Running with gitlab-runner 13.12.0 (7a6612da)  on dsop-shared-gitlab-runner-5fcd8977b8-m6qmr JrExJ6yx  feature flags: FF_USE_LEGACY_KUBERNETES_EXECUTION_STRATEGY:false section_start:1631018061:resolve_secrets Resolving secrets section_end:1631018061:resolve_secrets section_start:1631018061:prepare_executor Preparing the "kubernetes" executor Using Kubernetes namespace: gitlab-runner-ironbank-dsop Using Kubernetes executor with image registry1.dso.mil/ironbank/ironbank-pipelines/rootless-podman:0.2 ... Using attach strategy to execute scripts... section_end:1631018061:prepare_executor section_start:1631018061:prepare_script Preparing environment Waiting for pod gitlab-runner-ironbank-dsop/runner-jrexj6yx-project-2227-concurrent-08w8qw to be running, status is Pending Waiting for pod gitlab-runner-ironbank-dsop/runner-jrexj6yx-project-2227-concurrent-08w8qw to be running, status is Pending ContainersNotInitialized: "containers with incomplete status: [init-logs istio-init]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" Waiting for pod gitlab-runner-ironbank-dsop/runner-jrexj6yx-project-2227-concurrent-08w8qw to be running, status is Pending ContainersNotReady: "containers with unready status: [build helper istio-proxy]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" Waiting for pod gitlab-runner-ironbank-dsop/runner-jrexj6yx-project-2227-concurrent-08w8qw to be running, status is Pending ContainersNotReady: "containers with unready status: [build helper istio-proxy]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" Running on runner-jrexj6yx-project-2227-concurrent-08w8qw via dsop-shared-gitlab-runner-5fcd8977b8-m6qmr... section_end:1631018074:prepare_script section_start:1631018074:get_sources Getting source from Git repository $ until [ $(curl --fail --silent --output /dev/stderr --write-out "%{http_code}" localhost:15020/healthz/ready) -eq 200 ]; do echo Waiting for Sidecar; sleep 3 ; done ; echo Sidecar available; Sidecar available Fetching changes with git depth set to 50... Initialized empty Git repository in /builds/JrExJ6yx/0/dsop/galvanize/galvanize/python-code-evaluator/.git/ Created fresh repository. Checking out 59e5d5d7 as master... Skipping Git submodules setup section_end:1631018075:get_sources section_start:1631018075:download_artifacts Downloading artifacts Downloading artifacts for hardening-manifest (6297767)... Downloading artifacts from coordinator... ok  id=6297767 responseStatus=200 OK token=m8cACJwe WARNING: ci-artifacts/preflight/: lchown ci-artifacts/preflight/: operation not permitted (suppressing repeats) Downloading artifacts for import-artifacts (6297769)... Downloading artifacts from coordinator... ok  id=6297769 responseStatus=200 OK token=TQjCSn11 WARNING: ci-artifacts/import-artifacts/: lchown ci-artifacts/import-artifacts/: operation not permitted (suppressing repeats) Downloading artifacts for load-scripts (6297764)... Downloading artifacts from coordinator... ok  id=6297764 responseStatus=200 OK token=JigpKPXQ WARNING: ci-artifacts/[MASKED]/: lchown ci-artifacts/[MASKED]/: operation not permitted (suppressing repeats) Downloading artifacts for wl-compare-lint (6297768)... Downloading artifacts from coordinator... ok  id=6297768 responseStatus=200 OK token=xYxfu7Ep WARNING: ci-artifacts/lint/: lchown ci-artifacts/lint/: operation not permitted (suppressing repeats) section_end:1631018076:download_artifacts section_start:1631018076:step_script