-
-
Save ajohnstone/7e6179e24509bceff4361fd82ca2c3a6 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Started by user Andrew Johnstone | |
Loading library photobox-jenkins-pipelines@master | |
> git rev-parse --is-inside-work-tree # timeout=10 | |
Setting origin to git@github.com:<REDACTED>.git | |
> git config remote.origin.url git@github.com:<REDACTED>.git # timeout=10 | |
Fetching origin... | |
Fetching upstream changes from origin | |
> git --version # timeout=10 | |
using GIT_ASKPASS to set credentials photobox-services | |
> git fetch --tags --progress origin +refs/heads/*:refs/remotes/origin/* | |
> git rev-parse master^{commit} # timeout=10 | |
> git rev-parse origin/master^{commit} # timeout=10 | |
Wiping out workspace first. | |
Cloning the remote Git repository | |
Cloning repository git@github.com:<REDACTED>.git | |
> git init /var/jenkins_home/jobs/test/workspace@libs/photobox-jenkins-pipelines # timeout=10 | |
Fetching upstream changes from git@github.com:<REDACTED>.git | |
> git --version # timeout=10 | |
using GIT_ASKPASS to set credentials photobox-services | |
> git fetch --tags --progress git@github.com:<REDACTED>.git +refs/heads/*:refs/remotes/origin/* | |
> git config remote.origin.url git@github.com:<REDACTED>.git # timeout=10 | |
> git config --add remote.origin.fetch +refs/heads/*:refs/remotes/origin/* # timeout=10 | |
> git config remote.origin.url git@github.com:<REDACTED>.git # timeout=10 | |
Cleaning workspace | |
> git rev-parse --verify HEAD # timeout=10 | |
No valid HEAD. Skipping the resetting | |
> git clean -fdx # timeout=10 | |
Fetching upstream changes from git@github.com:<REDACTED>.git | |
using GIT_ASKPASS to set credentials photobox-services | |
> git fetch --tags --progress git@github.com:<REDACTED>.git +refs/heads/*:refs/remotes/origin/* | |
Checking out Revision 5152281265e5323a259cb3c63de61d05bf119625 (master) | |
> git config core.sparsecheckout # timeout=10 | |
> git checkout -f 5152281265e5323a259cb3c63de61d05bf119625 | |
> git rev-list 5152281265e5323a259cb3c63de61d05bf119625 # timeout=10 | |
[Pipeline] node | |
Running on amazon-ecs-docker (i-0c388429a809ca1c0) in /home/ec2-user/workspace/test | |
[Pipeline] { | |
[Pipeline] awsIdentity | |
Current AWS identity: 49<REDACTED>63 - AROAI7UVUABOSGMRQ2D3U:i-c02c1c28 - arn:aws:sts::49<REDACTED>63:assumed-role/ecs-instance-bootstrap/i-c02c1c28 | |
[Pipeline] withAWS | |
[Pipeline] // withAWS | |
[Pipeline] } | |
[Pipeline] // node | |
[Pipeline] End of Pipeline | |
[BFA] Scanning build for known causes... | |
[BFA] No failure causes found | |
[BFA] Done. 0s | |
com.amazonaws.services.securitytoken.model.AWSSecurityTokenServiceException: User: arn:aws:sts::49<REDACTED>63:assumed-role/ecs-instance-bootstrap/i-c02c1c28 is not authorized to perform: sts:AssumeRole on resource: arn:aws:iam::49<REDACTED>63:role/kubernetes-manage-cluster (Service: AWSSecurityTokenService; Status Code: 403; Error Code: AccessDenied; Request ID: bc15dfe0-2f87-11e7-b403-ed659bd489f4) | |
at com.amazonaws.http.AmazonHttpClient$RequestExecutor.handleErrorResponse(AmazonHttpClient.java:1588) | |
at com.amazonaws.http.AmazonHttpClient$RequestExecutor.executeOneRequest(AmazonHttpClient.java:1258) | |
at com.amazonaws.http.AmazonHttpClient$RequestExecutor.executeHelper(AmazonHttpClient.java:1030) | |
at com.amazonaws.http.AmazonHttpClient$RequestExecutor.doExecute(AmazonHttpClient.java:742) | |
at com.amazonaws.http.AmazonHttpClient$RequestExecutor.executeWithTimer(AmazonHttpClient.java:716) | |
at com.amazonaws.http.AmazonHttpClient$RequestExecutor.execute(AmazonHttpClient.java:699) | |
at com.amazonaws.http.AmazonHttpClient$RequestExecutor.access$500(AmazonHttpClient.java:667) | |
at com.amazonaws.http.AmazonHttpClient$RequestExecutionBuilderImpl.execute(AmazonHttpClient.java:649) | |
at com.amazonaws.http.AmazonHttpClient.execute(AmazonHttpClient.java:513) | |
at com.amazonaws.services.securitytoken.AWSSecurityTokenServiceClient.doInvoke(AWSSecurityTokenServiceClient.java:1271) | |
at com.amazonaws.services.securitytoken.AWSSecurityTokenServiceClient.invoke(AWSSecurityTokenServiceClient.java:1247) | |
