Running with gitlab-runner 13.12.0 (7a6612da)  on dsop-shared-gitlab-runner-5fcd8977b8-m6qmr JrExJ6yx  feature flags: FF_USE_LEGACY_KUBERNETES_EXECUTION_STRATEGY:false section_start:1630891244:resolve_secrets Resolving secrets section_end:1630891244:resolve_secrets section_start:1630891244:prepare_executor Preparing the "kubernetes" executor Using Kubernetes namespace: gitlab-runner-ironbank-dsop Using Kubernetes executor with image registry1.dso.mil/ironbank/ironbank-pipelines/rootless-podman:0.2 ... Using attach strategy to execute scripts... section_end:1630891244:prepare_executor section_start:1630891244:prepare_script Preparing environment Waiting for pod gitlab-runner-ironbank-dsop/runner-jrexj6yx-project-3401-concurrent-0685kk to be running, status is Pending Waiting for pod gitlab-runner-ironbank-dsop/runner-jrexj6yx-project-3401-concurrent-0685kk to be running, status is Pending ContainersNotInitialized: "containers with incomplete status: [init-logs istio-init]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" Waiting for pod gitlab-runner-ironbank-dsop/runner-jrexj6yx-project-3401-concurrent-0685kk to be running, status is Pending ContainersNotReady: "containers with unready status: [build helper istio-proxy]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" Waiting for pod gitlab-runner-ironbank-dsop/runner-jrexj6yx-project-3401-concurrent-0685kk to be running, status is Pending ContainersNotReady: "containers with unready status: [build helper istio-proxy]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" Running on runner-jrexj6yx-project-3401-concurrent-0685kk via dsop-shared-gitlab-runner-5fcd8977b8-m6qmr... section_end:1630891257:prepare_script section_start:1630891257:get_sources Getting source from Git repository $ until [ $(curl --fail --silent --output /dev/stderr --write-out "%{http_code}" localhost:15020/healthz/ready) -eq 200 ]; do echo Waiting for Sidecar; sleep 3 ; done ; echo Sidecar available; Sidecar available Fetching changes with git depth set to 50... Initialized empty Git repository in /builds/JrExJ6yx/0/dsop/opensource/amazon/aws-cli/.git/ Created fresh repository. Checking out ce6b6539 as master... Skipping Git submodules setup section_end:1630891259:get_sources section_start:1630891259:download_artifacts Downloading artifacts Downloading artifacts for hardening-manifest (6255008)... Downloading artifacts from coordinator... ok  id=6255008 responseStatus=200 OK token=qDPsGFbA WARNING: ci-artifacts/preflight/: lchown ci-artifacts/preflight/: operation not permitted (suppressing repeats) Downloading artifacts for import-artifacts (6255010)... Downloading artifacts from coordinator... ok  id=6255010 responseStatus=200 OK token=wnqiyJ1s WARNING: ci-artifacts/import-artifacts/: lchown ci-artifacts/import-artifacts/: operation not permitted (suppressing repeats) Downloading artifacts for load-scripts (6255005)... Downloading artifacts from coordinator... ok  id=6255005 responseStatus=200 OK token=SAcwznkd WARNING: ci-artifacts/[MASKED]/: lchown ci-artifacts/[MASKED]/: operation not permitted (suppressing repeats) Downloading artifacts for wl-compare-lint (6255009)... Downloading artifacts from coordinator... ok  id=6255009 responseStatus=200 OK token=izFK7AdS WARNING: ci-artifacts/lint/: lchown ci-artifacts/lint/: operation not permitted (suppressing repeats) section_end:1630891265:download_artifacts section_start:1630891265:step_script Executing "step_script" stage of the job script $ "${PIPELINE_REPO_DIR}/stages/build/build-run.sh" Determine source registry based on branch Load any images used in Dockerfile build loading image ci-artifacts/import-artifacts/images/amazon-aws-cli-2.2.35.tar Getting image source signatures Copying blob sha256:f2ee02d0590463004270cbe9b3471bbadb08eb108d1349a39675f49f6fff9779 Copying blob sha256:1c4e5d5e62f7a31571f71a85de5b6b1d2d43e7b420a376a7fab6c07c1bf1229d Copying blob sha256:6404f374ee85974c2c0fb1946097fe9856c5ab4fb2cb27a5f79e95097e9c4118 Copying blob sha256:26e28373a3b2ca00e33af0d4750ae911beea4120212fb1b9821e1b3b62f731d4 Copying blob sha256:16c20e3fe6f13d95e3855d7099f1da9b9d1d367e3255f84a9c0f5157a621383c Copying config sha256:95b223a33d72e163741bf056905298b89a4e7076e54641db20ea6eae7e1915ea Writing manifest to image destination Storing signatures