Running with gitlab-runner 13.12.0 (7a6612da)  on dsop-shared-gitlab-runner-5fcd8977b8-m6qmr JrExJ6yx  feature flags: FF_USE_LEGACY_KUBERNETES_EXECUTION_STRATEGY:false section_start:1630754143:resolve_secrets Resolving secrets section_end:1630754143:resolve_secrets section_start:1630754143:prepare_executor Preparing the "kubernetes" executor Using Kubernetes namespace: gitlab-runner-ironbank-dsop Using Kubernetes executor with image registry1.dso.mil/ironbank/ironbank-pipelines/rootless-podman:0.2 ... Using attach strategy to execute scripts... section_end:1630754143:prepare_executor section_start:1630754143:prepare_script Preparing environment Waiting for pod gitlab-runner-ironbank-dsop/runner-jrexj6yx-project-4182-concurrent-04dkc8 to be running, status is Pending Waiting for pod gitlab-runner-ironbank-dsop/runner-jrexj6yx-project-4182-concurrent-04dkc8 to be running, status is Pending Waiting for pod gitlab-runner-ironbank-dsop/runner-jrexj6yx-project-4182-concurrent-04dkc8 to be running, status is Pending ContainersNotInitialized: "containers with incomplete status: [init-logs istio-init]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" Waiting for pod gitlab-runner-ironbank-dsop/runner-jrexj6yx-project-4182-concurrent-04dkc8 to be running, status is Pending ContainersNotReady: "containers with unready status: [build helper istio-proxy]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" Running on runner-jrexj6yx-project-4182-concurrent-04dkc8 via dsop-shared-gitlab-runner-5fcd8977b8-m6qmr... section_end:1630754156:prepare_script section_start:1630754156:get_sources Getting source from Git repository $ until [ $(curl --fail --silent --output /dev/stderr --write-out "%{http_code}" localhost:15020/healthz/ready) -eq 200 ]; do echo Waiting for Sidecar; sleep 3 ; done ; echo Sidecar available; Sidecar available Fetching changes with git depth set to 50... Initialized empty Git repository in /builds/JrExJ6yx/0/dsop/jfrog/jfrog-xray/xray-persist/.git/ Created fresh repository. Checking out 7d9d76e7 as master... Skipping Git submodules setup section_end:1630754157:get_sources section_start:1630754157:download_artifacts Downloading artifacts Downloading artifacts for hardening-manifest (6239522)... Downloading artifacts from coordinator... ok  id=6239522 responseStatus=200 OK token=uqMSY7Mk WARNING: ci-artifacts/preflight/: lchown ci-artifacts/preflight/: operation not permitted (suppressing repeats) Downloading artifacts for import-artifacts (6239524)... Downloading artifacts from coordinator... ok  id=6239524 responseStatus=200 OK token=GMR3eJme WARNING: ci-artifacts/import-artifacts/: lchown ci-artifacts/import-artifacts/: operation not permitted (suppressing repeats) Downloading artifacts for load-scripts (6239519)... Downloading artifacts from coordinator... ok  id=6239519 responseStatus=200 OK token=st398E1z WARNING: ci-artifacts/[MASKED]/: lchown ci-artifacts/[MASKED]/: operation not permitted (suppressing repeats) Downloading artifacts for wl-compare-lint (6239523)... Downloading artifacts from coordinator... ok  id=6239523 responseStatus=200 OK token=sKSEu-XK WARNING: ci-artifacts/lint/: lchown ci-artifacts/lint/: operation not permitted (suppressing repeats) section_end:1630754166:download_artifacts section_start:1630754166:step_script Executing "step_script" stage of the job script $ "${PIPELINE_REPO_DIR}/stages/build/build-run.sh" Determine source registry based on branch Load any images used in Dockerfile build loading image ci-artifacts/import-artifacts/images/releases-docker.jfrog.io-jfrog-xray-persist-3.30.2.tar Getting image source signatures Copying blob sha256:fd7cb8a31b6b3a622e1d587c0596bad94304d8f2776afb1822622de5fd542a42 Copying blob