Running with gitlab-runner 13.8.0 (775dd39d)  on dsop-shared-gitlab-runner-f887cbcbd-srgz6 E82_g8RG section_start:1625259798:resolve_secrets Resolving secrets section_end:1625259798:resolve_secrets section_start:1625259798:prepare_executor Preparing the "kubernetes" executor Using Kubernetes namespace: gitlab-runner-ironbank-dsop WARNING: Pulling GitLab Runner helper image from Docker Hub. Helper image is migrating to registry.gitlab.com, for more information see https://docs.gitlab.com/runner/configuration/advanced-configuration.html#migrating-helper-image-to-registrygitlabcom Using Kubernetes executor with image registry1.dso.mil/ironbank/ironbank-pipelines/rootless-podman:0.2 ... section_end:1625259798:prepare_executor section_start:1625259798:prepare_script Preparing environment Waiting for pod gitlab-runner-ironbank-dsop/runner-e82g8rg-project-3577-concurrent-0qg5cg to be running, status is Pending Waiting for pod gitlab-runner-ironbank-dsop/runner-e82g8rg-project-3577-concurrent-0qg5cg to be running, status is Pending ContainersNotInitialized: "containers with incomplete status: [istio-init]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" Running on runner-e82g8rg-project-3577-concurrent-0qg5cg via dsop-shared-gitlab-runner-f887cbcbd-srgz6... section_end:1625259804:prepare_script section_start:1625259804:get_sources Getting source from Git repository $ until [ $(curl --fail --silent --output /dev/stderr --write-out "%{http_code}" localhost:15020/healthz/ready) -eq 200 ]; do echo Waiting for Sidecar; sleep 3 ; done ; echo Sidecar available; Sidecar available Fetching changes with git depth set to 50... Initialized empty Git repository in /builds/dsop/aws/aws-controllers-k8s/ecr/.git/ Created fresh repository. Checking out 4b49d35b as development... Skipping object checkout, Git LFS is not installed. Skipping Git submodules setup section_end:1625259805:get_sources section_start:1625259805:download_artifacts Downloading artifacts Downloading artifacts for hardening-manifest (4532921)... Downloading artifacts from coordinator... ok  id=4532921 responseStatus=200 OK token=XucRfDgD WARNING: ci-artifacts/preflight/: lchown ci-artifacts/preflight/: operation not permitted (suppressing repeats) Downloading artifacts for import-artifacts (4532923)... Downloading artifacts from coordinator... ok  id=4532923 responseStatus=200 OK token=QaZ9Nfzo WARNING: ci-artifacts/import-artifacts/: lchown ci-artifacts/import-artifacts/: operation not permitted (suppressing repeats) Downloading artifacts for load-scripts (4532918)... Downloading artifacts from coordinator... ok  id=4532918 responseStatus=200 OK token=gtQpwXzv WARNING: ci-artifacts/[MASKED]/: lchown ci-artifacts/[MASKED]/: operation not permitted (suppressing repeats) Downloading artifacts for wl-compare-lint (4532922)... Downloading artifacts from coordinator... ok  id=4532922 responseStatus=200 OK token=ngikcBX4 WARNING: ci-artifacts/lint/: lchown ci-artifacts/lint/: operation not permitted (suppressing repeats) section_end:1625259808:download_artifacts section_start:1625259808:step_script Executing "step_script" stage of the job script $ "${PIPELINE_REPO_DIR}/stages/build/build-run.sh" Determine source registry based on branch Load any images used in Dockerfile build loading image ci-artifacts/import-artifacts/images/amazon-aws-controllers-k8s-ecr-v0.0.1.tar time="2021-07-02T21:03:29Z" level=warning