Running with gitlab-runner 13.8.0 (775dd39d)  on dsop-shared-gitlab-runner-f887cbcbd-srgz6 E82_g8RG section_start:1628212022:resolve_secrets Resolving secrets section_end:1628212022:resolve_secrets section_start:1628212022:prepare_executor Preparing the "kubernetes" executor Using Kubernetes namespace: gitlab-runner-ironbank-dsop WARNING: Pulling GitLab Runner helper image from Docker Hub. Helper image is migrating to registry.gitlab.com, for more information see https://docs.gitlab.com/runner/configuration/advanced-configuration.html#migrating-helper-image-to-registrygitlabcom Using Kubernetes executor with image registry1.dso.mil/ironbank/ironbank-pipelines/rootless-podman:0.2 ... section_end:1628212022:prepare_executor section_start:1628212022:prepare_script Preparing environment Waiting for pod gitlab-runner-ironbank-dsop/runner-e82g8rg-project-5684-concurrent-0zmlsc to be running, status is Pending Waiting for pod gitlab-runner-ironbank-dsop/runner-e82g8rg-project-5684-concurrent-0zmlsc to be running, status is Pending ContainersNotInitialized: "containers with incomplete status: [istio-init]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" Waiting for pod gitlab-runner-ironbank-dsop/runner-e82g8rg-project-5684-concurrent-0zmlsc to be running, status is Pending ContainersNotReady: "containers with unready status: [build helper istio-proxy]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" Running on runner-e82g8rg-project-5684-concurrent-0zmlsc via dsop-shared-gitlab-runner-f887cbcbd-srgz6... section_end:1628212031:prepare_script section_start:1628212031:get_sources Getting source from Git repository $ until [ $(curl --fail --silent --output /dev/stderr --write-out "%{http_code}" localhost:15020/healthz/ready) -eq 200 ]; do echo Waiting for Sidecar; sleep 3 ; done ; echo Sidecar available; Sidecar available Fetching changes with git depth set to 50... Initialized empty Git repository in /builds/dsop/opensource/jupyter/jupyterhub-k8s-image-awaiter/.git/ Created fresh repository. Checking out 99c5b650 as renovate/jupyterhub-k8s-image-awaiter-1.x... Skipping object checkout, Git LFS is not installed. Skipping Git submodules setup section_end:1628212031:get_sources section_start:1628212032:download_artifacts Downloading artifacts Downloading artifacts for hardening-manifest (5413626)... Downloading artifacts from coordinator... ok  id=5413626 responseStatus=200 OK token=xnz-sHbd WARNING: ci-artifacts/preflight/: lchown ci-artifacts/preflight/: operation not permitted (suppressing repeats) Downloading artifacts for import-artifacts (5413628)... Downloading artifacts from coordinator... ok  id=5413628 responseStatus=200 OK token=vvGBN_7h WARNING: ci-artifacts/import-artifacts/: lchown ci-artifacts/import-artifacts/: operation not permitted (suppressing repeats) Downloading artifacts for load-scripts (5413623)... Downloading artifacts from coordinator... ok  id=5413623 responseStatus=200 OK token=zKEWfueB WARNING: ci-artifacts/[MASKED]/: lchown ci-artifacts/[MASKED]/: operation not permitted (suppressing repeats) Downloading artifacts for wl-compare-lint (5413627)... Downloading artifacts from coordinator... ok  id=5413627 responseStatus=200 OK token=vTZsZzV6 WARNING: ci-artifacts/lint/: lchown ci-artifacts/lint/: operation not permitted (suppressing repeats) section_end:1628212032:download_artifacts section_start:1628212032:step_script Executing "step_script" stage of the job script $ "${PIPELINE_REPO_DIR}/stages/build/build-run.sh" Determine source registry based on branch Load any images used in Dockerfile build loading image ci-artifacts/import-artifacts/images/jupyterhub-k8s-image-awaiter-1.1.2.tar time="2021-08-06T01:07:13Z" level=warning msg="Failed to detect the owner for the current cgroup: stat /sys/fs/cgroup/systemd/kubepods/burstable/podf6e6c204-52a4-48e8-b78f-ecde6f0a9d88/7230dd6f01d317e93f417ac9aff15c9d9ec762fdb0844ea20a1a86b2b2e0a809: no such file or directory" Getting image source signatures Copying blob sha256:0774ddc8db29b7d1e8663556fabb8d6b198ceba53670e1a1888a40574d54631f Copying config sha256:4ff56dee8244bf2476f58d668f2570aef0c9187b47c4556308c35e3a9ab692e9 Writing manifest to image destination Storing signatures Loaded image(s): localhost/jupyterhub/k8s-image-awaiter:1.1.2 Load HTTP and S3 external resources Converting labels from hardening manifest into command line args Converting build args from hardening manifest into command line args Build the image STEP 1: FROM jupyterhub/k8s-image-awaiter:1.1.2 AS base Getting image source signatures Copying blob sha256:0774ddc8db29b7d1e8663556fabb8d6b198ceba53670e1a1888a40574d54631f