sha256:a1aa9e2601bb3acef6f93f38a082bbc8c50824edce9277cecef62ebe21cf1e1e Copying blob sha256:3eca2a28f49fcf7f63b30ef658cc2d652a65cec10a43726677c1177570555c6d Copying blob sha256:d4eeb44a26a5fff422e76cb0d4d13aa8c8a2116daf1e6bc26b9af898dea5895b Copying blob sha256:5c43fc780dbb6c9a901f4a5aba6d1160b8fb9ae393c215a22e8ae2011ddd388f Copying blob sha256:fe73eab36b7ffb6c23b4ced96a883dbacd8f452c7f67776cb35cd54df57d7298 Copying blob sha256:043a2f0f480f997b29ae0cf4b5dac9050cebc1ae06b0128a38608d430bccb932 Copying blob sha256:e050e9803fc4753e19a9a96ef70b1afe6cf76da38e2787a71a1bc325b66973e6 Copying blob sha256:b61e3fdc8ce02a1e9e237260bd1f4dfb8e60c204e1f147c733713f80286ed676 Copying blob sha256:7dd356574b723c2bc5fd1b4a978e852226cdae3492a677b5e2df0585de3837e5 Copying config sha256:c8c0d672c3f866cd9446decf62048857a56ef0744c7ca6a87b31e5b24c0d0dc4 Writing manifest to image destination Storing signatures Loaded image(s): releases-docker.jfrog.io/jfrog/xray-persist:3.30.2 Load HTTP and S3 external resources Converting labels from hardening manifest into command line args Converting build args from hardening manifest into command line args Build the image STEP 1: FROM releases-docker.jfrog.io/jfrog/xray-persist:3.30.2 AS base Getting image source signatures Copying blob sha256:5c43fc780dbb6c9a901f4a5aba6d1160b8fb9ae393c215a22e8ae2011ddd388f Copying blob sha256:a1aa9e2601bb3acef6f93f38a082bbc8c50824edce9277cecef62ebe21cf1e1e Copying blob sha256:d4eeb44a26a5fff422e76cb0d4d13aa8c8a2116daf1e6bc26b9af898dea5895b Copying blob sha256:3eca2a28f49fcf7f63b30ef658cc2d652a65cec10a43726677c1177570555c6d Copying blob sha256:fe73eab36b7ffb6c23b4ced96a883dbacd8f452c7f67776cb35cd54df57d7298 Copying blob sha256:fd7cb8a31b6b3a622e1d587c0596bad94304d8f2776afb1822622de5fd542a42 Copying blob sha256:043a2f0f480f997b29ae0cf4b5dac9050cebc1ae06b0128a38608d430bccb932 Copying blob sha256:e050e9803fc4753e19a9a96ef70b1afe6cf76da38e2787a71a1bc325b66973e6 Copying blob sha256:b61e3fdc8ce02a1e9e237260bd1f4dfb8e60c204e1f147c733713f80286ed676 Copying blob sha256:7dd356574b723c2bc5fd1b4a978e852226cdae3492a677b5e2df0585de3837e5 Copying config sha256:454f95faf5b965f2d2d9929dbc276241a62ec3a4e2091daede91957f466789a5 Writing manifest to image destination Storing signatures --> 454f95faf5b STEP 2: FROM registry1.dso.mil/ironbank/redhat/ubi/ubi8:8.4 Trying to pull registry1.dso.mil/ironbank/redhat/ubi/ubi8:8.4... Getting image source signatures Copying blob sha256:96476a77b28db43fcb170401c287700d91d95cdff9c06e5ea7b48289d40a8e57 Copying blob sha256:db2f50b75fc09a20e8d9c497d96ad384fbeacf7e77df71e4c7b578d4c07fccce Copying blob sha256:9f0e58d20a101ca4f9a522c85daee9264868d5be592441923f009fd244f64046 Copying config sha256:0653fdd2960e9903e15065a96f8d76655c20db0d1882ac58ec5e098db5814ae2 Writing manifest to image destination Storing signatures STEP 3: ENV JF_XRAY_USER=xray XRAY_USER_ID=1035 XRAY_VERSION=${XRAY_BASE_VERSION} JF_PRODUCT_HOME=/opt/jfrog/xray JF_PRODUCT_DATA_INTERNAL=/var/opt/jfrog/xray SERVICE_NAME=persist STEP 4: COPY --from=base /opt/jfrog/xray /opt/jfrog/xray STEP 5: COPY --from=base /var/opt/jfrog/xray /var/opt/jfrog/xray STEP 6: COPY ./scripts/* /opt/jfrog/xray/app/bin/ STEP 7: COPY --from=base /opt/jfrog/xray/app/doc/* /licenses/ STEP 8: RUN mkdir -p /var/opt/jfrog && chmod 0777 /var/opt/jfrog STEP 9: RUN useradd -M -s /usr/sbin/nologin --uid ${XRAY_USER_ID} --user-group xray && chown -R ${JF_XRAY_USER}:${JF_XRAY_USER} ${JF_PRODUCT_HOME} ${JF_PRODUCT_DATA_INTERNAL} && chmod +x ${JF_PRODUCT_HOME}/app/bin/*.sh && chmod +x ${JF_PRODUCT_HOME}/app/bin/rabbitmq/*.sh && dnf upgrade -y --nodoc && dnf install -y procps net-tools hostname --setopt=tsflags=nodocs && dnf clean all Red Hat Universal Base Image 8 (RPMs) - BaseOS 53 kB/s | 790 kB 00:15 Red Hat