Running with gitlab-runner 13.8.0 (775dd39d)  on dsop-shared-gitlab-runner-f887cbcbd-srgz6 E82_g8RG section_start:1628515003:resolve_secrets Resolving secrets section_end:1628515003:resolve_secrets section_start:1628515003:prepare_executor Preparing the "kubernetes" executor Using Kubernetes namespace: gitlab-runner-ironbank-dsop WARNING: Pulling GitLab Runner helper image from Docker Hub. Helper image is migrating to registry.gitlab.com, for more information see https://docs.gitlab.com/runner/configuration/advanced-configuration.html#migrating-helper-image-to-registrygitlabcom Using Kubernetes executor with image registry1.dso.mil/ironbank/ironbank-pipelines/rootless-podman:0.2 ... section_end:1628515003:prepare_executor section_start:1628515003:prepare_script Preparing environment Waiting for pod gitlab-runner-ironbank-dsop/runner-e82g8rg-project-1933-concurrent-0974bx to be running, status is Pending Waiting for pod gitlab-runner-ironbank-dsop/runner-e82g8rg-project-1933-concurrent-0974bx to be running, status is Pending ContainersNotReady: "containers with unready status: [build helper istio-proxy]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" Waiting for pod gitlab-runner-ironbank-dsop/runner-e82g8rg-project-1933-concurrent-0974bx to be running, status is Pending ContainersNotReady: "containers with unready status: [build helper istio-proxy]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" Running on runner-e82g8rg-project-1933-concurrent-0974bx via dsop-shared-gitlab-runner-f887cbcbd-srgz6... section_end:1628515012:prepare_script section_start:1628515012:get_sources Getting source from Git repository $ until [ $(curl --fail --silent --output /dev/stderr --write-out "%{http_code}" localhost:15020/healthz/ready) -eq 200 ]; do echo Waiting for Sidecar; sleep 3 ; done ; echo Sidecar available; Waiting for Sidecar Sidecar available Fetching changes with git depth set to 50... Initialized empty Git repository in /builds/dsop/opensource/excalidraw/excalidraw/.git/ Created fresh repository. Checking out f2306cfe as cade-update... Skipping object checkout, Git LFS is not installed. Skipping Git submodules setup section_end:1628515016:get_sources section_start:1628515016:download_artifacts Downloading artifacts Downloading artifacts for hardening-manifest (5506511)... Downloading artifacts from coordinator... ok  id=5506511 responseStatus=200 OK token=9yocUG3W Downloading artifacts for import-artifacts (5506513)... WARNING: ci-artifacts/preflight/: lchown ci-artifacts/preflight/: operation not permitted (suppressing repeats) Downloading artifacts from coordinator... ok  id=5506513 responseStatus=200 OK token=neWWaqhb WARNING: ci-artifacts/import-artifacts/: lchown ci-artifacts/import-artifacts/: operation not permitted (suppressing repeats) Downloading artifacts for load-scripts (5506508)... Downloading artifacts from coordinator... ok  id=5506508 responseStatus=200 OK token=sF4yPcXk WARNING: ci-artifacts/[MASKED]/: lchown ci-artifacts/[MASKED]/: operation not permitted (suppressing repeats) Downloading artifacts for wl-compare-lint (5506512)... Downloading artifacts from coordinator... ok  id=5506512 responseStatus=200 OK token=8UkxJczo WARNING: ci-artifacts/lint/: lchown ci-artifacts/lint/: operation not permitted (suppressing repeats) section_end:1628515017:download_artifacts section_start:1628515017:step_script Executing "step_script" stage of the job script $ "${PIPELINE_REPO_DIR}/stages/build/build-run.sh" Determine source registry based on branch Load any images used in Dockerfile build loading image ci-artifacts/import-artifacts/images/excalidraw-excalidraw-sha-8b3f236.tar time="2021-08-09T13:16:57Z" level=warning msg="Failed to detect the owner for the current cgroup: stat /sys/fs/cgroup/systemd/kubepods/burstable/pod384552c1-f02d-4d4c-a01f-2623c4bada8d/f09844eadda1b21abc8a981a396fff8cbecf4cc007a9792f0648681ca21b9ff4: no such file or directory" Getting image source signatures Copying blob sha256:72e830a4dff5f0d5225cdc0a320e85ab1ce06ea5673acfe8d83a7645cbd0e9cf Copying blob sha256:7ebe47ef59e57bbdad417a11f671972885f88203f6e6d305a5e7bc6649467d18 