Running with gitlab-runner 13.8.0 (775dd39d)  on global-shared-gitlab-runner-5896686f8-f7z96 71K9UkNo section_start:1621618358:resolve_secrets Resolving secrets section_end:1621618358:resolve_secrets section_start:1621618358:prepare_executor Preparing the "kubernetes" executor Using Kubernetes namespace: gitlab-runner-isolated WARNING: Pulling GitLab Runner helper image from Docker Hub. Helper image is migrating to registry.gitlab.com, for more information see https://docs.gitlab.com/runner/configuration/advanced-configuration.html#migrating-helper-image-to-registrygitlabcom Using Kubernetes executor with image registry1.dso.mil/ironbank/ironbank-pipelines/rootless-podman:0.1 ... section_end:1621618358:prepare_executor section_start:1621618358:prepare_script Preparing environment Waiting for pod gitlab-runner-isolated/runner-71k9ukno-project-5654-concurrent-02l2sf to be running, status is Pending Waiting for pod gitlab-runner-isolated/runner-71k9ukno-project-5654-concurrent-02l2sf to be running, status is Pending ContainersNotReady: "containers with unready status: [build helper]" ContainersNotReady: "containers with unready status: [build helper]" Running on runner-71k9ukno-project-5654-concurrent-02l2sf via global-shared-gitlab-runner-5896686f8-f7z96... section_end:1621618364:prepare_script section_start:1621618364:get_sources Getting source from Git repository Fetching changes with git depth set to 50... Initialized empty Git repository in /builds/dsop/opensource/antiword/antiword/.git/ Created fresh repository. Checking out 266a7294 as development... Skipping Git submodules setup section_end:1621618364:get_sources section_start:1621618365:download_artifacts Downloading artifacts Downloading artifacts for hardening_manifest (3492519)... Downloading artifacts from coordinator... ok  id=3492519 responseStatus=200 OK token=gyb7_x1F Downloading artifacts for import artifacts (3492521)... Downloading artifacts from coordinator... ok  id=3492521 responseStatus=200 OK token=G1-7XWrF Downloading artifacts for load scripts (3492516)... Downloading artifacts from coordinator... ok  id=3492516 responseStatus=200 OK token=iZ5WatzJ Downloading artifacts for wl compare lint (3492520)... Downloading artifacts from coordinator... ok  id=3492520 responseStatus=200 OK token=mWY4xjf- section_end:1621618365:download_artifacts section_start:1621618365:step_script Executing "step_script" stage of the job script $ "${PIPELINE_REPO_DIR}/stages/build/build-run.sh" Determine source registry based on branch Load any images used in Dockerfile build Load HTTP and S3 external resources 'ci-artifacts/import-artifacts/external-resources/antiword-0.37-30.fc33.x86_64.rpm' -> './antiword-0.37-30.fc33.x86_64.rpm' Converting labels from hardening manifest into command line args Converting build args from hardening manifest into command line args Build the image STEP 1: FROM registry1.dso.mil/ironbank/redhat/ubi/ubi8:8.4 Getting image source signatures Copying blob sha256:53732dad4680ae165f569331357b89605c03583057db7193a7a4fabdf312f061 Copying blob sha256:1b322af0cf911cb5db91080f654d36cafd4853710174ed9082749dd32362d05e Copying blob sha256:a538c9b9760931040405e4c827d816c820fc4738284b4f51a1bb0c872fb4b45d Copying config sha256:952d93fd4d6b640094179932aa48dc9bc0c1e007f3464d1f8f238d35a240032c Writing manifest to image destination Storing signatures STEP 2: COPY *.rpm signatures/* ./ STEP 3: RUN dnf upgrade -y && rpm --import RPM-GPG-KEY-fedora && dnf localinstall -y antiword-0.37-30.fc33.x86_64.rpm && dnf clean all && rm -rf /var/cache/dnf && rm *.rpm RPM-GPG-KEY-fedora && groupadd -g 1000 aw && useradd -r -u 1000 -m -s /sbin/nologin -g aw aw Red Hat Universal Base Image 8 (RPMs) - BaseOS 79 kB/s | 789 kB 00:10 Red Hat Universal Base Image 8 (RPMs) - AppStre 747 kB/s | 7.4 MB 00:10 Red Hat Universal Base Image 8 (RPMs) - CodeRea 1.4 kB/s | 14 kB 00:10 Dependencies resolved. Nothing to do. Complete! Last metadata expiration check: 0:00:01 ago on Fri May 21 17:33:40 2021. Dependencies resolved. ================================================================================ Package Architecture Version Repository Size ================================================================================ Installing: antiword x86_64 0.37-30.fc33 @commandline 159 k Transaction Summary ================================================================================ Install 1 Package Total size: 159 k Installed size: 623 k Downloading Packages: Running transaction check Transaction check succeeded. Running transaction test Transaction test succeeded. Running transaction Preparing : 1/1 Installing : antiword-0.37-30.fc33.x86_64 1/1 Running scriptlet: antiword-0.37-30.fc33.x86_64 1/1 Verifying : antiword-0.37-30.fc33.x86_64 1/1 Installed products updated. Installed: antiword-0.37-30.fc33.x86_64 Complete! 