build-template-works-without-crane ✗ failed
⏱
Duration: 10s
⏳
Queued: 3s
📁
Stage: docker-image
🖥
Runner: linux-aws-1
Average Duration
50s
This job: 10s
Failure Rate
1.5%
last 30 days
External Links
▶
Job Execution Phases
💡 Tip: Click on any phase bar to jump to that section in the log below
▶
Failure Analysis
1 pattern
No known pattern matched
The failure reason could not be detected.
Mitigation:
Please post to [slack-support] if you need assistance.
Generating AI diagnosis...
▶
Full Job Log
419 lines
Match - of 0
1
14:27:23
Running with gitlab-runner 18.5.0 (bda84871)
2
14:27:23
on gitlab-runner-linux-1-86d76d468c-d4585 wRxjPbsJX, system ID: r_J8j67beySAjl
3
14:27:23
feature flags: FF_USE_FASTZIP:true, FF_USE_NEW_BASH_EVAL_STRATEGY:true, FF_SCRIPT_SECTIONS:true, FF_USE_ADVANCED_POD_SPEC_CONFIGURATION:true, FF_PRINT_POD_EVENTS:true, FF_USE_DUMB_INIT_WITH_KUBERNETES_EXECUTOR:true, FF_LOG_IMAGES_CONFIGURED_FOR_JOB:true, FF_CLEAN_UP_FAILED_CACHE_EXTRACT:true, FF_TIMESTAMPS:true, FF_GIT_URLS_WITHOUT_TOKENS:true
4
14:27:23
Resolving secrets
5
14:27:23
section_start:1765290443:prepare_executor
6
14:27:23
+Preparing the "kubernetes" executor
7
14:27:23
"CPURequest" overwritten with "2"
8
14:27:23
"MemoryRequest" overwritten with "4G"
9
14:27:23
Using Kubernetes namespace: gitlab-runner
10
14:27:23
Using Kubernetes executor with image martizih/kaniko:v1.26.2-debug ...
11
14:27:23
Using attach strategy to execute scripts...
12
14:27:23
Using effective pull policy of [Always] for container helper
13
14:27:23
Using effective pull policy of [Always] for container init-permissions
14
14:27:23
Using effective pull policy of [Always] for container build
15
14:27:23
section_end:1765290443:prepare_executor
16
14:27:23
+section_start:1765290443:prepare_script
17
14:27:23
+Preparing environment
18
14:27:23
Using FF_USE_POD_ACTIVE_DEADLINE_SECONDS, the Pod activeDeadlineSeconds will be set to the job timeout: 1h0m0s...
19
14:27:23
WARNING: Advanced Pod Spec configuration enabled, merging the provided PodSpec to the generated one. This is a beta feature and is subject to change. Feedback is collected in this issue: https://gitlab.com/gitlab-org/gitlab-runner/-/issues/29659 ...
20
14:27:23
Subscribing to Kubernetes Pod events...
21
14:27:23
Type Reason Message
22
14:27:23
Normal Scheduled Successfully assigned gitlab-runner/runner-wrxjpbsjx-project-621-concurrent-0-w4u5fxip to ip-10-0-23-99.eu-central-1.compute.internal
23
14:27:24
Normal Pulled Container image "gitlab/gitlab-runner-helper:x86_64-v18.5.0" already present on machine
24
14:27:24
Normal Created Created container: init-permissions
25
14:27:24
Normal Started Started container init-permissions
26
14:27:25
Normal Pulling Pulling image "martizih/kaniko:v1.26.2-debug"
27
14:27:27
Normal Pulled Successfully pulled image "martizih/kaniko:v1.26.2-debug" in 2.704s (2.704s including waiting). Image size: 40628519 bytes.
28
14:27:27
Normal Created Created container: build
29
14:27:28
Normal Started Started container build
30
14:27:28
Normal Pulled Container image "gitlab/gitlab-runner-helper:x86_64-v18.5.0" already present on machine
31
14:27:28
Normal Created Created container: helper
32
14:27:28
Normal Started Started container helper
33
14:27:30
Running on runner-wrxjpbsjx-project-621-concurrent-0-w4u5fxip via gitlab-runner-linux-1-86d76d468c-d4585...
34
14:27:30
35
14:27:30
section_end:1765290450:prepare_script
36
14:27:30
+section_start:1765290450:get_sources
37
14:27:30
+Getting source from Git repository
38
14:27:30
Gitaly correlation ID: 01KC1R505R484M9F2STYRTY6V5
39
14:27:30
Fetching changes with git depth set to 1...
40
14:27:30
Initialized empty Git repository in /build/internal/gitlab-templates/.git/
41
14:27:30
Created fresh repository.
42
14:27:31
Checking out 940006cc as detached HEAD (ref is refs/merge-requests/507/merge)...
