Running with gitlab-runner 13.8.0 (775dd39d)  on dsop-shared-gitlab-runner-f887cbcbd-srgz6 E82_g8RG section_start:1630516592:resolve_secrets Resolving secrets section_end:1630516592:resolve_secrets section_start:1630516592:prepare_executor Preparing the "kubernetes" executor Using Kubernetes namespace: gitlab-runner-ironbank-dsop WARNING: Pulling GitLab Runner helper image from Docker Hub. Helper image is migrating to registry.gitlab.com, for more information see https://docs.gitlab.com/runner/configuration/advanced-configuration.html#migrating-helper-image-to-registrygitlabcom Using Kubernetes executor with image registry1.dso.mil/ironbank/ironbank-pipelines/rootless-podman:0.2 ... section_end:1630516592:prepare_executor section_start:1630516592:prepare_script Preparing environment Waiting for pod gitlab-runner-ironbank-dsop/runner-e82g8rg-project-421-concurrent-0nmbfj to be running, status is Pending Waiting for pod gitlab-runner-ironbank-dsop/runner-e82g8rg-project-421-concurrent-0nmbfj to be running, status is Pending ContainersNotReady: "containers with unready status: [build helper istio-proxy]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" Running on runner-e82g8rg-project-421-concurrent-0nmbfj via dsop-shared-gitlab-runner-f887cbcbd-srgz6... section_end:1630516599:prepare_script section_start:1630516599:get_sources Getting source from Git repository $ until [ $(curl --fail --silent --output /dev/stderr --write-out "%{http_code}" localhost:15020/healthz/ready) -eq 200 ]; do echo Waiting for Sidecar; sleep 3 ; done ; echo Sidecar available; Sidecar available Fetching changes with git depth set to 50... Initialized empty Git repository in /builds/dsop/elastic/apm-server/apm-server/.git/ Created fresh repository. Checking out dbb28ef9 as development... Skipping object checkout, Git LFS is not installed. Skipping Git submodules setup section_end:1630516600:get_sources section_start:1630516600:download_artifacts Downloading artifacts Downloading artifacts for hardening-manifest (6154462)... Downloading artifacts from coordinator... ok  id=6154462 responseStatus=200 OK token=1CVNVhMa WARNING: ci-artifacts/preflight/: lchown ci-artifacts/preflight/: operation not permitted (suppressing repeats) Downloading artifacts for import-artifacts (6154464)... Downloading artifacts from coordinator... ok  id=6154464 responseStatus=200 OK token=hzAUWg_Y WARNING: ci-artifacts/import-artifacts/: lchown ci-artifacts/import-artifacts/: operation not permitted (suppressing repeats) Downloading artifacts for load-scripts (6154459)... Downloading artifacts from coordinator... ok  id=6154459 responseStatus=200 OK token=xsCr2-eL WARNING: ci-artifacts/[MASKED]/: lchown ci-artifacts/[MASKED]/: operation not permitted (suppressing repeats) Downloading artifacts for wl-compare-lint (6154463)... Downloading artifacts from coordinator... ok  id=6154463 responseStatus=200 OK token=kcKZQYzY WARNING: ci-artifacts/lint/: lchown ci-artifacts/lint/: operation not permitted (suppressing repeats) section_end:1630516601:download_artifacts section_start:1630516601:step_script Executing "step_script" stage of the job script $ "${PIPELINE_REPO_DIR}/stages/build/build-run.sh" Determine source registry based on branch Load any images used in Dockerfile build Load HTTP and S3 external resources 'ci-artifacts/import-artifacts/external-resources/apm-server-7.14.1-linux-x86_64.tar.gz' -> './apm-server-7.14.1-linux-x86_64.tar.gz' 'ci-artifacts/import-artifacts/external-resources/tinit' -> './tinit' Converting labels from hardening manifest into command line args Converting build args from hardening manifest into