at com.amazonaws.services.securitytoken.AWSSecurityTokenServiceClient.executeAssumeRole(AWSSecurityTokenServiceClient.java:454) | |
at com.amazonaws.services.securitytoken.AWSSecurityTokenServiceClient.assumeRole(AWSSecurityTokenServiceClient.java:431) | |
at de.taimos.pipeline.aws.WithAWSStep$Execution.withRole(WithAWSStep.java:195) | |
at de.taimos.pipeline.aws.WithAWSStep$Execution.start(WithAWSStep.java:152) | |
at org.jenkinsci.plugins.workflow.cps.DSL.invokeStep(DSL.java:184) | |
at org.jenkinsci.plugins.workflow.cps.DSL.invokeMethod(DSL.java:126) | |
at org.jenkinsci.plugins.workflow.cps.CpsScript.invokeMethod(CpsScript.java:108) | |
at groovy.lang.GroovyObject$invokeMethod$1.call(Unknown Source) | |
at org.codehaus.groovy.runtime.callsite.CallSiteArray.defaultCall(CallSiteArray.java:48) | |
at org.codehaus.groovy.runtime.callsite.AbstractCallSite.call(AbstractCallSite.java:113) | |
at org.kohsuke.groovy.sandbox.impl.Checker$1.call(Checker.java:151) | |
at org.kohsuke.groovy.sandbox.GroovyInterceptor.onMethodCall(GroovyInterceptor.java:21) | |
at org.jenkinsci.plugins.scriptsecurity.sandbox.groovy.SandboxInterceptor.onMethodCall(SandboxInterceptor.java:115) | |
at org.kohsuke.groovy.sandbox.impl.Checker$1.call(Checker.java:149) | |
at org.kohsuke.groovy.sandbox.impl.Checker.checkedCall(Checker.java:146) | |
at org.kohsuke.groovy.sandbox.impl.Checker.checkedCall(Checker.java:123) | |
at com.cloudbees.groovy.cps.sandbox.SandboxInvoker.methodCall(SandboxInvoker.java:16) | |
at WorkflowScript.run(WorkflowScript:3) | |
at ___cps.transform___(Native Method) | |
at com.cloudbees.groovy.cps.impl.ContinuationGroup.methodCall(ContinuationGroup.java:57) | |
at com.cloudbees.groovy.cps.impl.FunctionCallBlock$ContinuationImpl.dispatchOrArg(FunctionCallBlock.java:109) | |
at com.cloudbees.groovy.cps.impl.FunctionCallBlock$ContinuationImpl.fixArg(FunctionCallBlock.java:82) | |
at sun.reflect.GeneratedMethodAccessor350.invoke(Unknown Source) | |
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) | |
at java.lang.reflect.Method.invoke(Method.java:498) | |
at com.cloudbees.groovy.cps.impl.ContinuationPtr$ContinuationImpl.receive(ContinuationPtr.java:72) | |
at com.cloudbees.groovy.cps.impl.ClosureBlock.eval(ClosureBlock.java:46) | |
at com.cloudbees.groovy.cps.Next.step(Next.java:74) | |
at com.cloudbees.groovy.cps.Continuable.run0(Continuable.java:154) | |
at org.jenkinsci.plugins.workflow.cps.SandboxContinuable.access$001(SandboxContinuable.java:18) | |
at org.jenkinsci.plugins.workflow.cps.SandboxContinuable$1.call(SandboxContinuable.java:33) | |
at org.jenkinsci.plugins.workflow.cps.SandboxContinuable$1.call(SandboxContinuable.java:30) | |
at org.jenkinsci.plugins.scriptsecurity.sandbox.groovy.GroovySandbox.runInSandbox(GroovySandbox.java:108) | |
at org.jenkinsci.plugins.workflow.cps.SandboxContinuable.run0(SandboxContinuable.java:30) | |
at org.jenkinsci.plugins.workflow.cps.CpsThread.runNextChunk(CpsThread.java:165) | |
at org.jenkinsci.plugins.workflow.cps.CpsThreadGroup.run(CpsThreadGroup.java:328) | |
at org.jenkinsci.plugins.workflow.cps.CpsThreadGroup.access$100(CpsThreadGroup.java:80) | |
at org.jenkinsci.plugins.workflow.cps.CpsThreadGroup$2.call(CpsThreadGroup.java:240) | |
at org.jenkinsci.plugins.workflow.cps.CpsThreadGroup$2.call(CpsThreadGroup.java:228) | |
at org.jenkinsci.plugins.workflow.cps.CpsVmExecutorService$2.call(CpsVmExecutorService.java:64) | |
at java.util.concurrent.FutureTask.run(FutureTask.java:266) | |
at hudson.remoting.SingleLaneExecutorService$1.run(SingleLaneExecutorService.java:112) | |
at jenkins.util.ContextResettingExecutorService$1.run(ContextResettingExecutorService.java:28) | |
at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:511) | |
at java.util.concurrent.FutureTask.run(FutureTask.java:266) | |
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142) | |
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617) | |
at java.lang.Thread.run(Thread.java:745) | |
Finished: FAILURE |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
node('amazon-ecs-docker-default') { | |
awsIdentity() | |
withAWS(role:'kubernetes-manage-cluster', roleAccount: env.ACCOUNT_ID) { | |
awsIdentity() | |
} | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment