Running with gitlab-runner 13.12.0 (7a6612da)  on dsop-shared-gitlab-runner-5fcd8977b8-m6qmr JrExJ6yx  feature flags: FF_USE_LEGACY_KUBERNETES_EXECUTION_STRATEGY:false section_start:1630978436:resolve_secrets Resolving secrets section_end:1630978436:resolve_secrets section_start:1630978436:prepare_executor Preparing the "kubernetes" executor Using Kubernetes namespace: gitlab-runner-ironbank-dsop Using Kubernetes executor with image registry1.dso.mil/ironbank/ironbank-pipelines/rootless-podman:0.2 ... Using attach strategy to execute scripts... section_end:1630978436:prepare_executor section_start:1630978436:prepare_script Preparing environment Waiting for pod gitlab-runner-ironbank-dsop/runner-jrexj6yx-project-2259-concurrent-0jj9d6 to be running, status is Pending Waiting for pod gitlab-runner-ironbank-dsop/runner-jrexj6yx-project-2259-concurrent-0jj9d6 to be running, status is Pending ContainersNotInitialized: "containers with incomplete status: [init-logs istio-init]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" Waiting for pod gitlab-runner-ironbank-dsop/runner-jrexj6yx-project-2259-concurrent-0jj9d6 to be running, status is Pending ContainersNotInitialized: "containers with incomplete status: [istio-init]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" Waiting for pod gitlab-runner-ironbank-dsop/runner-jrexj6yx-project-2259-concurrent-0jj9d6 to be running, status is Pending ContainersNotReady: "containers with unready status: [build helper istio-proxy]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" Running on runner-jrexj6yx-project-2259-concurrent-0jj9d6 via dsop-shared-gitlab-runner-5fcd8977b8-m6qmr... section_end:1630978448:prepare_script section_start:1630978448:get_sources Getting source from Git repository $ until [ $(curl --fail --silent --output /dev/stderr --write-out "%{http_code}" localhost:15020/healthz/ready) -eq 200 ]; do echo Waiting for Sidecar; sleep 3 ; done ; echo Sidecar available; Sidecar available Fetching changes with git depth set to 50... Initialized empty Git repository in /builds/JrExJ6yx/0/dsop/elastic/beats/elastic-agent/.git/ Created fresh repository. Checking out f10eaf2e as master... Skipping Git submodules setup section_end:1630978450:get_sources section_start:1630978450:download_artifacts Downloading artifacts Downloading artifacts for hardening-manifest (6283538)... Downloading artifacts from coordinator... ok  id=6283538 responseStatus=200 OK token=xaR_kxaA WARNING: ci-artifacts/preflight/: lchown ci-artifacts/preflight/: operation not permitted (suppressing repeats) Downloading artifacts for import-artifacts (6283540)... Downloading artifacts from coordinator... ok  id=6283540 responseStatus=200 OK token=cdgxsz6V WARNING: ci-artifacts/import-artifacts/: lchown ci-artifacts/import-artifacts/: operation not permitted (suppressing repeats) Downloading artifacts for load-scripts (6283535)... Downloading artifacts from coordinator... ok  id=6283535 responseStatus=200 OK token=nDpczdPc WARNING: ci-artifacts/[MASKED]/: lchown ci-artifacts/[MASKED]/: operation not permitted (suppressing repeats) Downloading artifacts for wl-compare-lint (6283539)... Downloading artifacts from coordinator... ok  id=6283539 responseStatus=200 OK token=tq7SsPsa WARNING: ci-artifacts/lint/: lchown ci-artifacts/lint/: operation not permitted (suppressing repeats) section_end:1630978458:download_artifacts section_start:1630978458:step_script Executing "step_script" stage of the job script $ "${PIPELINE_REPO_DIR}/stages/build/build-run.sh" Determine source registry based on branch Load any images used in Dockerfile build Load HTTP and S3 external resources 'ci-artifacts/import-artifacts/external-resources/elastic-agent-7.14.1-linux-x86_64.tar.gz' -> './elastic-agent-7.14.1-linux-x86_64.tar.gz' 'ci-artifacts/import-artifacts/external-resources/jq' -> './jq' 'ci-artifacts/import-artifacts/external-resources/tinit' -> './tinit' Converting labels from hardening manifest into