Copying config sha256:6e4febc8c40cbadaa36f8c9d450dc4faafdd2c7f62dff57376fb69d27daac836 Writing manifest to image destination Storing signatures --> 6e4febc8c40 STEP 2: FROM registry1.dso.mil/ironbank/google/distroless/static:nonroot Getting image source signatures Copying blob sha256:03a0a57ab6ff1e6962479560efda46f8552429975f94d187e0042b887b4af390 Copying config sha256:53f2430bc4ac224233af4b1eed7be7fef9efe3a47fc82eb5a1ae0176fc24c75c Writing manifest to image destination Storing signatures STEP 3: COPY --from=base /image-awaiter /image-awaiter STEP 4: COMMIT registry1.dso.mil/ironbank-staging/opensource/jupyterhub/k8s-image-awaiter Getting image source signatures Copying blob sha256:07363fa8421000ad294c2881d17b0535aabdd17ced2a874eb354a9d8514d3d59 Copying blob sha256:5715c412dbb23cca98b34ec66aac1c11cc4637bd102812a6c1cb772f4068616e Copying config sha256:b16e2bc1e23dc76774235de47882fbe1fad4a292099011ad23e821e2cf84aa4a Writing manifest to image destination Storing signatures --> b16e2bc1e23 b16e2bc1e23dc76774235de47882fbe1fad4a292099011ad23e821e2cf84aa4a + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/jupyterhub/k8s-image-awaiter registry1.dso.mil/ironbank-staging/opensource/jupyterhub/k8s-image-awaiter:ibci-408538 + buildah push --storage-driver=vfs --authfile staging_auth.json --digestfile=ci-artifacts/build/digest registry1.dso.mil/ironbank-staging/opensource/jupyterhub/k8s-image-awaiter:ibci-408538 Getting image source signatures Copying blob sha256:5715c412dbb23cca98b34ec66aac1c11cc4637bd102812a6c1cb772f4068616e Copying blob sha256:07363fa8421000ad294c2881d17b0535aabdd17ced2a874eb354a9d8514d3d59 Copying config sha256:b16e2bc1e23dc76774235de47882fbe1fad4a292099011ad23e821e2cf84aa4a Writing manifest to image destination Storing signatures Read the tags + echo 'Read the tags' + tags_file=ci-artifacts/preflight/tags.txt + test -f ci-artifacts/preflight/tags.txt + IFS= + read -r tag + buildah tag --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/jupyterhub/k8s-image-awaiter registry1.dso.mil/ironbank-staging/opensource/jupyterhub/k8s-image-awaiter:1.1.2 + buildah push --storage-driver=vfs --authfile staging_auth.json registry1.dso.mil/ironbank-staging/opensource/jupyterhub/k8s-image-awaiter:1.1.2 Getting image source signatures Copying blob sha256:07363fa8421000ad294c2881d17b0535aabdd17ced2a874eb354a9d8514d3d59 Copying blob sha256:5715c412dbb23cca98b34ec66aac1c11cc4637bd102812a6c1cb772f4068616e Copying config sha256:b16e2bc1e23dc76774235de47882fbe1fad4a292099011ad23e821e2cf84aa4a Writing manifest to image destination Storing signatures + IFS= + read -r tag ++ podman inspect --storage-driver=vfs registry1.dso.mil/ironbank-staging/opensource/jupyterhub/k8s-image-awaiter --format '{{.Id}}' time="2021-08-06T01:07:27Z" level=warning msg="Failed to detect the owner for the current cgroup: stat /sys/fs/cgroup/systemd/kubepods/burstable/podf6e6c204-52a4-48e8-b78f-ecde6f0a9d88/7230dd6f01d317e93f417ac9aff15c9d9ec762fdb0844ea20a1a86b2b2e0a809: no such file or directory" + IMAGE_ID=sha256:b16e2bc1e23dc76774235de47882fbe1fad4a292099011ad23e821e2cf84aa4a + echo IMAGE_ID=sha256:b16e2bc1e23dc76774235de47882fbe1fad4a292099011ad23e821e2cf84aa4a + IMAGE_PODMAN_SHA=sha256:caf8cf2bca5ef4480244dbd67f0202666e4d72fde72e206752075699faf96fd9 + echo IMAGE_PODMAN_SHA=sha256:caf8cf2bca5ef4480244dbd67f0202666e4d72fde72e206752075699faf96fd9 A tarball of the built image can be retrieved from the create-tar job artifacts. + echo IMAGE_FULLTAG=registry1.dso.mil/ironbank-staging/opensource/jupyterhub/k8s-image-awaiter:ibci-408538 + echo IMAGE_NAME=opensource/jupyterhub/k8s-image-awaiter + branches=("master" "development") + [[ master development =~ renovate/jupyterhub-k8s-image-awaiter-1.x ]] + msg='A tarball of the built image can be retrieved from the create-tar job artifacts.' + echo 'A tarball of the built image can be retrieved from the create-tar job artifacts.' section_end:1628212047:step_script section_start:1628212047:upload_artifacts_on_success Uploading artifacts for successful job Uploading artifacts... ci-artifacts/build/: found 2 matching files and directories Uploading artifacts as "archive" to coordinator... ok id=5413630 responseStatus=201 Created token=xx5qZKTy Uploading artifacts... build.env: found 1 matching files and directories  Uploading artifacts as "dotenv" to coordinator... ok id=5413630 responseStatus=201 Created token=xx5qZKTy section_end:1628212049:upload_artifacts_on_success section_start:1628212049:cleanup_file_variables Cleaning up file based variables section_end:1628212049:cleanup_file_variables Job succeeded