Running with gitlab-runner 13.10.0 (54944146)  on gitlab-runners-bigbang-gl-packages-privileged-gitlab-runne5fpbj ZQwZsvm5  feature flags: FF_GITLAB_REGISTRY_HELPER_IMAGE:true section_start:1618515224:resolve_secrets Resolving secrets section_end:1618515224:resolve_secrets section_start:1618515224:prepare_executor Preparing the "kubernetes" executor Using Kubernetes namespace: gitlab-runners Using Kubernetes executor with image registry.dso.mil/platform-one/big-bang/pipeline-templates/pipeline-templates/k3d-builder:0.0.5 ... section_end:1618515224:prepare_executor section_start:1618515224:prepare_script Preparing environment Waiting for pod gitlab-runners/runner-zqwzsvm5-project-2324-concurrent-0cmx9l to be running, status is Pending Running on runner-zqwzsvm5-project-2324-concurrent-0cmx9l via gitlab-runners-bigbang-gl-packages-privileged-gitlab-runne5fpbj... section_end:1618515227:prepare_script section_start:1618515227:get_sources Getting source from Git repository Fetching changes with git depth set to 50... Initialized empty Git repository in /builds/platform-one/big-bang/apps/security-tools/keycloak/.git/ Created fresh repository. Checking out 80646861 as refs/merge-requests/7/head... Skipping Git submodules setup section_end:1618515228:get_sources section_start:1618515228:step_script Executing "step_script" stage of the job script $ if [ -z ${PIPELINE_REPO_BRANCH} ]; then # collapsed multi-line command $ git clone -b ${PIPELINE_REPO_BRANCH} ${PIPELINE_REPO} ${PIPELINE_REPO_DESTINATION} Cloning into '../pipeline-repo'... $ source ${WAIT_PATH} $ docker network create ${CI_JOB_ID} --driver=bridge -o "com.docker.network.driver.mtu"="1450" 369439cc1486af7bf374f65391fee5fbc2bc8ed1199459ba8b4d6d35a4188820 $ k3d cluster create ${CI_JOB_ID} --config ${K3D_CONFIG_PATH} --network ${CI_JOB_ID} INFO[0000] Using config file ../pipeline-repo/jobs/k3d-ci/config.yaml INFO[0000] Prep: Network INFO[0000] Network with name '2756653' already exists with ID '369439cc1486af7bf374f65391fee5fbc2bc8ed1199459ba8b4d6d35a4188820' INFO[0000] Created volume 'k3d-2756653-images' INFO[0001] Creating node 'k3d-2756653-server-0' INFO[0002] Pulling image 'docker.io/rancher/k3s:v1.20.4-k3s1' INFO[0005] Creating LoadBalancer 'k3d-2756653-serverlb' INFO[0006] Pulling image 'docker.io/rancher/k3d-proxy:v4.3.0' INFO[0008] Starting cluster '2756653' INFO[0008] Starting servers... INFO[0008] Starting Node 'k3d-2756653-server-0' INFO[0013] Starting agents... INFO[0013] Starting helpers... INFO[0013] Starting Node 'k3d-2756653-serverlb' INFO[0014] (Optional) Trying to get IP of the docker host and inject it into the cluster as 'host.k3d.internal' for easy access INFO[0017] Successfully added host record to /etc/hosts in 2/2 nodes and to the CoreDNS ConfigMap INFO[0017] Cluster '2756653' created successfully! INFO[0017] --kubeconfig-update-default=false --> sets --kubeconfig-switch-context=false INFO[0017] You can now use it like this: kubectl config use-context k3d-2756653 kubectl cluster-info $ until kubectl get deployment coredns -n kube-system -o go-template='{{.status.availableReplicas}}' | grep -v -e ''; do sleep 1s; done 1 $ if [ ! -z ${PROJECT_NAME} ]; then # collapsed multi-line command namespace/keycloak created secret/private-registry created secret/private-registry-mil created $ if [[ "${CI_PROJECT_NAME}" != *"istio"* ]]; then # collapsed multi-line command - Processing resources for Istio core. ✔ Istio core installed - Processing resources for Istiod. - Processing resources for Istiod. Waiting for Deployment/istio-system/istiod ✔ Istiod installed - Processing resources for Ingress gateways. - Processing resources for Ingress gateways. Waiting for Deployment/istio-system/istio-ingressgat... ✔ Ingress gateways installed - Pruning removed resources ✔ Installation complete$ if [[ "${PACKAGE_NAMESPACE}" != "istio-operator" ]]; then # collapsed multi-line command Generating a RSA private key ....................................................................................................................................