Running with gitlab-runner 13.8.0 (775dd39d)  on dsop-shared-gitlab-runner-f887cbcbd-srgz6 E82_g8RG section_start:1628255401:resolve_secrets Resolving secrets section_end:1628255401:resolve_secrets section_start:1628255401:prepare_executor Preparing the "kubernetes" executor Using Kubernetes namespace: gitlab-runner-ironbank-dsop WARNING: Pulling GitLab Runner helper image from Docker Hub. Helper image is migrating to registry.gitlab.com, for more information see https://docs.gitlab.com/runner/configuration/advanced-configuration.html#migrating-helper-image-to-registrygitlabcom Using Kubernetes executor with image registry1.dso.mil/ironbank/ironbank-pipelines/rootless-podman:0.2 ... section_end:1628255401:prepare_executor section_start:1628255401:prepare_script Preparing environment Waiting for pod gitlab-runner-ironbank-dsop/runner-e82g8rg-project-5317-concurrent-0vgmld to be running, status is Pending Waiting for pod gitlab-runner-ironbank-dsop/runner-e82g8rg-project-5317-concurrent-0vgmld to be running, status is Pending ContainersNotInitialized: "containers with incomplete status: [istio-init]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" Waiting for pod gitlab-runner-ironbank-dsop/runner-e82g8rg-project-5317-concurrent-0vgmld to be running, status is Pending ContainersNotReady: "containers with unready status: [build helper istio-proxy]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" Running on runner-e82g8rg-project-5317-concurrent-0vgmld via dsop-shared-gitlab-runner-f887cbcbd-srgz6... section_end:1628255410:prepare_script section_start:1628255410:get_sources Getting source from Git repository $ until [ $(curl --fail --silent --output /dev/stderr --write-out "%{http_code}" localhost:15020/healthz/ready) -eq 200 ]; do echo Waiting for Sidecar; sleep 3 ; done ; echo Sidecar available; Sidecar available Fetching changes with git depth set to 50... Initialized empty Git repository in /builds/dsop/opensource/jaegertracing/jaeger-collector/.git/ Created fresh repository. Checking out 4e0122b8 as development... Skipping object checkout, Git LFS is not installed. Skipping Git submodules setup section_end:1628255411:get_sources section_start:1628255411:download_artifacts Downloading artifacts Downloading artifacts for hardening-manifest (5429338)... Downloading artifacts from coordinator... ok  id=5429338 responseStatus=200 OK token=sZwsZmnZ WARNING: ci-artifacts/preflight/: lchown ci-artifacts/preflight/: operation not permitted (suppressing repeats) Downloading artifacts for import-artifacts (5429340)... Downloading artifacts from coordinator... ok  id=5429340 responseStatus=200 OK token=eMznrLJU WARNING: ci-artifacts/import-artifacts/: lchown ci-artifacts/import-artifacts/: operation not permitted (suppressing repeats) Downloading artifacts for load-scripts (5429335)... Downloading artifacts from coordinator... ok  id=5429335 responseStatus=200 OK token=bauYZ4Qf Downloading artifacts for wl-compare-lint (5429339)... WARNING: ci-artifacts/[MASKED]/: lchown ci-artifacts/[MASKED]/: operation not permitted (suppressing repeats) Downloading artifacts from coordinator... ok  id=5429339 responseStatus=200 OK token=zQ2V8wyr WARNING: ci-artifacts/lint/: lchown ci-artifacts/lint/: operation not permitted (suppressing repeats) section_end:1628255412:download_artifacts section_start:1628255412:step_script Executing "step_script" stage of the job script $ "${PIPELINE_REPO_DIR}/stages/build/build-run.sh" Determine source registry based on branch Load any images used in Dockerfile build loading image ci-artifacts/import-artifacts/images/jaegertracing-jaeger-collector-1.25.0.tar time="2021-08-06T13:10:13Z" level=warning msg="Failed to detect the owner for the