43
14:27:31
44
14:27:31
Skipping Git submodules setup
45
14:27:31
46
14:27:31
section_end:1765290451:get_sources
47
14:27:31
+section_start:1765290451:step_script
48
14:27:31
+Executing "step_script" stage of the job script
49
14:27:31
section_start:1765290451:section_pre_build_script_0[hide_duration=true,collapsed=true]
$ function cleanup {
50
14:27:31
rv=$?
51
14:27:31
if [ $rv -ne 0 ]; then
52
14:27:31
echo ""
53
14:27:31
echo " Failure Cause Analysis might help, please open this link:"
54
14:27:31
echo " https://failure-cause-analysis.zrh.int.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
55
14:27:31
echo ""
56
14:27:31
fi
57
14:27:31
echo ""
58
14:27:31
echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=${EPOCHSECONDS}000"
59
14:27:31
echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=${EPOCHSECONDS}000"
60
14:27:31
echo ""
61
14:27:31
exit $rv
62
14:27:31
}
63
14:27:31
trap cleanup EXIT
64
14:27:31
echo "INFO: This is the CI job pre_build_script"
65
14:27:31
echo "INFO: It's defined in the backend/infra/aws repo."
66
14:27:31
echo "INFO: These additional Scandit variables are available to you:"
67
14:27:31
echo " SC_K8S_NODE_NAME: $SC_K8S_NODE_NAME"
68
14:27:31
echo " SC_K8S_IMAGE_ID: $SC_K8S_IMAGE_ID"
69
14:27:31
echo "cpu (r/l): ${SC_K8S_REQUESTS_CPU}/${SC_K8S_LIMITS_CPU}"
70
14:27:31
if command -v numfmt >/dev/null 2>&1; then
71
14:27:31
echo "memory (r/l): $(numfmt --to=iec --suffix=B $SC_K8S_REQUESTS_MEMORY)/$(numfmt --to=iec --suffix=B $SC_K8S_LIMITS_MEMORY)"
72
14:27:31
else
73
14:27:31
echo "memory (r/l): ${SC_K8S_REQUESTS_MEMORY}/${SC_K8S_LIMITS_MEMORY}"
74
14:27:31
fi
75
14:27:31
__start_time=${EPOCHSECONDS}
76
14:27:31
echo ""
77
14:27:31
echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=now"
78
14:27:31
echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=now"
79
14:27:31
echo ""
80
14:27:31
echo "Setting up credentials for Gitlab Python registries"
81
14:27:31
mkdir -p ~
82
14:27:31
echo "machine gitlab.scandit.com" > ~/.netrc
83
14:27:31
echo "login gitlab-ci-token" >> ~/.netrc
84
14:27:31
echo "password ${CI_JOB_TOKEN}" >> ~/.netrc
85
14:27:31
chmod 600 ~/.netrc
86
14:27:31
if command -v git &> /dev/null && [ "$(id -u)" -ne 0 ]; then
87
14:27:31
git config --global --add safe.directory $CI_PROJECT_DIR
88
14:27:31
fi
89
14:27:31
# Sonarqube server is running on the same cluster. Use internal address
90
14:27:31
export SONAR_HOST_URL="http://sonarqube.sonarqube.svc.cluster.local:9000"
91
14:27:31
section_end:1765290451:section_pre_build_script_0
92
14:27:31
INFO: This is the CI job pre_build_script
93
14:27:31
INFO: It's defined in the backend/infra/aws repo.
94
14:27:31
INFO: These additional Scandit variables are available to you:
95
14:27:31
SC_K8S_NODE_NAME: ip-10-0-23-99.eu-central-1.compute.internal
96
14:27:31
SC_K8S_IMAGE_ID:
97
14:27:31
cpu (r/l): 2/4
98
14:27:31
memory (r/l): 4000000000/17179869184
99
14:27:31
100
14:27:31
Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-host=ip-10-0-23-99.eu-central-1.compute.internal&var-namespace=gitlab-runner&var-pod=runner-wrxjpbsjx-project-621-concurrent-0-w4u5fxip&var-resolution=15&from=1765290451000&to=now
101
14:27:31
Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-node=ip-10-0-23-99.eu-central-1.compute.internal&var-resolution=15s&from=1765290451000&to=now
102
14:27:31
103
14:27:31
Setting up credentials for Gitlab Python registries
104
14:27:31
$ echo $DOCKER_CONFIG_JSON > /kaniko/.docker/config.json
105
14:27:31
section_start:1765290451:section_script_step_1[hide_duration=true,collapsed=true]
$ if [ "$CONTAINER_USER_HOME" != "" ]; then
106
14:27:31
mkdir -p "$CONTAINER_USER_HOME"
107
14:27:31
cp ~/.netrc "$CONTAINER_USER_HOME"
108
14:27:31
if [ "$CONTAINER_USER_UID" != "" ]; then
109
14:27:31
chown "$CONTAINER_USER_UID" "$CONTAINER_USER_HOME/.netrc"
110
14:27:31
fi
111
14:27:31
fi
112
14:27:31
section_end:1765290451:section_script_step_1
113
14:27:31
section_start:1765290451:section_script_step_2[hide_duration=true,collapsed=true]
$ function copy_files() {
114
14:27:31
local src="$1"
115
14:27:31
local trg="$2"
116
14:27:31
