vendor/google.golang.org/protobuf/internal/impl/codec_message_opaque.go vendor/google.golang.org/protobuf/internal/impl/message_opaque.go vendor/google.golang.org/protobuf/internal/impl/presence.go vendor/google.golang.org/protobuf/internal/version/version.go vendor/google.golang.org/protobuf/reflect/protoreflect/source_gen.go vendor/google.golang.org/protobuf/types/descriptorpb/descriptor.pb.go vendor/modules.txt Updated property [component_manager/disable_update_check]. ============================ ==== CURRENT TEST SETUP ==== ============================ >> gcloud SDK version Google Cloud SDK 506.0.0 alpha 2025.01.10 beta 2025.01.10 bq 2.1.11 bundled-python3-unix 3.11.9 core 2025.01.10 docker-credential-gcr 1.5.0 gcloud-crc32c 1.0.0 gke-gcloud-auth-plugin 0.5.9 gsutil 5.33 kubectl 1.30.5 >> kubectl version Client Version: v1.32.0-alpha.0 Kustomize Version: v5.4.2 >> go version go: downloading go1.24.0 (linux/amd64) go version go1.24.0 linux/amd64 >> git version git version 2.43.0 >> docker version Client: Docker Engine - Community Version: 27.5.0 API version: 1.47 Go version: go1.22.10 Git commit: a187fa5 Built: Mon Jan 13 15:25:08 2025 OS/Arch: linux/amd64 Context: default Server: Docker Engine - Community Engine: Version: 27.5.0 API version: 1.47 (minimum version 1.24) Go version: go1.22.10 Git commit: 38b84dc Built: Mon Jan 13 15:25:08 2025 OS/Arch: linux/amd64 Experimental: false containerd: Version: 1.7.25 GitCommit: bcc810d6b9066471b0b6fa75f557a15a1cbf31bb runc: Version: 1.2.4 GitCommit: v1.2.4-0-g6c52b3f docker-init: Version: 0.19.0 GitCommit: de40ad0 =================================== ==== RUNNING INTEGRATION TESTS ==== =================================== /home/prow/go/src/github.com/tektoncd/results /home/prow/go/src/github.com/tektoncd/results Running integration test test/e2e-tests.sh + E2E_GO_TEST_TIMEOUT=20m + main + failed=0 + echo 'Start e2e tests with a timeout of 20m' Start e2e tests with a timeout of 20m ++ dirname test/e2e-tests.sh + timeout 20m test/e2e/e2e.sh + trap cleanup EXIT + main + export KO_DOCKER_REPO=kind.local + KO_DOCKER_REPO=kind.local + export KIND_CLUSTER_NAME=tekton-results + KIND_CLUSTER_NAME=tekton-results + export SA_TOKEN_PATH=/tmp/tekton-results/tokens + SA_TOKEN_PATH=/tmp/tekton-results/tokens + export SSL_CERT_PATH=/tmp/tekton-results/ssl + SSL_CERT_PATH=/tmp/tekton-results/ssl ++ git rev-parse --show-toplevel + REPO=/home/prow/go/src/github.com/tektoncd/results + /home/prow/go/src/github.com/tektoncd/results/test/e2e/00-setup.sh Creating cluster "tekton-results" ... â€ĸ Ensuring node image (kindest/node:v1.32.2) đŸ–ŧ ... DEBUG: docker/images.go:67] Pulling image: kindest/node:v1.32.2@sha256:f226345927d7e348497136874b6d207e0b32cc52154ad8323129352923a3142f ... ✓ Ensuring node image (kindest/node:v1.32.2) đŸ–ŧ â€ĸ Preparing nodes đŸ“Ļ đŸ“Ļ ... ✓ Preparing nodes đŸ“Ļ đŸ“Ļ â€ĸ Writing configuration 📜 ... DEBUG: config/config.go:96] Using the following kubeadm config for node tekton-results-control-plane: apiServer: certSANs: - localhost - 127.0.0.1 extraArgs: runtime-config: "" apiVersion: kubeadm.k8s.io/v1beta3 clusterName: tekton-results controlPlaneEndpoint: tekton-results-control-plane:6443 controllerManager: extraArgs: enable-hostpath-provisioner: "true" kind: ClusterConfiguration kubernetesVersion: v1.32.2 networking: podSubnet: 10.244.0.0/16 serviceSubnet: 10.96.0.0/16 scheduler: extraArgs: null --- apiVersion: kubeadm.k8s.io/v1beta3 bootstrapTokens: - token: abcdef.0123456789abcdef kind: InitConfiguration localAPIEndpoint: advertiseAddress: 172.18.0.3 bindPort: 6443 nodeRegistration: criSocket: unix:///run/containerd/containerd.sock kubeletExtraArgs: node-ip: 172.18.0.3 node-labels: "" provider-id: kind://docker/tekton-results/tekton-results-control-plane --- apiVersion: kubeadm.k8s.io/v1beta3 controlPlane: localAPIEndpoint: advertiseAddress: 172.18.0.3 bindPort: 6443 discovery: bootstrapToken: apiServerEndpoint: tekton-results-control-plane:6443 token: abcdef.0123456789abcdef unsafeSkipCAVerification: true kind: JoinConfiguration nodeRegistration: criSocket: unix:///run/containerd/containerd.sock kubeletExtraArgs: node-ip: 172.18.0.3 node-labels: "" provider-id: kind://docker/tekton-results/tekton-results-control-plane --- apiVersion: kubelet.config.k8s.io/v1beta1 cgroupDriver: systemd cgroupRoot: /kubelet evictionHard: imagefs.available: 0% nodefs.available: 0% nodefs.inodesFree: 0% failSwapOn: false imageGCHighThresholdPercent: 100 kind: KubeletConfiguration --- apiVersion: kubeproxy.config.k8s.io/v1alpha1 conntrack: maxPerCore: 0 iptables: minSyncPeriod: 1s kind: KubeProxyConfiguration mode: iptables DEBUG: config/config.go:96] Using the following kubeadm config for node tekton-results-worker: apiServer: certSANs: - localhost - 127.0.0.1 extraArgs: runtime-config: "" apiVersion: kubeadm.k8s.io/v1beta3 clusterName: tekton-results controlPlaneEndpoint: tekton-results-control-plane:6443 controllerManager: extraArgs: enable-hostpath-provisioner: "true" kind: ClusterConfiguration kubernetesVersion: v1.32.2 networking: podSubnet: 10.244.0.0/16 serviceSubnet: 10.96.0.0/16 scheduler: extraArgs: null --- apiVersion: kubeadm.k8s.io/v1beta3 bootstrapTokens: - token: abcdef.0123456789abcdef kind: InitConfiguration localAPIEndpoint: advertiseAddress: 172.18.0.2 bindPort: 6443 nodeRegistration: criSocket: unix:///run/containerd/containerd.sock kubeletExtraArgs: node-ip: 172.18.0.2 node-labels: "" provider-id: kind://docker/tekton-results/tekton-results-worker --- apiVersion: kubeadm.k8s.io/v1beta3 discovery: bootstrapToken: apiServerEndpoint: tekton-results-control-plane:6443 token: abcdef.0123456789abcdef unsafeSkipCAVerification: true kind: JoinConfiguration nodeRegistration: criSocket: unix:///run/containerd/containerd.sock kubeletExtraArgs: node-ip: 172.18.0.2 node-labels: "" provider-id: kind://docker/tekton-results/tekton-results-worker --- apiVersion: kubelet.config.k8s.io/v1beta1 cgroupDriver: systemd cgroupRoot: /kubelet evictionHard: imagefs.available: 0% nodefs.available: 0% nodefs.inodesFree: 0% failSwapOn: false imageGCHighThresholdPercent: 