msg="Failed to detect the owner for the current cgroup: stat /sys/fs/cgroup/systemd/kubepods/burstable/pod7dadf5cc-5366-42c8-bc52-0155762767c5/0b767c1ec13427c7b06b319095daebb9fbba013c4b1a53da9c62d3b33fc49901: no such file or directory" Getting image source signatures Copying blob sha256:a8f24777088e6de70734421dea61b5fbc5b80217160a4ef234ab623ae7bcbbc8 Copying blob sha256:50c3cd23142638cd1a726e8d788baa9353907479df6e6501edcee6fa4f7820ba Copying config sha256:4aca3eff17c6b551c10961dad1416231ecdebd06ef65a1a1b43a1945cc74d482 Writing manifest to image destination Storing signatures Loaded image(s): localhost/amazon/aws-controllers-k8s:ecr-v0.0.1 time="2021-07-02T21:03:37Z" level=error msg="failed to kill 31" Load HTTP and S3 external resources Converting labels from hardening manifest into command line args Converting build args from hardening manifest into command line args Build the image STEP 1: FROM amazon/aws-controllers-k8s:ecr-v0.0.1 AS builder Getting image source signatures Copying blob sha256:50c3cd23142638cd1a726e8d788baa9353907479df6e6501edcee6fa4f7820ba Copying blob sha256:a8f24777088e6de70734421dea61b5fbc5b80217160a4ef234ab623ae7bcbbc8 Copying config sha256:55fe04eb04851f83190533dec945b414ba24164fd053a1f8fceb4b239457a555 Writing manifest to image destination Storing signatures --> 55fe04eb048 STEP 2: FROM registry1.dso.mil/ironbank/redhat/ubi/ubi8:8.4 Getting image source signatures Copying blob sha256:53732dad4680ae165f569331357b89605c03583057db7193a7a4fabdf312f061 Copying blob sha256:a538c9b9760931040405e4c827d816c820fc4738284b4f51a1bb0c872fb4b45d Copying blob sha256:0e3d70c00fa6f581a90f9dde512f9260471e55360b925e7780d78dcf6d70542e Copying config sha256:10c1cd09ae0bd37ddd7a5668b4edad9f2be74c759db30c63b8aae7fb1d043191 Writing manifest to image destination Storing signatures STEP 3: COPY --from=builder /bin/controller /bin/ STEP 4: RUN groupadd -r awscontrollersk8suser && useradd -r -g awscontrollersk8suser awscontrollersk8suser STEP 5: USER awscontrollersk8suser STEP 6: ENTRYPOINT ["/bin/controller"] STEP 7: HEALTHCHECK NONE STEP 8: COMMIT registry1.dso.mil/ironbank-staging/aws/aws-controllers-k8s/ecr Getting image source signatures Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:e812b2e9a8ece0548c27034b9ff1493411fa8e5ba5c8a5c61abf256effe2003a Copying blob sha256:4957428498c80e1151afa1f347a137de997083bec0316cccb073249ae77cddf1 Copying config sha256:c59f8025cbec832711f52980acdae15f1dbcb9bbf2a7f3515e6b239ece9aa8c8 Writing manifest to image destination Storing signatures --> c59f8025cbe c59f8025cbec832711f52980acdae15f1dbcb9bbf2a7f3515e6b239ece9aa8c8 + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/aws/aws-controllers-k8s/ecr registry1.dso.mil/ironbank-staging/aws/aws-controllers-k8s/ecr:ibci-346889 + buildah push --storage-driver=vfs --authfile staging_auth.json --digestfile=ci-artifacts/build/digest registry1.dso.mil/ironbank-staging/aws/aws-controllers-k8s/ecr:ibci-346889 Getting image source signatures Copying blob sha256:4957428498c80e1151afa1f347a137de997083bec0316cccb073249ae77cddf1 Copying blob sha256:e812b2e9a8ece0548c27034b9ff1493411fa8e5ba5c8a5c61abf256effe2003a Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying config sha256:c59f8025cbec832711f52980acdae15f1dbcb9bbf2a7f3515e6b239ece9aa8c8 Writing manifest to image destination Storing signatures + echo 'Read the