Loaded image(s): localhost/amazon/aws-cli:2.2.35 time="2021-09-06T01:22:13Z" level=error msg="failed to kill 24" Load HTTP and S3 external resources Converting labels from hardening manifest into command line args Converting build args from hardening manifest into command line args Build the image STEP 1: FROM amazon/aws-cli:2.2.35 AS cli Getting image source signatures Copying blob sha256:6404f374ee85974c2c0fb1946097fe9856c5ab4fb2cb27a5f79e95097e9c4118 Copying blob sha256:1c4e5d5e62f7a31571f71a85de5b6b1d2d43e7b420a376a7fab6c07c1bf1229d Copying blob sha256:26e28373a3b2ca00e33af0d4750ae911beea4120212fb1b9821e1b3b62f731d4 Copying blob sha256:16c20e3fe6f13d95e3855d7099f1da9b9d1d367e3255f84a9c0f5157a621383c Copying blob sha256:f2ee02d0590463004270cbe9b3471bbadb08eb108d1349a39675f49f6fff9779 Copying config sha256:e03e7b4db62736a5890a82772004396d31ba8d2ab01d9f305ce307d3788cbd81 Writing manifest to image destination Storing signatures --> e03e7b4db62 STEP 2: FROM registry1.dso.mil/ironbank/redhat/ubi/ubi8:8.4 Trying to pull registry1.dso.mil/ironbank/redhat/ubi/ubi8:8.4... Getting image source signatures Copying blob sha256:db2f50b75fc09a20e8d9c497d96ad384fbeacf7e77df71e4c7b578d4c07fccce Copying blob sha256:9f0e58d20a101ca4f9a522c85daee9264868d5be592441923f009fd244f64046 Copying blob sha256:96476a77b28db43fcb170401c287700d91d95cdff9c06e5ea7b48289d40a8e57 Copying config sha256:0653fdd2960e9903e15065a96f8d76655c20db0d1882ac58ec5e098db5814ae2 Writing manifest to image destination Storing signatures STEP 3: COPY --from=cli /usr/local/aws-cli /usr/local/aws-cli STEP 4: RUN groupadd -g 1001 awscli && useradd -r -u 1001 -d /aws -m -s /sbin/nologin -g awscli awscli && ln -s /usr/local/aws-cli/v2/current/bin/aws /usr/local/bin/aws && ln -s /usr/local/aws-cli/v2/current/bin/aws_completer /usr/local/bin/aws_completer && dnf upgrade -y && dnf install -y groff-base less && dnf clean all && rm -rf /var/cache/dnf Red Hat Universal Base Image 8 (RPMs) - BaseOS 79 kB/s | 790 kB 00:10 Red Hat Universal Base Image 8 (RPMs) - AppStre 247 kB/s | 2.4 MB 00:09 Red Hat Universal Base Image 8 (RPMs) - CodeRea 1.4 kB/s | 14 kB 00:10 Dependencies resolved. Nothing to do. Complete! Last metadata expiration check: 0:00:01 ago on Mon Sep 6 01:23:46 2021. Dependencies resolved. ================================================================================ Package Architecture Version Repository Size ================================================================================ Installing: groff-base x86_64 1.22.3-18.el8 ubi-8-baseos 1.0 M less x86_64 530-1.el8 ubi-8-baseos 164 k Transaction Summary ================================================================================ Install 2 Packages Total download size: 1.2 M Installed size: 4.4 M Downloading Packages: [MIRROR] less-530-1.el8.x86_64.rpm: Curl error (28): Timeout was reached for https://cdn-ubi.redhat.com/content/public/ubi/dist/ubi8/8/x86_64/baseos/os/Packages/l/less-530-1.el8.x86_64.rpm [Operation timed out after 5001 milliseconds with 0 out of 0 bytes received] [MIRROR] groff-base-1.22.3-18.el8.x86_64.rpm: Curl error (28): Timeout was reached for https://cdn-ubi.redhat.com/content/public/ubi/dist/ubi8/8/x86_64/baseos/os/Packages/g/groff-base-1.22.3-18.el8.x86_64.rpm [Operation timed out after 5001 milliseconds with 0 out of 0 bytes received] (1/2): less-530-1.el8.x86_64.rpm 33 kB/s | 164 kB 00:05 (2/2): groff-base-1.22.3-18.el8.x86_64.rpm 208 kB/s | 1.0 MB 00:05 -------------------------------------------------------------------------------- Total 241 kB/s | 1.2 MB 00:05 Running transaction check Transaction check succeeded. Running transaction test Transaction test succeeded. Running transaction Preparing : 1/1 Installing : groff-base-1.22.3-18.el8.x86_64 1/2 Installing : less-530-1.el8.x86_64 2/2 Running scriptlet: less-530-1.el8.x86_64 2/2 Verifying : less-530-1.el8.x86_64 1/2 Verifying : groff-base-1.22.3-18.el8.x86_64 2/2 Installed products updated. Installed: groff-base-1.22.3-18.el8.x86_64 less-530-1.el8.x86_64 Complete! 