100 kind: KubeletConfiguration --- apiVersion: kubeproxy.config.k8s.io/v1alpha1 conntrack: maxPerCore: 0 iptables: minSyncPeriod: 1s kind: KubeProxyConfiguration mode: iptables ✓ Writing configuration 📜 â€ĸ Starting control-plane đŸ•šī¸ ... DEBUG: kubeadminit/init.go:82] I0818 06:00:29.639471 224 initconfiguration.go:261] loading configuration from "/kind/kubeadm.conf" W0818 06:00:29.640346 224 common.go:101] your configuration file uses a deprecated API spec: "kubeadm.k8s.io/v1beta3" (kind: "ClusterConfiguration"). Please use 'kubeadm config migrate --old-config old.yaml --new-config new.yaml', which will write the new, similar spec using a newer API version. W0818 06:00:29.641308 224 common.go:101] your configuration file uses a deprecated API spec: "kubeadm.k8s.io/v1beta3" (kind: "InitConfiguration"). Please use 'kubeadm config migrate --old-config old.yaml --new-config new.yaml', which will write the new, similar spec using a newer API version. W0818 06:00:29.641786 224 common.go:101] your configuration file uses a deprecated API spec: "kubeadm.k8s.io/v1beta3" (kind: "JoinConfiguration"). Please use 'kubeadm config migrate --old-config old.yaml --new-config new.yaml', which will write the new, similar spec using a newer API version. W0818 06:00:29.642096 224 initconfiguration.go:361] [config] WARNING: Ignored YAML document with GroupVersionKind kubeadm.k8s.io/v1beta3, Kind=JoinConfiguration [init] Using Kubernetes version: v1.32.2 I0818 06:00:29.643543 224 certs.go:112] creating a new certificate authority for ca [certs] Using certificateDir folder "/etc/kubernetes/pki" [certs] Generating "ca" certificate and key I0818 06:00:29.882418 224 certs.go:473] validating certificate period for ca certificate [certs] Generating "apiserver" certificate and key [certs] apiserver serving cert is signed for DNS names [kubernetes kubernetes.default kubernetes.default.svc kubernetes.default.svc.cluster.local localhost tekton-results-control-plane] and IPs [10.96.0.1 172.18.0.3 127.0.0.1] [certs] Generating "apiserver-kubelet-client" certificate and key I0818 06:00:30.128873 224 certs.go:112] creating a new certificate authority for front-proxy-ca [certs] Generating "front-proxy-ca" certificate and key I0818 06:00:30.400875 224 certs.go:473] validating certificate period for front-proxy-ca certificate [certs] Generating "front-proxy-client" certificate and key I0818 06:00:30.499031 224 certs.go:112] creating a new certificate authority for etcd-ca [certs] Generating "etcd/ca" certificate and key I0818 06:00:30.703374 224 certs.go:473] validating certificate period for etcd/ca certificate [certs] Generating "etcd/server" certificate and key [certs] etcd/server serving cert is signed for DNS names [localhost tekton-results-control-plane] and IPs [172.18.0.3 127.0.0.1 ::1] [certs] Generating "etcd/peer" certificate and key [certs] etcd/peer serving cert is signed for DNS names [localhost tekton-results-control-plane] and IPs [172.18.0.3 127.0.0.1 ::1] [certs] Generating "etcd/healthcheck-client" certificate and key [certs] Generating "apiserver-etcd-client" certificate and key I0818 06:00:31.536810 224 certs.go:78] creating new public/private key files for signing service account users [certs] Generating "sa" key and public key [kubeconfig] Using kubeconfig folder "/etc/kubernetes" I0818 06:00:31.744054 224 kubeconfig.go:111] creating kubeconfig file for admin.conf [kubeconfig] Writing "admin.conf" kubeconfig file I0818 06:00:31.836592 224 kubeconfig.go:111] creating kubeconfig file for super-admin.conf [kubeconfig] Writing "super-admin.conf" kubeconfig file I0818 06:00:31.995203 224 kubeconfig.go:111] creating kubeconfig file for kubelet.conf [kubeconfig] Writing "kubelet.conf" kubeconfig file I0818 06:00:32.070620 224 kubeconfig.go:111] creating kubeconfig file for controller-manager.conf [kubeconfig] Writing "controller-manager.conf" kubeconfig file I0818 06:00:32.264399 224 kubeconfig.go:111] creating kubeconfig file for scheduler.conf [kubeconfig] Writing "scheduler.conf" kubeconfig file [etcd] Creating static Pod manifest for local etcd in "/etc/kubernetes/manifests" [control-plane] Using manifest folder "/etc/kubernetes/manifests" [control-plane] Creating static Pod manifest for "kube-apiserver" I0818 06:00:32.736439 224 local.go:66] [etcd] wrote Static Pod manifest for a local etcd member to "/etc/kubernetes/manifests/etcd.yaml" I0818 06:00:32.736483 224 manifests.go:104] [control-plane] getting StaticPodSpecs I0818 06:00:32.736762 224 certs.go:473] validating certificate period for CA certificate I0818 06:00:32.736844 224 manifests.go:130] [control-plane] adding volume "ca-certs" for component "kube-apiserver" I0818 06:00:32.736860 224 manifests.go:130] [control-plane] adding volume "etc-ca-certificates" for component "kube-apiserver" I0818 06:00:32.736866 224 manifests.go:130] [control-plane] adding volume "k8s-certs" for component "kube-apiserver" I0818 06:00:32.736872 224 manifests.go:130] [control-plane] adding volume "usr-local-share-ca-certificates" for component "kube-apiserver" I0818 06:00:32.736879 224 manifests.go:130] [control-plane] adding volume "usr-share-ca-certificates" for component "kube-apiserver" I0818 06:00:32.737713 224 manifests.go:159] [control-plane] wrote static Pod manifest for component "kube-apiserver" to "/etc/kubernetes/manifests/kube-apiserver.yaml" I0818 06:00:32.737735 224 manifests.go:104] [control-plane] getting StaticPodSpecs [control-plane] Creating static Pod manifest for "kube-controller-manager" I0818 06:00:32.738000 224 manifests.go:130] [control-plane] adding volume "ca-certs" for component "kube-controller-manager" I0818 06:00:32.738017 224 manifests.go:130] [control-plane] adding volume "etc-ca-certificates" for component "kube-controller-manager" I0818 06:00:32.738024 224 manifests.go:130] [control-plane] adding volume "flexvolume-dir" for component "kube-controller-manager" I0818 06:00:32.738030 224 manifests.go:130] [control-plane] adding volume "k8s-certs" for component "kube-controller-manager" I0818 06:00:32.738036 224 