Copying blob sha256:2524a71e12187e18714b39ee5afdad2ec4cd42c6a787280881ba7080773fb91e Copying blob sha256:a40efec4089151f2b655924ead9a334c6d9af2779b03ecfa612eda845900c4c2 Copying blob sha256:d3a37e5dc9b61ff09333fd8322e9e7a981bdef816b749b918c6946cf7f6c746d Copying blob sha256:b74fa78b15286fd6754391051dac67e210ab9e6ef526823c4b5402680d2f5d0c Copying blob sha256:c2a4fdbcb3adb38ffa36657e18c1b2608e1d37aeed093f0db00f688edaa361fd Copying config sha256:80754ca1869e105276e769532410a321db1f68a6cafeb9cd2349a176e4b64fee Writing manifest to image destination Storing signatures Loaded image(s): localhost/excalidraw/excalidraw:sha-8b3f236 Load HTTP and S3 external resources Converting labels from hardening manifest into command line args Converting build args from hardening manifest into command line args Build the image STEP 1: FROM excalidraw/excalidraw:sha-8b3f236 AS base Getting image source signatures Copying blob sha256:72e830a4dff5f0d5225cdc0a320e85ab1ce06ea5673acfe8d83a7645cbd0e9cf Copying blob sha256:b74fa78b15286fd6754391051dac67e210ab9e6ef526823c4b5402680d2f5d0c Copying blob sha256:2524a71e12187e18714b39ee5afdad2ec4cd42c6a787280881ba7080773fb91e --> ee85c0c9ebd Copying blob sha256:d3a37e5dc9b61ff09333fd8322e9e7a981bdef816b749b918c6946cf7f6c746d STEP 2: FROM registry1.dso.mil/ironbank/opensource/nginx/nginx:1.20.1 Copying blob sha256:a40efec4089151f2b655924ead9a334c6d9af2779b03ecfa612eda845900c4c2 Copying blob sha256:7ebe47ef59e57bbdad417a11f671972885f88203f6e6d305a5e7bc6649467d18 Copying blob sha256:c2a4fdbcb3adb38ffa36657e18c1b2608e1d37aeed093f0db00f688edaa361fd Copying config sha256:ee85c0c9ebd2e801bbb5a14618a8785079f6a3894204f2a833487b083f54f6ec Writing manifest to image destination Storing signatures Getting image source signatures Copying blob sha256:a538c9b9760931040405e4c827d816c820fc4738284b4f51a1bb0c872fb4b45d Copying blob sha256:53732dad4680ae165f569331357b89605c03583057db7193a7a4fabdf312f061 Copying blob sha256:afcf659959ba1b201d3f17f6220e4c77252c7f0ee98c04fa6b2c9fe310965765 Copying blob sha256:8f77d8d5f3cb4628f916cac9c8fd099d2baa272cb2a018990f577271a1142d79 Copying config sha256:1a0a43404903099698225de9dc94c3a919a55be2570ecf1e5c490c7298256845 Writing manifest to image destination Storing signatures STEP 3: USER root STEP 4: RUN dnf upgrade -y && sed -i '1d;2d' /etc/nginx/nginx.conf && sed -i 's/80;/8080;/g' /etc/nginx/conf.d/default.conf && chown -R nginx:nginx /var/cache/nginx && chown -R nginx:nginx /var/log/nginx && chown -R nginx:nginx /etc/nginx && touch /var/run/nginx.pid && chown -R nginx:nginx /var/run/nginx.pid && dnf clean all && rm -rf /var/cache/dnf Red Hat Universal Base Image 8 (RPMs) - BaseOS 79 kB/s | 790 kB 00:10 Red Hat Universal Base Image 8 (RPMs) - AppStre 236 kB/s | 2.4 MB 00:10 Red Hat Universal Base Image 8 (RPMs) - CodeRea 1.4 kB/s | 14 kB 00:10 Dependencies resolved. Nothing to do. Complete! 25 files removed STEP 5: COPY --from=base /usr/share/nginx/html /usr/share/nginx/html STEP 6: USER nginx STEP 7: EXPOSE 8080 STEP 8: HEALTHCHECK --interval=10s --timeout=5s --start-period=1m --retries=5 CMD curl -I -f --max-time 5 http://localhost:8080 || exit 1 STEP 9: COMMIT registry1.dso.mil/ironbank-staging/opensource/excalidraw/excalidraw Getting image source signatures Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:46889fd082053d010cc9109b9a901829a1862236e8d2a674c0ec998cbd115520 Copying blob sha256:5e3348aa451b76dd2453533d7b899bc4b3da16866531be757429b6218693a3c5 Copying blob sha256:58a212536b92adf1ded8e59c5eb6bd999ed31cdda8e349c81a59dcefc1d061fb Copying config sha256:0d3dc656443a3c3e1fb9a2a7d6aa2779736f538d6db109f0e9451358d1182713 Writing manifest to image destination Storing signatures --> 0d3dc656443 0d3dc656443a3c3e1fb9a2a7d6aa2779736f538d6db109f0e9451358d1182713 + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/excalidraw/excalidraw registry1.dso.mil/ironbank-staging/opensource/excalidraw/excalidraw:ibci-414598 + buildah push --storage-driver=vfs --authfile staging_auth.json --digestfile=ci-artifacts/build/digest registry1.dso.mil/ironbank-staging/opensource/excalidraw/excalidraw:ibci-414598 Getting image source signatures Copying