Running with gitlab-runner 13.8.0 (775dd39d)  on dsop-shared-gitlab-runner-f887cbcbd-srgz6 E82_g8RG section_start:1630516746:resolve_secrets Resolving secrets section_end:1630516746:resolve_secrets section_start:1630516746:prepare_executor Preparing the "kubernetes" executor Using Kubernetes namespace: gitlab-runner-ironbank-dsop WARNING: Pulling GitLab Runner helper image from Docker Hub. Helper image is migrating to registry.gitlab.com, for more information see https://docs.gitlab.com/runner/configuration/advanced-configuration.html#migrating-helper-image-to-registrygitlabcom Using Kubernetes executor with image registry1.dso.mil/ironbank/ironbank-pipelines/rootless-podman:0.2 ... section_end:1630516746:prepare_executor section_start:1630516746:prepare_script Preparing environment Waiting for pod gitlab-runner-ironbank-dsop/runner-e82g8rg-project-433-concurrent-0gg6j7 to be running, status is Pending Waiting for pod gitlab-runner-ironbank-dsop/runner-e82g8rg-project-433-concurrent-0gg6j7 to be running, status is Pending ContainersNotReady: "containers with unready status: [build helper istio-proxy]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" Running on runner-e82g8rg-project-433-concurrent-0gg6j7 via dsop-shared-gitlab-runner-f887cbcbd-srgz6... section_end:1630516752:prepare_script section_start:1630516752:get_sources Getting source from Git repository $ until [ $(curl --fail --silent --output /dev/stderr --write-out "%{http_code}" localhost:15020/healthz/ready) -eq 200 ]; do echo Waiting for Sidecar; sleep 3 ; done ; echo Sidecar available; Sidecar available Fetching changes with git depth set to 50... Initialized empty Git repository in /builds/dsop/elastic/beats/auditbeat/.git/ Created fresh repository. Checking out 16fda642 as development... Skipping object checkout, Git LFS is not installed. Skipping Git submodules setup section_end:1630516753:get_sources section_start:1630516753:download_artifacts Downloading artifacts Downloading artifacts for hardening-manifest (6154499)... Downloading artifacts from coordinator... ok  id=6154499 responseStatus=200 OK token=mtxVwzer WARNING: ci-artifacts/preflight/: lchown ci-artifacts/preflight/: operation not permitted (suppressing repeats) Downloading artifacts for import-artifacts (6154501)... Downloading artifacts from coordinator... ok  id=6154501 responseStatus=200 OK token=Nz_wHhyD WARNING: ci-artifacts/import-artifacts/: lchown ci-artifacts/import-artifacts/: operation not permitted (suppressing repeats) Downloading artifacts for load-scripts (6154496)... Downloading artifacts from coordinator... ok  id=6154496 responseStatus=200 OK token=p5nyTLyQ WARNING: ci-artifacts/[MASKED]/: lchown ci-artifacts/[MASKED]/: operation not permitted (suppressing repeats) Downloading artifacts for wl-compare-lint (6154500)... Downloading artifacts from coordinator... ok  id=6154500 responseStatus=200 OK token=zstgwbxv WARNING: ci-artifacts/lint/: lchown ci-artifacts/lint/: operation not permitted (suppressing repeats) section_end:1630516754:download_artifacts section_start:1630516754:step_script Executing "step_script" stage of the job script $ "${PIPELINE_REPO_DIR}/stages/build/build-run.sh" Determine source registry based on branch Load any images used in Dockerfile build Load HTTP and S3 external resources 'ci-artifacts/import-artifacts/external-resources/auditbeat-7.14.1-linux-x86_64.tar.gz' -> './auditbeat-7.14.1-linux-x86_64.tar.gz' 'ci-artifacts/import-artifacts/external-resources/tinit' -> './tinit' Converting labels from hardening manifest into command line args Converting build args from hardening manifest into command line args Build the image STEP 1: FROM registry1.dso.mil/ironbank/redhat/ubi/ubi8:8.4 AS prep_files