Running with gitlab-runner 13.12.0 (7a6612da)  on dsop-shared-gitlab-runner-5fcd8977b8-m6qmr JrExJ6yx  feature flags: FF_USE_LEGACY_KUBERNETES_EXECUTION_STRATEGY:false section_start:1630754893:resolve_secrets Resolving secrets section_end:1630754893:resolve_secrets section_start:1630754893:prepare_executor Preparing the "kubernetes" executor Using Kubernetes namespace: gitlab-runner-ironbank-dsop Using Kubernetes executor with image registry1.dso.mil/ironbank/ironbank-pipelines/rootless-podman:0.2 ... Using attach strategy to execute scripts... section_end:1630754893:prepare_executor section_start:1630754893:prepare_script Preparing environment Waiting for pod gitlab-runner-ironbank-dsop/runner-jrexj6yx-project-3667-concurrent-064t4g to be running, status is Pending Waiting for pod gitlab-runner-ironbank-dsop/runner-jrexj6yx-project-3667-concurrent-064t4g to be running, status is Pending ContainersNotInitialized: "containers with incomplete status: [istio-init]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" Running on runner-jrexj6yx-project-3667-concurrent-064t4g via dsop-shared-gitlab-runner-5fcd8977b8-m6qmr... section_end:1630754899:prepare_script section_start:1630754899:get_sources Getting source from Git repository $ until [ $(curl --fail --silent --output /dev/stderr --write-out "%{http_code}" localhost:15020/healthz/ready) -eq 200 ]; do echo Waiting for Sidecar; sleep 3 ; done ; echo Sidecar available; Sidecar available Fetching changes with git depth set to 50... Initialized empty Git repository in /builds/JrExJ6yx/0/dsop/ivx/yet-another-cloudwatch-exporter/.git/ Created fresh repository. Checking out f08b42cc as master... Skipping Git submodules setup section_end:1630754900:get_sources section_start:1630754900:download_artifacts Downloading artifacts Downloading artifacts for hardening-manifest (6240218)... Downloading artifacts from coordinator... ok  id=6240218 responseStatus=200 OK token=6zAQzsjT WARNING: ci-artifacts/preflight/: lchown ci-artifacts/preflight/: operation not permitted (suppressing repeats) Downloading artifacts for import-artifacts (6240220)... Downloading artifacts from coordinator... ok  id=6240220 responseStatus=200 OK token=DDeM3hm- WARNING: ci-artifacts/import-artifacts/: lchown ci-artifacts/import-artifacts/: operation not permitted (suppressing repeats) Downloading artifacts for load-scripts (6240215)... Downloading artifacts from coordinator... ok  id=6240215 responseStatus=200 OK token=Tnsjo_QR WARNING: ci-artifacts/[MASKED]/: lchown ci-artifacts/[MASKED]/: operation not permitted (suppressing repeats) Downloading artifacts for wl-compare-lint (6240219)... Downloading artifacts from coordinator... ok  id=6240219 responseStatus=200 OK token=q36DpnFD WARNING: ci-artifacts/lint/: lchown ci-artifacts/lint/: operation not permitted (suppressing repeats) section_end:1630754901:download_artifacts section_start:1630754901:step_script Executing "step_script" stage of the job script $ "${PIPELINE_REPO_DIR}/stages/build/build-run.sh" Determine source registry based on branch Load any images used in Dockerfile build Load HTTP and S3 external resources 'ci-artifacts/import-artifacts/external-resources/yet-another-cloudwatch-exporter.tar.gz' -> './yet-another-cloudwatch-exporter.tar.gz' Converting labels from hardening manifest into command line args Converting build args from hardening manifest into command line args Build the image STEP 1: FROM registry1.dso.mil/ironbank/redhat/ubi/ubi8:8.4 Trying to pull registry1.dso.mil/ironbank/redhat/ubi/ubi8:8.4... Getting image source signatures Copying blob sha256:db2f50b75fc09a20e8d9c497d96ad384fbeacf7e77df71e4c7b578d4c07fccce Copying blob sha256:96476a77b28db43fcb170401c287700d91d95cdff9c06e5ea7b48289d40a8e57 Copying blob sha256:9f0e58d20a101ca4f9a522c85daee9264868d5be592441923f009fd244f64046 Copying config sha256:0653fdd2960e9903e15065a96f8d76655c20db0d1882ac58ec5e098db5814ae2 Writing manifest to image destination Storing signatures STEP 2: WORKDIR /opt/ STEP 3: COPY yet-another-cloudwatch-exporter.tar.gz ./ STEP 4: RUN tar -xzf yet-another-cloudwatch-exporter.tar.gz -C /usr/local/bin STEP 5: EXPOSE 5000 STEP 6: ENTRYPOINT ["yace"] STEP 7: CMD ["--config.file=/tmp/config.yml"] STEP 8: RUN groupadd -g 1000 exporter && useradd -u 1000 -G exporter exporter -h /exporter Usage: useradd [options] LOGIN useradd -D useradd -D [options] Options: -b, --base-dir BASE_DIR base directory for the home directory of the new account -c, --comment COMMENT GECOS field of the new account -d, --home-dir HOME_DIR home directory of the new account -D, --defaults print or change default useradd configuration -e, --expiredate EXPIRE_DATE expiration date of the new account -f, --inactive INACTIVE password inactivity period of the new account -g, --gid GROUP name or ID of the primary group of the new account -G, --groups GROUPS list of supplementary groups of the new account -h, --help display this help message and exit -k, --skel SKEL_DIR use this alternative skeleton directory -K, --key KEY=VALUE override /etc/login.defs defaults -l, --no-log-init do not add the user to the lastlog and faillog databases -m, --create-home create the user's home directory -M, --no-create-home do not create the user's home directory -N, --no-user-group do not create a group with