Running with gitlab-runner 13.11.0 (7f7a4bb0)  on gitlab-runners-bigbang-gl-packages-privileged-gitlab-runne22ncc YvhYaXSq  feature flags: FF_GITLAB_REGISTRY_HELPER_IMAGE:true section_start:1623420042:resolve_secrets Resolving secrets section_end:1623420042:resolve_secrets section_start:1623420042:prepare_executor Preparing the "kubernetes" executor Using Kubernetes namespace: gitlab-runners Using Kubernetes executor with image registry.dso.mil/platform-one/big-bang/pipeline-templates/pipeline-templates/k3d-builder:0.0.5 ... section_end:1623420042:prepare_executor section_start:1623420042:prepare_script Preparing environment Waiting for pod gitlab-runners/runner-yvhyaxsq-project-2312-concurrent-0mhz6n to be running, status is Pending Running on runner-yvhyaxsq-project-2312-concurrent-0mhz6n via gitlab-runners-bigbang-gl-packages-privileged-gitlab-runne22ncc... section_end:1623420045:prepare_script section_start:1623420045:get_sources Getting source from Git repository Fetching changes with git depth set to 50... Initialized empty Git repository in /builds/platform-one/big-bang/apps/developer-tools/gitlab/.git/ Created fresh repository. Checking out 79a6a39c as refs/merge-requests/45/head... Skipping Git submodules setup section_end:1623420047:get_sources section_start:1623420047:step_script Executing "step_script" stage of the job script $ if [ -z ${PIPELINE_REPO_BRANCH} ]; then # collapsed multi-line command $ git clone -b ${PIPELINE_REPO_BRANCH} ${PIPELINE_REPO} ${PIPELINE_REPO_DESTINATION} Cloning into '../pipeline-repo'... $ source ${WAIT_PATH} $ docker network create ${CI_JOB_ID} --driver=bridge -o "com.docker.network.driver.mtu"="1450" 9b4aceb9376dd00a80c250235685e4bf2cd571376fdcb7c38e97e69c2bdda3e6 $ k3d cluster create ${CI_JOB_ID} --config ${K3D_CONFIG_PATH} --network ${CI_JOB_ID} INFO[0000] Using config file ../pipeline-repo/jobs/k3d-ci/config.yaml INFO[0000] Prep: Network INFO[0000] Network with name '4014100' already exists with ID '9b4aceb9376dd00a80c250235685e4bf2cd571376fdcb7c38e97e69c2bdda3e6' INFO[0000] Created volume 'k3d-4014100-images' INFO[0001] Creating node 'k3d-4014100-server-0' INFO[0002] Pulling image 'docker.io/rancher/k3s:v1.20.4-k3s1' INFO[0004] Creating LoadBalancer 'k3d-4014100-serverlb' INFO[0006] Pulling image 'docker.io/rancher/k3d-proxy:v4.3.0' INFO[0008] Starting cluster '4014100' INFO[0008] Starting servers... INFO[0008] Starting Node 'k3d-4014100-server-0' INFO[0013] Starting agents... INFO[0013] Starting helpers... INFO[0013] Starting Node 'k3d-4014100-serverlb' INFO[0013] (Optional) Trying to get IP of the docker host and inject it into the cluster as 'host.k3d.internal' for easy access INFO[0016] Successfully added host record to /etc/hosts in 2/2 nodes and to the CoreDNS ConfigMap INFO[0016] Cluster '4014100' created successfully! INFO[0016] --kubeconfig-update-default=false --> sets --kubeconfig-switch-context=false INFO[0016] You can now use it like this: kubectl config use-context k3d-4014100 kubectl cluster-info $ until kubectl get deployment coredns -n kube-system -o go-template='{{.status.availableReplicas}}' | grep -v -e ''; do sleep 1s; done 1 $ if [ ! -z ${PROJECT_NAME} ]; then # collapsed multi-line command namespace/gitlab created secret/private-registry created secret/private-registry-mil created $ if [[ "${CI_PROJECT_NAME}" != *"istio"* ]]; then # collapsed multi-line command - Processing resources for Istio core. ✔ Istio core installed - Processing resources for Istiod. - Processing resources for Istiod. Waiting for Deployment/istio-system/istiod ✔ Istiod installed - Processing resources for Ingress gateways. - Processing resources for Ingress gateways. Waiting for Deployment/istio-system/istio-ingressgat... ✔ Ingress gateways installed - Pruning removed resources ✔ Installation completenamespace/istio-system labeled $ if [[ "${PACKAGE_NAMESPACE}" != "istio-operator" ]]; then # collapsed multi-line command Generating a RSA private key ....