Running with gitlab-runner 13.11.0 (7f7a4bb0)  on gitlab-runners-bigbang-gl-packages-privileged-gitlab-runne22ncc YvhYaXSq  feature flags: FF_GITLAB_REGISTRY_HELPER_IMAGE:true section_start:1620890687:resolve_secrets Resolving secrets section_end:1620890687:resolve_secrets section_start:1620890687:prepare_executor Preparing the "kubernetes" executor Using Kubernetes namespace: gitlab-runners Using Kubernetes executor with image registry.dso.mil/platform-one/big-bang/pipeline-templates/pipeline-templates/k3d-builder:0.0.5 ... section_end:1620890687:prepare_executor section_start:1620890687:prepare_script Preparing environment Waiting for pod gitlab-runners/runner-yvhyaxsq-project-2324-concurrent-05s5vv to be running, status is Pending Running on runner-yvhyaxsq-project-2324-concurrent-05s5vv via gitlab-runners-bigbang-gl-packages-privileged-gitlab-runne22ncc... section_end:1620890690:prepare_script section_start:1620890690:get_sources Getting source from Git repository Fetching changes with git depth set to 50... Initialized empty Git repository in /builds/platform-one/big-bang/apps/security-tools/keycloak/.git/ Created fresh repository. Checking out d839ae11 as refs/merge-requests/15/head... Skipping Git submodules setup section_end:1620890691:get_sources section_start:1620890691:step_script Executing "step_script" stage of the job script $ if [ -z ${PIPELINE_REPO_BRANCH} ]; then # collapsed multi-line command $ git clone -b ${PIPELINE_REPO_BRANCH} ${PIPELINE_REPO} ${PIPELINE_REPO_DESTINATION} Cloning into '../pipeline-repo'... $ source ${WAIT_PATH} $ docker network create ${CI_JOB_ID} --driver=bridge -o "com.docker.network.driver.mtu"="1450" 6501df98c9dbc6cf2520b0b3518abf570b06c23d1f93bf30ff5d69d3eb1ffd6f $ k3d cluster create ${CI_JOB_ID} --config ${K3D_CONFIG_PATH} --network ${CI_JOB_ID} INFO[0000] Using config file ../pipeline-repo/jobs/k3d-ci/config.yaml INFO[0000] Prep: Network INFO[0000] Network with name '3297531' already exists with ID '6501df98c9dbc6cf2520b0b3518abf570b06c23d1f93bf30ff5d69d3eb1ffd6f' INFO[0000] Created volume 'k3d-3297531-images' INFO[0001] Creating node 'k3d-3297531-server-0' INFO[0002] Pulling image 'docker.io/rancher/k3s:v1.20.4-k3s1' INFO[0004] Creating LoadBalancer 'k3d-3297531-serverlb' INFO[0005] Pulling image 'docker.io/rancher/k3d-proxy:v4.3.0' INFO[0007] Starting cluster '3297531' INFO[0007] Starting servers... INFO[0007] Starting Node 'k3d-3297531-server-0' INFO[0012] Starting agents... INFO[0012] Starting helpers... INFO[0012] Starting Node 'k3d-3297531-serverlb' INFO[0013] (Optional) Trying to get IP of the docker host and inject it into the cluster as 'host.k3d.internal' for easy access INFO[0016] Successfully added host record to /etc/hosts in 2/2 nodes and to the CoreDNS ConfigMap INFO[0016] Cluster '3297531' created successfully! INFO[0016] --kubeconfig-update-default=false --> sets --kubeconfig-switch-context=false INFO[0016] You can now use it like this: kubectl config use-context k3d-3297531 kubectl cluster-info $ until kubectl get deployment coredns -n kube-system -o go-template='{{.status.availableReplicas}}' | grep -v -e ''; do sleep 1s; done 1 $ if [ ! -z ${PROJECT_NAME} ]; then # collapsed multi-line command namespace/keycloak created secret/private-registry created secret/private-registry-mil created $ if [[ "${CI_PROJECT_NAME}" != *"istio"* ]]; then # collapsed multi-line command - Processing resources for Istio core. ✔ Istio core installed - Processing resources for Istiod. - Processing resources for Istiod. Waiting for Deployment/istio-system/istiod ✔ Istiod installed - Processing resources for Ingress gateways. - Processing resources for Ingress gateways. Waiting for Deployment/istio-system/istio-ingressgat... ✔ Ingress gateways installed - Pruning removed resources ✔ Installation complete$ if [[ "${PACKAGE_NAMESPACE}" != "istio-operator" ]]; then # collapsed multi-line command Generating a RSA private key ........................................................................................................