command line args Build the image STEP 1: FROM registry1.dso.mil/ironbank/redhat/ubi/ubi8:8.4 AS prep_files Trying to pull registry1.dso.mil/ironbank/redhat/ubi/ubi8:8.4... Getting image source signatures Copying blob sha256:96476a77b28db43fcb170401c287700d91d95cdff9c06e5ea7b48289d40a8e57 Copying blob sha256:f9ef3e11f27a19f8a99d2f646f19f402677b52acf3aee977f91721a903463b66 Copying blob sha256:db2f50b75fc09a20e8d9c497d96ad384fbeacf7e77df71e4c7b578d4c07fccce Copying config sha256:ce5d04260daca9acea6b50427f112397fbdf475a5488ff50fc4c1262f2fb366a Writing manifest to image destination Storing signatures STEP 2: ARG ELASTIC_STACK=7.14.1 STEP 3: ARG ELASTIC_PRODUCT=apm-server STEP 4: ARG OS_AND_ARCH=linux-x86_64 STEP 5: RUN mkdir /usr/share/${ELASTIC_PRODUCT} STEP 6: WORKDIR /usr/share/${ELASTIC_PRODUCT} STEP 7: COPY --chown=1000:0 ${ELASTIC_PRODUCT}-${ELASTIC_STACK}-${OS_AND_ARCH}.tar.gz . STEP 8: RUN tar --strip-components=1 -zxf ${ELASTIC_PRODUCT}-${ELASTIC_STACK}-${OS_AND_ARCH}.tar.gz STEP 9: RUN chmod -R g=u /usr/share/${ELASTIC_PRODUCT} STEP 10: RUN mkdir /usr/share/${ELASTIC_PRODUCT}/data /usr/share/${ELASTIC_PRODUCT}/logs && chown -R root:root /usr/share/${ELASTIC_PRODUCT} && find /usr/share/${ELASTIC_PRODUCT} -type d -exec chmod 0750 {} \; && find /usr/share/${ELASTIC_PRODUCT} -type f -exec chmod 0640 {} \; && chmod 0750 /usr/share/${ELASTIC_PRODUCT}/${ELASTIC_PRODUCT} && chmod 0770 /usr/share/${ELASTIC_PRODUCT}/data /usr/share/${ELASTIC_PRODUCT}/logs STEP 11: FROM registry1.dso.mil/ironbank/redhat/ubi/ubi8:8.4 STEP 12: ARG ELASTIC_PRODUCT=apm-server STEP 13: COPY LICENSE /licenses/elastic-${ELASTIC_PRODUCT} STEP 14: COPY tinit /tinit STEP 15: RUN chmod +x /tinit STEP 16: COPY --from=prep_files --chown=1000:0 /usr/share/${ELASTIC_PRODUCT} /usr/share/${ELASTIC_PRODUCT} STEP 17: WORKDIR /usr/share/${ELASTIC_PRODUCT} STEP 18: RUN ln -s /usr/share/${ELASTIC_PRODUCT} /opt/${ELASTIC_PRODUCT} STEP 19: ENV ELASTIC_CONTAINER true STEP 20: RUN ln -s /usr/share/${ELASTIC_PRODUCT}/${ELASTIC_PRODUCT} /usr/bin/${ELASTIC_PRODUCT} STEP 21: RUN chmod -R g+w /usr/share/${ELASTIC_PRODUCT} STEP 22: RUN chmod go-w /usr/share/${ELASTIC_PRODUCT}/${ELASTIC_PRODUCT}.yml STEP 23: RUN find / -xdev -perm -4000 -exec chmod u-s {} + STEP 24: RUN groupadd --gid 1000 ${ELASTIC_PRODUCT} && useradd --uid 1000 --gid 1000 --home-dir /usr/share/${ELASTIC_PRODUCT} --no-create-home ${ELASTIC_PRODUCT} STEP 25: USER ${ELASTIC_PRODUCT} STEP 26: EXPOSE 8200 STEP 27: ENTRYPOINT ["/tinit", "--", "/usr/share/apm-server/apm-server"] STEP 28: CMD ["-environment", "container"] STEP 29: HEALTHCHECK --interval=10s --timeout=5s --start-period=1m --retries=5 CMD (curl -I -f --max-time 5 https://localhost:8200 || curl -I -f --max-time 5 http://localhost:8200 || exit 1) STEP 30: COMMIT registry1.dso.mil/ironbank-staging/elastic/apm-server/apm-server Getting image source signatures Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:ba0df648399981d4eddac2d7ed153952076b2f1c6dc9bb728dadd8a88a7c5205 Copying blob sha256:5cca3283704075639687253da7aa6c340a34d462cc8a2e9fdd237d8dcb5201b3 Copying config sha256:cd5258274a5936ff42c8d5f6ca49c7a82dcdfcc9e7e336ee9dc2eda18b42f250 Writing manifest to image destination Storing signatures --> cd5258274a5 Successfully tagged registry1.dso.mil/ironbank-staging/elastic/apm-server/apm-server:latest cd5258274a5936ff42c8d5f6ca49c7a82dcdfcc9e7e336ee9dc2eda18b42f250 + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/elastic/apm-server/apm-server registry1.dso.mil/ironbank-staging/elastic/apm-server/apm-server:ibci-455882 + buildah push --storage-driver=vfs --authfile staging_auth.json --digestfile=ci-artifacts/build/digest