Running with gitlab-runner 13.12.0 (7a6612da)  on dsop-shared-gitlab-runner-5fcd8977b8-m6qmr JrExJ6yx  feature flags: FF_USE_LEGACY_KUBERNETES_EXECUTION_STRATEGY:false section_start:1630989147:resolve_secrets Resolving secrets section_end:1630989147:resolve_secrets section_start:1630989147:prepare_executor Preparing the "kubernetes" executor Using Kubernetes namespace: gitlab-runner-ironbank-dsop Using Kubernetes executor with image registry1.dso.mil/ironbank/ironbank-pipelines/rootless-podman:0.2 ... Using attach strategy to execute scripts... section_end:1630989147:prepare_executor section_start:1630989147:prepare_script Preparing environment Waiting for pod gitlab-runner-ironbank-dsop/runner-jrexj6yx-project-432-concurrent-05g8gs to be running, status is Pending Waiting for pod gitlab-runner-ironbank-dsop/runner-jrexj6yx-project-432-concurrent-05g8gs to be running, status is Pending ContainersNotInitialized: "containers with incomplete status: [init-logs istio-init]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" Waiting for pod gitlab-runner-ironbank-dsop/runner-jrexj6yx-project-432-concurrent-05g8gs to be running, status is Pending ContainersNotReady: "containers with unready status: [build helper istio-proxy]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" Waiting for pod gitlab-runner-ironbank-dsop/runner-jrexj6yx-project-432-concurrent-05g8gs to be running, status is Pending ContainersNotReady: "containers with unready status: [build helper istio-proxy]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" Running on runner-jrexj6yx-project-432-concurrent-05g8gs via dsop-shared-gitlab-runner-5fcd8977b8-m6qmr... section_end:1630989160:prepare_script section_start:1630989160:get_sources Getting source from Git repository $ until [ $(curl --fail --silent --output /dev/stderr --write-out "%{http_code}" localhost:15020/healthz/ready) -eq 200 ]; do echo Waiting for Sidecar; sleep 3 ; done ; echo Sidecar available; Sidecar available Fetching changes with git depth set to 50... Initialized empty Git repository in /builds/JrExJ6yx/0/dsop/elastic/beats/heartbeat/.git/ Created fresh repository. Checking out 041e7c1b as master... Skipping Git submodules setup section_end:1630989161:get_sources section_start:1630989161:download_artifacts Downloading artifacts Downloading artifacts for hardening-manifest (6289580)... Downloading artifacts from coordinator... ok  id=6289580 responseStatus=200 OK token=gSnSqQkT WARNING: ci-artifacts/preflight/: lchown ci-artifacts/preflight/: operation not permitted (suppressing repeats) Downloading artifacts for import-artifacts (6289582)... Downloading artifacts from coordinator... ok  id=6289582 responseStatus=200 OK token=AxSsrxYP WARNING: ci-artifacts/import-artifacts/: lchown ci-artifacts/import-artifacts/: operation not permitted (suppressing repeats) Downloading artifacts for load-scripts (6289577)... Downloading artifacts from coordinator... ok  id=6289577 responseStatus=200 OK token=8pHerK6J WARNING: ci-artifacts/[MASKED]/: lchown ci-artifacts/[MASKED]/: operation not permitted (suppressing repeats) Downloading artifacts for wl-compare-lint (6289581)... Downloading artifacts from coordinator... ok  id=6289581 responseStatus=200 OK token=X98ykSwk WARNING: ci-artifacts/lint/: lchown ci-artifacts/lint/: operation not permitted (suppressing repeats) section_end:1630989163:download_artifacts section_start:1630989163:step_script Executing "step_script" stage of the job script $ "${PIPELINE_REPO_DIR}/stages/build/build-run.sh" Determine source registry based on branch Load any images used in Dockerfile build Load HTTP and S3 external resources 'ci-artifacts/import-artifacts/external-resources/heartbeat-7.12.0-linux-x86_64.tar.gz' -> './heartbeat-7.12.0-linux-x86_64.tar.gz' 'ci-artifacts/import-artifacts/external-resources/tinit' -> './tinit' Converting labels from hardening manifest into command line args Converting build args from hardening manifest into