Universal Base Image 8 (RPMs) - AppStre 247 kB/s | 2.4 MB 00:09 Red Hat Universal Base Image 8 (RPMs) - CodeRea 1.5 kB/s | 14 kB 00:09 Dependencies resolved. Nothing to do. Complete! Dependencies resolved. ================================================================================ Package Arch Version Repository Size ================================================================================ Installing: hostname x86_64 3.20-6.el8 ubi-8-baseos 32 k net-tools x86_64 2.0-0.52.20160912git.el8 ubi-8-baseos 322 k procps-ng x86_64 3.3.15-6.el8 ubi-8-baseos 329 k Transaction Summary ================================================================================ Install 3 Packages Total download size: 683 k Installed size: 1.8 M Downloading Packages: [MIRROR] procps-ng-3.3.15-6.el8.x86_64.rpm: Curl error (28): Timeout was reached for https://cdn-ubi.redhat.com/content/public/ubi/dist/ubi8/8/x86_64/baseos/os/Packages/p/procps-ng-3.3.15-6.el8.x86_64.rpm [Operation timed out after 5000 milliseconds with 0 out of 0 bytes received] [MIRROR] hostname-3.20-6.el8.x86_64.rpm: Curl error (28): Timeout was reached for https://cdn-ubi.redhat.com/content/public/ubi/dist/ubi8/8/x86_64/baseos/os/Packages/h/hostname-3.20-6.el8.x86_64.rpm [Operation timed out after 5000 milliseconds with 0 out of 0 bytes received] [MIRROR] net-tools-2.0-0.52.20160912git.el8.x86_64.rpm: Curl error (28): Timeout was reached for https://cdn-ubi.redhat.com/content/public/ubi/dist/ubi8/8/x86_64/baseos/os/Packages/n/net-tools-2.0-0.52.20160912git.el8.x86_64.rpm [Operation timed out after 5000 milliseconds with 0 out of 0 bytes received] (1/3): hostname-3.20-6.el8.x86_64.rpm 6.4 kB/s | 32 kB 00:05 (2/3): net-tools-2.0-0.52.20160912git.el8.x86_6 64 kB/s | 322 kB 00:05 (3/3): procps-ng-3.3.15-6.el8.x86_64.rpm 66 kB/s | 329 kB 00:05 -------------------------------------------------------------------------------- Total 136 kB/s | 683 kB 00:05 Running transaction check Transaction check succeeded. Running transaction test Transaction test succeeded. Running transaction Preparing : 1/1 Installing : net-tools-2.0-0.52.20160912git.el8.x86_64 1/3 Running scriptlet: net-tools-2.0-0.52.20160912git.el8.x86_64 1/3 Installing : hostname-3.20-6.el8.x86_64 2/3 Running scriptlet: hostname-3.20-6.el8.x86_64 2/3 Installing : procps-ng-3.3.15-6.el8.x86_64 3/3 Running scriptlet: procps-ng-3.3.15-6.el8.x86_64 3/3 Verifying : procps-ng-3.3.15-6.el8.x86_64 1/3 Verifying : hostname-3.20-6.el8.x86_64 2/3 Verifying : net-tools-2.0-0.52.20160912git.el8.x86_64 3/3 Installed products updated. Installed: hostname-3.20-6.el8.x86_64 net-tools-2.0-0.52.20160912git.el8.x86_64 procps-ng-3.3.15-6.el8.x86_64 Complete! 25 files removed STEP 10: USER xray STEP 11: VOLUME /var/opt/jfrog/xray STEP 12: HEALTHCHECK --interval=30s --timeout=5s --start-period=2m --retries=5 CMD curl -I -f http://localhost:7003/api/v1/system/ping || exit 1 STEP 13: ENTRYPOINT ["/opt/jfrog/xray/app/bin/wrapper.sh"] STEP 14: COMMIT registry1.dso.mil/ironbank-staging/jfrog/jfrog-xray/xray-persist Getting image source signatures Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:b9e1d509321b2230ee35fbfd2a387f278a4dc4038098ec6b3d2e76cd72fac5fb Copying blob sha256:322a6e79981b7e1b4fde4c6e144617a37ad79a9ff72d86ba39889e7903646456 Copying config sha256:e4cc28f9b68d099efdf81c86a943232f2fef3c48846d1955c00802651be3f7c6 Writing manifest to image destination Storing signatures --> e4cc28f9b68 Successfully tagged registry1.dso.mil/ironbank-staging/jfrog/jfrog-xray/xray-persist:latest e4cc28f9b68d099efdf81c86a943232f2fef3c48846d1955c00802651be3f7c6 + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/jfrog/jfrog-xray/xray-persist registry1.dso.mil/ironbank-staging/jfrog/jfrog-xray/xray-persist:ibci-461111 + buildah push --storage-driver=vfs --authfile staging_auth.json --digestfile=ci-artifacts/build/digest registry1.dso.mil/ironbank-staging/jfrog/jfrog-xray/xray-persist:ibci-461111 Getting image source signatures Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:322a6e79981b7e1b4fde4c6e144617a37ad79a9ff72d86ba39889e7903646456 Copying blob sha256:b9e1d509321b2230ee35fbfd2a387f278a4dc4038098ec6b3d2e76cd72fac5fb Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying config sha256:e4cc28f9b68d099efdf81c86a943232f2fef3c48846d1955c00802651be3f7c6 Writing manifest to image destination Storing signatures + echo 'Read the tags' Read the tags + tags_file=ci-artifacts/preflight/tags.txt + test -f ci-artifacts/preflight/tags.txt + IFS= + read -r tag + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/jfrog/jfrog-xray/xray-persist registry1.dso.mil/ironbank-staging/jfrog/jfrog-xray/xray-persist:3.30.2 + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/jfrog/jfrog-xray/xray-persist:3.30.2 Getting image source signatures Copying blob sha256:322a6e79981b7e1b4fde4c6e144617a37ad79a9ff72d86ba39889e7903646456 Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying blob sha256:b9e1d509321b2230ee35fbfd2a387f278a4dc4038098ec6b3d2e76cd72fac5fb Copying config sha256:e4cc28f9b68d099efdf81c86a943232f2fef3c48846d1955c00802651be3f7c6 Writing manifest to image destination Storing signatures + IFS= + read -r tag + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/jfrog/jfrog-xray/xray-persist registry1.dso.mil/ironbank-staging/jfrog/jfrog-xray/xray-persist:latest + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/jfrog/jfrog-xray/xray-persist:latest Getting image source signatures Copying blob sha256:322a6e79981b7e1b4fde4c6e144617a37ad79a9ff72d86ba39889e7903646456 Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:b9e1d509321b2230ee35fbfd2a387f278a4dc4038098ec6b3d2e76cd72fac5fb Copying config sha256:e4cc28f9b68d099efdf81c86a943232f2fef3c48846d1955c00802651be3f7c6 Writing manifest to image destination Storing signatures + IFS= + read -r tag ++ podman inspect --storage-driver=vfs registry1.dso.mil/ironbank-staging/jfrog/jfrog-xray/xray-persist --format '{{.Id}}' + IMAGE_ID=sha256:e4cc28f9b68d099efdf81c86a943232f2fef3c48846d1955c00802651be3f7c6 + echo IMAGE_ID=sha256:e4cc28f9b68d099efdf81c86a943232f2fef3c48846d1955c00802651be3f7c6 + IMAGE_PODMAN_SHA=sha256:572ed665f2c931d1053635fbf707a22688a9706995536e7069bac5925c294287 + echo IMAGE_PODMAN_SHA=sha256:572ed665f2c931d1053635fbf707a22688a9706995536e7069bac5925c294287 + echo IMAGE_FULLTAG=registry1.dso.mil/ironbank-staging/jfrog/jfrog-xray/xray-persist:ibci-461111 + echo IMAGE_NAME=jfrog/jfrog-xray/xray-persist + branches=("master" "development") + [[ master development =~ master ]] + msg='A tarball of the built image can be retrieved from the documentation job artifacts.' + echo 'A tarball of the built image can be retrieved from the documentation job artifacts.' A tarball of the built image can be retrieved from the documentation job artifacts. section_end:1630754308:step_script section_start:1630754308:upload_artifacts_on_success Uploading artifacts for successful job Uploading artifacts... ci-artifacts/build/: found 2 matching files and directories Uploading artifacts as "archive" to coordinator... ok id=6239526 responseStatus=201 Created token=g7ipsdQC Uploading artifacts... build.env: found 1 matching files and directories  Uploading artifacts as "dotenv" to coordinator... ok id=6239526 responseStatus=201 Created token=g7ipsdQC section_end:1630754310:upload_artifacts_on_success section_start:1630754310:cleanup_file_variables Cleaning up file based variables section_end:1630754311:cleanup_file_variables Job succeeded