command line args Converting build args from hardening manifest into command line args Build the image STEP 1: FROM registry1.dso.mil/ironbank/redhat/ubi/ubi8:8.4 AS prep_files Trying to pull registry1.dso.mil/ironbank/redhat/ubi/ubi8:8.4... Getting image source signatures Copying blob sha256:db2f50b75fc09a20e8d9c497d96ad384fbeacf7e77df71e4c7b578d4c07fccce Copying blob sha256:9f0e58d20a101ca4f9a522c85daee9264868d5be592441923f009fd244f64046 Copying blob sha256:96476a77b28db43fcb170401c287700d91d95cdff9c06e5ea7b48289d40a8e57 Copying config sha256:0653fdd2960e9903e15065a96f8d76655c20db0d1882ac58ec5e098db5814ae2 Writing manifest to image destination Storing signatures STEP 2: ARG ELASTIC_STACK=7.14.1 STEP 3: ARG ELASTIC_PRODUCT=elastic-agent STEP 4: ARG OS_AND_ARCH=linux-x86_64 STEP 5: RUN mkdir /usr/share/${ELASTIC_PRODUCT} STEP 6: WORKDIR /usr/share/${ELASTIC_PRODUCT} STEP 7: COPY --chown=1000:0 ${ELASTIC_PRODUCT}-${ELASTIC_STACK}-${OS_AND_ARCH}.tar.gz . STEP 8: RUN tar --strip-components=1 -zxf ${ELASTIC_PRODUCT}-${ELASTIC_STACK}-${OS_AND_ARCH}.tar.gz && rm ${ELASTIC_PRODUCT}-${ELASTIC_STACK}-${OS_AND_ARCH}.tar.gz STEP 9: RUN chmod -R g=u /usr/share/${ELASTIC_PRODUCT} STEP 10: RUN mkdir -p /usr/share/${ELASTIC_PRODUCT}/data /usr/share/${ELASTIC_PRODUCT}/logs && chown -R root:root /usr/share/${ELASTIC_PRODUCT} && find /usr/share/${ELASTIC_PRODUCT} -type d -exec chmod 0750 {} \; && find /usr/share/${ELASTIC_PRODUCT} -type f -exec chmod 0640 {} \; && chmod 0750 /usr/share/${ELASTIC_PRODUCT}/${ELASTIC_PRODUCT} && chmod 0770 /usr/share/${ELASTIC_PRODUCT}/data /usr/share/${ELASTIC_PRODUCT}/logs STEP 11: FROM registry1.dso.mil/ironbank/redhat/ubi/ubi8:8.4 STEP 12: ARG ELASTIC_PRODUCT=elastic-agent STEP 13: COPY LICENSE /licenses/elastic-${ELASTIC_PRODUCT} STEP 14: COPY tinit /tinit STEP 15: RUN chmod +x /tinit STEP 16: COPY --from=prep_files --chown=1000:0 /usr/share/${ELASTIC_PRODUCT} /usr/share/${ELASTIC_PRODUCT} STEP 17: WORKDIR /usr/share/${ELASTIC_PRODUCT} STEP 18: RUN ln -s /usr/share/${ELASTIC_PRODUCT} /opt/${ELASTIC_PRODUCT} STEP 19: ENV ELASTIC_CONTAINER="true" STEP 20: RUN ln -s /usr/share/${ELASTIC_PRODUCT}/${ELASTIC_PRODUCT} /usr/bin/${ELASTIC_PRODUCT} STEP 21: RUN chmod -R g+w /usr/share/${ELASTIC_PRODUCT} STEP 22: RUN chown root:root /usr/share/${ELASTIC_PRODUCT}/${ELASTIC_PRODUCT}.yml && chmod go-w /usr/share/${ELASTIC_PRODUCT}/${ELASTIC_PRODUCT}.yml STEP 23: RUN find / -xdev -perm -4000 -exec chmod u-s {} + STEP 24: RUN groupadd --gid 1000 ${ELASTIC_PRODUCT} && useradd --uid 1000 --gid 1000 --groups 0 --home-dir /usr/share/${ELASTIC_PRODUCT} --no-create-home ${ELASTIC_PRODUCT} STEP 25: RUN find /usr/share//elastic-agent/data -type d -exec chmod 0770 {} \; && find /usr/share//elastic-agent/data -type f -exec chmod 0660 {} \; && chmod +x /usr/share//elastic-agent/data/elastic-agent-*/elastic-agent STEP 26: COPY jq /usr/local/bin STEP 27: RUN chown root:root /usr/local/bin/jq && chmod 0755 /usr/local/bin/jq STEP 28: COPY scripts/docker-entrypoint /usr/local/bin/docker-entrypoint STEP 29: RUN chmod 755 /usr/local/bin/docker-entrypoint STEP 30: USER ${ELASTIC_PRODUCT} STEP 31: ENV ELASTIC_PRODUCT=${ELASTIC_PRODUCT} STEP 32: ENTRYPOINT ["/tinit", "--", "/usr/local/bin/docker-entrypoint"] STEP 33: CMD [""] STEP 34: HEALTHCHECK --interval=10s --timeout=5s --start-period=1m --retries=5 CMD test -w '/tmp/elastic-agent/elastic-agent.sock' STEP 35: COMMIT registry1.dso.mil/ironbank-staging/elastic/beats/elastic-agent Getting image source signatures Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:b9e1d509321b2230ee35fbfd2a387f278a4dc4038098ec6b3d2e76cd72fac5fb Copying blob sha256:85648ab438d57339d4f21ba0fa2bcc032a35d7f0d90b6013bd133c05c36879e7 Copying config sha256:3acd1e25c08e62ad2108d546c91034f190f666743c3d03a7ccb006aa8fb548b5 Writing manifest to image destination Storing signatures --> 3acd1e25c08 Successfully tagged registry1.dso.mil/ironbank-staging/elastic/beats/elastic-agent:latest 