Running with gitlab-runner 13.12.0 (7a6612da)  on dsop-shared-gitlab-runner-5fcd8977b8-m6qmr JrExJ6yx  feature flags: FF_USE_LEGACY_KUBERNETES_EXECUTION_STRATEGY:false section_start:1631110506:resolve_secrets Resolving secrets section_end:1631110506:resolve_secrets section_start:1631110506:prepare_executor Preparing the "kubernetes" executor Using Kubernetes namespace: gitlab-runner-ironbank-dsop Using Kubernetes executor with image registry1.dso.mil/ironbank/ironbank-pipelines/rootless-podman:0.2 ... Using attach strategy to execute scripts... section_end:1631110506:prepare_executor section_start:1631110506:prepare_script Preparing environment Waiting for pod gitlab-runner-ironbank-dsop/runner-jrexj6yx-project-1229-concurrent-0pvddk to be running, status is Pending Waiting for pod gitlab-runner-ironbank-dsop/runner-jrexj6yx-project-1229-concurrent-0pvddk to be running, status is Pending ContainersNotReady: "containers with unready status: [build helper istio-proxy]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" Running on runner-jrexj6yx-project-1229-concurrent-0pvddk via dsop-shared-gitlab-runner-5fcd8977b8-m6qmr... section_end:1631110512:prepare_script section_start:1631110512:get_sources Getting source from Git repository $ until [ $(curl --fail --silent --output /dev/stderr --write-out "%{http_code}" localhost:15020/healthz/ready) -eq 200 ]; do echo Waiting for Sidecar; sleep 3 ; done ; echo Sidecar available; Sidecar available Fetching changes with git depth set to 50... Initialized empty Git repository in /builds/JrExJ6yx/0/dsop/opensource/goharbor/harbor-registryctl/.git/ Created fresh repository. Checking out 84071e5c as master... Skipping Git submodules setup section_end:1631110514:get_sources section_start:1631110514:download_artifacts Downloading artifacts Downloading artifacts for hardening-manifest (6321603)... Downloading artifacts from coordinator... ok  id=6321603 responseStatus=200 OK token=SZDtuN_x WARNING: ci-artifacts/preflight/: lchown ci-artifacts/preflight/: operation not permitted (suppressing repeats) Downloading artifacts for import-artifacts (6321605)... Downloading artifacts from coordinator... ok  id=6321605 responseStatus=200 OK token=zkw6Jxti WARNING: ci-artifacts/import-artifacts/: lchown ci-artifacts/import-artifacts/: operation not permitted (suppressing repeats) Downloading artifacts for load-scripts (6321600)... Downloading artifacts from coordinator... ok  id=6321600 responseStatus=200 OK token=ogVWug2J WARNING: ci-artifacts/[MASKED]/: lchown ci-artifacts/[MASKED]/: operation not permitted (suppressing repeats) Downloading artifacts for wl-compare-lint (6321604)... Downloading artifacts from coordinator... ok  id=6321604 responseStatus=200 OK token=3d98yCy- WARNING: ci-artifacts/lint/: lchown ci-artifacts/lint/: operation not permitted (suppressing repeats) section_end:1631110517:download_artifacts section_start:1631110517:step_script Executing "step_script" stage of the job script $ "${PIPELINE_REPO_DIR}/stages/build/build-run.sh" Determine source registry based on branch Load any images used in Dockerfile build loading image ci-artifacts/import-artifacts/images/goharbor-harbor-registryctl-v2.3.2.tar Getting image source signatures Copying blob sha256:9b458167a646d6f89623ee17034692967824c03d69b85e48e325cf73b43b0c6c Copying blob sha256:a056039f5f6df6e7cd859b32eb8ac002dca677cb7f03a2964c148000f2f8e834 Copying blob sha256:166cfc19ad5d6763d8a3e3ceb032bab34116d399d280464405df4e99ffec8919 Copying blob sha256:f85726ba84dcf1d3936aaa81b00b84d9c9a3a404e75995a09bfce2b7e780abc7 Copying blob sha256:c90e384ee5a44c68186bee3dc96d8950d1bdf0d0e007fe4fba0293ff3dff52db Copying blob sha256:f6e68d4c9b228398cd02847bc1475a8e23e316eb4adfa223ec3ff75177656504 Copying blob