Trying to pull registry1.dso.mil/ironbank/redhat/ubi/ubi8:8.4... Getting image source signatures Copying blob sha256:f9ef3e11f27a19f8a99d2f646f19f402677b52acf3aee977f91721a903463b66 Copying blob sha256:96476a77b28db43fcb170401c287700d91d95cdff9c06e5ea7b48289d40a8e57 Copying blob sha256:db2f50b75fc09a20e8d9c497d96ad384fbeacf7e77df71e4c7b578d4c07fccce Copying config sha256:ce5d04260daca9acea6b50427f112397fbdf475a5488ff50fc4c1262f2fb366a Writing manifest to image destination Storing signatures STEP 2: ARG ELASTIC_STACK=7.14.1 STEP 3: ARG ELASTIC_PRODUCT=auditbeat STEP 4: ARG OS_AND_ARCH=linux-x86_64 STEP 5: RUN mkdir /usr/share/${ELASTIC_PRODUCT} STEP 6: WORKDIR /usr/share/${ELASTIC_PRODUCT} STEP 7: COPY --chown=1000:0 ${ELASTIC_PRODUCT}-${ELASTIC_STACK}-${OS_AND_ARCH}.tar.gz . STEP 8: RUN tar --strip-components=1 -zxf ${ELASTIC_PRODUCT}-${ELASTIC_STACK}-${OS_AND_ARCH}.tar.gz && rm ${ELASTIC_PRODUCT}-${ELASTIC_STACK}-${OS_AND_ARCH}.tar.gz STEP 9: COPY config/auditbeat.yml /usr/share/${ELASTIC_PRODUCT} STEP 10: RUN chmod -R g=u /usr/share/${ELASTIC_PRODUCT} STEP 11: RUN mkdir /usr/share/${ELASTIC_PRODUCT}/data /usr/share/${ELASTIC_PRODUCT}/logs && chown -R root:root /usr/share/${ELASTIC_PRODUCT} && find /usr/share/${ELASTIC_PRODUCT} -type d -exec chmod 0750 {} \; && find /usr/share/${ELASTIC_PRODUCT} -type f -exec chmod 0640 {} \; && chmod 0750 /usr/share/${ELASTIC_PRODUCT}/${ELASTIC_PRODUCT} && chmod 0770 /usr/share/${ELASTIC_PRODUCT}/data /usr/share/${ELASTIC_PRODUCT}/logs STEP 12: FROM registry1.dso.mil/ironbank/redhat/ubi/ubi8:8.4 STEP 13: ARG ELASTIC_PRODUCT=auditbeat STEP 14: COPY LICENSE /licenses/elastic-${ELASTIC_PRODUCT} STEP 15: COPY tinit /tinit STEP 16: RUN chmod +x /tinit STEP 17: COPY --from=prep_files --chown=1000:0 /usr/share/${ELASTIC_PRODUCT} /usr/share/${ELASTIC_PRODUCT} STEP 18: WORKDIR /usr/share/${ELASTIC_PRODUCT} STEP 19: RUN ln -s /usr/share/${ELASTIC_PRODUCT} /opt/${ELASTIC_PRODUCT} STEP 20: ENV ELASTIC_CONTAINER="true" STEP 21: RUN ln -s /usr/share/${ELASTIC_PRODUCT}/${ELASTIC_PRODUCT} /usr/bin/${ELASTIC_PRODUCT} STEP 22: RUN chmod -R g+w /usr/share/${ELASTIC_PRODUCT} STEP 23: RUN chown root:root /usr/share/${ELASTIC_PRODUCT}/${ELASTIC_PRODUCT}.yml && chmod go-w /usr/share/${ELASTIC_PRODUCT}/${ELASTIC_PRODUCT}.yml STEP 24: RUN find / -xdev -perm -4000 -exec chmod u-s {} + STEP 25: RUN groupadd --gid 1000 ${ELASTIC_PRODUCT} && useradd --uid 1000 --gid 1000 --groups 0 --home-dir /usr/share/${ELASTIC_PRODUCT} --no-create-home ${ELASTIC_PRODUCT} STEP 26: USER ${ELASTIC_PRODUCT} STEP 27: ENV ELASTIC_PRODUCT=${ELASTIC_PRODUCT} STEP 28: ENTRYPOINT ["/tinit", "--", "/usr/share/auditbeat/auditbeat", "-E", "http.enabled=true", "-E", "http.host=unix:///usr/share/auditbeat/data/auditbeat.sock"] STEP 29: CMD ["-environment", "container"] STEP 30: HEALTHCHECK --interval=10s --timeout=5s --start-period=1m --retries=5 CMD curl -I -f --max-time 5 --unix-socket '/usr/share/auditbeat/data/auditbeat.sock' 'http:/stats?pretty' STEP 31: COMMIT registry1.dso.mil/ironbank-staging/elastic/beats/auditbeat Getting image source signatures Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:ba0df648399981d4eddac2d7ed153952076b2f1c6dc9bb728dadd8a88a7c5205 Copying blob sha256:5c02f27e0e8fd3f3d172dbae32ae1d4d66a1e064cd3189cb384e4c9c2567fc19 Copying config sha256:364444628a7aa8b7ab41a8857a1a2d988a38711840bad3b65f221f557de1fbc9 Writing manifest to image destination Storing signatures --> 364444628a7 Successfully tagged registry1.dso.mil/ironbank-staging/elastic/beats/auditbeat:latest 364444628a7aa8b7ab41a8857a1a2d988a38711840bad3b65f221f557de1fbc9 + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/elastic/beats/auditbeat registry1.dso.mil/ironbank-staging/elastic/beats/auditbeat:ibci-455885 + buildah push --storage-driver=vfs --authfile staging_auth.json --digestfile=ci-artifacts/build/digest registry1.dso.mil/ironbank-staging/elastic/beats/auditbeat:ibci-455885 Getting image source signatures Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:5c02f27e0e8fd3f3d172dbae32ae1d4d66a1e064cd3189cb384e4c9c2567fc19 Copying blob sha256:ba0df648399981d4eddac2d7ed153952076b2f1c6dc9bb728dadd8a88a7c5205 Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying config sha256:364444628a7aa8b7ab41a8857a1a2d988a38711840bad3b65f221f557de1fbc9 Writing manifest to image destination Storing signatures + echo 'Read the tags' + tags_file=ci-artifacts/preflight/tags.txt + test -f ci-artifacts/preflight/tags.txt + IFS= + read -r tag Read the tags + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/elastic/beats/auditbeat registry1.dso.mil/ironbank-staging/elastic/beats/auditbeat:7.14.1 + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/elastic/beats/auditbeat:7.14.1 Getting image source signatures Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:ba0df648399981d4eddac2d7ed153952076b2f1c6dc9bb728dadd8a88a7c5205 Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying blob sha256:5c02f27e0e8fd3f3d172dbae32ae1d4d66a1e064cd3189cb384e4c9c2567fc19 Copying config sha256:364444628a7aa8b7ab41a8857a1a2d988a38711840bad3b65f221f557de1fbc9 Writing manifest to image destination Storing signatures + IFS= + read -r tag + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/elastic/beats/auditbeat registry1.dso.mil/ironbank-staging/elastic/beats/auditbeat:latest + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/elastic/beats/auditbeat:latest Getting image source signatures Copying blob sha256:ba0df648399981d4eddac2d7ed153952076b2f1c6dc9bb728dadd8a88a7c5205 Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying blob sha256:5c02f27e0e8fd3f3d172dbae32ae1d4d66a1e064cd3189cb384e4c9c2567fc19 Copying config sha256:364444628a7aa8b7ab41a8857a1a2d988a38711840bad3b65f221f557de1fbc9 Writing manifest to image destination Storing signatures + IFS= + read -r tag ++ podman inspect --storage-driver=vfs registry1.dso.mil/ironbank-staging/elastic/beats/auditbeat --format '{{.Id}}' + IMAGE_ID=sha256:364444628a7aa8b7ab41a8857a1a2d988a38711840bad3b65f221f557de1fbc9 + echo IMAGE_ID=sha256:364444628a7aa8b7ab41a8857a1a2d988a38711840bad3b65f221f557de1fbc9 + IMAGE_PODMAN_SHA=sha256:50b64556f745cfa1c76b4f1eba15fa45cade7734d35ac8d1a908954832848d50 + echo IMAGE_PODMAN_SHA=sha256:50b64556f745cfa1c76b4f1eba15fa45cade7734d35ac8d1a908954832848d50 + echo IMAGE_FULLTAG=registry1.dso.mil/ironbank-staging/elastic/beats/auditbeat:ibci-455885 + echo IMAGE_NAME=elastic/beats/auditbeat A tarball of the built image can be retrieved from the documentation job artifacts. + branches=("master" "development") + [[ master development =~ development ]] + msg='A tarball of the built image can be retrieved from the documentation job artifacts.' + echo 'A tarball of the built image can be retrieved from the documentation job artifacts.' section_end:1630516818:step_script section_start:1630516818:upload_artifacts_on_success Uploading artifacts for successful job Uploading artifacts... ci-artifacts/build/: found 2 matching files and directories Uploading artifacts as "archive" to coordinator... ok id=6154503 responseStatus=201 Created token=zp2wJgMf Uploading artifacts... build.env: found 1 matching files and directories  Uploading artifacts as "dotenv" to coordinator... ok id=6154503 responseStatus=201 Created token=zp2wJgMf section_end:1630516820:upload_artifacts_on_success section_start:1630516820:cleanup_file_variables Cleaning up file based variables section_end:1630516820:cleanup_file_variables Job succeeded