+++++ ................+++++ writing new private key to 'tls.key' ----- secret/wildcard-cert created $ if [ -f "tests/main-test-gateway.yaml" ]; then # collapsed multi-line command $ if [ -f "tests/dependencies.yaml" ]; then # collapsed multi-line command $ sleep 10 $ kubectl wait --for=condition=established --timeout 60s -A crd --all > /dev/null $ if [ -f tests/dependencies.yaml ]; then # collapsed multi-line command $ wait_sts $ wait_daemonset $ kubectl wait --for=condition=available --timeout 600s -A deployment --all > /dev/null $ kubectl wait --for=condition=ready --timeout 600s -A pods --all --field-selector status.phase=Running > /dev/null $ echo "Package install" Package install $ if [ ! -z ${PROJECT_NAME} ]; then # collapsed multi-line command $ if [ $(ls -1 tests/test-values.y*ml 2>/dev/null | wc -l) -gt 0 ]; then # collapsed multi-line command Helm installing keycloak/chart into keycloak namespace using keycloak/tests/test-values.yaml for values NAME: keycloak LAST DEPLOYED: Thu May 13 07:26:00 2021 NAMESPACE: keycloak STATUS: deployed REVISION: 1 TEST SUITE: None NOTES: *********************************************************************** * * * Keycloak Helm Chart by codecentric AG * * * *********************************************************************** Keycloak was installed with a Service of type ClusterIP Create a port-forwarding with the following commands: export POD_NAME=$(kubectl get pods --namespace keycloak -l "app.kubernetes.io/name=keycloak,app.kubernetes.io/instance=keycloak" -o name) echo "Visit http://127.0.0.1:8080 to use your application" kubectl --namespace keycloak port-forward "$POD_NAME" 8080 $ sleep 10 $ kubectl wait --for=condition=established --timeout 60s -A crd --all > /dev/null $ if [ -f tests/wait.sh ]; then # collapsed multi-line command $ wait_sts $ wait_daemonset $ kubectl wait --for=condition=available --timeout 600s -A deployment --all > /dev/null $ kubectl wait --for=condition=ready --timeout 600s -A pods --all --field-selector status.phase=Running > /dev/null $ echo "Package tests" Package tests $ if [ ! -z $(kubectl get services -n istio-system istio-ingressgateway -o jsonpath='{.status.loadBalancer.ingress[0].ip}') ] && [ ! -z $(kubectl get vs -A -o jsonpath='{.items[0].spec.hosts[0]}') ]; then # collapsed multi-line command $ if [ -f "tests/cypress.json" ]; then # collapsed multi-line command $ if [ -d "chart/templates/tests" ]; then # collapsed multi-line command $ touch $CI_PROJECT_DIR/success section_end:1620890916:step_script section_start:1620890916:after_script Running after_script Running after script... $ if [ -e success ]; then # collapsed multi-line command Job Succeeded $ docker exec -i k3d-${CI_JOB_ID}-server-0 crictl images -o json | jq -r '.images[].repoTags[0] | select(. != null)' > images.txt $ sed -i '/docker.io\/istio\//d' images.txt $ sed -i '/docker.io\/rancher\//d' images.txt $ if [ -f tests/images.txt ]; then # collapsed multi-line command $ k3d cluster delete ${CI_JOB_ID} INFO[0000] Deleting cluster '3297531' INFO[0000] Deleted k3d-3297531-serverlb INFO[0002] Deleted k3d-3297531-server-0 INFO[0002] Deleting image volume 'k3d-3297531-images' INFO[0002] Removing cluster details from default kubeconfig... INFO[0002] Removing standalone kubeconfig file (if there is one)... INFO[0002] Successfully deleted cluster 3297531! $ docker network rm ${CI_JOB_ID} 3297531 section_end:1620890919:after_script section_start:1620890919:upload_artifacts_on_success Uploading artifacts for successful job Uploading artifacts... images.txt: found 1 matching files and directories WARNING: tests/cypress/screenshots: no matching files WARNING: tests/cypress/videos: no matching files  WARNING: cypress-artifacts: no matching files  Uploading artifacts as "archive" to coordinator... ok id=3297531 responseStatus=201 Created token=bDPQedY4 section_end:1620890920:upload_artifacts_on_success section_start:1620890920:cleanup_file_variables Cleaning up file based variables section_end:1620890920:cleanup_file_variables Job succeeded