Running with gitlab-runner 13.12.0 (7a6612da)  on dsop-shared-gitlab-runner-5fcd8977b8-m6qmr JrExJ6yx  feature flags: FF_USE_LEGACY_KUBERNETES_EXECUTION_STRATEGY:false section_start:1631142753:resolve_secrets Resolving secrets section_end:1631142753:resolve_secrets section_start:1631142753:prepare_executor Preparing the "kubernetes" executor Using Kubernetes namespace: gitlab-runner-ironbank-dsop Using Kubernetes executor with image registry1.dso.mil/ironbank/ironbank-pipelines/rootless-podman:0.2 ... Using attach strategy to execute scripts... section_end:1631142753:prepare_executor section_start:1631142753:prepare_script Preparing environment Waiting for pod gitlab-runner-ironbank-dsop/runner-jrexj6yx-project-5318-concurrent-08vsw5 to be running, status is Pending Waiting for pod gitlab-runner-ironbank-dsop/runner-jrexj6yx-project-5318-concurrent-08vsw5 to be running, status is Pending ContainersNotReady: "containers with unready status: [build helper istio-proxy]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" Running on runner-jrexj6yx-project-5318-concurrent-08vsw5 via dsop-shared-gitlab-runner-5fcd8977b8-m6qmr... section_end:1631142759:prepare_script section_start:1631142759:get_sources Getting source from Git repository $ until [ $(curl --fail --silent --output /dev/stderr --write-out "%{http_code}" localhost:15020/healthz/ready) -eq 200 ]; do echo Waiting for Sidecar; sleep 3 ; done ; echo Sidecar available; Sidecar available Fetching changes with git depth set to 50... Initialized empty Git repository in /builds/JrExJ6yx/0/dsop/opensource/jaegertracing/jaeger-ingester/.git/ Created fresh repository. Checking out db5fa6c0 as master... Skipping Git submodules setup section_end:1631142760:get_sources section_start:1631142760:download_artifacts Downloading artifacts Downloading artifacts for hardening-manifest (6329023)... Downloading artifacts from coordinator... ok  id=6329023 responseStatus=200 OK token=iqy2rA3E WARNING: ci-artifacts/preflight/: lchown ci-artifacts/preflight/: operation not permitted (suppressing repeats) Downloading artifacts for import-artifacts (6329025)... Downloading artifacts from coordinator... ok  id=6329025 responseStatus=200 OK token=C2ySqyq7 WARNING: ci-artifacts/import-artifacts/: lchown ci-artifacts/import-artifacts/: operation not permitted (suppressing repeats) Downloading artifacts for load-scripts (6329020)... Downloading artifacts from coordinator... ok  id=6329020 responseStatus=200 OK token=sdL67ZwG WARNING: ci-artifacts/[MASKED]/: lchown ci-artifacts/[MASKED]/: operation not permitted (suppressing repeats) Downloading artifacts for wl-compare-lint (6329024)... Downloading artifacts from coordinator... ok  id=6329024 responseStatus=200 OK token=kn556Mn5 WARNING: ci-artifacts/lint/: lchown ci-artifacts/lint/: operation not permitted (suppressing repeats) section_end:1631142762:download_artifacts section_start:1631142762:step_script Executing "step_script" stage of the job script $ "${PIPELINE_REPO_DIR}/stages/build/build-run.sh" Determine source registry based on branch Load any images used in Dockerfile build loading image ci-artifacts/import-artifacts/images/jaegertracing-jaeger-ingester-1.26.0.tar Getting image source signatures Copying blob sha256:f1dd685eb59e7d19dd353b02c4679d9fafd21ccffe1f51960e6c3645f3ceb0cd Copying blob sha256:396b00af30964908ebd70abb40f4fa07fbd45d033ed3c5233fd16ac416a5fa6d Copying blob sha256:faf95e8bfa6d42f8907e473c5b973e94a233648c2f085b3de274a3685f3d2bea Copying config sha256:988ee8c85df4b34ff50beac0a1e3a738e1ca51a99953de51f092806d10147c35 Writing manifest to image destination Storing signatures Loaded image(s): localhost/jaegertracing/jaeger-ingester:1.26.0 Load HTTP and S3 external resources Converting labels from hardening manifest into command line args Converting build args from hardening manifest into command line args Build the image STEP 1: FROM jaegertracing/jaeger-ingester:1.26.0 AS source Getting image source signatures Copying blob sha256:f1dd685eb59e7d19dd353b02c4679d9fafd21ccffe1f51960e6c3645f3ceb0cd Copying blob sha256:faf95e8bfa6d42f8907e473c5b973e94a233648c2f085b3de274a3685f3d2bea Copying blob sha256:396b00af30964908ebd70abb40f4fa07fbd45d033ed3c5233fd16ac416a5fa6d Copying config sha256:ad9f885cc6d4ea88f43e1ac7474123cb8ba45f968f4e6610995cabd5b4cdd141 Writing manifest to image destination Storing signatures --> ad9f885cc6d STEP 2: FROM registry1.dso.mil/ironbank/redhat/ubi/ubi8:8.4 Trying to pull registry1.dso.mil/ironbank/redhat/ubi/ubi8:8.4... Getting image source signatures Copying blob sha256:96476a77b28db43fcb170401c287700d91d95cdff9c06e5ea7b48289d40a8e57 Copying blob sha256:2de9c288ff0cf59cd0269e1bb62a9351be3d200aafc1fd11d9e1ba08b0e6f345 Copying blob sha256:db2f50b75fc09a20e8d9c497d96ad384fbeacf7e77df71e4c7b578d4c07fccce Copying config sha256:abd78a7b9379f5c09a4b90b629aede4f8a42935d4ee267788900d3fcb4174f11 Writing manifest to image destination Storing signatures STEP 3: COPY --from=source /go/bin/ingester-linux /go/bin/ingester-linux STEP 4: RUN dnf upgrade -y && dnf install -y curl ca-certificates && dnf clean all && rm -rf /var/cache/dnf Red Hat Universal Base Image 8 (RPMs) - BaseOS 79 kB/s | 790 kB 00:10 Red Hat Universal Base Image 8 (RPMs) - AppStre 247 kB/s | 2.4 MB 00:09 Red Hat Universal Base Image 8 (RPMs) - CodeRea 1.4 kB/s | 14 kB 00:10 Dependencies resolved. Nothing to do. Complete! Last metadata expiration check: 0:00:01 ago on Wed Sep 8 23:13:35 2021. Package curl-7.61.1-18.el8.x86_64 is already installed. Package ca-certificates-2020.2.41-80.0.el8_2.noarch is already installed. Dependencies resolved. Nothing to do. Complete! 25 files removed STEP 5: RUN groupadd -g 1000 ingester && useradd -r -u 1000 -G ingester -g ingester ingester STEP 6: USER ingester STEP 7: HEALTHCHECK --start-period=3s --timeout=5s --interval=3s --retries=3 CMD curl -fs http://localhost:14270 || exit STEP 8: EXPOSE 14270/tcp STEP 9: ENTRYPOINT ["/go/bin/ingester-linux"] STEP 10: COMMIT registry1.dso.mil/ironbank-staging/opensource/jaegertracing/jaeger-ingester Getting image source signatures Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:4fac780b23d7cd645ee31b3da7f7a5b7da354b9f9cbc2a90a8fd8d4a2907c7cd Copying blob sha256:a6c3925b69cebd0e84d7b5f9ba229cb5afb75d1e0c951ff74606c4d6c8a4431c Copying config sha256:a786c74a2c5189fc94d2189ca6081a8d17478a3bba1bedd25a946c9377cd6805 Writing manifest to image destination Storing signatures --> a786c74a2c5 Successfully tagged registry1.dso.mil/ironbank-staging/opensource/jaegertracing/jaeger-ingester:latest a786c74a2c5189fc94d2189ca6081a8d17478a3bba1bedd25a946c9377cd6805 + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/jaegertracing/jaeger-ingester registry1.dso.mil/ironbank-staging/opensource/jaegertracing/jaeger-ingester:ibci-466792 + buildah push --storage-driver=vfs --authfile staging_auth.json --digestfile=ci-artifacts/build/digest registry1.dso.mil/ironbank-staging/opensource/jaegertracing/jaeger-ingester:ibci-466792 Getting image source signatures Copying blob sha256:a6c3925b69cebd0e84d7b5f9ba229cb5afb75d1e0c951ff74606c4d6c8a4431c Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:4fac780b23d7cd645ee31b3da7f7a5b7da354b9f9cbc2a90a8fd8d4a2907c7cd Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying config sha256:a786c74a2c5189fc94d2189ca6081a8d17478a3bba1bedd25a946c9377cd6805 Writing manifest to image destination Storing signatures + echo 'Read the tags' Read the tags + tags_file=ci-artifacts/preflight/tags.txt + test -f ci-artifacts/preflight/tags.txt + IFS= + read -r tag + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/jaegertracing/jaeger-ingester registry1.dso.mil/ironbank-staging/opensource/jaegertracing/jaeger-ingester:1.26.0 + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/opensource/jaegertracing/jaeger-ingester:1.26.0 Getting image source signatures Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying blob sha256:4fac780b23d7cd645ee31b3da7f7a5b7da354b9f9cbc2a90a8fd8d4a2907c7cd Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:a6c3925b69cebd0e84d7b5f9ba229cb5afb75d1e0c951ff74606c4d6c8a4431c Copying config sha256:a786c74a2c5189fc94d2189ca6081a8d17478a3bba1bedd25a946c9377cd6805 Writing manifest to image destination Storing signatures + IFS= + read -r tag + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/jaegertracing/jaeger-ingester registry1.dso.mil/ironbank-staging/opensource/jaegertracing/jaeger-ingester:latest + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/opensource/jaegertracing/jaeger-ingester:latest Getting image source signatures Copying blob sha256:4fac780b23d7cd645ee31b3da7f7a5b7da354b9f9cbc2a90a8fd8d4a2907c7cd Copying blob sha256:a6c3925b69cebd0e84d7b5f9ba229cb5afb75d1e0c951ff74606c4d6c8a4431c Copying blob sha256:bfb9caafb0fc0d8496a27709f1698ac90d1a306556387a75b92a86063544f4c8 Copying blob sha256:98469092e6042f8c9cc81dcb1a710957fb5ef27817c9b178f7b71c4f242cb2ed Copying config sha256:a786c74a2c5189fc94d2189ca6081a8d17478a3bba1bedd25a946c9377cd6805 Writing manifest to image destination Storing signatures + IFS= + read -r tag ++ podman inspect --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/jaegertracing/jaeger-ingester --format '{{.Id}}' + IMAGE_ID=sha256:a786c74a2c5189fc94d2189ca6081a8d17478a3bba1bedd25a946c9377cd6805 + echo IMAGE_ID=sha256:a786c74a2c5189fc94d2189ca6081a8d17478a3bba1bedd25a946c9377cd6805 + IMAGE_PODMAN_SHA=sha256:37af9e37712a288ebe2aa7fecc364d76db7ce89847e5af233748d4a9ce78d970 + echo IMAGE_PODMAN_SHA=sha256:37af9e37712a288ebe2aa7fecc364d76db7ce89847e5af233748d4a9ce78d970 + echo IMAGE_FULLTAG=registry1.dso.mil/ironbank-staging/opensource/jaegertracing/jaeger-ingester:ibci-466792 + echo IMAGE_NAME=opensource/jaegertracing/jaeger-ingester + branches=("master" "development") + [[ master development =~ master ]] + msg='A tarball of the built image can be retrieved from the documentation job artifacts.' + echo 'A tarball of the built image can be retrieved from the documentation job artifacts.' A tarball of the built image can be retrieved from the documentation job artifacts. section_end:1631142846:step_script section_start:1631142846:upload_artifacts_on_success Uploading artifacts for successful job Uploading artifacts... ci-artifacts/build/: found 2 matching files and directories Uploading artifacts as "archive" to coordinator... ok id=6329027 responseStatus=201 Created token=JReDo6tY Uploading artifacts... build.env: found 1 matching files and directories  Uploading artifacts as "dotenv" to coordinator... ok id=6329027 responseStatus=201 Created token=JReDo6tY section_end:1631142849:upload_artifacts_on_success section_start:1631142849:cleanup_file_variables Cleaning up file based variables section_end:1631142849:cleanup_file_variables Job succeeded