+++++ .................+++++ writing new private key to 'tls.key' ----- secret/wildcard-cert created $ if [ -f "tests/main-test-gateway.yaml" ]; then # collapsed multi-line command $ if [ -f "tests/dependencies.yaml" ]; then # collapsed multi-line command $ sleep 10 $ kubectl wait --for=condition=established --timeout 60s -A crd --all > /dev/null $ if [ -f tests/dependencies.yaml ]; then # collapsed multi-line command $ wait_sts $ wait_daemonset $ kubectl wait --for=condition=available --timeout 600s -A deployment --all > /dev/null $ kubectl wait --for=condition=ready --timeout 600s -A pods --all --field-selector status.phase=Running > /dev/null $ echo "Package install" Package install $ if [ ! -z ${PROJECT_NAME} ]; then # collapsed multi-line command $ if [ $(ls -1 tests/test-values.y*ml 2>/dev/null | wc -l) -gt 0 ]; then # collapsed multi-line command Helm installing keycloak/chart into keycloak namespace using keycloak/tests/test-values.yaml for values NAME: keycloak LAST DEPLOYED: Thu Apr 15 19:34:53 2021 NAMESPACE: keycloak STATUS: deployed REVISION: 1 TEST SUITE: None NOTES: *********************************************************************** * * * Keycloak Helm Chart by codecentric AG * * * *********************************************************************** Keycloak was installed with a Service of type ClusterIP Create a port-forwarding with the following commands: export POD_NAME=$(kubectl get pods --namespace keycloak -l "app.kubernetes.io/name=keycloak,app.kubernetes.io/instance=keycloak" -o name) echo "Visit http://127.0.0.1:8080 to use your application" kubectl --namespace keycloak port-forward "$POD_NAME" 8080 $ sleep 10 $ kubectl wait --for=condition=established --timeout 60s -A crd --all > /dev/null $ if [ -f tests/wait.sh ]; then # collapsed multi-line command $ wait_sts $ wait_daemonset $ kubectl wait --for=condition=available --timeout 600s -A deployment --all > /dev/null $ kubectl wait --for=condition=ready --timeout 600s -A pods --all --field-selector status.phase=Running > /dev/null $ echo "Package tests" Package tests $ if [ ! -z $(kubectl get services -n istio-system istio-ingressgateway -o jsonpath='{.status.loadBalancer.ingress[0].ip}') ] && [ ! -z $(kubectl get vs -A -o jsonpath='{.items[0].spec.hosts[0]}') ]; then # collapsed multi-line command $ if [ -f "tests/cypress.json" ]; then # collapsed multi-line command $ if [ -d "chart/templates/tests" ]; then # collapsed multi-line command $ touch $CI_PROJECT_DIR/success section_end:1618515465:step_script section_start:1618515465:after_script Running after_script Running after script... $ if [ -e success ]; then # collapsed multi-line command Job Succeeded $ docker exec -i k3d-${CI_JOB_ID}-server-0 crictl images -o json | jq -r '.images[].repoTags[0] | select(. != null)' > images.txt $ sed -i '/docker.io\/istio\//d' images.txt $ sed -i '/docker.io\/rancher\//d' images.txt $ if [ -f tests/images.txt ]; then # collapsed multi-line command $ k3d cluster delete ${CI_JOB_ID} INFO[0000] Deleting cluster '2756653' INFO[0000] Deleted k3d-2756653-serverlb INFO[0002] Deleted k3d-2756653-server-0 INFO[0002] Deleting image volume 'k3d-2756653-images' INFO[0002] Removing cluster details from default kubeconfig... INFO[0002] Removing standalone kubeconfig file (if there is one)... INFO[0002] Successfully deleted cluster 2756653! $ docker network rm ${CI_JOB_ID} 2756653 section_end:1618515468:after_script section_start:1618515468:upload_artifacts_on_success Uploading artifacts for successful job Uploading artifacts... images.txt: found 1 matching files and directories WARNING: tests/cypress/screenshots: no matching files WARNING: tests/cypress/videos: no matching files  Uploading artifacts as "archive" to coordinator... ok id=2756653 responseStatus=201 Created token=unCuijBN section_end:1618515469:upload_artifacts_on_success section_start:1618515469:cleanup_file_variables Cleaning up file based variables section_end:1618515469:cleanup_file_variables Job succeeded