build-template-works-without-crane ✗ failed

Duration: 10s
Queued: 3s
📁 Stage: docker-image
🖥 Runner: linux-aws-1
Average Duration
50s
This job: 10s
Failure Rate
1.5%
last 30 days

Job Execution Phases

💡 Tip: Click on any phase bar to jump to that section in the log below

Failure Analysis

1 pattern
No known pattern matched

The failure reason could not be detected.

Mitigation:

Please post to [slack-support] if you need assistance.

Full Job Log

419 lines
Match - of 0
1 14:27:23 Running with gitlab-runner 18.5.0 (bda84871)
2 14:27:23 on gitlab-runner-linux-1-86d76d468c-d4585 wRxjPbsJX, system ID: r_J8j67beySAjl
3 14:27:23 feature flags: FF_USE_FASTZIP:true, FF_USE_NEW_BASH_EVAL_STRATEGY:true, FF_SCRIPT_SECTIONS:true, FF_USE_ADVANCED_POD_SPEC_CONFIGURATION:true, FF_PRINT_POD_EVENTS:true, FF_USE_DUMB_INIT_WITH_KUBERNETES_EXECUTOR:true, FF_LOG_IMAGES_CONFIGURED_FOR_JOB:true, FF_CLEAN_UP_FAILED_CACHE_EXTRACT:true, FF_TIMESTAMPS:true, FF_GIT_URLS_WITHOUT_TOKENS:true
4 14:27:23 Resolving secrets
5 14:27:23 section_start:1765290443:prepare_executor
6 14:27:23 +Preparing the "kubernetes" executor
7 14:27:23 "CPURequest" overwritten with "2"
8 14:27:23 "MemoryRequest" overwritten with "4G"
9 14:27:23 Using Kubernetes namespace: gitlab-runner
10 14:27:23 Using Kubernetes executor with image martizih/kaniko:v1.26.2-debug ...
11 14:27:23 Using attach strategy to execute scripts...
12 14:27:23 Using effective pull policy of [Always] for container helper
13 14:27:23 Using effective pull policy of [Always] for container init-permissions
14 14:27:23 Using effective pull policy of [Always] for container build
15 14:27:23 section_end:1765290443:prepare_executor
16 14:27:23 +section_start:1765290443:prepare_script
17 14:27:23 +Preparing environment
18 14:27:23 Using FF_USE_POD_ACTIVE_DEADLINE_SECONDS, the Pod activeDeadlineSeconds will be set to the job timeout: 1h0m0s...
19 14:27:23 WARNING: Advanced Pod Spec configuration enabled, merging the provided PodSpec to the generated one. This is a beta feature and is subject to change. Feedback is collected in this issue: https://gitlab.com/gitlab-org/gitlab-runner/-/issues/29659 ...
20 14:27:23 Subscribing to Kubernetes Pod events...
21 14:27:23 Type Reason Message
22 14:27:23 Normal Scheduled Successfully assigned gitlab-runner/runner-wrxjpbsjx-project-621-concurrent-0-w4u5fxip to ip-10-0-23-99.eu-central-1.compute.internal
23 14:27:24 Normal Pulled Container image "gitlab/gitlab-runner-helper:x86_64-v18.5.0" already present on machine
24 14:27:24 Normal Created Created container: init-permissions
25 14:27:24 Normal Started Started container init-permissions
26 14:27:25 Normal Pulling Pulling image "martizih/kaniko:v1.26.2-debug"
27 14:27:27 Normal Pulled Successfully pulled image "martizih/kaniko:v1.26.2-debug" in 2.704s (2.704s including waiting). Image size: 40628519 bytes.
28 14:27:27 Normal Created Created container: build
29 14:27:28 Normal Started Started container build
30 14:27:28 Normal Pulled Container image "gitlab/gitlab-runner-helper:x86_64-v18.5.0" already present on machine
31 14:27:28 Normal Created Created container: helper
32 14:27:28 Normal Started Started container helper