manifests.go:130] [control-plane] adding volume "kubeconfig" for component "kube-controller-manager" I0818 06:00:32.738042 224 manifests.go:130] [control-plane] adding volume "usr-local-share-ca-certificates" for component "kube-controller-manager" I0818 06:00:32.738053 224 manifests.go:130] [control-plane] adding volume "usr-share-ca-certificates" for component "kube-controller-manager" I0818 06:00:32.738775 224 manifests.go:159] [control-plane] wrote static Pod manifest for component "kube-controller-manager" to "/etc/kubernetes/manifests/kube-controller-manager.yaml" I0818 06:00:32.738795 224 manifests.go:104] [control-plane] getting StaticPodSpecs [control-plane] Creating static Pod manifest for "kube-scheduler" I0818 06:00:32.739033 224 manifests.go:130] [control-plane] adding volume "kubeconfig" for component "kube-scheduler" I0818 06:00:32.739582 224 manifests.go:159] [control-plane] wrote static Pod manifest for component "kube-scheduler" to "/etc/kubernetes/manifests/kube-scheduler.yaml" I0818 06:00:32.739601 224 kubelet.go:70] Stopping the kubelet [kubelet-start] Writing kubelet environment file with flags to file "/var/lib/kubelet/kubeadm-flags.env" [kubelet-start] Writing kubelet configuration to file "/var/lib/kubelet/config.yaml" [kubelet-start] Starting the kubelet I0818 06:00:32.916235 224 loader.go:402] Config loaded from file: /etc/kubernetes/admin.conf I0818 06:00:32.916774 224 envvar.go:172] "Feature gate default state" feature="ClientsPreferCBOR" enabled=false I0818 06:00:32.916799 224 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false I0818 06:00:32.916806 224 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false I0818 06:00:32.916812 224 envvar.go:172] "Feature gate default state" feature="ClientsAllowCBOR" enabled=false [wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory "/etc/kubernetes/manifests" [kubelet-check] Waiting for a healthy kubelet at http://127.0.0.1:10248/healthz. This can take up to 4m0s [kubelet-check] The kubelet is healthy after 1.001580013s [api-check] Waiting for a healthy API server. This can take up to 4m0s I0818 06:00:33.919612 224 round_trippers.go:560] GET https://tekton-results-control-plane:6443/healthz?timeout=10s in 0 milliseconds I0818 06:00:34.419546 224 round_trippers.go:560] GET https://tekton-results-control-plane:6443/healthz?timeout=10s in 0 milliseconds I0818 06:00:34.919537 224 round_trippers.go:560] GET https://tekton-results-control-plane:6443/healthz?timeout=10s in 0 milliseconds I0818 06:00:35.419529 224 round_trippers.go:560] GET https://tekton-results-control-plane:6443/healthz?timeout=10s in 0 milliseconds I0818 06:00:37.995535 224 round_trippers.go:560] GET https://tekton-results-control-plane:6443/healthz?timeout=10s 403 Forbidden in 2075 milliseconds I0818 06:00:37.998214 224 round_trippers.go:560] GET https://tekton-results-control-plane:6443/healthz?timeout=10s 403 Forbidden in 2 milliseconds I0818 06:00:38.420889 224 round_trippers.go:560] GET https://tekton-results-control-plane:6443/healthz?timeout=10s 403 Forbidden in 0 milliseconds I0818 06:00:38.920890 224 round_trippers.go:560] GET https://tekton-results-control-plane:6443/healthz?timeout=10s 403 Forbidden in 1 milliseconds I0818 06:00:39.420243 224 round_trippers.go:560] GET https://tekton-results-control-plane:6443/healthz?timeout=10s 500 Internal Server Error in 0 milliseconds [api-check] The API server is healthy after 6.001409597s I0818 06:00:39.920189 224 round_trippers.go:560] GET https://tekton-results-control-plane:6443/healthz?timeout=10s 200 OK in 1 milliseconds I0818 06:00:39.921052 224 loader.go:402] Config loaded from file: /etc/kubernetes/admin.conf I0818 06:00:39.922110 224 loader.go:402] Config loaded from file: /etc/kubernetes/super-admin.conf I0818 06:00:39.922684 224 kubeconfig.go:665] ensuring that the ClusterRoleBinding for the kubeadm:cluster-admins Group exists I0818 06:00:39.923948 224 round_trippers.go:560] POST https://tekton-results-control-plane:6443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings?timeout=10s 403 Forbidden in 1 milliseconds I0818 06:00:39.924122 224 kubeconfig.go:738] creating the ClusterRoleBinding for the kubeadm:cluster-admins Group by using super-admin.conf I0818 06:00:39.932948 224 round_trippers.go:560] POST https://tekton-results-control-plane:6443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings?timeout=10s 201 Created in 8 milliseconds [upload-config] Storing the configuration used in ConfigMap "kubeadm-config" in the "kube-system" Namespace I0818 06:00:39.933109 224 uploadconfig.go:112] [upload-config] Uploading the kubeadm ClusterConfiguration to a ConfigMap I0818 06:00:39.936972 224 round_trippers.go:560] POST https://tekton-results-control-plane:6443/api/v1/namespaces/kube-system/configmaps?timeout=10s 201 Created in 2 milliseconds I0818 06:00:39.940225 224 round_trippers.go:560] POST https://tekton-results-control-plane:6443/apis/rbac.authorization.k8s.io/v1/namespaces/kube-system/roles?timeout=10s 201 Created in 2 milliseconds I0818 06:00:39.943443 224 round_trippers.go:560] POST https://tekton-results-control-plane:6443/apis/rbac.authorization.k8s.io/v1/namespaces/kube-system/rolebindings?timeout=10s 201 Created in 2 milliseconds I0818 06:00:39.943608 224 uploadconfig.go:126] [upload-config] Uploading the kubelet component config to a ConfigMap [kubelet] Creating a ConfigMap "kubelet-config" in namespace kube-system with the configuration for the kubelets in the cluster I0818 06:00:39.947779 224 round_trippers.go:560] POST https://tekton-results-control-plane:6443/api/v1/namespaces/kube-system/configmaps?timeout=10s 201 Created in 3 milliseconds I0818 06:00:39.950786 224 round_trippers.go:560] POST https://tekton-results-control-plane:6443/apis/rbac.authorization.k8s.io/v1/namespaces/kube-system/roles?timeout=10s 201 Created in 2 milliseconds I0818 06:00:39.953529 224 round_trippers.go:560] POST https://tekton-results-control-plane:6443/apis/rbac.authorization.k8s.io/v1/namespaces/kube-system/rolebindings?timeout=10s 201 Created in 2 milliseconds I0818 06:00:39.953631 224 