+++++ .........................................................................................................+++++ writing new private key to 'tls.key' ----- secret/wildcard-cert created $ if [ -f "tests/main-test-gateway.yaml" ]; then # collapsed multi-line command $ if [ -f "tests/dependencies.yaml" ]; then # collapsed multi-line command $ sleep 10 $ kubectl wait --for=condition=established --timeout 60s -A crd --all > /dev/null $ if [ -f tests/dependencies.yaml ]; then # collapsed multi-line command $ wait_sts $ wait_daemonset $ kubectl wait --for=condition=available --timeout 600s -A deployment --all > /dev/null $ kubectl wait --for=condition=ready --timeout 600s -A pods --all --field-selector status.phase=Running > /dev/null $ echo "Package install" Package install $ if [ ! -z ${PROJECT_NAME} ]; then # collapsed multi-line command $ if [ $(ls -1 tests/test-values.y*ml 2>/dev/null | wc -l) -gt 0 ]; then # collapsed multi-line command Helm installing gitlab/chart into gitlab namespace using gitlab/tests/test-values.yaml for values NAME: gitlab LAST DEPLOYED: Fri Jun 11 14:01:50 2021 NAMESPACE: gitlab STATUS: deployed REVISION: 1 NOTES: NOTICE: The resource requests have increased for the Webservice and Sidekiq charts. For more information on Webservice resources, see https://docs.gitlab.com/charts/charts/gitlab/webservice/index.html#resources For more information on Sidekiq resources, see https://docs.gitlab.com/charts/charts/gitlab/sidekiq/index.html#resource Related merge request: https://gitlab.com/gitlab-org/charts/gitlab/-/merge_requests/1634 To restore the original resource specifications: --set gitlab.sidekiq.resources.requests.cpu=50m --set gitlab.sidekiq.resources.requests.memory=650M --set gitlab.webservice.resources.requests.memory=1.5G WARNING: Automatic TLS certificate generation with cert-manager is disabled and no TLS certificates were provided. Self-signed certificates were generated. You may retrieve the CA root for these certificates from the `gitlab-wildcard-tls-ca` secret, via the following command. It can then be imported to a web browser or system store. kubectl get secret gitlab-wildcard-tls-ca -ojsonpath='{.data.cfssl_ca}' | base64 --decode > gitlab-webservice-test-svc.gitlab.svc.cluster.local.ca.pem If you do not wish to use self-signed certificates, please set the following properties: - global.ingress.tls.secretName OR - global.ingress.tls.enabled (set to `true`) - gitlab.webservice.ingress.tls.secretName - registry.ingress.tls.secretName - minio.ingress.tls.secretName Help us improve the installation experience, let us know how we did with a 1 minute survey: https://gitlab.fra1.qualtrics.com/jfe/form/SV_6kVqZANThUQ1bZb?installation=helm&release=13-10 $ sleep 10 $ kubectl wait --for=condition=established --timeout 60s -A crd --all > /dev/null $ if [ -f tests/wait.sh ]; then # collapsed multi-line command $ wait_sts $ wait_daemonset $ kubectl wait --for=condition=available --timeout 600s -A deployment --all > /dev/null $ kubectl wait --for=condition=ready --timeout 600s -A pods --all --field-selector status.phase=Running > /dev/null $ echo "Package tests" Package tests $ if [ ! -z $(kubectl get services -n istio-system istio-ingressgateway -o jsonpath='{.status.loadBalancer.ingress[0].ip}' &> /dev/null) ] && [ ! -z $(kubectl get vs -A -o jsonpath='{.items[0].spec.hosts[0]}' &> /dev/null) ]; then # collapsed multi-line command $ if [ -f "tests/cypress.json" ]; then # collapsed multi-line command $ if [ -d "chart/templates/tests" ]; then # collapsed multi-line command NAME: gitlab LAST DEPLOYED: Fri Jun 11 14:01:50 2021 NAMESPACE: gitlab STATUS: deployed REVISION: 1 TEST SUITE: gitlab-cypress-sa Last Started: Fri Jun 11 14:04:07 2021 Last Completed: Fri Jun 11 14:04:07 2021 Phase: Succeeded TEST SUITE: gitlab-cypress-config Last Started: Fri Jun 11 14:04:06 2021 Last Completed: Fri Jun 11 14:04:07 2021 Phase: Succeeded TEST SUITE: gitlab-script-config Last Started: Fri Jun 11 14:04:07 2021 Last Completed: Fri Jun 11 14:04:08 2021 Phase: Succeeded TEST SUITE: gitlab-cypress-role Last Started: Fri Jun 11 14:04:07 2021 Last Completed: Fri Jun 11 14:04:07 2021 Phase: Succeeded TEST SUITE: gitlab-cypress-rolebinding Last Started: Fri Jun 11 14:04:07 2021 Last Completed: Fri Jun 11 14:04:07 2021 Phase: Succeeded TEST SUITE: gitlab-registry-test-svc Last Started: Fri Jun 11 14:04:07 2021 Last Completed: Fri Jun 11 14:04:07 2021 Phase: Succeeded TEST SUITE: gitlab-webservice-test-svc Last Started: Fri Jun 11 14:04:08 2021 Last Completed: Fri Jun 11 14:04:08 2021 Phase: Succeeded TEST SUITE: gitlab-cypress-test Last Started: Fri Jun 11 14:04:08 2021 Last Completed: Fri Jun 11 14:05:08 2021 Phase: Succeeded TEST SUITE: gitlab-script-test Last Started: Fri Jun 11 14:05:08 2021 Last Completed: Fri Jun 11 14:05:20 2021 Phase: Succeeded NOTES: NOTICE: The resource requests have increased for the Webservice and Sidekiq charts. For more information on Webservice resources, see https://docs.gitlab.com/charts/charts/gitlab/webservice/index.html#resources For more information on Sidekiq resources, see https://docs.gitlab.com/charts/charts/gitlab/sidekiq/index.html#resource Related merge request: https://gitlab.com/gitlab-org/charts/gitlab/-/merge_requests/1634 To restore the original resource specifications: --set gitlab.sidekiq.resources.requests.cpu=50m --set gitlab.sidekiq.resources.requests.memory=650M --set gitlab.webservice.resources.requests.memory=1.5G WARNING: Automatic TLS certificate generation with cert-manager is disabled and no TLS certificates were provided. Self-signed certificates were generated. You may retrieve the CA root for these certificates from the `gitlab-wildcard-tls-ca` secret, via the following command. It can then be imported to a web browser or system store. kubectl get secret gitlab-wildcard-tls-ca -ojsonpath='{.data.cfssl_ca}' | base64 --decode > gitlab-webservice-test-svc.gitlab.svc.cluster.local.ca.pem If you do not wish to use self-signed certificates, please set the following properties: - global.ingress.tls.secretName OR - global.ingress.tls.enabled (set to `true`) - gitlab.webservice.ingress.tls.secretName - registry.ingress.tls.secretName - minio.ingress.tls.secretName Help us improve the installation experience, let us know how we did with a 1 minute survey: https://gitlab.fra1.qualtrics.com/jfe/form/SV_6kVqZANThUQ1bZb?installation=helm&release=13-10 ***** Start Helm Test Logs ***** --- Running test.sh... --- + git config --global user.email testuser@example.com + git config --global user.name testuser + git config --global user.password 12345678 + crane auth login gitlab-registry-test-svc.gitlab.svc.cluster.local:80 -u testuser -p 12345678 2021/06/11 14:05:16 logged in via /home/golanguser/.docker/config.json + echo 'cloning repo...' + git clone http://gitlab-webservice-default.gitlab.svc.cluster.local:8181/testuser/my-awesome-project.git cloning repo... Cloning into 'my-awesome-project'... + echo 'changing into repo directory...' + cd my-awesome-project + echo 'modifying repo...' + touch Dockerfile changing into repo directory... modifying repo... + echo 'FROM alpine' + echo 'pushing changes to repo...' + git add Dockerfile pushing changes to repo... + git commit -m 'initial