33 14:27:30 Running on runner-wrxjpbsjx-project-621-concurrent-0-w4u5fxip via gitlab-runner-linux-1-86d76d468c-d4585...
34 14:27:30
35 14:27:30 section_end:1765290450:prepare_script
36 14:27:30 +section_start:1765290450:get_sources
37 14:27:30 +Getting source from Git repository
38 14:27:30 Gitaly correlation ID: 01KC1R505R484M9F2STYRTY6V5
39 14:27:30 Fetching changes with git depth set to 1...
40 14:27:30 Initialized empty Git repository in /build/internal/gitlab-templates/.git/
41 14:27:30 Created fresh repository.
42 14:27:31 Checking out 940006cc as detached HEAD (ref is refs/merge-requests/507/merge)...
43 14:27:31
44 14:27:31 Skipping Git submodules setup
45 14:27:31
46 14:27:31 section_end:1765290451:get_sources
47 14:27:31 +section_start:1765290451:step_script
48 14:27:31 +Executing "step_script" stage of the job script
49 14:27:31 section_start:1765290451:section_pre_build_script_0[hide_duration=true,collapsed=true] $ function cleanup {
50 14:27:31 rv=$?
51 14:27:31 if [ $rv -ne 0 ]; then
52 14:27:31 echo ""
53 14:27:31 echo " Failure Cause Analysis might help, please open this link:"
54 14:27:31 echo " https://failure-cause-analysis.zrh.int.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
55 14:27:31 echo ""
56 14:27:31 fi
57 14:27:31 echo ""
58 14:27:31 echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=${EPOCHSECONDS}000"
59 14:27:31 echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=${EPOCHSECONDS}000"
60 14:27:31 echo ""
61 14:27:31 exit $rv
62 14:27:31 }
63 14:27:31 trap cleanup EXIT
64 14:27:31 echo "INFO: This is the CI job pre_build_script"
65 14:27:31 echo "INFO: It's defined in the backend/infra/aws repo."
66 14:27:31 echo "INFO: These additional Scandit variables are available to you:"
67 14:27:31 echo " SC_K8S_NODE_NAME: $SC_K8S_NODE_NAME"
68 14:27:31 echo " SC_K8S_IMAGE_ID: $SC_K8S_IMAGE_ID"
69 14:27:31 echo "cpu (r/l): ${SC_K8S_REQUESTS_CPU}/${SC_K8S_LIMITS_CPU}"
70 14:27:31 if command -v numfmt >/dev/null 2>&1; then
71 14:27:31 echo "memory (r/l): $(numfmt --to=iec --suffix=B $SC_K8S_REQUESTS_MEMORY)/$(numfmt --to=iec --suffix=B $SC_K8S_LIMITS_MEMORY)"
72 14:27:31 else
73 14:27:31 echo "memory (r/l): ${SC_K8S_REQUESTS_MEMORY}/${SC_K8S_LIMITS_MEMORY}"
74 14:27:31 fi
75 14:27:31 __start_time=${EPOCHSECONDS}
76 14:27:31 echo ""
77 14:27:31 echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=now"
78 14:27:31 echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=now"
79 14:27:31 echo ""
80 14:27:31 echo "Setting up credentials for Gitlab Python registries"
81 14:27:31 mkdir -p ~
82 14:27:31 echo "machine gitlab.scandit.com" > ~/.netrc
83 14:27:31 echo "login gitlab-ci-token" >> ~/.netrc
84 14:27:31 echo "password ${CI_JOB_TOKEN}" >> ~/.netrc
85 14:27:31 chmod 600 ~/.netrc
86 14:27:31 if command -v git &> /dev/null && [ "$(id -u)" -ne 0 ]; then
87 14:27:31 git config --global --add safe.directory $CI_PROJECT_DIR
88 14:27:31 fi
89 14:27:31 # Sonarqube server is running on the same cluster. Use internal address
90 14:27:31 export SONAR_HOST_URL="http://sonarqube.sonarqube.svc.cluster.local:9000"
91 14:27:31 section_end:1765290451:section_pre_build_script_0
92 14:27:31 INFO: This is the CI job pre_build_script