uploadconfig.go:132] [upload-config] Preserving the CRISocket information for the control-plane node I0818 06:00:39.953646 224 patchnode.go:31] [patchnode] Uploading the CRI Socket information "unix:///run/containerd/containerd.sock" to the Node API object "tekton-results-control-plane" as an annotation I0818 06:00:39.955778 224 round_trippers.go:560] GET https://tekton-results-control-plane:6443/api/v1/nodes/tekton-results-control-plane?timeout=10s 200 OK in 1 milliseconds I0818 06:00:39.963714 224 round_trippers.go:560] PATCH https://tekton-results-control-plane:6443/api/v1/nodes/tekton-results-control-plane?timeout=10s 200 OK in 6 milliseconds [upload-certs] Skipping phase. Please see --upload-certs [mark-control-plane] Marking the node tekton-results-control-plane as control-plane by adding the labels: [node-role.kubernetes.io/control-plane node.kubernetes.io/exclude-from-external-load-balancers] [mark-control-plane] Marking the node tekton-results-control-plane as control-plane by adding the taints [node-role.kubernetes.io/control-plane:NoSchedule] I0818 06:00:39.966038 224 round_trippers.go:560] GET https://tekton-results-control-plane:6443/api/v1/nodes/tekton-results-control-plane?timeout=10s 200 OK in 1 milliseconds I0818 06:00:39.972632 224 round_trippers.go:560] PATCH https://tekton-results-control-plane:6443/api/v1/nodes/tekton-results-control-plane?timeout=10s 200 OK in 5 milliseconds [bootstrap-token] Configuring bootstrap tokens, cluster-info ConfigMap, RBAC Roles I0818 06:00:39.975127 224 round_trippers.go:560] GET https://tekton-results-control-plane:6443/api/v1/namespaces/kube-system/secrets/bootstrap-token-abcdef?timeout=10s 404 Not Found in 1 milliseconds I0818 06:00:39.978383 224 round_trippers.go:560] POST https://tekton-results-control-plane:6443/api/v1/namespaces/kube-system/secrets?timeout=10s 201 Created in 2 milliseconds [bootstrap-token] Configured RBAC rules to allow Node Bootstrap tokens to get nodes I0818 06:00:39.981098 224 round_trippers.go:560] POST https://tekton-results-control-plane:6443/apis/rbac.authorization.k8s.io/v1/clusterroles?timeout=10s 201 Created in 2 milliseconds I0818 06:00:39.983695 224 round_trippers.go:560] POST https://tekton-results-control-plane:6443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings?timeout=10s 201 Created in 2 milliseconds [bootstrap-token] Configured RBAC rules to allow Node Bootstrap tokens to post CSRs in order for nodes to get long term certificate credentials I0818 06:00:39.986363 224 round_trippers.go:560] POST https://tekton-results-control-plane:6443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings?timeout=10s 201 Created in 2 milliseconds [bootstrap-token] Configured RBAC rules to allow the csrapprover controller automatically approve CSRs from a Node Bootstrap Token I0818 06:00:39.988830 224 round_trippers.go:560] POST https://tekton-results-control-plane:6443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings?timeout=10s 201 Created in 2 milliseconds [bootstrap-token] Configured RBAC rules to allow certificate rotation for all node client certificates in the cluster I0818 06:00:39.991575 224 round_trippers.go:560] POST https://tekton-results-control-plane:6443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings?timeout=10s 201 Created in 2 milliseconds I0818 06:00:39.991686 224 clusterinfo.go:47] [bootstrap-token] loading admin kubeconfig [bootstrap-token] Creating the "cluster-info" ConfigMap in the "kube-public" namespace I0818 06:00:39.992353 224 loader.go:402] Config loaded from file: /etc/kubernetes/admin.conf I0818 06:00:39.992373 224 clusterinfo.go:58] [bootstrap-token] copying the cluster from admin.conf to the bootstrap kubeconfig I0818 06:00:39.992648 224 clusterinfo.go:70] [bootstrap-token] creating/updating ConfigMap in kube-public namespace I0818 06:00:39.995114 224 round_trippers.go:560] POST https://tekton-results-control-plane:6443/api/v1/namespaces/kube-public/configmaps?timeout=10s 201 Created in 2 milliseconds I0818 06:00:39.995247 224 clusterinfo.go:84] creating the RBAC rules for exposing the cluster-info ConfigMap in the kube-public namespace I0818 06:00:40.123704 224 request.go:661] Waited for 128.302075ms due to client-side throttling, not priority and fairness, request: POST:https://tekton-results-control-plane:6443/apis/rbac.authorization.k8s.io/v1/namespaces/kube-public/roles?timeout=10s I0818 06:00:40.126989 224 round_trippers.go:560] POST https://tekton-results-control-plane:6443/apis/rbac.authorization.k8s.io/v1/namespaces/kube-public/roles?timeout=10s 201 Created in 3 milliseconds I0818 06:00:40.323632 224 request.go:661] Waited for 196.412951ms due to client-side throttling, not priority and fairness, request: POST:https://tekton-results-control-plane:6443/apis/rbac.authorization.k8s.io/v1/namespaces/kube-public/rolebindings?timeout=10s I0818 06:00:40.327088 224 round_trippers.go:560] POST https://tekton-results-control-plane:6443/apis/rbac.authorization.k8s.io/v1/namespaces/kube-public/rolebindings?timeout=10s 201 Created in 3 milliseconds I0818 06:00:40.327295 224 kubeletfinalize.go:91] [kubelet-finalize] Assuming that kubelet client certificate rotation is enabled: found "/var/lib/kubelet/pki/kubelet-client-current.pem" [kubelet-finalize] Updating "/etc/kubernetes/kubelet.conf" to point to a rotatable kubelet client certificate and key I0818 06:00:40.327976 224 loader.go:402] Config loaded from file: /etc/kubernetes/kubelet.conf I0818 06:00:40.328473 224 kubeletfinalize.go:145] [kubelet-finalize] Restarting the kubelet to enable client certificate rotation I0818 06:00:40.551279 224 round_trippers.go:560] GET https://tekton-results-control-plane:6443/apis/apps/v1/namespaces/kube-system/deployments?labelSelector=k8s-app%3Dkube-dns 200 OK in 3 milliseconds I0818 06:00:40.554219 224 round_trippers.go:560] GET https://tekton-results-control-plane:6443/api/v1/namespaces/kube-system/configmaps/coredns?timeout=10s 404 Not Found in 2 milliseconds I0818 06:00:40.557654 224 round_trippers.go:560] POST https://tekton-results-control-plane:6443/api/v1/namespaces/kube-system/configmaps?timeout=10s 