commit' [master 0490cef] initial commit 1 file changed, 1 insertion(+) create mode 100644 Dockerfile + git remote rm origin + git remote add origin http://testuser:12345678@gitlab-webservice-default.gitlab.svc.cluster.local:8181/testuser/my-awesome-project.git + git push -u origin master To http://gitlab-webservice-default.gitlab.svc.cluster.local:8181/testuser/my-awesome-project.git c270486..0490cef master -> master Branch 'master' set up to track remote branch 'master' from 'origin'. + echo 'pulling image...' + crane pull alpine:latest alpine-latest.tar pulling image... pushing image to gitlab registry... + echo 'pushing image to gitlab registry...' + crane push alpine-latest.tar gitlab-registry-test-svc.gitlab.svc.cluster.local:80/testuser/my-awesome-project/alpine:latest 2021/06/11 14:05:19 pushed blob: sha256:540db60ca9383eac9e418f78490994d0af424aab7bf6d0e47ac8ed4e2e9bcbba 2021/06/11 14:05:19 pushed blob: sha256:6dbb9cc54074106d46d4ccb330f2a40a682d49dda5f4844962b7dce9fe44aaec 2021/06/11 14:05:19 gitlab-registry-test-svc.gitlab.svc.cluster.local:80/testuser/my-awesome-project/alpine:latest: digest: sha256:7e8c1de27fd6e0538cbd0eb339b0cf7fa66a40f83c914851d25fa8e35ca7c404 size: 428 + echo 'All tests complete!' All tests complete! ====================================================================================================  (Run Starting)  ┌────────────────────────────────────────────────────────────────────────────────────────────────┐  │ Cypress: 5.0.0 │  │ Browser: Chrome 83 (headless) │  │ Specs: 4 found (01-gitlab-health.spec.js, 02-gitlab-signup.spec.js, 03-gitlab-login.spec. │  │ js, 04-gitlab-create-project.spec.js) │  └────────────────────────────────────────────────────────────────────────────────────────────────┘ ──────────────────────────────────────────────────────────────────────────────────────────────────── Running: 01-gitlab-health.spec.js (1 of 4) Browserslist: caniuse-lite is outdated. Please run: npx browserslist@latest --update-db   Basic Gitlab  ✓ Check Gitlab UI is accessible (495ms)   1 passing (509ms)  (Results)  ┌────────────────────────────────────────────────────────────────────────────────────────────────┐  │ Tests: 1 │  │ Passing: 1 │  │ Failing: 0 │  │ Pending: 0 │  │ Skipped: 0 │  │ Screenshots: 0 │  │ Video: true │  │ Duration: 0 seconds │  │ Spec Ran: 01-gitlab-health.spec.js │  └────────────────────────────────────────────────────────────────────────────────────────────────┘  (Video)   - Started processing: Compressing to 32 CRF   - Finished processing: /test/cypress/videos/01-gitlab-health.spec.js.mp4 (0 seconds) ──────────────────────────────────────────────────────────────────────────────────────────────────── Running: 02-gitlab-signup.spec.js (2 of 4)   Gitlab Signup  ✓ Check user is able to signup (5180ms)   1 passing (5s)  (Results)  ┌────────────────────────────────────────────────────────────────────────────────────────────────┐  │ Tests: 1 │  │ Passing: 1 │  │ Failing: 0 │  │ Pending: 0 │  │ Skipped: 0 │  │ Screenshots: 0 │  │ Video: true │  │ Duration: 5 seconds │  │ Spec Ran: 02-gitlab-signup.spec.js │  └────────────────────────────────────────────────────────────────────────────────────────────────┘  (Video)   - Started processing: Compressing to 32 CRF   - Finished processing: /test/cypress/videos/02-gitlab-signup.spec.js.mp4 (0 seconds) ──────────────────────────────────────────────────────────────────────────────────────────────────── Running: 03-gitlab-login.spec.js (3 of 4)   Gitlab Login  ✓ Check admin is able to login (3931ms)   1 passing (4s)  (Results)  ┌────────────────────────────────────────────────────────────────────────────────────────────────┐  │ Tests: 1 │  │ Passing: 1 │  │ Failing: 0 │  │ Pending: 0 │  │ Skipped: 