93 14:27:31 INFO: It's defined in the backend/infra/aws repo.
94 14:27:31 INFO: These additional Scandit variables are available to you:
95 14:27:31 SC_K8S_NODE_NAME: ip-10-0-23-99.eu-central-1.compute.internal
96 14:27:31 SC_K8S_IMAGE_ID:
97 14:27:31 cpu (r/l): 2/4
98 14:27:31 memory (r/l): 4000000000/17179869184
99 14:27:31
100 14:27:31 Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-host=ip-10-0-23-99.eu-central-1.compute.internal&var-namespace=gitlab-runner&var-pod=runner-wrxjpbsjx-project-621-concurrent-0-w4u5fxip&var-resolution=15&from=1765290451000&to=now
101 14:27:31 Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-node=ip-10-0-23-99.eu-central-1.compute.internal&var-resolution=15s&from=1765290451000&to=now
102 14:27:31
103 14:27:31 Setting up credentials for Gitlab Python registries
104 14:27:31 $ echo $DOCKER_CONFIG_JSON > /kaniko/.docker/config.json
105 14:27:31 section_start:1765290451:section_script_step_1[hide_duration=true,collapsed=true] $ if [ "$CONTAINER_USER_HOME" != "" ]; then
106 14:27:31 mkdir -p "$CONTAINER_USER_HOME"
107 14:27:31 cp ~/.netrc "$CONTAINER_USER_HOME"
108 14:27:31 if [ "$CONTAINER_USER_UID" != "" ]; then
109 14:27:31 chown "$CONTAINER_USER_UID" "$CONTAINER_USER_HOME/.netrc"
110 14:27:31 fi
111 14:27:31 fi
112 14:27:31 section_end:1765290451:section_script_step_1
113 14:27:31 section_start:1765290451:section_script_step_2[hide_duration=true,collapsed=true] $ function copy_files() {
114 14:27:31 local src="$1"
115 14:27:31 local trg="$2"
116 14:27:31 for f in $src; do
117 14:27:31 t="$trg/`dirname $f`"
118 14:27:31 mkdir -p $t || true
119 14:27:31 echo "Copy $f"
120 14:27:31 cp -pr $f $trg/$f
121 14:27:31 done
122 14:27:31 }
123 14:27:31 function recursive_hash() {
124 14:27:31 local dir="$1"
125 14:27:31 (find $dir -type f -exec sha256sum {} + ; find $dir -type d) | sort | sha256sum | cut -d ' ' -f1
126 14:27:31 }
127 14:27:31 function remote_docker_digest() {
128 14:27:31 local images="$1"
129 14:27:31 echo $images | xargs -n 1 crane digest
130 14:27:31 }
131 14:27:31 function remote_image_exists() {
132 14:27:31 local image="$1"
133 14:27:31 crane manifest $image > /dev/null 2>&1
134 14:27:31 }
135 14:27:31 function remote_images_are_identical() {
136 14:27:31 local imageA="$1"
137 14:27:31 local imageB="$2"
138 14:27:31 if [[ $(remote_docker_digest "$imageA") == $(remote_docker_digest "$imageB") ]]; then
139 14:27:31 return 0
140 14:27:31 else
141 14:27:31 return 1
142 14:27:31 fi
143 14:27:31 }
144 14:27:31 function copy_image() {
145 14:27:31 local image="$1"
146 14:27:31 local remotes="$2"
147 14:27:31 local backup_ext="$3"
148 14:27:31 echo "$image"
149 14:27:31 local source_digest=$(remote_docker_digest $image)
150 14:27:31 local target_digest
151 14:27:31 for registry in $remotes; do
152 14:27:31 if target_digest=$(remote_docker_digest $registry); then
153 14:27:31 if [ "$target_digest" != "$source_digest" ]; then
154 14:27:31 echo "image outdated, overwriting with newest version"
155 14:27:31 crane copy $image $registry
156 14:27:31 crane copy $image ${registry}${backup_ext}
157 14:27:31 fi
158 14:27:31 else
159 14:27:31 echo "image does not exist, writing newest version"
160 14:27:31 crane copy $image $registry