blob sha256:58a212536b92adf1ded8e59c5eb6bd999ed31cdda8e349c81a59dcefc1d061fb Copying blob sha256:5e3348aa451b76dd2453533d7b899bc4b3da16866531be757429b6218693a3c5 Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:46889fd082053d010cc9109b9a901829a1862236e8d2a674c0ec998cbd115520 Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying config sha256:0d3dc656443a3c3e1fb9a2a7d6aa2779736f538d6db109f0e9451358d1182713 Writing manifest to image destination Storing signatures Read the tags + echo 'Read the tags' + tags_file=ci-artifacts/preflight/tags.txt + test -f ci-artifacts/preflight/tags.txt + IFS= + read -r tag + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/excalidraw/excalidraw registry1.dso.mil/ironbank-staging/opensource/excalidraw/excalidraw:sha-8b3f236 + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/opensource/excalidraw/excalidraw:sha-8b3f236 Getting image source signatures Copying blob sha256:5e3348aa451b76dd2453533d7b899bc4b3da16866531be757429b6218693a3c5 Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying blob sha256:58a212536b92adf1ded8e59c5eb6bd999ed31cdda8e349c81a59dcefc1d061fb Copying blob sha256:46889fd082053d010cc9109b9a901829a1862236e8d2a674c0ec998cbd115520 Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying config sha256:0d3dc656443a3c3e1fb9a2a7d6aa2779736f538d6db109f0e9451358d1182713 Writing manifest to image destination Storing signatures + IFS= + read -r tag + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/excalidraw/excalidraw registry1.dso.mil/ironbank-staging/opensource/excalidraw/excalidraw:latest + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/opensource/excalidraw/excalidraw:latest Getting image source signatures Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:5e3348aa451b76dd2453533d7b899bc4b3da16866531be757429b6218693a3c5 Copying blob sha256:58a212536b92adf1ded8e59c5eb6bd999ed31cdda8e349c81a59dcefc1d061fb Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying blob sha256:46889fd082053d010cc9109b9a901829a1862236e8d2a674c0ec998cbd115520 Copying config sha256:0d3dc656443a3c3e1fb9a2a7d6aa2779736f538d6db109f0e9451358d1182713 Writing manifest to image destination Storing signatures + IFS= + read -r tag ++ podman inspect --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/excalidraw/excalidraw --format '{{.Id}}' time="2021-08-09T13:19:24Z" level=warning msg="Failed to detect the owner for the current cgroup: stat /sys/fs/cgroup/systemd/kubepods/burstable/pod384552c1-f02d-4d4c-a01f-2623c4bada8d/f09844eadda1b21abc8a981a396fff8cbecf4cc007a9792f0648681ca21b9ff4: no such file or directory" + IMAGE_ID=sha256:0d3dc656443a3c3e1fb9a2a7d6aa2779736f538d6db109f0e9451358d1182713 + echo IMAGE_ID=sha256:0d3dc656443a3c3e1fb9a2a7d6aa2779736f538d6db109f0e9451358d1182713 + IMAGE_PODMAN_SHA=sha256:d5cb13797fbbf99b205a09ae6502b7059b8a25867fb7fe3dc0b2679b354142de + echo IMAGE_PODMAN_SHA=sha256:d5cb13797fbbf99b205a09ae6502b7059b8a25867fb7fe3dc0b2679b354142de + echo IMAGE_FULLTAG=registry1.dso.mil/ironbank-staging/opensource/excalidraw/excalidraw:ibci-414598 + echo IMAGE_NAME=opensource/excalidraw/excalidraw + branches=("master" "development") A tarball of the built image can be retrieved from the create-tar job artifacts. + [[ master development =~ cade-update ]] + msg='A tarball of the built image can be retrieved from the create-tar job artifacts.' + echo 'A tarball of the built image can be retrieved from the create-tar job artifacts.' section_end:1628515164:step_script section_start:1628515164:upload_artifacts_on_success Uploading artifacts for successful job Uploading artifacts... ci-artifacts/build/: found 2 matching files and directories Uploading artifacts as "archive" to coordinator... ok id=5506515 responseStatus=201 Created token=2wBxYW_k Uploading artifacts... build.env: found 1 matching files and directories  Uploading artifacts as "dotenv" to coordinator... ok id=5506515 responseStatus=201 Created token=2wBxYW_k section_end:1628515166:upload_artifacts_on_success section_start:1628515166:cleanup_file_variables Cleaning up file based variables section_end:1628515166:cleanup_file_variables Job succeeded