for f in $src; do
117
14:27:31
t="$trg/`dirname $f`"
118
14:27:31
mkdir -p $t || true
119
14:27:31
echo "Copy $f"
120
14:27:31
cp -pr $f $trg/$f
121
14:27:31
done
122
14:27:31
}
123
14:27:31
function recursive_hash() {
124
14:27:31
local dir="$1"
125
14:27:31
(find $dir -type f -exec sha256sum {} + ; find $dir -type d) | sort | sha256sum | cut -d ' ' -f1
126
14:27:31
}
127
14:27:31
function remote_docker_digest() {
128
14:27:31
local images="$1"
129
14:27:31
echo $images | xargs -n 1 crane digest
130
14:27:31
}
131
14:27:31
function remote_image_exists() {
132
14:27:31
local image="$1"
133
14:27:31
crane manifest $image > /dev/null 2>&1
134
14:27:31
}
135
14:27:31
function remote_images_are_identical() {
136
14:27:31
local imageA="$1"
137
14:27:31
local imageB="$2"
138
14:27:31
if [[ $(remote_docker_digest "$imageA") == $(remote_docker_digest "$imageB") ]]; then
139
14:27:31
return 0
140
14:27:31
else
141
14:27:31
return 1
142
14:27:31
fi
143
14:27:31
}
144
14:27:31
function copy_image() {
145
14:27:31
local image="$1"
146
14:27:31
local remotes="$2"
147
14:27:31
local backup_ext="$3"
148
14:27:31
echo "$image"
149
14:27:31
local source_digest=$(remote_docker_digest $image)
150
14:27:31
local target_digest
151
14:27:31
for registry in $remotes; do
152
14:27:31
if target_digest=$(remote_docker_digest $registry); then
153
14:27:31
if [ "$target_digest" != "$source_digest" ]; then
154
14:27:31
echo "image outdated, overwriting with newest version"
155
14:27:31
crane copy $image $registry
156
14:27:31
crane copy $image ${registry}${backup_ext}
157
14:27:31
fi
158
14:27:31
else
159
14:27:31
echo "image does not exist, writing newest version"
160
14:27:31
crane copy $image $registry
161
14:27:31
crane copy $image ${registry}${backup_ext}
162
14:27:31
fi
163
14:27:31
done
164
14:27:31
}
165
14:27:31
section_end:1765290451:section_script_step_2
166
14:27:31
section_start:1765290451:section_script_step_3[hide_duration=true,collapsed=true]
$ if [ "$CONTAINER_SUBDIR" != "" ]; then
167
14:27:31
echo "Entering subpath $CONTAINER_SUBDIR"
168
14:27:31
cd $CONTAINER_SUBDIR
169
14:27:31
fi
170
14:27:31
section_end:1765290451:section_script_step_3
171
14:27:31
$ copy_files "$CONTAINER_IMPLICIT_REQUIREMENTS $CONTAINER_REQUIREMENTS" "$CONTAINER_CONTEXT_PATH"
172
14:27:31
Copy Dockerfile.python-3-no-requirements
173
14:27:31
$ echo "$CONTAINER_BUILD_ENVIRONMENT" > $CONTAINER_CONTEXT_PATH/.docker-build-env
174
14:27:31
$ docker_checksum=$(recursive_hash $CONTAINER_CONTEXT_PATH)
175
14:27:31
section_start:1765290451:section_script_step_7[hide_duration=true,collapsed=true]
$ if [ "$CONTAINER_IMAGE_NAME" == "" ]; then
176
14:27:31
final_image_name=${CONTAINER_IMAGE_URL}
177
14:27:31
else
178
14:27:31
final_image_name=${CONTAINER_IMAGE_URL}/${CONTAINER_IMAGE_NAME}
179
14:27:31
fi
180
14:27:31
section_end:1765290451:section_script_step_7
181
14:27:31
$ final_image_url=${final_image_name}:${docker_checksum}
182
14:27:31
section_start:1765290451:section_script_step_9[hide_duration=true,collapsed=true]
$ if [ "${PIPELINE_IMAGE_REFS}" == "1" ]; then
183
14:27:31
echo $CONTAINER_IMAGE_VARIABLE=${final_image_url}-P${CI_PROJECT_ID}-${CI_PIPELINE_ID} > $CI_PROJECT_DIR/docker_image_build.env
184
14:27:31
else
185
14:27:31
echo $CONTAINER_IMAGE_VARIABLE=$final_image_url > $CI_PROJECT_DIR/docker_image_build.env
186
14:27:31
fi
187
14:27:31
section_end:1765290451:section_script_step_9
188
14:27:31
$ echo ${CONTAINER_IMAGE_VARIABLE}_HASH=$docker_checksum >> $CI_PROJECT_DIR/docker_image_build.env
189
14:27:31
section_start:1765290451:section_script_step_11[hide_duration=true,collapsed=true]
$ if [ "${FORCE_BUILD}" != "true" ] || command -v crane &> /dev/null; then
190
14:27:31
echo $REGISTRY_PASSWORD | crane auth login $REGISTRY -u $REGISTRY_USER --password-stdin
191
14:27:31
fi
192
14:27:31
section_end:1765290451:section_script_step_11
193
14:27:31
section_start:1765290451:section_script_step_12[hide_duration=true,collapsed=true]
$ if [ "${FORCE_BUILD}" != "true" ] && remote_image_exists "$final_image_url"; then
194
14:27:31
echo "Image already exists, skip the build."