201 Created in 3 milliseconds I0818 06:00:40.561078 224 round_trippers.go:560] POST https://tekton-results-control-plane:6443/apis/rbac.authorization.k8s.io/v1/clusterroles?timeout=10s 201 Created in 2 milliseconds I0818 06:00:40.723960 224 request.go:661] Waited for 162.325096ms due to client-side throttling, not priority and fairness, request: POST:https://tekton-results-control-plane:6443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings?timeout=10s I0818 06:00:40.727212 224 round_trippers.go:560] POST https://tekton-results-control-plane:6443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings?timeout=10s 201 Created in 3 milliseconds I0818 06:00:40.730697 224 round_trippers.go:560] POST https://tekton-results-control-plane:6443/api/v1/namespaces/kube-system/serviceaccounts?timeout=10s 201 Created in 2 milliseconds I0818 06:00:40.738201 224 round_trippers.go:560] POST https://tekton-results-control-plane:6443/apis/apps/v1/namespaces/kube-system/deployments?timeout=10s 201 Created in 4 milliseconds I0818 06:00:40.748419 224 round_trippers.go:560] POST https://tekton-results-control-plane:6443/api/v1/namespaces/kube-system/services?timeout=10s 201 Created in 9 milliseconds [addons] Applied essential addon: CoreDNS I0818 06:00:40.753068 224 round_trippers.go:560] POST https://tekton-results-control-plane:6443/api/v1/namespaces/kube-system/configmaps?timeout=10s 201 Created in 3 milliseconds I0818 06:00:40.758275 224 round_trippers.go:560] POST https://tekton-results-control-plane:6443/apis/apps/v1/namespaces/kube-system/daemonsets?timeout=10s 201 Created in 4 milliseconds I0818 06:00:40.934942 224 request.go:661] Waited for 176.352042ms due to client-side throttling, not priority and fairness, request: POST:https://tekton-results-control-plane:6443/api/v1/namespaces/kube-system/serviceaccounts?timeout=10s I0818 06:00:40.938147 224 round_trippers.go:560] POST https://tekton-results-control-plane:6443/api/v1/namespaces/kube-system/serviceaccounts?timeout=10s 201 Created in 3 milliseconds I0818 06:00:40.941074 224 round_trippers.go:560] POST https://tekton-results-control-plane:6443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings?timeout=10s 201 Created in 2 milliseconds I0818 06:00:41.123922 224 request.go:661] Waited for 182.358889ms due to client-side throttling, not priority and fairness, request: POST:https://tekton-results-control-plane:6443/apis/rbac.authorization.k8s.io/v1/namespaces/kube-system/roles?timeout=10s I0818 06:00:41.127443 224 round_trippers.go:560] POST https://tekton-results-control-plane:6443/apis/rbac.authorization.k8s.io/v1/namespaces/kube-system/roles?timeout=10s 201 Created in 3 milliseconds I0818 06:00:41.323022 224 request.go:661] Waited for 195.240137ms due to client-side throttling, not priority and fairness, request: POST:https://tekton-results-control-plane:6443/apis/rbac.authorization.k8s.io/v1/namespaces/kube-system/rolebindings?timeout=10s I0818 06:00:41.326282 224 round_trippers.go:560] POST https://tekton-results-control-plane:6443/apis/rbac.authorization.k8s.io/v1/namespaces/kube-system/rolebindings?timeout=10s 201 Created in 3 milliseconds [addons] Applied essential addon: kube-proxy I0818 06:00:41.327058 224 loader.go:402] Config loaded from file: /etc/kubernetes/admin.conf I0818 06:00:41.327644 224 loader.go:402] Config loaded from file: /etc/kubernetes/admin.conf Your Kubernetes control-plane has initialized successfully! To start using your cluster, you need to run the following as a regular user: mkdir -p $HOME/.kube sudo cp -i /etc/kubernetes/admin.conf $HOME/.kube/config sudo chown $(id -u):$(id -g) $HOME/.kube/config Alternatively, if you are the root user, you can run: export KUBECONFIG=/etc/kubernetes/admin.conf You should now deploy a pod network to the cluster. Run "kubectl apply -f [podnetwork].yaml" with one of the options listed at: https://kubernetes.io/docs/concepts/cluster-administration/addons/ You can now join any number of control-plane nodes by copying certificate authorities and service account keys on each node and then running the following as root: kubeadm join tekton-results-control-plane:6443 --token \ --discovery-token-ca-cert-hash sha256:0aef22fbd3312efbc3f16ef0db23a1a20349b2a095474588e711c434aea4433b \ --control-plane Then you can join any number of worker nodes by running the following on each as root: kubeadm join tekton-results-control-plane:6443 --token \ --discovery-token-ca-cert-hash sha256:0aef22fbd3312efbc3f16ef0db23a1a20349b2a095474588e711c434aea4433b ✓ Starting control-plane đŸ•šī¸ â€ĸ Installing CNI 🔌 ... ✓ Installing CNI 🔌 â€ĸ Installing StorageClass 💾 ... ✓ Installing StorageClass 💾 â€ĸ Joining worker nodes 🚜 ... DEBUG: kubeadmjoin/join.go:133] I0818 06:00:42.435176 230 join.go:421] [preflight] found NodeName empty; using OS hostname as NodeName I0818 06:00:42.435250 230 joinconfiguration.go:83] loading configuration from "/kind/kubeadm.conf" W0818 06:00:42.435765 230 common.go:101] your configuration file uses a deprecated API spec: "kubeadm.k8s.io/v1beta3" (kind: "JoinConfiguration"). Please use 'kubeadm config migrate --old-config old.yaml --new-config new.yaml', which will write the new, similar spec using a newer API version. I0818 06:00:42.436281 230 controlplaneprepare.go:225] [download-certs] Skipping certs download I0818 06:00:42.436299 230 join.go:551] [preflight] Discovering cluster-info I0818 06:00:42.436315 230 token.go:72] [discovery] Created cluster-info discovery client, requesting info from "tekton-results-control-plane:6443" I0818 06:00:42.436522 230 envvar.go:172] "Feature gate default state" feature="ClientsAllowCBOR" enabled=false I0818 06:00:42.436538 230 envvar.go:172] "Feature gate default state" feature="ClientsPreferCBOR" enabled=false I0818 06:00:42.436542 230 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false I0818 06:00:42.436546 230 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false I0818 06:00:42.436934 230 token.go:230] [discovery] Waiting for the cluster-info ConfigMap to receive a JWS signature for token