Executing "step_script" stage of the job script $ "${PIPELINE_REPO_DIR}/stages/build/build-run.sh" Determine source registry based on branch Load any images used in Dockerfile build Load HTTP and S3 external resources 'ci-artifacts/import-artifacts/external-resources/redis-cli.tar.gz' -> './redis-cli.tar.gz' Converting labels from hardening manifest into command line args Converting build args from hardening manifest into command line args Build the image STEP 1: FROM registry1.dso.mil/ironbank/opensource/python/python39:v3.9.7 Trying to pull registry1.dso.mil/ironbank/opensource/python/python39:v3.9.7... Getting image source signatures Copying blob sha256:db2f50b75fc09a20e8d9c497d96ad384fbeacf7e77df71e4c7b578d4c07fccce Copying blob sha256:361ab352f363f6ec6a580e3cfcf5dca838fb183986a9850dba165161b137d3bb Copying blob sha256:96476a77b28db43fcb170401c287700d91d95cdff9c06e5ea7b48289d40a8e57 Copying blob sha256:cc494b4f434bf8732c50b862bdcc3e7936f62d3891266dd9d224a6296eae611c Copying config sha256:d9c33a63f973f3cab1959079990a4ebf9619936205ff94b0fe13b5586a672b42 Writing manifest to image destination Storing signatures STEP 2: USER 0 STEP 3: RUN dnf update -y && dnf clean all && rm -rf /var/cache/dnf Red Hat Universal Base Image 8 (RPMs) - BaseOS 79 kB/s | 790 kB 00:10 Red Hat Universal Base Image 8 (RPMs) - AppStre 244 kB/s | 2.4 MB 00:10 Red Hat Universal Base Image 8 (RPMs) - CodeRea 1.6 kB/s | 14 kB 00:08 Dependencies resolved. Nothing to do. Complete! 25 files removed STEP 4: WORKDIR /app STEP 5: COPY ./scripts . STEP 6: COPY redis-cli.tar.gz . STEP 7: RUN tar xzf redis-cli.tar.gz && rm redis-cli.tar.gz && mv redis-cli /usr/local/bin/redis-cli STEP 8: RUN chown -R 1001 /app && chown -R 1001 /usr/src && chmod 0555 /app/get-job.sh STEP 9: USER 1001 STEP 10: HEALTHCHECK none STEP 11: ENTRYPOINT ["/app/get-job.sh"] STEP 12: COMMIT registry1.dso.mil/ironbank-staging/galvanize/galvanize/python-code-evaluator Getting image source signatures Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:a7289086c95c733fa09dcfd84e354b7c88469dc5dc470dc53a2dfa9e83cae53b Copying blob sha256:4086971d7176fed130bd268de84d86d8ab4e511a5b4c81e457bdf4f3eb9ce131 Copying blob sha256:c26ecd0098a94f93c31fc02b99db81ae0dcda37b2ed52f841a6bec89db9e4c74 Copying config sha256:a114e713c099aaa5661686441a7ad90ff2d7710d46d820b179e94d144aff801c Writing manifest to image destination Storing signatures --> a114e713c09 Successfully tagged registry1.dso.mil/ironbank-staging/galvanize/galvanize/python-code-evaluator:latest a114e713c099aaa5661686441a7ad90ff2d7710d46d820b179e94d144aff801c + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/galvanize/galvanize/python-code-evaluator registry1.dso.mil/ironbank-staging/galvanize/galvanize/python-code-evaluator:ibci-464601 + buildah push --storage-driver=vfs --authfile staging_auth.json --digestfile=ci-artifacts/build/digest registry1.dso.mil/ironbank-staging/galvanize/galvanize/python-code-evaluator:ibci-464601 Getting image source signatures Copying blob sha256:c26ecd0098a94f93c31fc02b99db81ae0dcda37b2ed52f841a6bec89db9e4c74 Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:a7289086c95c733fa09dcfd84e354b7c88469dc5dc470dc53a2dfa9e83cae53b Copying blob sha256:4086971d7176fed130bd268de84d86d8ab4e511a5b4c81e457bdf4f3eb9ce131 Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying config sha256:a114e713c099aaa5661686441a7ad90ff2d7710d46d820b179e94d144aff801c Writing manifest to image destination