195
14:27:31
echo "$final_image_url"
196
14:27:31
if [[ "$CI_COMMIT_BRANCH" == "$CI_DEFAULT_BRANCH" ]]; then
197
14:27:31
_EXT=""
198
14:27:31
_BACKUP_EXT="-CI${CI_JOB_ID}-$(date '+%Y%m%d')"
199
14:27:31
elif [[ -n "$CI_MERGE_REQUEST_ID" ]]; then
200
14:27:31
_EXT="-MR${CI_MERGE_REQUEST_IID}"
201
14:27:31
_BACKUP_EXT=""
202
14:27:31
elif [[ "$CI_COMMIT_REF_PROTECTED" == "true" ]]; then
203
14:27:31
_EXT="-${CI_COMMIT_REF_SLUG}"
204
14:27:31
_BACKUP_EXT="-CI${CI_JOB_ID}-$(date '+%Y%m%d')"
205
14:27:31
else
206
14:27:31
_EXT="-${CI_COMMIT_REF_SLUG}"
207
14:27:31
_BACKUP_EXT=""
208
14:27:31
fi
209
14:27:31
for _TAG in $CONTAINER_IMAGE_TAG; do
210
14:27:31
echo "Copying ${final_image_url} to ${final_image_name}:${_TAG}${_EXT}"
211
14:27:31
copy_image "${final_image_url}" "${final_image_name}:${_TAG}${_EXT}" "${_BACKUP_EXT}"
212
14:27:31
done
213
14:27:31
if [ "${PIPELINE_IMAGE_REFS}" == "1" ]; then
214
14:27:31
_EXT="-P${CI_PROJECT_ID}-${CI_PIPELINE_ID}"
215
14:27:31
echo "Copying ${final_image_url} to ${final_image_url}${_EXT}"
216
14:27:31
copy_image "${final_image_url}" "${final_image_url}${_EXT}"
217
14:27:31
for _TAG in $CONTAINER_IMAGE_TAG; do
218
14:27:31
echo "Copying ${final_image_url} to ${final_image_name}:${_TAG}${_EXT}"
219
14:27:31
copy_image "${final_image_url}" "${final_image_name}:${_TAG}${_EXT}"
220
14:27:31
done
221
14:27:31
fi
222
14:27:31
exit 0
223
14:27:31
fi
224
14:27:31
section_end:1765290451:section_script_step_12
225
14:27:31
$ DESTINATIONS="--destination=$final_image_url"
226
14:27:31
section_start:1765290451:section_script_step_14[hide_duration=true,collapsed=true]
$ if [[ "$CI_COMMIT_BRANCH" == "$CI_DEFAULT_BRANCH" ]]; then
227
14:27:31
_EXT=""
228
14:27:31
TIMESTAMP_TAGS=$CONTAINER_IMAGE_TAG
229
14:27:31
elif [[ -n "$CI_MERGE_REQUEST_ID" ]]; then
230
14:27:31
_EXT="-MR${CI_MERGE_REQUEST_IID}"
231
14:27:31
TIMESTAMP_TAGS=""
232
14:27:31
elif [[ "$CI_COMMIT_REF_PROTECTED" == "true" ]]; then
233
14:27:31
_EXT="-${CI_COMMIT_REF_SLUG}"
234
14:27:31
TIMESTAMP_TAGS=$CONTAINER_IMAGE_TAG
235
14:27:31
fi
236
14:27:31
section_end:1765290451:section_script_step_14
237
14:27:31
section_start:1765290451:section_script_step_15[hide_duration=true,collapsed=true]
$ for _TAG in $CONTAINER_IMAGE_TAG; do
238
14:27:31
DESTINATIONS="${DESTINATIONS} --destination=${final_image_name}:${_TAG}${_EXT}"
239
14:27:31
done
240
14:27:31
section_end:1765290451:section_script_step_15
241
14:27:31
section_start:1765290451:section_script_step_16[hide_duration=true,collapsed=true]
$ if [ "${PIPELINE_IMAGE_REFS}" == "1" ]; then
242
14:27:31
_EXT="-P${CI_PROJECT_ID}-${CI_PIPELINE_ID}"
243
14:27:31
DESTINATIONS="${DESTINATIONS} --destination=${final_image_url}${_EXT}"
244
14:27:31
for _TAG in $CONTAINER_IMAGE_TAG; do
245
14:27:31
DESTINATIONS="${DESTINATIONS} --destination=${final_image_name}:${_TAG}${_EXT}"
246
14:27:31
done
247
14:27:31
fi
248
14:27:31
section_end:1765290451:section_script_step_16
249
14:27:31
section_start:1765290451:section_script_step_17[hide_duration=true,collapsed=true]
$ DATE=$(date '+%Y%m%d')
250
14:27:31
for _TAG in $TIMESTAMP_TAGS; do
251
14:27:31
DESTINATIONS="${DESTINATIONS} --destination=${final_image_name}:${_TAG}${_EXT}-CI${CI_JOB_ID}-${DATE}"