25 files removed STEP 5: USER 1001 STEP 6: WORKDIR /aws STEP 7: HEALTHCHECK NONE STEP 8: ENTRYPOINT ["aws"] STEP 9: COMMIT registry1.dso.mil/ironbank-staging/opensource/amazon/aws-cli Getting image source signatures Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:b9e1d509321b2230ee35fbfd2a387f278a4dc4038098ec6b3d2e76cd72fac5fb Copying blob sha256:cb2789a3cb372e1b61ff6deee8cb094716ceb46210a1fb5871125105bdfd5fa1 Copying config sha256:fb9d7fd23d5ce6bcb1e4f28651e62e868fc41dee0dab6bc09ebbdf342b29eddb Writing manifest to image destination Storing signatures --> fb9d7fd23d5 Successfully tagged registry1.dso.mil/ironbank-staging/opensource/amazon/aws-cli:latest fb9d7fd23d5ce6bcb1e4f28651e62e868fc41dee0dab6bc09ebbdf342b29eddb + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/amazon/aws-cli registry1.dso.mil/ironbank-staging/opensource/amazon/aws-cli:ibci-462123 + buildah push --storage-driver=vfs --authfile staging_auth.json --digestfile=ci-artifacts/build/digest registry1.dso.mil/ironbank-staging/opensource/amazon/aws-cli:ibci-462123 Getting image source signatures Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:cb2789a3cb372e1b61ff6deee8cb094716ceb46210a1fb5871125105bdfd5fa1 Copying blob sha256:b9e1d509321b2230ee35fbfd2a387f278a4dc4038098ec6b3d2e76cd72fac5fb Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying config sha256:fb9d7fd23d5ce6bcb1e4f28651e62e868fc41dee0dab6bc09ebbdf342b29eddb Writing manifest to image destination Storing signatures + echo 'Read the tags' Read the tags + tags_file=ci-artifacts/preflight/tags.txt + test -f ci-artifacts/preflight/tags.txt + IFS= + read -r tag + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/amazon/aws-cli registry1.dso.mil/ironbank-staging/opensource/amazon/aws-cli:2.2.35 + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/opensource/amazon/aws-cli:2.2.35 Getting image source signatures Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying blob sha256:b9e1d509321b2230ee35fbfd2a387f278a4dc4038098ec6b3d2e76cd72fac5fb Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:cb2789a3cb372e1b61ff6deee8cb094716ceb46210a1fb5871125105bdfd5fa1 Copying config sha256:fb9d7fd23d5ce6bcb1e4f28651e62e868fc41dee0dab6bc09ebbdf342b29eddb Writing manifest to image destination Storing signatures + IFS= + read -r tag + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/amazon/aws-cli registry1.dso.mil/ironbank-staging/opensource/amazon/aws-cli:latest + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/opensource/amazon/aws-cli:latest Getting image source signatures Copying blob sha256:b9e1d509321b2230ee35fbfd2a387f278a4dc4038098ec6b3d2e76cd72fac5fb Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:cb2789a3cb372e1b61ff6deee8cb094716ceb46210a1fb5871125105bdfd5fa1 Copying config sha256:fb9d7fd23d5ce6bcb1e4f28651e62e868fc41dee0dab6bc09ebbdf342b29eddb Writing manifest to image destination Storing signatures + IFS= + read -r tag ++ podman inspect --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/amazon/aws-cli --format '{{.Id}}' + IMAGE_ID=sha256:fb9d7fd23d5ce6bcb1e4f28651e62e868fc41dee0dab6bc09ebbdf342b29eddb + echo IMAGE_ID=sha256:fb9d7fd23d5ce6bcb1e4f28651e62e868fc41dee0dab6bc09ebbdf342b29eddb + IMAGE_PODMAN_SHA=sha256:aa84ab51d0c92ee2165036fa292978885027313da5d5ef10b7b118d19b9bc3c6 + echo IMAGE_PODMAN_SHA=sha256:aa84ab51d0c92ee2165036fa292978885027313da5d5ef10b7b118d19b9bc3c6 + echo IMAGE_FULLTAG=registry1.dso.mil/ironbank-staging/opensource/amazon/aws-cli:ibci-462123 + echo IMAGE_NAME=opensource/amazon/aws-cli + branches=("master" "development") + [[ master development =~ master ]] + msg='A tarball of the built image can be retrieved from the documentation job artifacts.' + echo 'A tarball of the built image can be retrieved from the documentation job artifacts.' A tarball of the built image can be retrieved from the documentation job artifacts. section_end:1630891544:step_script section_start:1630891544:upload_artifacts_on_success Uploading artifacts for successful job Uploading artifacts... ci-artifacts/build/: found 2 matching files and directories Uploading artifacts as "archive" to coordinator... ok id=6255012 responseStatus=201 Created token=Ea3oeP7y Uploading artifacts... build.env: found 1 matching files and directories  Uploading artifacts as "dotenv" to coordinator... ok id=6255012 responseStatus=201 Created token=Ea3oeP7y section_end:1630891546:upload_artifacts_on_success section_start:1630891546:cleanup_file_variables Cleaning up file based variables section_end:1630891547:cleanup_file_variables Job succeeded