Running with gitlab-runner 14.1.0 (8925d9a0)  on gitlab-runners-bigbang-gl-packages-privileged-gitlab-runneb7dvc L_wAsvdS section_start:1629908399:resolve_secrets Resolving secrets section_end:1629908399:resolve_secrets section_start:1629908399:prepare_executor Preparing the "kubernetes" executor Using Kubernetes namespace: gitlab-runners Using Kubernetes executor with image registry.dso.mil/platform-one/big-bang/pipeline-templates/pipeline-templates/k3d-builder:0.0.5 ... Using attach strategy to execute scripts... section_end:1629908399:prepare_executor section_start:1629908399:prepare_script Preparing environment Waiting for pod gitlab-runners/runner-lwasvds-project-2312-concurrent-278fzz to be running, status is Pending Running on runner-lwasvds-project-2312-concurrent-278fzz via gitlab-runners-bigbang-gl-packages-privileged-gitlab-runneb7dvc... section_end:1629908405:prepare_script section_start:1629908405:get_sources Getting source from Git repository Fetching changes with git depth set to 50... Initialized empty Git repository in /builds/L_wAsvdS/2/platform-one/big-bang/apps/developer-tools/gitlab/.git/ Created fresh repository. Checking out 162aad92 as refs/merge-requests/62/head... Skipping Git submodules setup section_end:1629908406:get_sources section_start:1629908406:step_script Executing "step_script" stage of the job script $ if [ -z ${PIPELINE_REPO_BRANCH} ]; then # collapsed multi-line command $ git clone -b ${PIPELINE_REPO_BRANCH} ${PIPELINE_REPO} ${PIPELINE_REPO_DESTINATION} Cloning into '../pipeline-repo'... $ source ${WAIT_PATH} $ i=0; while [ "$i" -lt 12 ]; do docker info &>/dev/null && break; sleep 5; i=$(( i + 1 )) ; done $ docker network create ${CI_JOB_ID} --driver=bridge -o "com.docker.network.driver.mtu"="1450" cdf17ef87486a6d23db3c81d086f05e89b298e2b68b39a239730e801be47958b $ k3d cluster create ${CI_JOB_ID} --config ${K3D_CONFIG_PATH} --network ${CI_JOB_ID} INFO[0000] Using config file ../pipeline-repo/jobs/k3d-ci/config.yaml INFO[0000] Prep: Network INFO[0000] Network with name '5933285' already exists with ID 'cdf17ef87486a6d23db3c81d086f05e89b298e2b68b39a239730e801be47958b' INFO[0000] Created volume 'k3d-5933285-images' INFO[0001] Creating node 'k3d-5933285-server-0' INFO[0002] Pulling image 'docker.io/rancher/k3s:v1.20.4-k3s1' INFO[0004] Creating LoadBalancer 'k3d-5933285-serverlb' INFO[0005] Pulling image 'docker.io/rancher/k3d-proxy:v4.3.0' INFO[0007] Starting cluster '5933285' INFO[0007] Starting servers... INFO[0007] Starting Node 'k3d-5933285-server-0' INFO[0012] Starting agents... INFO[0012] Starting helpers... INFO[0012] Starting Node 'k3d-5933285-serverlb' INFO[0013] (Optional) Trying to get IP of the docker host and inject it into the cluster as 'host.k3d.internal' for easy access INFO[0016] Successfully added host record to /etc/hosts in 2/2 nodes and to the CoreDNS ConfigMap INFO[0016] Cluster '5933285' created successfully! INFO[0016] --kubeconfig-update-default=false --> sets --kubeconfig-switch-context=false INFO[0016] You can now use it like this: kubectl config use-context k3d-5933285 kubectl cluster-info $ until kubectl get deployment coredns -n kube-system -o go-template='{{.status.availableReplicas}}' | grep -v -e ''; do sleep 1s; done 1 $ if [ ! -z ${PROJECT_NAME} ]; then # collapsed multi-line command namespace/gitlab created secret/private-registry created secret/private-registry-mil created $ if [[ "${CI_PROJECT_NAME}" != *"istio"* ]]; then # collapsed multi-line command - Processing resources for Istio core. ✔ Istio core installed - Processing resources for Istiod. - Processing resources for Istiod. Waiting for Deployment/istio-system/istiod ✔ Istiod installed - Processing resources for Ingress gateways. - Processing resources for Ingress gateways. Waiting for Deployment/istio-system/istio-ingressgat... ✔ Ingress gateways installed - Pruning removed resources ✔ Installation complete namespace/istio-system labeled $ if [[ "${PACKAGE_NAMESPACE}" != "istio-operator" ]]; then # collapsed multi-line command Generating a RSA private key ..............................................................................+++++ ...