ID "abcdef" I0818 06:00:42.475793 230 round_trippers.go:560] GET https://tekton-results-control-plane:6443/api/v1/namespaces/kube-public/configmaps/cluster-info?timeout=10s 200 OK in 38 milliseconds I0818 06:00:42.476101 230 token.go:250] [discovery] Retrying due to error: could not find a JWS signature in the cluster-info ConfigMap for token ID "abcdef" I0818 06:00:47.437120 230 token.go:230] [discovery] Waiting for the cluster-info ConfigMap to receive a JWS signature for token ID "abcdef" I0818 06:00:47.476263 230 round_trippers.go:560] GET https://tekton-results-control-plane:6443/api/v1/namespaces/kube-public/configmaps/cluster-info?timeout=10s 200 OK in 38 milliseconds I0818 06:00:47.477763 230 token.go:114] [discovery] Cluster info signature and contents are valid and no TLS pinning was specified, will use API Server "tekton-results-control-plane:6443" I0818 06:00:47.477797 230 discovery.go:53] [discovery] Using provided TLSBootstrapToken as authentication credentials for the join process I0818 06:00:47.477811 230 join.go:565] [preflight] Fetching init configuration I0818 06:00:47.477818 230 join.go:652] [preflight] Retrieving KubeConfig objects [preflight] Reading configuration from the "kubeadm-config" ConfigMap in namespace "kube-system"... [preflight] Use 'kubeadm init phase upload-config --config your-config.yaml' to re-upload it. I0818 06:00:47.505415 230 round_trippers.go:560] GET https://tekton-results-control-plane:6443/api/v1/namespaces/kube-system/configmaps/kubeadm-config?timeout=10s 200 OK in 26 milliseconds I0818 06:00:47.506702 230 kubeproxy.go:55] attempting to download the KubeProxyConfiguration from ConfigMap "kube-proxy" I0818 06:00:47.508732 230 round_trippers.go:560] GET https://tekton-results-control-plane:6443/api/v1/namespaces/kube-system/configmaps/kube-proxy?timeout=10s 200 OK in 1 milliseconds I0818 06:00:47.510201 230 kubelet.go:74] attempting to download the KubeletConfiguration from ConfigMap "kubelet-config" I0818 06:00:47.512285 230 round_trippers.go:560] GET https://tekton-results-control-plane:6443/api/v1/namespaces/kube-system/configmaps/kubelet-config?timeout=10s 200 OK in 1 milliseconds I0818 06:00:47.513886 230 initconfiguration.go:115] skip CRI socket detection, fill with the default CRI socket unix:///var/run/containerd/containerd.sock I0818 06:00:47.514113 230 interface.go:432] Looking for default routes with IPv4 addresses I0818 06:00:47.514128 230 interface.go:437] Default route transits interface "eth0" I0818 06:00:47.514251 230 interface.go:209] Interface eth0 is up I0818 06:00:47.514316 230 interface.go:257] Interface "eth0" has 3 addresses :[172.18.0.2/16 fc00:f853:ccd:e793::2/64 fe80::42:acff:fe12:2/64]. I0818 06:00:47.514371 230 interface.go:224] Checking addr 172.18.0.2/16. I0818 06:00:47.514402 230 interface.go:231] IP found 172.18.0.2 I0818 06:00:47.514433 230 interface.go:263] Found valid IPv4 address 172.18.0.2 for interface "eth0". I0818 06:00:47.514446 230 interface.go:443] Found active IP 172.18.0.2 I0818 06:00:47.514891 230 kubelet.go:183] [kubelet-start] writing bootstrap kubelet config file at /etc/kubernetes/bootstrap-kubelet.conf I0818 06:00:47.515729 230 kubelet.go:198] [kubelet-start] writing CA certificate at /etc/kubernetes/pki/ca.crt I0818 06:00:47.515852 230 kubelet.go:214] [kubelet-start] Checking for an existing Node in the cluster with name "tekton-results-worker" and status "Ready" I0818 06:00:47.517846 230 round_trippers.go:560] GET https://tekton-results-control-plane:6443/api/v1/nodes/tekton-results-worker?timeout=10s 404 Not Found in 1 milliseconds I0818 06:00:47.517948 230 kubelet.go:229] [kubelet-start] Stopping the kubelet [kubelet-start] Writing kubelet configuration to file "/var/lib/kubelet/config.yaml" [kubelet-start] Writing kubelet environment file with flags to file "/var/lib/kubelet/kubeadm-flags.env" [kubelet-start] Starting the kubelet [kubelet-check] Waiting for a healthy kubelet at http://127.0.0.1:10248/healthz. This can take up to 4m0s [kubelet-check] The kubelet is healthy after 1.003505831s [kubelet-start] Waiting for the kubelet to perform the TLS Bootstrap I0818 06:00:48.812229 230 loader.go:402] Config loaded from file: /etc/kubernetes/kubelet.conf I0818 06:00:48.813455 230 loader.go:402] Config loaded from file: /etc/kubernetes/kubelet.conf I0818 06:00:48.820568 230 cert_rotation.go:140] Starting client certificate rotation controller I0818 06:00:48.820801 230 kubelet.go:337] [kubelet-start] preserving the crisocket information for the node I0818 06:00:48.820867 230 patchnode.go:31] [patchnode] Uploading the CRI Socket information "unix:///run/containerd/containerd.sock" to the Node API object "tekton-results-worker" as an annotation I0818 06:00:48.847202 230 round_trippers.go:560] GET https://tekton-results-control-plane:6443/api/v1/nodes/tekton-results-worker?timeout=10s 200 OK in 26 milliseconds I0818 06:00:48.854288 230 round_trippers.go:560] PATCH https://tekton-results-control-plane:6443/api/v1/nodes/tekton-results-worker?timeout=10s 200 OK in 5 milliseconds This node has joined the cluster: * Certificate signing request was sent to apiserver and a response was received. * The Kubelet was informed of the new secure connection details. Run 'kubectl get nodes' on the control-plane to see this node join the cluster. ✓ Joining worker nodes 🚜 â€ĸ Waiting ≤ 1m0s for control-plane = Ready âŗ ... ✓ Waiting ≤ 1m0s for control-plane = Ready âŗ â€ĸ Ready after 12s 💚 Set kubectl context to "kind-tekton-results" You can now use your cluster with: kubectl cluster-info --context kind-tekton-results Thanks for using kind! 