252
14:27:31
done
253
14:27:31
section_end:1765290451:section_script_step_17
254
14:27:31
section_start:1765290451:section_script_step_18[hide_duration=true,collapsed=true]
$ if [ -n "${CONTAINER_BUILD_ARGS}" ]; then
255
14:27:31
for _BUILD_ARG in $CONTAINER_BUILD_ARGS; do
256
14:27:31
FINAL_BUILD_ARGS="--build-arg $_BUILD_ARG $FINAL_BUILD_ARGS"
257
14:27:31
done
258
14:27:31
fi
259
14:27:31
section_end:1765290451:section_script_step_18
260
14:27:31
section_start:1765290451:section_script_step_19[hide_duration=true,collapsed=true]
$ for _PATH in $CONTAINER_IGNORE_PATHS; do
261
14:27:31
FINAL_IGNORE_PATHS="--ignore-path=$_PATH $FINAL_IGNORE_PATHS"
262
14:27:31
done
263
14:27:31
section_end:1765290451:section_script_step_19
264
14:27:31
section_start:1765290451:section_script_step_20[hide_duration=true,collapsed=true]
$ if [ -n "${CONTAINER_PLATFORM}" ]; then
265
14:27:31
KANIKO_PLATFORM="--custom-platform=${CONTAINER_PLATFORM}"
266
14:27:31
fi
267
14:27:31
section_end:1765290451:section_script_step_20
268
14:27:31
$ ANNOTATIONS=""
269
14:27:31
section_start:1765290451:section_script_step_22[hide_duration=true,collapsed=true]
$ if [[ -n "$CI_COMMIT_REF_NAME" ]]; then
270
14:27:31
ANNOTATIONS="${ANNOTATIONS} $KANIKO_ANNOTATION_KEY org.opencontainers.image.ref.name=${CI_COMMIT_REF_NAME}"
271
14:27:31
fi
272
14:27:31
section_end:1765290451:section_script_step_22
273
14:27:31
section_start:1765290451:section_script_step_23[hide_duration=true,collapsed=true]
$ if [[ -n "$CI_COMMIT_SHA" ]]; then
274
14:27:31
ANNOTATIONS="${ANNOTATIONS} $KANIKO_ANNOTATION_KEY org.opencontainers.image.revision=${CI_COMMIT_SHA}"
275
14:27:31
fi
276
14:27:31
section_end:1765290451:section_script_step_23
277
14:27:31
section_start:1765290451:section_script_step_24[hide_duration=true,collapsed=true]
$ if [[ -n "$CI_JOB_URL" ]]; then
278
14:27:31
ANNOTATIONS="${ANNOTATIONS} $KANIKO_ANNOTATION_KEY org.opencontainers.image.url=${CI_JOB_URL}"
279
14:27:31
fi
280
14:27:31
section_end:1765290451:section_script_step_24
281
14:27:31
section_start:1765290451:section_script_step_25[hide_duration=true,collapsed=true]
$ if [[ -n "$CI_PIPELINE_ID" ]]; then
282
14:27:31
ANNOTATIONS="${ANNOTATIONS} $KANIKO_ANNOTATION_KEY io.gitlab.ci.pipeline_id=${CI_PIPELINE_ID}"
283
14:27:31
fi
284
14:27:31
section_end:1765290451:section_script_step_25
285
14:27:31
section_start:1765290451:section_script_step_26[hide_duration=true,collapsed=true]
$ if [[ -n "$CI_JOB_ID" ]]; then
286
14:27:31
ANNOTATIONS="${ANNOTATIONS} $KANIKO_ANNOTATION_KEY io.gitlab.ci.job_id=${CI_JOB_ID}"
287
14:27:31
fi
288
14:27:31
section_end:1765290451:section_script_step_26
289
14:27:31
section_start:1765290451:section_script_step_27[hide_duration=true,collapsed=true]
$ if [[ -n "$CI_JOB_IMAGE" ]]; then
290
14:27:31
ANNOTATIONS="${ANNOTATIONS} $KANIKO_ANNOTATION_KEY io.gitlab.ci.job_image=${CI_JOB_IMAGE}"
291
14:27:31
fi
292
14:27:31
section_end:1765290451:section_script_step_27
293
14:27:31
$ ANNOTATIONS="${ANNOTATIONS} $KANIKO_ANNOTATION_KEY org.opencontainers.image.title=${final_image_name}:$(echo $CONTAINER_IMAGE_TAG | cut -d' ' -f1)"
294
14:27:31
$ ANNOTATIONS="${ANNOTATIONS} $KANIKO_ANNOTATION_KEY org.opencontainers.image.created=$(date -u +%Y-%m-%dT%H:%M:%SZ)"