0 │  │ Screenshots: 0 │  │ Video: true │  │ Duration: 3 seconds │  │ Spec Ran: 03-gitlab-login.spec.js │  └────────────────────────────────────────────────────────────────────────────────────────────────┘  (Video)   - Started processing: Compressing to 32 CRF   - Finished processing: /test/cypress/videos/03-gitlab-login.spec.js.mp4 (0 seconds) ──────────────────────────────────────────────────────────────────────────────────────────────────── Running: 04-gitlab-create-project.spec.js (4 of 4)   Create Gitlab Project  ✓ Check user is able to create a project (5064ms)   1 passing (5s)  (Results)  ┌────────────────────────────────────────────────────────────────────────────────────────────────┐  │ Tests: 1 │  │ Passing: 1 │  │ Failing: 0 │  │ Pending: 0 │  │ Skipped: 0 │  │ Screenshots: 0 │  │ Video: true │  │ Duration: 5 seconds │  │ Spec Ran: 04-gitlab-create-project.spec.js │  └────────────────────────────────────────────────────────────────────────────────────────────────┘  (Video)   - Started processing: Compressing to 32 CRF   - Finished processing: /test/cypress/videos/04-gitlab-create-project.spec.js.mp4 (0 seconds) ====================================================================================================  (Run Finished)   Spec Tests Passing Failing Pending Skipped    ┌────────────────────────────────────────────────────────────────────────────────────────────────┐  │ ✔ 01-gitlab-health.spec.js 508ms 1 1 - - - │  ├────────────────────────────────────────────────────────────────────────────────────────────────┤  │ ✔ 02-gitlab-signup.spec.js 00:05 1 1 - - - │  ├────────────────────────────────────────────────────────────────────────────────────────────────┤  │ ✔ 03-gitlab-login.spec.js 00:03 1 1 - - - │  ├────────────────────────────────────────────────────────────────────────────────────────────────┤  │ ✔ 04-gitlab-create-project.spec.js 00:05 1 1 - - - │  └────────────────────────────────────────────────────────────────────────────────────────────────┘   ✔ All specs passed! 00:14 4 4 - - -   tar: Removing leading `/' from member names configmap/cypress-videos created ***** End Helm Test Logs ***** $ touch $CI_PROJECT_DIR/success section_end:1623420321:step_script section_start:1623420321:after_script Running after_script Running after script... $ if [ -e success ]; then # collapsed multi-line command Job Succeeded $ docker exec -i k3d-${CI_JOB_ID}-server-0 crictl images -o json | jq -r '.images[].repoTags[0] | select(. != null)' > images.txt $ sed -i '/docker.io\/istio\//d' images.txt $ sed -i '/docker.io\/rancher\//d' images.txt $ if [ -f tests/images.txt ]; then # collapsed multi-line command $ k3d cluster delete ${CI_JOB_ID} INFO[0000] Deleting cluster '4014100' INFO[0000] Deleted k3d-4014100-serverlb INFO[0016] Deleted k3d-4014100-server-0 INFO[0016] Deleting image volume 'k3d-4014100-images' INFO[0016] Removing cluster details from default kubeconfig... INFO[0016] Removing standalone kubeconfig file (if there is one)... INFO[0016] Successfully deleted cluster 4014100! $ docker network rm ${CI_JOB_ID} 4014100 section_end:1623420337:after_script section_start:1623420337:upload_artifacts_on_success Uploading artifacts for successful job Uploading artifacts... images.txt: found 1 matching files and directories WARNING: tests/cypress/screenshots: no matching files WARNING: tests/cypress/videos: no matching files  cypress-artifacts: found 6 matching files and directories Uploading artifacts as "archive" to coordinator... ok id=4014100 responseStatus=201 Created token=EyNbuWak section_end:1623420338:upload_artifacts_on_success section_start:1623420338:cleanup_file_variables Cleaning up file based variables section_end:1623420339:cleanup_file_variables Job succeeded