+++++ writing new private key to 'tls.key' ----- secret/wildcard-cert created $ if [ -f "tests/main-test-gateway.yaml" ]; then # collapsed multi-line command $ if [ -f "tests/dependencies.yaml" ]; then # collapsed multi-line command $ sleep 10 $ kubectl wait --for=condition=established --timeout 60s -A crd --all > /dev/null $ if [ -f tests/dependencies.yaml ]; then # collapsed multi-line command $ wait_sts $ wait_daemonset $ kubectl wait --for=condition=available --timeout 600s -A deployment --all > /dev/null $ kubectl wait --for=condition=ready --timeout 600s -A pods --all --field-selector status.phase=Running > /dev/null $ echo "Package install" Package install $ if [ ! -z ${PROJECT_NAME} ]; then # collapsed multi-line command $ if [ $(ls -1 tests/test-values.y*ml 2>/dev/null | wc -l) -gt 0 ]; then # collapsed multi-line command Helm installing gitlab/chart into gitlab namespace using gitlab/tests/test-values.yaml for values NAME: gitlab LAST DEPLOYED: Wed Aug 25 16:21:13 2021 NAMESPACE: gitlab STATUS: deployed REVISION: 1 NOTES: NOTICE: The resource requests have increased for the Webservice and Sidekiq charts. For more information on Webservice resources, see https://docs.gitlab.com/charts/charts/gitlab/webservice/index.html#resources For more information on Sidekiq resources, see https://docs.gitlab.com/charts/charts/gitlab/sidekiq/index.html#resource Related merge request: https://gitlab.com/gitlab-org/charts/gitlab/-/merge_requests/1634 To restore the original resource specifications: --set gitlab.sidekiq.resources.requests.cpu=50m --set gitlab.sidekiq.resources.requests.memory=650M --set gitlab.webservice.resources.requests.memory=1.5G WARNING: Automatic TLS certificate generation with cert-manager is disabled and no TLS certificates were provided. Self-signed certificates were generated. You may retrieve the CA root for these certificates from the `gitlab-wildcard-tls-ca` secret, via the following command. It can then be imported to a web browser or system store. kubectl get secret gitlab-wildcard-tls-ca -ojsonpath='{.data.cfssl_ca}' | base64 --decode > gitlab-webservice-test-svc.gitlab.svc.cluster.local.ca.pem If you do not wish to use self-signed certificates, please set the following properties: - global.ingress.tls.secretName OR - global.ingress.tls.enabled (set to `true`) - gitlab.webservice.ingress.tls.secretName - registry.ingress.tls.secretName - minio.ingress.tls.secretName Help us improve the installation experience, let us know how we did with a 1 minute survey: https://gitlab.fra1.qualtrics.com/jfe/form/SV_6kVqZANThUQ1bZb?installation=helm&release=13-12 $ sleep 10 $ kubectl wait --for=condition=established --timeout 60s -A crd --all > /dev/null $ if [ -f tests/wait.sh ]; then # collapsed multi-line command $ wait_sts $ wait_daemonset $ kubectl wait --for=condition=available --timeout 600s -A deployment --all > /dev/null $ kubectl wait --for=condition=ready --timeout 600s -A pods --all --field-selector status.phase=Running > /dev/null $ echo "Package tests" Package tests $ if [ ! -z $(kubectl get services -n istio-system istio-ingressgateway -o jsonpath='{.status.loadBalancer.ingress[0].ip}' &> /dev/null) ] && [ ! -z $(kubectl get vs -A -o jsonpath='{.items[0].spec.hosts[0]}' &> /dev/null) ]; then # collapsed multi-line command $ if [ -f "tests/cypress.json" ]; then # collapsed multi-line command $ if [ -d "chart/templates/tests" ]; then # collapsed multi-line command NAME: gitlab LAST DEPLOYED: Wed Aug 25 16:21:13 2021 NAMESPACE: gitlab STATUS: deployed REVISION: 1 TEST SUITE: gitlab-cypress-sa Last Started: Wed Aug 25 16:23:23 2021 Last Completed: Wed Aug 25 16:23:23 2021 Phase: Succeeded TEST SUITE: gitlab-cypress-config Last Started: Wed Aug 25 16:23:22 2021 Last Completed: Wed Aug 25 16:23:22 2021 Phase: Succeeded TEST SUITE: gitlab-script-config Last Started: Wed Aug 25 16:23:23 2021 Last Completed: Wed Aug 25 16:23:23 2021 Phase: Succeeded TEST SUITE: gitlab-cypress-role Last Started: Wed Aug 25 16:23:22 2021 Last Completed: Wed Aug 25 16:23:23 2021 Phase: Succeeded TEST SUITE: gitlab-cypress-rolebinding Last Started: Wed Aug 25 16:23:23 2021 Last Completed: Wed Aug 25 16:23:23 2021 Phase: Succeeded TEST SUITE: gitlab-registry-test-svc Last Started: Wed Aug 25 16:23:23 2021 Last Completed: Wed Aug 25 16:23:23 2021 Phase: Succeeded TEST SUITE: gitlab-webservice-test-svc Last Started: Wed Aug 25 16:23:23 2021 Last Completed: Wed Aug 25 16:23:24 2021 Phase: Succeeded TEST SUITE: gitlab-cypress-test Last Started: Wed Aug 25 16:23:24 2021 Last Completed: Wed Aug 25 16:24:30 2021 Phase: Succeeded TEST SUITE: gitlab-script-test Last Started: Wed Aug 25 16:24:30 2021 Last Completed: Wed Aug 25 16:24:39 2021 Phase: Succeeded NOTES: NOTICE: The resource requests have increased for the Webservice and Sidekiq charts. For more information on Webservice resources, see https://docs.gitlab.com/charts/charts/gitlab/webservice/index.html#resources For more information on Sidekiq resources, see https://docs.gitlab.com/charts/charts/gitlab/sidekiq/index.html#resource Related merge request: https://gitlab.com/gitlab-org/charts/gitlab/-/merge_requests/1634 To restore the original resource specifications: --set gitlab.sidekiq.resources.requests.cpu=50m --set gitlab.sidekiq.resources.requests.memory=650M --set gitlab.webservice.resources.requests.memory=1.5G WARNING: Automatic TLS certificate generation with cert-manager is disabled and no TLS certificates were provided. Self-signed certificates were generated. You may retrieve the CA root for these certificates from the `gitlab-wildcard-tls-ca` secret, via the following command. It can then be imported to a web browser or system store. kubectl get secret gitlab-wildcard-tls-ca -ojsonpath='{.data.cfssl_ca}' | base64 --decode > gitlab-webservice-test-svc.gitlab.svc.cluster.local.ca.pem If you do not wish to use self-signed certificates, please set the following properties: - global.ingress.tls.secretName OR - global.ingress.tls.enabled (set to `true`) - gitlab.webservice.ingress.tls.secretName - registry.ingress.tls.secretName - minio.ingress.tls.secretName Help us improve the installation experience, let us know how we did with a 1 minute survey: https://gitlab.fra1.qualtrics.com/jfe/form/SV_6kVqZANThUQ1bZb?installation=helm&release=13-12 ***** Start Helm Test Logs ***** ====================================================================================================  (Run Starting)  ┌────────────────────────────────────────────────────────────────────────────────────────────────┐  │ Cypress: 5.0.0 │  │ Browser: Chrome 83 (headless) │  │ Specs: 4 found (01-gitlab-health.spec.js, 02-gitlab-signup.spec.js, 03-gitlab-login.spec. │  │ js, 04-gitlab-create-project.spec.js) │  └────────────────────────────────────────────────────────────────────────────────────────────────┘ ──────────────────────────────────────────────────────────────────────────────────────────────────── Running: 01-gitlab-health.spec.js (1 of 4) Browserslist: caniuse-lite is outdated. Please run: npx browserslist@latest --update-db   Basic Gitlab  ✓ Check Gitlab UI is accessible (609ms)   1 passing (626ms)  (Results)  ┌────────────────────────────────────────────────────────────────────────────────────────────────┐  │ Tests: 1 │  │ Passing: 1 │  │ Failing: 0 │  │ Pending: 0 │  │ Skipped: 0 │  │ Screenshots: 0 │  │ Video: true │  │ Duration: 0 seconds │  │ Spec Ran: 01-gitlab-health.spec.js │  └────────────────────────────────────────────────────────────────────────────────────────────────┘  (Video)   - Started processing: Compressing to 32 CRF   - Finished processing: /test/cypress/videos/01-gitlab-health.spec.js.mp4 (0 seconds) ──────────────────────────────────────────────────────────────────────────────────────────────────── Running: 02-gitlab-signup.spec.js (2 of 4)   Gitlab Signup  ✓ Check user is able to signup (5281ms)   1 passing (5s)  (Results)  ┌────────────────────────────────────────────────────────────────────────────────────────────────┐  │ Tests: 1 │  │ Passing: 1 │  │ Failing: 0 │  │ Pending: 0 │  │ Skipped: 0 │  │ Screenshots: 0 │  │ Video: true │  │ Duration: 5 seconds │  │ Spec Ran: 02-gitlab-signup.spec.js │  └────────────────────────────────────────────────────────────────────────────────────────────────┘  (Video)   - Started processing: Compressing to 32 CRF   - Finished processing: /test/cypress/videos/02-gitlab-signup.spec.js.mp4 (0 seconds) ──────────────────────────────────────────────────────────────────────────────────────────────────── Running: 03-gitlab-login.spec.js (3 of 4)   Gitlab Login  ✓ Check admin is able to login (4101ms)   1 passing (4s)  (Results)  ┌────────────────────────────────────────────────────────────────────────────────────────────────┐  │ Tests: 1 │  │ Passing: 1 │  │ Failing: 0 │  │ Pending: 0 │  │ Skipped: 0 │  │ Screenshots: 0 │  │ Video: true │  │ Duration: 4 seconds │  │ Spec Ran: 03-gitlab-login.spec.js │  └────────────────────────────────────────────────────────────────────────────────────────────────┘  (Video)   - Started processing: Compressing to 32 CRF   - Finished processing: /test/cypress/videos/03-gitlab-login.spec.js.mp4 (0 seconds) ──────────────────────────────────────────────────────────────────────────────────────────────────── Running: 04-gitlab-create-project.spec.js (4 of 4)   Create Gitlab Project  ✓ Check user is able to create a project (5350ms)   1 passing (5s)  (Results)  ┌────────────────────────────────────────────────────────────────────────────────────────────────┐  │ Tests: 1 │  │ Passing: 1 │  │ Failing: 0 │  │ Pending: 0 │  │ Skipped: 0 │  │ Screenshots: 0 │  │ Video: true │  │ Duration: 5 seconds │  │ Spec Ran: 04-gitlab-create-project.spec.js │  └────────────────────────────────────────────────────────────────────────────────────────────────┘  (Video)   - Started processing: Compressing to 32 CRF   - Finished processing: /test/cypress/videos/04-gitlab-create-project.spec.js.mp4 (0 seconds) ====================================================================================================  (Run Finished)   Spec Tests Passing Failing Pending Skipped    ┌────────────────────────────────────────────────────────────────────────────────────────────────┐  │ ✔ 01-gitlab-health.spec.js 621ms 1 1 - - - │  ├────────────────────────────────────────────────────────────────────────────────────────────────┤  │ ✔ 02-gitlab-signup.spec.js 00:05 1 1 - - - │  ├────────────────────────────────────────────────────────────────────────────────────────────────┤  │ ✔ 03-gitlab-login.spec.js 00:04 1 1 - - - │  ├────────────────────────────────────────────────────────────────────────────────────────────────┤  │ ✔ 04-gitlab-create-project.spec.js 00:05 1 1 - - - │  └────────────────────────────────────────────────────────────────────────────────────────────────┘   ✔ All specs passed! 00:15 4 4 - - -   tar: Removing leading `/' from member names configmap/cypress-videos created ***** End Helm Test Logs ***** $ touch $CI_PROJECT_DIR/success section_end:1629908679:step_script section_start:1629908679:after_script Running after_script Running after script... $ if [ -e success ]; then # collapsed multi-line command Job Succeeded $ docker exec -i k3d-${CI_JOB_ID}-server-0 crictl images -o json | jq -r '.images[].repoTags[0] | select(. != null)' > images.txt $ sed -i '/docker.io\/istio\//d' images.txt $ sed -i '/docker.io\/rancher\//d' images.txt $ if [ -f tests/images.txt ]; then # collapsed multi-line command $ k3d cluster delete ${CI_JOB_ID} INFO[0000] Deleting cluster '5933285' INFO[0000] Deleted k3d-5933285-serverlb INFO[0011] Deleted k3d-5933285-server-0 INFO[0011] Deleting image volume 'k3d-5933285-images' INFO[0011] Removing cluster details from default kubeconfig... INFO[0011] Removing standalone kubeconfig file (if there is one)... INFO[0011] Successfully deleted cluster 5933285! $ docker network rm ${CI_JOB_ID} 5933285 section_end:1629908691:after_script section_start:1629908691:upload_artifacts_on_success Uploading artifacts for successful job Uploading artifacts... images.txt: found 1 matching files and directories WARNING: tests/cypress/screenshots: no matching files WARNING: tests/cypress/videos: no matching files  cypress-artifacts: found 6 matching files and directories Uploading artifacts as "archive" to coordinator... ok id=5933285 responseStatus=201 Created token=azvcJ3vy section_end:1629908692:upload_artifacts_on_success section_start:1629908692:cleanup_file_variables Cleaning up file based variables section_end:1629908693:cleanup_file_variables Job succeeded