295
14:27:31
$ ANNOTATIONS="${ANNOTATIONS} $KANIKO_ANNOTATION_KEY org.opencontainers.image.vendor=Scandit"
296
14:27:31
$ ANNOTATIONS="${ANNOTATIONS} $KANIKO_ANNOTATION_KEY io.scandit.ci.hash=${docker_checksum}"
297
14:27:31
section_start:1765290451:section_script_step_32[hide_duration=true,collapsed=true]
$ if [ -n "${CONTAINER_TARGET_STAGE}" ]; then
298
14:27:31
KANIKO_TARGET="--target $CONTAINER_TARGET_STAGE"
299
14:27:31
fi
300
14:27:31
section_end:1765290451:section_script_step_32
301
14:27:31
$ set -x
302
14:27:31
+ echo '$ /kaniko/executor --context $CONTAINER_CONTEXT_PATH --dockerfile $CONTAINER_DOCKERFILE $DESTINATIONS --cache=true --cache-copy-layers --cache-dir /cache/kaniko --cache-repo ${CI_REGISTRY_IMAGE}/cache --cache-ttl=$CONTAINER_CACHE_TTL $FINAL_IGNORE_PATHS $KANIKO_TARGET $FINAL_BUILD_ARGS $KANIKO_PLATFORM $ANNOTATIONS $KANIKO_DEFAULT_FLAGS $KANIKO_EXTRA_FLAGS'
303
14:27:31
$ /kaniko/executor --context $CONTAINER_CONTEXT_PATH --dockerfile $CONTAINER_DOCKERFILE $DESTINATIONS --cache=true --cache-copy-layers --cache-dir /cache/kaniko --cache-repo ${CI_REGISTRY_IMAGE}/cache --cache-ttl=$CONTAINER_CACHE_TTL $FINAL_IGNORE_PATHS $KANIKO_TARGET $FINAL_BUILD_ARGS $KANIKO_PLATFORM $ANNOTATIONS $KANIKO_DEFAULT_FLAGS $KANIKO_EXTRA_FLAGS
304
14:27:31
+ /kaniko/executor --context /build/internal/gitlab-templates/context/ --dockerfile Dockerfile.python-3-no-requirements '--destination=registry.scandit.com/internal/gitlab-templates:c2730dcff7ac732d36125357928a6f845a331fe83118f151638054758cf29518' '--destination=registry.scandit.com/internal/gitlab-templates:latest-MR507' '--cache=true' --cache-copy-layers --cache-dir /cache/kaniko --cache-repo registry.scandit.com/internal/gitlab-templates/cache '--cache-ttl=336h' --annotation 'org.opencontainers.image.ref.name=martin.zihlmann-master-patch-ac03' --annotation 'org.opencontainers.image.revision=940006ccdb5cae9f992061bdd618ea8cc79c4306' --annotation 'org.opencontainers.image.url=https://gitlab.scandit.com/internal/gitlab-templates/-/jobs/46308184' --annotation 'io.gitlab.ci.pipeline_id=1391810' --annotation 'io.gitlab.ci.job_id=46308184' --annotation 'io.gitlab.ci.job_image=martizih/kaniko:v1.26.2-debug' --annotation 'org.opencontainers.image.title=registry.scandit.com/internal/gitlab-templates:latest' --annotation 'org.opencontainers.image.created=2025-12-09T14:27:31Z' --annotation 'org.opencontainers.image.vendor=Scandit' --annotation 'io.scandit.ci.hash=c2730dcff7ac732d36125357928a6f845a331fe83118f151638054758cf29518' --preserve-context '--credential-helpers=gitlab' --secret 'id=netrc,src=/root/.netrc' --secret 'id=ci_job_token,env=CI_JOB_TOKEN'
305
14:27:31
Error: unknown flag: --secret
306
14:27:31
Usage:
307
14:27:31
executor [flags]
308
14:27:31
executor [command]
309
14:27:31
310
14:27:31
Available Commands:
311
14:27:31
completion Generate the autocompletion script for the specified shell
312
14:27:31
help Help about any command
313
14:27:31
version Print the version number of kaniko
314
14:27:31
315
14:27:31
Flags:
316
14:27:31
--annotation key-value-arg type Set metadata annotations for the image in key=value format. Set it repeatedly for multiple annotations.