Storing signatures + echo 'Read the tags' Read the tags + tags_file=ci-artifacts/preflight/tags.txt + test -f ci-artifacts/preflight/tags.txt + IFS= + read -r tag + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/galvanize/galvanize/python-code-evaluator registry1.dso.mil/ironbank-staging/galvanize/galvanize/python-code-evaluator:0.1.4 + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/galvanize/galvanize/python-code-evaluator:0.1.4 Getting image source signatures Copying blob sha256:c26ecd0098a94f93c31fc02b99db81ae0dcda37b2ed52f841a6bec89db9e4c74 Copying blob sha256:4086971d7176fed130bd268de84d86d8ab4e511a5b4c81e457bdf4f3eb9ce131 Copying blob sha256:a7289086c95c733fa09dcfd84e354b7c88469dc5dc470dc53a2dfa9e83cae53b Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying config sha256:a114e713c099aaa5661686441a7ad90ff2d7710d46d820b179e94d144aff801c Writing manifest to image destination Storing signatures + IFS= + read -r tag + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/galvanize/galvanize/python-code-evaluator registry1.dso.mil/ironbank-staging/galvanize/galvanize/python-code-evaluator:latest + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/galvanize/galvanize/python-code-evaluator:latest Getting image source signatures Copying blob sha256:c26ecd0098a94f93c31fc02b99db81ae0dcda37b2ed52f841a6bec89db9e4c74 Copying blob sha256:4086971d7176fed130bd268de84d86d8ab4e511a5b4c81e457bdf4f3eb9ce131 Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:a7289086c95c733fa09dcfd84e354b7c88469dc5dc470dc53a2dfa9e83cae53b Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying config sha256:a114e713c099aaa5661686441a7ad90ff2d7710d46d820b179e94d144aff801c Writing manifest to image destination Storing signatures + IFS= + read -r tag ++ podman inspect --storage-driver=vfs registry1.dso.mil/ironbank-staging/galvanize/galvanize/python-code-evaluator --format '{{.Id}}' + IMAGE_ID=sha256:a114e713c099aaa5661686441a7ad90ff2d7710d46d820b179e94d144aff801c + echo IMAGE_ID=sha256:a114e713c099aaa5661686441a7ad90ff2d7710d46d820b179e94d144aff801c + IMAGE_PODMAN_SHA=sha256:c3a31169d04ce23907e9fa8e29ceefadb67606f6fd3023dd131304aab79229bd + echo IMAGE_PODMAN_SHA=sha256:c3a31169d04ce23907e9fa8e29ceefadb67606f6fd3023dd131304aab79229bd + echo IMAGE_FULLTAG=registry1.dso.mil/ironbank-staging/galvanize/galvanize/python-code-evaluator:ibci-464601 + echo IMAGE_NAME=galvanize/galvanize/python-code-evaluator + branches=("master" "development") + [[ master development =~ master ]] + msg='A tarball of the built image can be retrieved from the documentation job artifacts.' + echo 'A tarball of the built image can be retrieved from the documentation job artifacts.' A tarball of the built image can be retrieved from the documentation job artifacts. section_end:1631018455:step_script section_start:1631018455:upload_artifacts_on_success Uploading artifacts for successful job Uploading artifacts... ci-artifacts/build/: found 2 matching files and directories Uploading artifacts as "archive" to coordinator... ok id=6297771 responseStatus=201 Created token=BEu72qc8 Uploading artifacts... build.env: found 1 matching files and directories  Uploading artifacts as "dotenv" to coordinator... ok id=6297771 responseStatus=201 Created token=BEu72qc8 section_end:1631018457:upload_artifacts_on_success section_start:1631018457:cleanup_file_variables Cleaning up file based variables section_end:1631018458:cleanup_file_variables Job succeeded