registry1.dso.mil/ironbank-staging/elastic/apm-server/apm-server:ibci-455882 Getting image source signatures Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:5cca3283704075639687253da7aa6c340a34d462cc8a2e9fdd237d8dcb5201b3 Copying blob sha256:ba0df648399981d4eddac2d7ed153952076b2f1c6dc9bb728dadd8a88a7c5205 Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying config sha256:cd5258274a5936ff42c8d5f6ca49c7a82dcdfcc9e7e336ee9dc2eda18b42f250 Writing manifest to image destination Storing signatures Read the tags + echo 'Read the tags' + tags_file=ci-artifacts/preflight/tags.txt + test -f ci-artifacts/preflight/tags.txt + IFS= + read -r tag + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/elastic/apm-server/apm-server registry1.dso.mil/ironbank-staging/elastic/apm-server/apm-server:7.14.1 + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/elastic/apm-server/apm-server:7.14.1 Getting image source signatures Copying blob sha256:ba0df648399981d4eddac2d7ed153952076b2f1c6dc9bb728dadd8a88a7c5205 Copying blob sha256:5cca3283704075639687253da7aa6c340a34d462cc8a2e9fdd237d8dcb5201b3 Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying config sha256:cd5258274a5936ff42c8d5f6ca49c7a82dcdfcc9e7e336ee9dc2eda18b42f250 Writing manifest to image destination Storing signatures + IFS= + read -r tag + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/elastic/apm-server/apm-server registry1.dso.mil/ironbank-staging/elastic/apm-server/apm-server:latest + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/elastic/apm-server/apm-server:latest Getting image source signatures Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:ba0df648399981d4eddac2d7ed153952076b2f1c6dc9bb728dadd8a88a7c5205 Copying blob sha256:5cca3283704075639687253da7aa6c340a34d462cc8a2e9fdd237d8dcb5201b3 Copying config sha256:cd5258274a5936ff42c8d5f6ca49c7a82dcdfcc9e7e336ee9dc2eda18b42f250 Writing manifest to image destination Storing signatures + IFS= + read -r tag ++ podman inspect --storage-driver=vfs registry1.dso.mil/ironbank-staging/elastic/apm-server/apm-server --format '{{.Id}}' + IMAGE_ID=sha256:cd5258274a5936ff42c8d5f6ca49c7a82dcdfcc9e7e336ee9dc2eda18b42f250 + echo IMAGE_ID=sha256:cd5258274a5936ff42c8d5f6ca49c7a82dcdfcc9e7e336ee9dc2eda18b42f250 + IMAGE_PODMAN_SHA=sha256:793b3212eb81f9f14d4615fc126cbe4ef834d7392af431690544a59fbaecea67 + echo IMAGE_PODMAN_SHA=sha256:793b3212eb81f9f14d4615fc126cbe4ef834d7392af431690544a59fbaecea67 + echo IMAGE_FULLTAG=registry1.dso.mil/ironbank-staging/elastic/apm-server/apm-server:ibci-455882 + echo IMAGE_NAME=elastic/apm-server/apm-server A tarball of the built image can be retrieved from the documentation job artifacts. + branches=("master" "development") + [[ master development =~ development ]] + msg='A tarball of the built image can be retrieved from the documentation job artifacts.' + echo 'A tarball of the built image can be retrieved from the documentation job artifacts.' section_end:1630516661:step_script section_start:1630516661:upload_artifacts_on_success Uploading artifacts for successful job Uploading artifacts... ci-artifacts/build/: found 2 matching files and directories Uploading artifacts as "archive" to coordinator... ok id=6154466 responseStatus=201 Created token=-6ixsjxU Uploading artifacts... build.env: found 1 matching files and directories  Uploading artifacts as "dotenv" to coordinator... ok id=6154466 responseStatus=201 Created token=-6ixsjxU section_end:1630516663:upload_artifacts_on_success section_start:1630516663:cleanup_file_variables Cleaning up file based variables section_end:1630516663:cleanup_file_variables Job succeeded