317
14:27:31
--build-arg multi-arg type This flag allows you to pass in ARG values at build time. Set it repeatedly for multiple values.
318
14:27:31
--cache Use cache when building image
319
14:27:31
--cache-copy-layers Caches copy layers
320
14:27:31
--cache-dir string Specify a local directory to use as a cache. (default "/cache")
321
14:27:31
--cache-repo string Specify a repository to use as a cache, otherwise one will be inferred from the destination provided; when prefixed with 'oci:' the repository will be written in OCI image layout format at the path provided
322
14:27:31
--cache-run-layers Caches run layers (default true)
323
14:27:31
--cache-ttl duration Cache timeout, requires value and unit of duration -> ex: 6h. Defaults to two weeks. (default 336h0m0s)
324
14:27:31
--cleanup Clean the filesystem at the end
325
14:27:31
--compressed-caching Compress the cached layers. Decreases build time, but increases memory usage. (default true)
326
14:27:31
--compression compression Compression algorithm (gzip, zstd)
327
14:27:31
--compression-level int Compression level (default -1)
328
14:27:31
-c, --context string Path to the dockerfile build context. (default "/workspace/")
329
14:27:31
--context-sub-path string Sub path within the given context.
330
14:27:31
--credential-helpers multi-arg type Use these credential helpers automatically, select from (env, google, ecr, acr, gitlab). Set it repeatedly for multiple helpers, defaults to all, set it to empty string to deactivate.
331
14:27:31
--custom-platform string Specify the build platform if different from the current host
332
14:27:31
--customPlatform string This flag is deprecated. Please use '--custom-platform'.
333
14:27:31
-d, --destination multi-arg type Registry the final image should be pushed to. Set it repeatedly for multiple destinations.
334
14:27:31
--digest-file string Specify a file to save the digest of the built image to.
335
14:27:31
-f, --dockerfile string Path to the dockerfile to be built. (default "Dockerfile")
336
14:27:31
--force Force building outside of a container
337
14:27:31
--force-build-metadata This flag is deprecated. This is the new default behaviour
338
14:27:31
--git gitoptions Branch to clone if build context is a git repository (default branch=,single-branch=false,depth=0,recurse-submodules=false,insecure-skip-tls=false)
339
14:27:31
-h, --help help for executor
340
14:27:31
--ignore-path multi-arg type Ignore these paths when taking a snapshot. Set it repeatedly for multiple paths.
341
14:27:31
--ignore-var-run Ignore /var/run directory when taking image snapshot. Set it to false to preserve /var/run/ in destination image. (default true)
342
14:27:31
--image-download-retry int Number of retries for downloading the remote image
343
14:27:31
--image-fs-extract-retry int Number of retries for image FS extraction
344
14:27:31
--image-name-tag-with-digest-file string Specify a file to save the image name w/ image tag w/ digest of the built image to.
345
14:27:31
--image-name-with-digest-file string Specify a file to save the image name w/ digest of the built image to.
346
14:27:31
--insecure Push to insecure registry using plain HTTP
347
14:27:31
--insecure-pull Pull from insecure registry using plain HTTP
348
14:27:31
--insecure-registry multi-arg type Insecure registry using plain HTTP to push and pull. Set it repeatedly for multiple registries.
349
14:27:31
--kaniko-dir string Path to the kaniko directory, this takes precedence over the KANIKO_DIR environment variable. (default "/kaniko")
350
14:27:31
--label multi-arg type Set metadata for an image. Set it repeatedly for multiple labels.
351
14:27:31
--log-format string Log format (text, color, json) (default "color")
352
14:27:31
--log-timestamp Timestamp in log output
353
14:27:31
--materialize Guarantee that the final state of the file system corresponds to what was specified as the build target, even if we have 100% cache hitrate and wouldn't need to unpack any layers
354
14:27:31
--no-push Do not push the image to the registry
355
14:27:31
--no-push-cache Do not push the cache layers to the registry
356
14:27:31
--oci-layout-path string Path to save the OCI image layout of the built image.
357
14:27:31
--pre-cleanup Clean the filesystem before the build
358
14:27:31
--preserve-context Preserve build context across build stages by taking a snapshot of the full filesystem before build and restore it after we switch stages. Restores in the end too if passed together with 'cleanup'
359
14:27:31
--push-ignore-immutable-tag-errors If true, known tag immutability errors are ignored and the push finishes with success.
360
14:27:31
--push-retry int Number of retries for the push operation
361
14:27:31
--registry-certificate key-value-arg type Use the provided certificate for TLS communication with the given registry. Expected format is 'my.registry.url=/path/to/the/server/certificate'.