sha256:2a481503dae18e278a7b189a459a585e52ac6ecbe6210a624b7756878faa375b Copying config sha256:0e551984a22c7dcf703d87a4e8c3dc23b0a80a1e659605e634583c5dd6d33ec9 Writing manifest to image destination Storing signatures Loaded image(s): localhost/goharbor/harbor-registryctl:v2.3.2 Load HTTP and S3 external resources Converting labels from hardening manifest into command line args Converting build args from hardening manifest into command line args Build the image STEP 1: FROM goharbor/harbor-registryctl:v2.3.2 AS base Getting image source signatures Copying blob sha256:f6e68d4c9b228398cd02847bc1475a8e23e316eb4adfa223ec3ff75177656504 Copying blob sha256:f85726ba84dcf1d3936aaa81b00b84d9c9a3a404e75995a09bfce2b7e780abc7 Copying blob sha256:a056039f5f6df6e7cd859b32eb8ac002dca677cb7f03a2964c148000f2f8e834 Copying blob sha256:c90e384ee5a44c68186bee3dc96d8950d1bdf0d0e007fe4fba0293ff3dff52db Copying blob sha256:166cfc19ad5d6763d8a3e3ceb032bab34116d399d280464405df4e99ffec8919 Copying blob sha256:9b458167a646d6f89623ee17034692967824c03d69b85e48e325cf73b43b0c6c Copying blob sha256:2a481503dae18e278a7b189a459a585e52ac6ecbe6210a624b7756878faa375b Copying config sha256:d5fa04b5d5a79d4cc111a972aabbe1eb7d0475bee0a1406a9c699e7fe5250f6c Writing manifest to image destination Storing signatures --> d5fa04b5d5a STEP 2: FROM registry1.dso.mil/ironbank/redhat/ubi/ubi8:8.4 Trying to pull registry1.dso.mil/ironbank/redhat/ubi/ubi8:8.4... Getting image source signatures Copying blob sha256:2de9c288ff0cf59cd0269e1bb62a9351be3d200aafc1fd11d9e1ba08b0e6f345 Copying blob sha256:96476a77b28db43fcb170401c287700d91d95cdff9c06e5ea7b48289d40a8e57 Copying blob sha256:db2f50b75fc09a20e8d9c497d96ad384fbeacf7e77df71e4c7b578d4c07fccce Copying config sha256:abd78a7b9379f5c09a4b90b629aede4f8a42935d4ee267788900d3fcb4174f11 Writing manifest to image destination Storing signatures STEP 3: RUN groupadd -g 10000 harbor && useradd -r -u 10000 -m -s /sbin/nologin -g harbor harbor && mkdir -p /etc/registry && dnf upgrade -y && dnf clean all && rm -rf /var/cache/dnf Red Hat Universal Base Image 8 (RPMs) - BaseOS 79 kB/s | 790 kB 00:10 Red Hat Universal Base Image 8 (RPMs) - AppStre 243 kB/s | 2.4 MB 00:10 Red Hat Universal Base Image 8 (RPMs) - CodeRea 1.5 kB/s | 14 kB 00:09 Dependencies resolved. Nothing to do. Complete! 25 files removed STEP 4: COPY --from=base --chown=harbor:harbor /home/harbor/harbor_registryctl /home/harbor/harbor_registryctl STEP 5: COPY --from=base /usr/bin/registry_DO_NOT_USE_GC /usr/bin/registry_DO_NOT_USE_GC STEP 6: WORKDIR /home/harbor STEP 7: USER harbor STEP 8: VOLUME ["/var/lib/registry"] STEP 9: HEALTHCHECK CMD curl -fs http://localhost:8080/api/health || curl -fsk --key /etc/harbor/ssl/registryctl.key --cert /etc/harbor/ssl/registryctl.crt https://localhost:8443/api/health || exit 1 STEP 10: ENTRYPOINT ["/home/harbor/harbor_registryctl"] STEP 11: CMD ["-c", "/etc/registryctl/config.yml"] STEP 12: COMMIT registry1.dso.mil/ironbank-staging/opensource/goharbor/harbor-registryctl Getting image source signatures Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:4fac780b23d7cd645ee31b3da7f7a5b7da354b9f9cbc2a90a8fd8d4a2907c7cd Copying blob sha256:487a77a79fd5dd20cfbc0d4c05836d3de2fa7f98f5f1d8b81099a09926456b9f Copying config sha256:ab4228428a9149216a7abb306d1bd988f65b710ac54fabcc1846e15ff4e5ec96 Writing manifest to image destination Storing signatures --> ab4228428a9 Successfully tagged registry1.dso.mil/ironbank-staging/opensource/goharbor/harbor-registryctl:latest ab4228428a9149216a7abb306d1bd988f65b710ac54fabcc1846e15ff4e5ec96 + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/goharbor/harbor-registryctl registry1.dso.mil/ironbank-staging/opensource/goharbor/harbor-registryctl:ibci-466200 + buildah push --storage-driver=vfs --authfile