25 files removed STEP 4: USER aw STEP 5: HEALTHCHECK NONE STEP 6: ENTRYPOINT ["antiword"] STEP 7: COMMIT registry1.dso.mil/ironbank-staging/opensource/antiword/antiword Getting image source signatures Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:0189a929502aa1480e26c03b1d6d294ed7be377ade5ca54860cc3f79d5f29027 Copying blob sha256:97f1a0cf365b61e719b11f357516a5b75f3fe9fe30d55d73c47fea07a681a0d8 Copying config sha256:91e811d5fe02b05570fdedf4407fc3e79a262df47269ad8bd1019367a9c51d84 Writing manifest to image destination Storing signatures --> 91e811d5fe0 91e811d5fe02b05570fdedf4407fc3e79a262df47269ad8bd1019367a9c51d84 + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/antiword/antiword registry1.dso.mil/ironbank-staging/opensource/antiword/antiword:271473 + buildah push --storage-driver=vfs --authfile staging_auth.json --digestfile=ci-artifacts/build/digest registry1.dso.mil/ironbank-staging/opensource/antiword/antiword:271473 Getting image source signatures Copying blob sha256:97f1a0cf365b61e719b11f357516a5b75f3fe9fe30d55d73c47fea07a681a0d8 Copying blob sha256:0189a929502aa1480e26c03b1d6d294ed7be377ade5ca54860cc3f79d5f29027 Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying config sha256:91e811d5fe02b05570fdedf4407fc3e79a262df47269ad8bd1019367a9c51d84 Writing manifest to image destination Storing signatures Read the tags + echo 'Read the tags' + tags_file=ci-artifacts/preflight/tags.txt + test -f ci-artifacts/preflight/tags.txt + IFS= + read -r tag + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/antiword/antiword registry1.dso.mil/ironbank-staging/opensource/antiword/antiword:0.37 + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/opensource/antiword/antiword:0.37 Getting image source signatures Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:0189a929502aa1480e26c03b1d6d294ed7be377ade5ca54860cc3f79d5f29027 Copying blob sha256:97f1a0cf365b61e719b11f357516a5b75f3fe9fe30d55d73c47fea07a681a0d8 Copying config sha256:91e811d5fe02b05570fdedf4407fc3e79a262df47269ad8bd1019367a9c51d84 Writing manifest to image destination Storing signatures + IFS= + read -r tag + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/antiword/antiword registry1.dso.mil/ironbank-staging/opensource/antiword/antiword:latest + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/opensource/antiword/antiword:latest Getting image source signatures Copying blob sha256:0189a929502aa1480e26c03b1d6d294ed7be377ade5ca54860cc3f79d5f29027 Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying blob sha256:97f1a0cf365b61e719b11f357516a5b75f3fe9fe30d55d73c47fea07a681a0d8 Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying config sha256:91e811d5fe02b05570fdedf4407fc3e79a262df47269ad8bd1019367a9c51d84 Writing manifest to image destination Storing signatures + IFS= + read -r tag ++ podman inspect --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/antiword/antiword --format '{{.Id}}' time="2021-05-21T17:34:00Z" level=warning msg="Failed to detect the owner for the current cgroup: stat /sys/fs/cgroup/systemd/kubepods/burstable/pod7e059fbc-b5a0-403f-8270-316c57eb6034/43fa09d5b578f1b022600f09c8e6f44fa55bae9023a75497e4ab26dabe97f4fc: no such file or directory" + IMAGE_ID=sha256:91e811d5fe02b05570fdedf4407fc3e79a262df47269ad8bd1019367a9c51d84 + echo IMAGE_ID=sha256:91e811d5fe02b05570fdedf4407fc3e79a262df47269ad8bd1019367a9c51d84 + IMAGE_PODMAN_SHA=sha256:458ba0dc534ba7853ae7ffdbb85794350d446da8f17cbc01c5f9ccd917b5722c + echo IMAGE_PODMAN_SHA=sha256:458ba0dc534ba7853ae7ffdbb85794350d446da8f17cbc01c5f9ccd917b5722c + echo IMAGE_FULLTAG=registry1.dso.mil/ironbank-staging/opensource/antiword/antiword:271473 + echo IMAGE_NAME=opensource/antiword/antiword section_end:1621618440:step_script section_start:1621618440:upload_artifacts_on_success Uploading artifacts for successful job Uploading artifacts... ci-artifacts/build/: found 2 matching files and directories Uploading artifacts as "archive" to coordinator... ok id=3492523 responseStatus=201 Created token=nLA_ykzg Uploading artifacts... build.env: found 1 matching files and directories  Uploading artifacts as "dotenv" to coordinator... ok id=3492523 responseStatus=201 Created token=nLA_ykzg section_end:1621618441:upload_artifacts_on_success section_start:1621618441:cleanup_file_variables Cleaning up file based variables section_end:1621618441:cleanup_file_variables Job succeeded