😊 Set kubectl context to "kind-tekton-results" + /home/prow/go/src/github.com/tektoncd/results/test/e2e/01-install.sh Installing Tekton Pipelines... namespace/tekton-pipelines created clusterrole.rbac.authorization.k8s.io/tekton-pipelines-controller-cluster-access created clusterrole.rbac.authorization.k8s.io/tekton-pipelines-controller-tenant-access created clusterrole.rbac.authorization.k8s.io/tekton-pipelines-webhook-cluster-access created clusterrole.rbac.authorization.k8s.io/tekton-events-controller-cluster-access created role.rbac.authorization.k8s.io/tekton-pipelines-controller created role.rbac.authorization.k8s.io/tekton-pipelines-webhook created role.rbac.authorization.k8s.io/tekton-pipelines-events-controller created role.rbac.authorization.k8s.io/tekton-pipelines-leader-election created role.rbac.authorization.k8s.io/tekton-pipelines-info created serviceaccount/tekton-pipelines-controller created serviceaccount/tekton-pipelines-webhook created serviceaccount/tekton-events-controller created clusterrolebinding.rbac.authorization.k8s.io/tekton-pipelines-controller-cluster-access created clusterrolebinding.rbac.authorization.k8s.io/tekton-pipelines-controller-tenant-access created clusterrolebinding.rbac.authorization.k8s.io/tekton-pipelines-webhook-cluster-access created clusterrolebinding.rbac.authorization.k8s.io/tekton-events-controller-cluster-access created rolebinding.rbac.authorization.k8s.io/tekton-pipelines-controller created rolebinding.rbac.authorization.k8s.io/tekton-pipelines-webhook created rolebinding.rbac.authorization.k8s.io/tekton-pipelines-controller-leaderelection created rolebinding.rbac.authorization.k8s.io/tekton-pipelines-webhook-leaderelection created rolebinding.rbac.authorization.k8s.io/tekton-pipelines-info created rolebinding.rbac.authorization.k8s.io/tekton-pipelines-events-controller created rolebinding.rbac.authorization.k8s.io/tekton-events-controller-leaderelection created customresourcedefinition.apiextensions.k8s.io/customruns.tekton.dev created customresourcedefinition.apiextensions.k8s.io/pipelines.tekton.dev created customresourcedefinition.apiextensions.k8s.io/pipelineruns.tekton.dev created customresourcedefinition.apiextensions.k8s.io/resolutionrequests.resolution.tekton.dev created customresourcedefinition.apiextensions.k8s.io/stepactions.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tasks.tekton.dev created customresourcedefinition.apiextensions.k8s.io/taskruns.tekton.dev created customresourcedefinition.apiextensions.k8s.io/verificationpolicies.tekton.dev created secret/webhook-certs created validatingwebhookconfiguration.admissionregistration.k8s.io/validation.webhook.pipeline.tekton.dev created mutatingwebhookconfiguration.admissionregistration.k8s.io/webhook.pipeline.tekton.dev created validatingwebhookconfiguration.admissionregistration.k8s.io/config.webhook.pipeline.tekton.dev created clusterrole.rbac.authorization.k8s.io/tekton-aggregate-edit created clusterrole.rbac.authorization.k8s.io/tekton-aggregate-view created configmap/config-defaults created configmap/config-events created configmap/feature-flags created configmap/pipelines-info created configmap/config-leader-election-controller created configmap/config-leader-election-events created configmap/config-leader-election-webhook created configmap/config-logging created configmap/config-observability created configmap/config-registry-cert created configmap/config-spire created configmap/config-tracing created configmap/config-wait-exponential-backoff created deployment.apps/tekton-pipelines-controller created service/tekton-pipelines-controller created deployment.apps/tekton-events-controller created service/tekton-events-controller created namespace/tekton-pipelines-resolvers created clusterrole.rbac.authorization.k8s.io/tekton-pipelines-resolvers-resolution-request-updates created role.rbac.authorization.k8s.io/tekton-pipelines-resolvers-namespace-rbac created serviceaccount/tekton-pipelines-resolvers created clusterrolebinding.rbac.authorization.k8s.io/tekton-pipelines-resolvers created rolebinding.rbac.authorization.k8s.io/tekton-pipelines-resolvers-namespace-rbac created configmap/bundleresolver-config created configmap/cluster-resolver-config created configmap/resolvers-feature-flags created configmap/config-leader-election-resolvers created configmap/config-logging created configmap/config-observability created configmap/git-resolver-config created configmap/http-resolver-config created configmap/hubresolver-config created deployment.apps/tekton-pipelines-remote-resolvers created service/tekton-pipelines-remote-resolvers created horizontalpodautoscaler.autoscaling/tekton-pipelines-webhook created deployment.apps/tekton-pipelines-webhook created service/tekton-pipelines-webhook created Generating DB secret... secret/tekton-results-postgres created Generating TLS key pair... ...+...............+......+..+............+....+.....+.+.....+.+.........+...+..+.+........+....+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*...+...+...+.....................+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*............+...............+........+...+....+.....+.+.................+.+......+...........+....+.......................+.+......+........+.+..+.......+...............+......+.....+....+..+.+..............+...+..................+..........+...+.....+.........+.+.........+...+............+..+..................+.+......+...+.....................+..+....+...+......+...........+................+........+.+.....+.+..............+.+.................+...+...+.......+..+...+...+........................+...+......................+......+...........+.+.....+.........+.............+..................+..+.+...........+....+..+...+................+..............+.......+.....+.......+.....+...+...+.........+.+.....+.......+...+......+......+..+..........+..+.+..............+.........+......+.............+......+..+...+....+.................+.+..+.....................+.+......+.........+...+..+.........+.....................+.............+............+.....+.+..+......+.+......+.....+......................+........+...+...................+...............+........+...+.+...+...+.......................+.+...+........+...+.........................+..+.........+................+...+...........+....+.....+.+.....+....+..+..................+....+......+..+...+....+...+............+............+...+......+.....+.........+......+......+......+....+...........+..........+.....+.......+..+......+.......+............+...+...+.........+.........+...........