current cgroup: stat /sys/fs/cgroup/systemd/kubepods/burstable/podfdb4da4a-5502-4287-8a89-6b0d5770c747/e9893bdd34fe338b420caad38e5f079e96574a425c0089f579a66c1fe331937f: no such file or directory" Getting image source signatures Copying blob sha256:b3e21f3cdfb81db18587df245b1020260c8ec0c6467480613d1968130cbf99dd Copying blob sha256:25ffe3380aa60886f1a55c3cb68af53677f3031a9d2b2251f86000ee808167cb Copying blob sha256:b2d5eeeaba3a22b9b8aa97261957974a6bd65274ebd43e1d81d0a7b8b752b116 Copying config sha256:a9edcbcedef72834da575551866b3b158c7652c38a5cdbd36bac9d875ac0dd27 Writing manifest to image destination Storing signatures Loaded image(s): localhost/jaegertracing/jaeger-collector:1.25.0 Load HTTP and S3 external resources Converting labels from hardening manifest into command line args Converting build args from hardening manifest into command line args Build the image STEP 1: FROM jaegertracing/jaeger-collector:1.25.0 AS source Getting image source signatures Copying blob sha256:b2d5eeeaba3a22b9b8aa97261957974a6bd65274ebd43e1d81d0a7b8b752b116 Copying blob sha256:b3e21f3cdfb81db18587df245b1020260c8ec0c6467480613d1968130cbf99dd Copying blob sha256:25ffe3380aa60886f1a55c3cb68af53677f3031a9d2b2251f86000ee808167cb Copying config sha256:81dd2503ea3a4d1d253b9b1ca59ef1d98bee5d4ba55bd05437f8163fc315cfc7 Writing manifest to image destination Storing signatures --> 81dd2503ea3 STEP 2: FROM registry1.dso.mil/ironbank/redhat/ubi/ubi8:8.4 Getting image source signatures Copying blob sha256:12db700c3dbca27ed889da6e871f4d37d4ec5c6ef26487ee99de9a3146f418cb Copying blob sha256:a538c9b9760931040405e4c827d816c820fc4738284b4f51a1bb0c872fb4b45d Copying blob sha256:53732dad4680ae165f569331357b89605c03583057db7193a7a4fabdf312f061 Copying config sha256:ffaa0ee7d4cb0a47fe1e9cce38f282925fb14949d72aa23e0cc2f12a5ef1ce0f Writing manifest to image destination Storing signatures STEP 3: COPY --from=source /go/bin/collector-linux /go/bin/collector-linux STEP 4: RUN dnf upgrade -y && dnf clean all && rm -rf /var/cache/dnf Red Hat Universal Base Image 8 (RPMs) - BaseOS 79 kB/s | 790 kB 00:10 Red Hat Universal Base Image 8 (RPMs) - AppStre 237 kB/s | 2.4 MB 00:10 Red Hat Universal Base Image 8 (RPMs) - CodeRea 1.4 kB/s | 14 kB 00:10 Dependencies resolved. Nothing to do. Complete! 25 files removed STEP 5: RUN groupadd -g 1001 jcollector && useradd -r -u 1001 -m -s /sbin/nologin -g jcollector jcollector STEP 6: USER jcollector STEP 7: HEALTHCHECK --start-period=3s --timeout=5s --interval=3s --retries=3 CMD curl -fs http://localhost:14269 || exit 1 STEP 8: EXPOSE 14250/tcp STEP 9: ENTRYPOINT ["/go/bin/collector-linux"] STEP 10: COMMIT registry1.dso.mil/ironbank-staging/opensource/jaegertracing/jaeger-collector Getting image source signatures Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:bddca03e8250de627a63330243e94d72423debd6c1047c0d83b55bc8ec5738c4 Copying blob sha256:30840104d62911db298e2dc6f2ea17c6ff203a167e40fb8bddf908efb85c3319 Copying config sha256:da9b43416897c12d8a7fd471d2ff97a8760862211b15a87145e0d03ea1761287 Writing manifest to image destination Storing signatures --> da9b4341689 da9b43416897c12d8a7fd471d2ff97a8760862211b15a87145e0d03ea1761287 + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/jaegertracing/jaeger-collector registry1.dso.mil/ironbank-staging/opensource/jaegertracing/jaeger-collector:ibci-409547 + buildah push --storage-driver=vfs --authfile staging_auth.json --digestfile=ci-artifacts/build/digest registry1.dso.mil/ironbank-staging/opensource/jaegertracing/jaeger-collector:ibci-409547 Getting image source signatures Copying blob sha256:30840104d62911db298e2dc6f2ea17c6ff203a167e40fb8bddf908efb85c3319 Copying blob sha256:bddca03e8250de627a63330243e94d72423debd6c1047c0d83b55bc8ec5738c4 Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying config sha256:da9b43416897c12d8a7fd471d2ff97a8760862211b15a87145e0d03ea1761287 Writing manifest to image destination Storing signatures Read the tags + echo 'Read the tags' + tags_file=ci-artifacts/preflight/tags.txt + test -f ci-artifacts/preflight/tags.txt + IFS= + read -r tag + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/jaegertracing/jaeger-collector registry1.dso.mil/ironbank-staging/opensource/jaegertracing/jaeger-collector:1.25.0 + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/opensource/jaegertracing/jaeger-collector:1.25.0 Getting image source signatures Copying blob sha256:30840104d62911db298e2dc6f2ea17c6ff203a167e40fb8bddf908efb85c3319 Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:bddca03e8250de627a63330243e94d72423debd6c1047c0d83b55bc8ec5738c4 Copying config sha256:da9b43416897c12d8a7fd471d2ff97a8760862211b15a87145e0d03ea1761287 Writing manifest to image destination Storing signatures + IFS= + read -r tag + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/jaegertracing/jaeger-collector registry1.dso.mil/ironbank-staging/opensource/jaegertracing/jaeger-collector:latest + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/opensource/jaegertracing/jaeger-collector:latest Getting image source signatures Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying blob sha256:30840104d62911db298e2dc6f2ea17c6ff203a167e40fb8bddf908efb85c3319 Copying blob sha256:bddca03e8250de627a63330243e94d72423debd6c1047c0d83b55bc8ec5738c4 Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying config sha256:da9b43416897c12d8a7fd471d2ff97a8760862211b15a87145e0d03ea1761287 Writing manifest to image destination Storing signatures + IFS= + read -r tag ++ podman inspect --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/jaegertracing/jaeger-collector --format '{{.Id}}' time="2021-08-06T13:12:17Z" level=warning msg="Failed to detect the owner for the current cgroup: stat /sys/fs/cgroup/systemd/kubepods/burstable/podfdb4da4a-5502-4287-8a89-6b0d5770c747/e9893bdd34fe338b420caad38e5f079e96574a425c0089f579a66c1fe331937f: no such file or directory" + IMAGE_ID=sha256:da9b43416897c12d8a7fd471d2ff97a8760862211b15a87145e0d03ea1761287 + echo IMAGE_ID=sha256:da9b43416897c12d8a7fd471d2ff97a8760862211b15a87145e0d03ea1761287 + IMAGE_PODMAN_SHA=sha256:f68ea7844e18209b3bf14b00f9a92044d6bdb35d816476f2c52c95998f4ffe94 + echo IMAGE_PODMAN_SHA=sha256:f68ea7844e18209b3bf14b00f9a92044d6bdb35d816476f2c52c95998f4ffe94 + echo IMAGE_FULLTAG=registry1.dso.mil/ironbank-staging/opensource/jaegertracing/jaeger-collector:ibci-409547 + echo IMAGE_NAME=opensource/jaegertracing/jaeger-collector + branches=("master" "development") + [[ master development =~ development ]] + msg='A tarball of the built image can be retrieved from the documentation job artifacts.' + echo 'A tarball of the built image can be retrieved from the documentation job artifacts.' A tarball of the built image can be retrieved from the documentation job artifacts. section_end:1628255537:step_script section_start:1628255537:upload_artifacts_on_success Uploading artifacts for successful job Uploading artifacts... ci-artifacts/build/: found 2 matching files and directories Uploading artifacts as "archive" to coordinator... ok id=5429342 responseStatus=201 Created token=7VKxNfBs Uploading artifacts... build.env: found 1 matching files and directories  Uploading artifacts as "dotenv" to coordinator... ok id=5429342 responseStatus=201 Created token=7VKxNfBs section_end:1628255539:upload_artifacts_on_success section_start:1628255539:cleanup_file_variables Cleaning up file based variables section_end:1628255540:cleanup_file_variables Job succeeded