3acd1e25c08e62ad2108d546c91034f190f666743c3d03a7ccb006aa8fb548b5 + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/elastic/beats/elastic-agent registry1.dso.mil/ironbank-staging/elastic/beats/elastic-agent:ibci-463779 + buildah push --storage-driver=vfs --authfile staging_auth.json --digestfile=ci-artifacts/build/digest registry1.dso.mil/ironbank-staging/elastic/beats/elastic-agent:ibci-463779 Getting image source signatures Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:b9e1d509321b2230ee35fbfd2a387f278a4dc4038098ec6b3d2e76cd72fac5fb Copying blob sha256:85648ab438d57339d4f21ba0fa2bcc032a35d7f0d90b6013bd133c05c36879e7 Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying config sha256:3acd1e25c08e62ad2108d546c91034f190f666743c3d03a7ccb006aa8fb548b5 Writing manifest to image destination Storing signatures + echo 'Read the tags' Read the tags + tags_file=ci-artifacts/preflight/tags.txt + test -f ci-artifacts/preflight/tags.txt + IFS= + read -r tag + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/elastic/beats/elastic-agent registry1.dso.mil/ironbank-staging/elastic/beats/elastic-agent:7.14.1 + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/elastic/beats/elastic-agent:7.14.1 Getting image source signatures Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying blob sha256:b9e1d509321b2230ee35fbfd2a387f278a4dc4038098ec6b3d2e76cd72fac5fb Copying blob sha256:85648ab438d57339d4f21ba0fa2bcc032a35d7f0d90b6013bd133c05c36879e7 Copying config sha256:3acd1e25c08e62ad2108d546c91034f190f666743c3d03a7ccb006aa8fb548b5 Writing manifest to image destination Storing signatures + IFS= + read -r tag + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/elastic/beats/elastic-agent registry1.dso.mil/ironbank-staging/elastic/beats/elastic-agent:latest + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/elastic/beats/elastic-agent:latest Getting image source signatures Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying blob sha256:b9e1d509321b2230ee35fbfd2a387f278a4dc4038098ec6b3d2e76cd72fac5fb Copying blob sha256:85648ab438d57339d4f21ba0fa2bcc032a35d7f0d90b6013bd133c05c36879e7 Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying config sha256:3acd1e25c08e62ad2108d546c91034f190f666743c3d03a7ccb006aa8fb548b5 Writing manifest to image destination Storing signatures + IFS= + read -r tag ++ podman inspect --storage-driver=vfs registry1.dso.mil/ironbank-staging/elastic/beats/elastic-agent --format '{{.Id}}' + IMAGE_ID=sha256:3acd1e25c08e62ad2108d546c91034f190f666743c3d03a7ccb006aa8fb548b5 + echo IMAGE_ID=sha256:3acd1e25c08e62ad2108d546c91034f190f666743c3d03a7ccb006aa8fb548b5 + IMAGE_PODMAN_SHA=sha256:af3d92d1e1e16de5604d7f86505f158faa6f0fef500ae80d420f363120a99b03 + echo IMAGE_PODMAN_SHA=sha256:af3d92d1e1e16de5604d7f86505f158faa6f0fef500ae80d420f363120a99b03 + echo IMAGE_FULLTAG=registry1.dso.mil/ironbank-staging/elastic/beats/elastic-agent:ibci-463779 + echo IMAGE_NAME=elastic/beats/elastic-agent + branches=("master" "development") + [[ master development =~ master ]] + msg='A tarball of the built image can be retrieved from the documentation job artifacts.' + echo 'A tarball of the built image can be retrieved from the documentation job artifacts.' A tarball of the built image can be retrieved from the documentation job artifacts. section_end:1630978726:step_script section_start:1630978726:upload_artifacts_on_success Uploading artifacts for successful job Uploading artifacts... ci-artifacts/build/: found 2 matching files and directories Uploading artifacts as "archive" to coordinator... ok id=6283542 responseStatus=201 Created token=59n46J9R Uploading artifacts... build.env: found 1 matching files and directories  Uploading artifacts as "dotenv" to coordinator... ok id=6283542 responseStatus=201 Created token=59n46J9R section_end:1630978730:upload_artifacts_on_success section_start:1630978730:cleanup_file_variables Cleaning up file based variables section_end:1630978731:cleanup_file_variables Job succeeded