staging_auth.json --digestfile=ci-artifacts/build/digest registry1.dso.mil/ironbank-staging/opensource/goharbor/harbor-registryctl:ibci-466200 Getting image source signatures Copying blob sha256:487a77a79fd5dd20cfbc0d4c05836d3de2fa7f98f5f1d8b81099a09926456b9f Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:4fac780b23d7cd645ee31b3da7f7a5b7da354b9f9cbc2a90a8fd8d4a2907c7cd Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying config sha256:ab4228428a9149216a7abb306d1bd988f65b710ac54fabcc1846e15ff4e5ec96 Writing manifest to image destination Storing signatures + echo 'Read the tags' Read the tags + tags_file=ci-artifacts/preflight/tags.txt + test -f ci-artifacts/preflight/tags.txt + IFS= + read -r tag + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/goharbor/harbor-registryctl registry1.dso.mil/ironbank-staging/opensource/goharbor/harbor-registryctl:v2.3.2 + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/opensource/goharbor/harbor-registryctl:v2.3.2 Getting image source signatures Copying blob sha256:4fac780b23d7cd645ee31b3da7f7a5b7da354b9f9cbc2a90a8fd8d4a2907c7cd Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying blob sha256:487a77a79fd5dd20cfbc0d4c05836d3de2fa7f98f5f1d8b81099a09926456b9f Copying config sha256:ab4228428a9149216a7abb306d1bd988f65b710ac54fabcc1846e15ff4e5ec96 Writing manifest to image destination Storing signatures + IFS= + read -r tag + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/goharbor/harbor-registryctl registry1.dso.mil/ironbank-staging/opensource/goharbor/harbor-registryctl:latest + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/opensource/goharbor/harbor-registryctl:latest Getting image source signatures Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:487a77a79fd5dd20cfbc0d4c05836d3de2fa7f98f5f1d8b81099a09926456b9f Copying blob sha256:4fac780b23d7cd645ee31b3da7f7a5b7da354b9f9cbc2a90a8fd8d4a2907c7cd Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying config sha256:ab4228428a9149216a7abb306d1bd988f65b710ac54fabcc1846e15ff4e5ec96 Writing manifest to image destination Storing signatures + IFS= + read -r tag ++ podman inspect --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/goharbor/harbor-registryctl --format '{{.Id}}' + IMAGE_ID=sha256:ab4228428a9149216a7abb306d1bd988f65b710ac54fabcc1846e15ff4e5ec96 + echo IMAGE_ID=sha256:ab4228428a9149216a7abb306d1bd988f65b710ac54fabcc1846e15ff4e5ec96 + IMAGE_PODMAN_SHA=sha256:462282260928e926119da8e53240b5068e556f717aef79a7f0cec748f631d45b + echo IMAGE_PODMAN_SHA=sha256:462282260928e926119da8e53240b5068e556f717aef79a7f0cec748f631d45b + echo IMAGE_FULLTAG=registry1.dso.mil/ironbank-staging/opensource/goharbor/harbor-registryctl:ibci-466200 + echo IMAGE_NAME=opensource/goharbor/harbor-registryctl + branches=("master" "development") + [[ master development =~ master ]] + msg='A tarball of the built image can be retrieved from the documentation job artifacts.' + echo 'A tarball of the built image can be retrieved from the documentation job artifacts.' A tarball of the built image can be retrieved from the documentation job artifacts. section_end:1631110604:step_script section_start:1631110604:upload_artifacts_on_success Uploading artifacts for successful job Uploading artifacts... ci-artifacts/build/: found 2 matching files and directories Uploading artifacts as "archive" to coordinator... ok id=6321607 responseStatus=201 Created token=M_4t8zuM Uploading artifacts... build.env: found 1 matching files and directories  Uploading artifacts as "dotenv" to coordinator... ok id=6321607 responseStatus=201 Created token=M_4t8zuM section_end:1631110606:upload_artifacts_on_success section_start:1631110606:cleanup_file_variables Cleaning up file based variables section_end:1631110606:cleanup_file_variables Job succeeded