362
14:27:31
--registry-client-cert key-value-arg type Use the provided client certificate for mutual TLS (mTLS) communication with the given registry. Expected format is 'my.registry.url=/path/to/client/cert,/path/to/client/key'.
363
14:27:31
--registry-map key-multi-value-arg type Registry map of mirror to use as pull-through cache instead. Expected format is 'orignal.registry=new.registry;other-original.registry=other-remap.registry'
364
14:27:31
--registry-mirror multi-arg type Registry mirror to use as pull-through cache instead of docker.io. Set it repeatedly for multiple mirrors.
365
14:27:31
--reproducible Strip timestamps out of the image to make it reproducible
366
14:27:31
--single-snapshot Take a single snapshot at the end of the build.
367
14:27:31
--skip-default-registry-fallback If an image is not found on any mirrors (defined with registry-mirror) do not fallback to the default registry. If registry-mirror is not defined, this flag is ignored.
368
14:27:31
--skip-push-permission-check Skip check of the push permission
369
14:27:31
--skip-tls-verify Push to insecure registry ignoring TLS verify
370
14:27:31
--skip-tls-verify-pull Pull from insecure registry ignoring TLS verify
371
14:27:31
--skip-tls-verify-registry multi-arg type Insecure registry ignoring TLS verify to push and pull. Set it repeatedly for multiple registries.
372
14:27:31
--skip-unused-stages Build only used stages if defined to true. Otherwise it builds by default all stages, even the unnecessaries ones until it reaches the target stage / end of Dockerfile (default true)
373
14:27:31
--snapshot-mode string Change the file attributes inspected during snapshotting (default "full")
374
14:27:31
--snapshotMode string This flag is deprecated. Please use '--snapshot-mode'.
375
14:27:31
--tar-path string Path to save the image in as a tarball instead of pushing
376
14:27:31
--tarPath string This flag is deprecated. Please use '--tar-path'.
377
14:27:31
--target string Set the target build stage to build
378
14:27:31
--use-new-run Use the experimental run implementation for detecting changes without requiring file system snapshots.
379
14:27:31
-v, --verbosity string Log level (trace, debug, info, warn, error, fatal, panic) (default "info")
380
14:27:31
381
14:27:31
Use "executor [command] --help" for more information about a command.
382
14:27:31
383
14:27:31
+ cleanup
384
14:27:31
+ rv=1
385
14:27:31
+ '[' 1 -ne 0 ]
386
14:27:31
+ echo
387
14:27:31
388
14:27:31
+ echo ' Failure Cause Analysis might help, please open this link:'
389
14:27:31
Failure Cause Analysis might help, please open this link:
390
14:27:31
+ echo ' https://failure-cause-analysis.zrh.int.scandit.io/analysis/projects/621/jobs/46308184'
391
14:27:31
https://failure-cause-analysis.zrh.int.scandit.io/analysis/projects/621/jobs/46308184
392
14:27:31
+ echo
393
14:27:31
394
14:27:31
+ echo
395
14:27:31
396
14:27:31
+ echo 'Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-host=ip-10-0-23-99.eu-central-1.compute.internal&var-namespace=gitlab-runner&var-pod=runner-wrxjpbsjx-project-621-concurrent-0-w4u5fxip&var-resolution=15&from=1765290451000&to=1765290451000'
397
14:27:31
Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-host=ip-10-0-23-99.eu-central-1.compute.internal&var-namespace=gitlab-runner&var-pod=runner-wrxjpbsjx-project-621-concurrent-0-w4u5fxip&var-resolution=15&from=1765290451000&to=1765290451000
398
14:27:31
+ echo 'Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-node=ip-10-0-23-99.eu-central-1.compute.internal&var-resolution=15s&from=1765290451000&to=1765290451000'
399
14:27:31
Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-node=ip-10-0-23-99.eu-central-1.compute.internal&var-resolution=15s&from=1765290451000&to=1765290451000
400
14:27:31
+ echo
401
14:27:31
402
14:27:31
+ exit 1
403
14:27:31
404
14:27:31
section_end:1765290451:step_script
405
14:27:31
+section_start:1765290451:upload_artifacts_on_failure
406
14:27:31
+Uploading artifacts for failed job
407
14:27:32
Uploading artifacts...
408
14:27:32
docker_image_build.env: found 1 matching artifact files and directories
409
14:27:32
Uploading artifacts as "dotenv" to coordinator... 201 Created correlation_id=01KC1R59A6VSA3Q56N83A508KZ id=46308184 responseStatus=201 Created token=64_17dz93
410
14:27:32
411
14:27:32
section_end:1765290452:upload_artifacts_on_failure
412
14:27:32
+section_start:1765290452:cleanup_file_variables
413
14:27:32
+Cleaning up project directory and file based variables
414
14:27:33
415
14:27:33
section_end:1765290453:cleanup_file_variables
416
14:27:33
+
417
14:27:33
ERROR: Job failed: command terminated with exit code 1
418
14:27:33
419