+...+...+.........+.+..................+..............+.+....................+.........+.......+........+............................+.....+...............+...................+..................+...........+.+...+......+....................+.+.....+...................+.........+.....+..........+..+......+............+.............+..+......................+......+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ...+..+...+...+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*...+..+.+..............+.+..+...+.........+...+.......+...+...+..+.......+..+...+...+....+.........+.....+.........+...+....+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*.......+......+.+........+......+.........+.+.........+..+.+..+...+...+.+........................+........................+...+..+.+.........+.....+.+...........+......+......................+...+.....+.........+..........+...........+....+........+.......+...+.....+.......+.....+...+.+..+...+.+...........+..........+............+.....+..........+........+....+......+..+..........+...+.......................+....+.................+.+........+..........+...........+.........+.+.........+......+.....+....+...........+...+............+.+.....+.........+....+.................+...............+...+.........+.+.........+...+....................+.......+..+.....................+............+.+...........+...+.+............+...+..+...+.....................+....+.....+.+...+..+......+.........+.........+....+...+............+........+..........+............+..+.+..............+.+..+.+.........+.....+.......+..............+......+...+..........+......+..............+...+...+...............+................+......+..+...+....+.....+....+.....+......+....+......+...+...........+....+.....+......+......+.+..+.............+..+.......+......+............+..+..................+..........+........+.......+...........+.+..............+......+.+........+......+.........+.......+...+.....+................+.....+......+....+......+..+.+..+...+....+.................+......+....+......+..................+..............+..........+........+...+....+......+..+.........+..........+.......................+............+.+............+..+..........+...+...........+........................+.......+.....+...+.+...........+.+........+...................+...+..................+......+........+.+............+..............+....+......+.....+..........+.....+................+..+...+.......+............+......+........+.+....................+.+...............+.....+..........+............+..+...+...+.......+.....+......+.+...+........+.................................+.........+.......+.........+...............+...........+...+.......+......+..+.+..+.........................+...+........................+..................+.................+...+...+.........+.+......+...+..+.........+.......+..+...+...+....+...........+.+.......................+...+....+........+.+......+...+........+.......+...........+.+......+.........+...........+...+.......+.....+.......+...+.....+.......+...........+..........+.....+.......+..+.......+.....................+.....+......................+......+...........+......+....+......+.....+....+...............+...........+...+......+.+..+..........+...............+.....+.+...........+...+.......+......+.....+....+...+......+....................+......+.........+.+...+...............+..+....+.........+..+......+...+....+...............+...........+.+.....+...+......+...................+...........+.........+.+........................+.....+.......+........+.....................+....+........+..........+...+..+...+......+.+..+.......+..............+............+....+...+..+...............+...+......+.......+..+...+...+......+..................+...+.......+........+.......+......+......+........+......+......+.+...............+..+...+...+.+.....+......+.........+....+..+....+.........+.....+.+......+............+.....+.....................+....+.....+..........+..+......+...........................+.+.....+.....................+...............+......+....+.................................+....................+.+.....+..........+............+.........+......+..+......+....+.....+..................+............+.+......+.....+...+...+.............+.........+..+...+.+...........+.+..+.................................+.......+..+.+...+..............+..........+......+.....+.........+.+...........+......+...............+...+............+...+.......+...+..+.......+...............+.....+...+............+.+............+........+.+...+........+.............+............+...+...........+......+.................................+......+...+.+..+.......+.....+.............+...+...........+.+...+......+..........................+...+.......+...+...............+......+......+..+.......+...+...................................+.+.....+.........+..........+............+........+.+..+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ----- secret/tekton-results-tls created Installing Tekton Results... 2025/08/18 06:01:13 Using base cgr.dev/chainguard/static:latest@sha256:6a4b683f4708f1f167ba218e31fcac0b7515d94c33c3acf223c36d5c6acd3783 for github.com/tektoncd/results/cmd/api 2025/08/18 06:01:13 Using base cgr.dev/chainguard/static:latest@sha256:6a4b683f4708f1f167ba218e31fcac0b7515d94c33c3acf223c36d5c6acd3783 for github.com/tektoncd/results/cmd/retention-policy-agent 2025/08/18 06:01:14 Using base cgr.dev/chainguard/static:latest@sha256:6a4b683f4708f1f167ba218e31fcac0b7515d94c33c3acf223c36d5c6acd3783 for github.com/tektoncd/results/cmd/watcher 2025/08/18 06:01:14 Building github.com/tektoncd/results/cmd/api for linux/amd64 2025/08/18 06:01:14 Building github.com/tektoncd/results/cmd/retention-policy-agent for linux/amd64 2025/08/18 06:01:14 Building github.com/tektoncd/results/cmd/watcher for linux/amd64 {"component":"entrypoint","file":"k8s.io/test-infra/prow/entrypoint/run.go:169","func":"k8s.io/test-infra/prow/entrypoint.Options.ExecuteProcess","level":"error","msg":"Entrypoint received interrupt: terminated","severity":"error","time":"2025-08-18T06:03:11Z"}