tags' + tags_file=ci-artifacts/preflight/tags.txt + test -f ci-artifacts/preflight/tags.txt Read the tags + IFS= + read -r tag + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/aws/aws-controllers-k8s/ecr registry1.dso.mil/ironbank-staging/aws/aws-controllers-k8s/ecr:ecr-v0.0.1 + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/aws/aws-controllers-k8s/ecr:ecr-v0.0.1 Getting image source signatures Copying blob sha256:e812b2e9a8ece0548c27034b9ff1493411fa8e5ba5c8a5c61abf256effe2003a Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:4957428498c80e1151afa1f347a137de997083bec0316cccb073249ae77cddf1 Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying config sha256:c59f8025cbec832711f52980acdae15f1dbcb9bbf2a7f3515e6b239ece9aa8c8 Writing manifest to image destination Storing signatures + IFS= + read -r tag + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/aws/aws-controllers-k8s/ecr registry1.dso.mil/ironbank-staging/aws/aws-controllers-k8s/ecr:latest + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/aws/aws-controllers-k8s/ecr:latest Getting image source signatures Copying blob sha256:4957428498c80e1151afa1f347a137de997083bec0316cccb073249ae77cddf1 Copying blob sha256:e812b2e9a8ece0548c27034b9ff1493411fa8e5ba5c8a5c61abf256effe2003a Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying config sha256:c59f8025cbec832711f52980acdae15f1dbcb9bbf2a7f3515e6b239ece9aa8c8 Writing manifest to image destination Storing signatures + IFS= + read -r tag ++ podman inspect --storage-driver=vfs registry1.dso.mil/ironbank-staging/aws/aws-controllers-k8s/ecr --format '{{.Id}}' time="2021-07-02T21:04:22Z" level=warning msg="Failed to detect the owner for the current cgroup: stat /sys/fs/cgroup/systemd/kubepods/burstable/pod7dadf5cc-5366-42c8-bc52-0155762767c5/0b767c1ec13427c7b06b319095daebb9fbba013c4b1a53da9c62d3b33fc49901: no such file or directory" + IMAGE_ID=sha256:c59f8025cbec832711f52980acdae15f1dbcb9bbf2a7f3515e6b239ece9aa8c8 + echo IMAGE_ID=sha256:c59f8025cbec832711f52980acdae15f1dbcb9bbf2a7f3515e6b239ece9aa8c8 + IMAGE_PODMAN_SHA=sha256:ae9e36f6ffd08ba8e9fcc7a08f3a8ed20cbabb5845b2527b4e3c20b3aab38816 + echo IMAGE_PODMAN_SHA=sha256:ae9e36f6ffd08ba8e9fcc7a08f3a8ed20cbabb5845b2527b4e3c20b3aab38816 + echo IMAGE_FULLTAG=registry1.dso.mil/ironbank-staging/aws/aws-controllers-k8s/ecr:ibci-346889 + echo IMAGE_NAME=aws/aws-controllers-k8s/ecr A tarball of the built image can be retrieved from the documentation job artifacts. + branches=("master" "development") + [[ master development =~ development ]] + msg='A tarball of the built image can be retrieved from the documentation job artifacts.' + echo 'A tarball of the built image can be retrieved from the documentation job artifacts.' section_end:1625259862:step_script section_start:1625259862:upload_artifacts_on_success Uploading artifacts for successful job Uploading artifacts... ci-artifacts/build/: found 2 matching files and directories Uploading artifacts as "archive" to coordinator... ok id=4532925 responseStatus=201 Created token=H-9CAz2r Uploading artifacts... build.env: found 1 matching files and directories  Uploading artifacts as "dotenv" to coordinator... ok id=4532925 responseStatus=201 Created token=H-9CAz2r section_end:1625259863:upload_artifacts_on_success section_start:1625259863:cleanup_file_variables Cleaning up file based variables section_end:1625259864:cleanup_file_variables Job succeeded