command line args Build the image STEP 1: FROM registry1.dso.mil/ironbank/redhat/ubi/ubi8:8.3 AS prep_files Trying to pull registry1.dso.mil/ironbank/redhat/ubi/ubi8:8.3... Getting image source signatures Copying blob sha256:6160f960fc37576eaa593da1487dfa280f157c9587a323f07f2fc59dfbbec822 Copying blob sha256:b32e97c39cd25ed9879db8b2f351607392dab0dcd85295b1eb61ddd277182d12 Copying blob sha256:a8beba9d0c64ba290cc6e3b0693bc508b4d5cc7ae70af495c5bbd8d2bfb7b11a Copying config sha256:05696c63de1bb587659102b32731594a9aeb97305bcaf8682eb3bfb61f02e594 Writing manifest to image destination Storing signatures STEP 2: ARG ELASTIC_STACK=7.12.0 STEP 3: ARG ELASTIC_PRODUCT=heartbeat STEP 4: ARG OS_AND_ARCH=linux-x86_64 STEP 5: RUN mkdir /usr/share/${ELASTIC_PRODUCT} STEP 6: WORKDIR /usr/share/${ELASTIC_PRODUCT} STEP 7: COPY --chown=1000:0 ${ELASTIC_PRODUCT}-${ELASTIC_STACK}-${OS_AND_ARCH}.tar.gz . STEP 8: RUN tar --strip-components=1 -zxf ${ELASTIC_PRODUCT}-${ELASTIC_STACK}-${OS_AND_ARCH}.tar.gz && rm ${ELASTIC_PRODUCT}-${ELASTIC_STACK}-${OS_AND_ARCH}.tar.gz STEP 9: RUN chmod -R g=u /usr/share/${ELASTIC_PRODUCT} STEP 10: RUN mkdir /usr/share/${ELASTIC_PRODUCT}/data /usr/share/${ELASTIC_PRODUCT}/logs && chown -R root:root /usr/share/${ELASTIC_PRODUCT} && find /usr/share/${ELASTIC_PRODUCT} -type d -exec chmod 0750 {} \; && find /usr/share/${ELASTIC_PRODUCT} -type f -exec chmod 0640 {} \; && chmod 0750 /usr/share/${ELASTIC_PRODUCT}/${ELASTIC_PRODUCT} && chmod 0770 /usr/share/${ELASTIC_PRODUCT}/data /usr/share/${ELASTIC_PRODUCT}/logs STEP 11: FROM registry1.dso.mil/ironbank/redhat/ubi/ubi8:8.3 STEP 12: ARG ELASTIC_PRODUCT=heartbeat STEP 13: COPY LICENSE /licenses/elastic-${ELASTIC_PRODUCT} STEP 14: COPY tinit /tinit STEP 15: RUN chmod +x /tinit STEP 16: COPY --from=prep_files --chown=1000:0 /usr/share/${ELASTIC_PRODUCT} /usr/share/${ELASTIC_PRODUCT} STEP 17: WORKDIR /usr/share/${ELASTIC_PRODUCT} STEP 18: RUN ln -s /usr/share/${ELASTIC_PRODUCT} /opt/${ELASTIC_PRODUCT} STEP 19: ENV ELASTIC_CONTAINER="true" STEP 20: RUN ln -s /usr/share/${ELASTIC_PRODUCT}/${ELASTIC_PRODUCT} /usr/bin/${ELASTIC_PRODUCT} STEP 21: RUN chmod -R g+w /usr/share/${ELASTIC_PRODUCT} STEP 22: RUN chown root:root /usr/share/${ELASTIC_PRODUCT}/${ELASTIC_PRODUCT}.yml && chmod go-w /usr/share/${ELASTIC_PRODUCT}/${ELASTIC_PRODUCT}.yml STEP 23: RUN find / -xdev -perm -4000 -exec chmod u-s {} + STEP 24: RUN groupadd --gid 1000 ${ELASTIC_PRODUCT} && useradd --uid 1000 --gid 1000 --groups 0 --home-dir /usr/share/${ELASTIC_PRODUCT} --no-create-home ${ELASTIC_PRODUCT} STEP 25: USER ${ELASTIC_PRODUCT} STEP 26: ENV ELASTIC_PRODUCT=${ELASTIC_PRODUCT} STEP 27: ENTRYPOINT ["/tinit", "--", "/usr/share/heartbeat/heartbeat", "-E", "http.enabled=true", "-E", "http.host=unix:///usr/share/heartbeat/data/heartbeat.sock"] STEP 28: CMD ["-environment", "container"] STEP 29: HEALTHCHECK --interval=10s --timeout=5s --start-period=1m --retries=5 CMD curl -I -f --max-time 5 --unix-socket '/usr/share/heartbeat/data/heartbeat.sock' 'http:/stats/?pretty' STEP 30: COMMIT registry1.dso.mil/ironbank-staging/elastic/beats/heartbeat Getting image source signatures Copying blob sha256:476579af086aee78cb12d88b08fd6b61a80a3f055cae293ec2d15a37dbe7b3f9 Copying blob sha256:1e8cd6732429ccfaea139348807617a5315fd7ca469850423f77f51661e8fe51 Copying blob sha256:97229eac1869c19fcba265b2384ab058dbd717f81bff2d498adce5edbc549f29 Copying blob sha256:bf6c02715f9cf56a072d21d556ac75acbdc1d161c49617c6dce464ab63722fd2 Copying config sha256:b80f421cd3454c4645194fcf83f658200d859d2a2fce14fdba5b42df01c73bd7 Writing manifest to image destination Storing signatures --> b80f421cd34 Successfully tagged registry1.dso.mil/ironbank-staging/elastic/beats/heartbeat:latest b80f421cd3454c4645194fcf83f658200d859d2a2fce14fdba5b42df01c73bd7 + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/elastic/beats/heartbeat registry1.dso.mil/ironbank-staging/elastic/beats/heartbeat:ibci-464124 + buildah push --storage-driver=vfs --authfile staging_auth.json --digestfile=ci-artifacts/build/digest registry1.dso.mil/ironbank-staging/elastic/beats/heartbeat:ibci-464124 Getting image source signatures Copying blob sha256:1e8cd6732429ccfaea139348807617a5315fd7ca469850423f77f51661e8fe51 Copying blob sha256:bf6c02715f9cf56a072d21d556ac75acbdc1d161c49617c6dce464ab63722fd2 Copying blob sha256:97229eac1869c19fcba265b2384ab058dbd717f81bff2d498adce5edbc549f29 Copying blob sha256:476579af086aee78cb12d88b08fd6b61a80a3f055cae293ec2d15a37dbe7b3f9 Copying config sha256:b80f421cd3454c4645194fcf83f658200d859d2a2fce14fdba5b42df01c73bd7 Writing manifest to image destination Storing signatures + echo 'Read the tags' Read the tags + tags_file=ci-artifacts/preflight/tags.txt + test -f ci-artifacts/preflight/tags.txt + IFS= + read -r tag + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/elastic/beats/heartbeat registry1.dso.mil/ironbank-staging/elastic/beats/heartbeat:7.12.0 + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/elastic/beats/heartbeat:7.12.0 Getting image source signatures Copying blob sha256:476579af086aee78cb12d88b08fd6b61a80a3f055cae293ec2d15a37dbe7b3f9 Copying blob sha256:1e8cd6732429ccfaea139348807617a5315fd7ca469850423f77f51661e8fe51 Copying blob sha256:97229eac1869c19fcba265b2384ab058dbd717f81bff2d498adce5edbc549f29 Copying blob sha256:bf6c02715f9cf56a072d21d556ac75acbdc1d161c49617c6dce464ab63722fd2 Copying config sha256:b80f421cd3454c4645194fcf83f658200d859d2a2fce14fdba5b42df01c73bd7 Writing manifest to image destination Storing signatures + IFS= + read -r tag + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/elastic/beats/heartbeat registry1.dso.mil/ironbank-staging/elastic/beats/heartbeat:latest + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/elastic/beats/heartbeat:latest Getting image source signatures Copying blob sha256:bf6c02715f9cf56a072d21d556ac75acbdc1d161c49617c6dce464ab63722fd2 Copying blob sha256:1e8cd6732429ccfaea139348807617a5315fd7ca469850423f77f51661e8fe51 Copying blob sha256:476579af086aee78cb12d88b08fd6b61a80a3f055cae293ec2d15a37dbe7b3f9 Copying blob sha256:97229eac1869c19fcba265b2384ab058dbd717f81bff2d498adce5edbc549f29 Copying config sha256:b80f421cd3454c4645194fcf83f658200d859d2a2fce14fdba5b42df01c73bd7 Writing manifest to image destination Storing signatures + IFS= + read -r tag ++ podman inspect --storage-driver=vfs registry1.dso.mil/ironbank-staging/elastic/beats/heartbeat --format '{{.Id}}' + IMAGE_ID=sha256:b80f421cd3454c4645194fcf83f658200d859d2a2fce14fdba5b42df01c73bd7 + echo IMAGE_ID=sha256:b80f421cd3454c4645194fcf83f658200d859d2a2fce14fdba5b42df01c73bd7 + IMAGE_PODMAN_SHA=sha256:87c6c93d3bb9187bcaee0880177daf69fabfb37f3e26966347df4bacf914731c + echo IMAGE_PODMAN_SHA=sha256:87c6c93d3bb9187bcaee0880177daf69fabfb37f3e26966347df4bacf914731c + echo IMAGE_FULLTAG=registry1.dso.mil/ironbank-staging/elastic/beats/heartbeat:ibci-464124 + echo IMAGE_NAME=elastic/beats/heartbeat + branches=("master" "development") + [[ master development =~ master ]] + msg='A tarball of the built image can be retrieved from the documentation job artifacts.' + echo 'A tarball of the built image can be retrieved from the documentation job artifacts.' A tarball of the built image can be retrieved from the documentation job artifacts. section_end:1630989296:step_script section_start:1630989296:upload_artifacts_on_success Uploading artifacts for successful job Uploading artifacts... ci-artifacts/build/: found 2 matching files and directories Uploading artifacts as "archive" to coordinator... ok id=6289584 responseStatus=201 Created token=-KmzJqfP Uploading artifacts... build.env: found 1 matching files and directories  Uploading artifacts as "dotenv" to coordinator... ok id=6289584 responseStatus=201 Created token=-KmzJqfP section_end:1630989299:upload_artifacts_on_success section_start:1630989299:cleanup_file_variables Cleaning up file based variables section_end:1630989299:cleanup_file_variables Job succeeded