the same name as the user -o, --non-unique allow to create users with duplicate (non-unique) UID -p, --password PASSWORD encrypted password of the new account -r, --system create a system account -R, --root CHROOT_DIR directory to chroot into -P, --prefix PREFIX_DIR prefix directory where are located the /etc/* files -s, --shell SHELL login shell of the new account -u, --uid UID user ID of the new account -U, --user-group create a group with the same name as the user -Z, --selinux-user SEUSER use a specific SEUSER for the SELinux user mapping STEP 9: WORKDIR /exporter/ STEP 10: USER exporter STEP 11: HEALTHCHECK NONE STEP 12: COMMIT registry1.dso.mil/ironbank-staging/ivx/yet-another-cloudwatch-exporter Getting image source signatures Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:b9e1d509321b2230ee35fbfd2a387f278a4dc4038098ec6b3d2e76cd72fac5fb Copying blob sha256:3cefb100d793230dac2e79349f889464d28da444523897930b0ea5f27aeff761 Copying config sha256:89e6372c31288fee7957a7edde0843fdfaa79b98cfee9e219e3677e5b0095201 Writing manifest to image destination Storing signatures --> 89e6372c312 Successfully tagged registry1.dso.mil/ironbank-staging/ivx/yet-another-cloudwatch-exporter:latest 89e6372c31288fee7957a7edde0843fdfaa79b98cfee9e219e3677e5b0095201 + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/ivx/yet-another-cloudwatch-exporter registry1.dso.mil/ironbank-staging/ivx/yet-another-cloudwatch-exporter:ibci-461149 + buildah push --storage-driver=vfs --authfile staging_auth.json --digestfile=ci-artifacts/build/digest registry1.dso.mil/ironbank-staging/ivx/yet-another-cloudwatch-exporter:ibci-461149 Getting image source signatures Copying blob sha256:3cefb100d793230dac2e79349f889464d28da444523897930b0ea5f27aeff761 Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:b9e1d509321b2230ee35fbfd2a387f278a4dc4038098ec6b3d2e76cd72fac5fb Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying config sha256:89e6372c31288fee7957a7edde0843fdfaa79b98cfee9e219e3677e5b0095201 Writing manifest to image destination Storing signatures + echo 'Read the tags' Read the tags + tags_file=ci-artifacts/preflight/tags.txt + test -f ci-artifacts/preflight/tags.txt + IFS= + read -r tag + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/ivx/yet-another-cloudwatch-exporter registry1.dso.mil/ironbank-staging/ivx/yet-another-cloudwatch-exporter:v0.28.0-alpha + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/ivx/yet-another-cloudwatch-exporter:v0.28.0-alpha Getting image source signatures Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying blob sha256:3cefb100d793230dac2e79349f889464d28da444523897930b0ea5f27aeff761 Copying blob sha256:b9e1d509321b2230ee35fbfd2a387f278a4dc4038098ec6b3d2e76cd72fac5fb Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying config sha256:89e6372c31288fee7957a7edde0843fdfaa79b98cfee9e219e3677e5b0095201 Writing manifest to image destination Storing signatures + IFS= + read -r tag + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/ivx/yet-another-cloudwatch-exporter registry1.dso.mil/ironbank-staging/ivx/yet-another-cloudwatch-exporter:latest + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/ivx/yet-another-cloudwatch-exporter:latest Getting image source signatures Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying blob sha256:3cefb100d793230dac2e79349f889464d28da444523897930b0ea5f27aeff761 Copying blob sha256:b9e1d509321b2230ee35fbfd2a387f278a4dc4038098ec6b3d2e76cd72fac5fb Copying config sha256:89e6372c31288fee7957a7edde0843fdfaa79b98cfee9e219e3677e5b0095201 Writing manifest to image destination Storing signatures + IFS= + read -r tag ++ podman inspect --storage-driver=vfs registry1.dso.mil/ironbank-staging/ivx/yet-another-cloudwatch-exporter --format '{{.Id}}' + IMAGE_ID=sha256:89e6372c31288fee7957a7edde0843fdfaa79b98cfee9e219e3677e5b0095201 + echo IMAGE_ID=sha256:89e6372c31288fee7957a7edde0843fdfaa79b98cfee9e219e3677e5b0095201 + IMAGE_PODMAN_SHA=sha256:53bc3add0dcdf95f8a81bebec67474ebc1c7a514a3210518845af83738f66639 + echo IMAGE_PODMAN_SHA=sha256:53bc3add0dcdf95f8a81bebec67474ebc1c7a514a3210518845af83738f66639 + echo IMAGE_FULLTAG=registry1.dso.mil/ironbank-staging/ivx/yet-another-cloudwatch-exporter:ibci-461149 + echo IMAGE_NAME=ivx/yet-another-cloudwatch-exporter + branches=("master" "development") + [[ master development =~ master ]] + msg='A tarball of the built image can be retrieved from the documentation job artifacts.' + echo 'A tarball of the built image can be retrieved from the documentation job artifacts.' A tarball of the built image can be retrieved from the documentation job artifacts. section_end:1630754948:step_script section_start:1630754948:upload_artifacts_on_success Uploading artifacts for successful job Uploading artifacts... ci-artifacts/build/: found 2 matching files and directories Uploading artifacts as "archive" to coordinator... ok id=6240222 responseStatus=201 Created token=Wyb-pqbd Uploading artifacts... build.env: found 1 matching files and directories  Uploading artifacts as "dotenv" to coordinator... ok id=6240222 responseStatus=201 Created token=Wyb-pqbd section_end:1630754949:upload_artifacts_on_success section_start:1630754949:cleanup_file_variables Cleaning up file based variables section_end:1630754950:cleanup_file_variables Job succeeded