161 14:27:31 crane copy $image ${registry}${backup_ext}
162 14:27:31 fi
163 14:27:31 done
164 14:27:31 }
165 14:27:31 section_end:1765290451:section_script_step_2
166 14:27:31 section_start:1765290451:section_script_step_3[hide_duration=true,collapsed=true] $ if [ "$CONTAINER_SUBDIR" != "" ]; then
167 14:27:31 echo "Entering subpath $CONTAINER_SUBDIR"
168 14:27:31 cd $CONTAINER_SUBDIR
169 14:27:31 fi
170 14:27:31 section_end:1765290451:section_script_step_3
171 14:27:31 $ copy_files "$CONTAINER_IMPLICIT_REQUIREMENTS $CONTAINER_REQUIREMENTS" "$CONTAINER_CONTEXT_PATH"
172 14:27:31 Copy Dockerfile.python-3-no-requirements
173 14:27:31 $ echo "$CONTAINER_BUILD_ENVIRONMENT" > $CONTAINER_CONTEXT_PATH/.docker-build-env
174 14:27:31 $ docker_checksum=$(recursive_hash $CONTAINER_CONTEXT_PATH)
175 14:27:31 section_start:1765290451:section_script_step_7[hide_duration=true,collapsed=true] $ if [ "$CONTAINER_IMAGE_NAME" == "" ]; then
176 14:27:31 final_image_name=${CONTAINER_IMAGE_URL}
177 14:27:31 else
178 14:27:31 final_image_name=${CONTAINER_IMAGE_URL}/${CONTAINER_IMAGE_NAME}
179 14:27:31 fi
180 14:27:31 section_end:1765290451:section_script_step_7
181 14:27:31 $ final_image_url=${final_image_name}:${docker_checksum}
182 14:27:31 section_start:1765290451:section_script_step_9[hide_duration=true,collapsed=true] $ if [ "${PIPELINE_IMAGE_REFS}" == "1" ]; then
183 14:27:31 echo $CONTAINER_IMAGE_VARIABLE=${final_image_url}-P${CI_PROJECT_ID}-${CI_PIPELINE_ID} > $CI_PROJECT_DIR/docker_image_build.env
184 14:27:31 else
185 14:27:31 echo $CONTAINER_IMAGE_VARIABLE=$final_image_url > $CI_PROJECT_DIR/docker_image_build.env
186 14:27:31 fi
187 14:27:31 section_end:1765290451:section_script_step_9
188 14:27:31 $ echo ${CONTAINER_IMAGE_VARIABLE}_HASH=$docker_checksum >> $CI_PROJECT_DIR/docker_image_build.env
189 14:27:31 section_start:1765290451:section_script_step_11[hide_duration=true,collapsed=true] $ if [ "${FORCE_BUILD}" != "true" ] || command -v crane &> /dev/null; then
190 14:27:31 echo $REGISTRY_PASSWORD | crane auth login $REGISTRY -u $REGISTRY_USER --password-stdin
191 14:27:31 fi
192 14:27:31 section_end:1765290451:section_script_step_11
193 14:27:31 section_start:1765290451:section_script_step_12[hide_duration=true,collapsed=true] $ if [ "${FORCE_BUILD}" != "true" ] && remote_image_exists "$final_image_url"; then
194 14:27:31 echo "Image already exists, skip the build."
195 14:27:31 echo "$final_image_url"
196 14:27:31 if [[ "$CI_COMMIT_BRANCH" == "$CI_DEFAULT_BRANCH" ]]; then
197 14:27:31 _EXT=""
198 14:27:31 _BACKUP_EXT="-CI${CI_JOB_ID}-$(date '+%Y%m%d')"
199 14:27:31 elif [[ -n "$CI_MERGE_REQUEST_ID" ]]; then
200 14:27:31 _EXT="-MR${CI_MERGE_REQUEST_IID}"
201 14:27:31 _BACKUP_EXT=""
202 14:27:31 elif [[ "$CI_COMMIT_REF_PROTECTED" == "true" ]]; then
203 14:27:31 _EXT="-${CI_COMMIT_REF_SLUG}"
204 14:27:31 _BACKUP_EXT="-CI${CI_JOB_ID}-$(date '+%Y%m%d')"
205 14:27:31 else
206 14:27:31 _EXT="-${CI_COMMIT_REF_SLUG}"
207 14:27:31 _BACKUP_EXT=""
208 14:27:31 fi
209 14:27:31 for _TAG in $CONTAINER_IMAGE_TAG; do
210 14:27:31 echo "Copying ${final_image_url} to ${final_image_name}:${_TAG}${_EXT}"
211 14:27:31 copy_image "${final_image_url}" "${final_image_name}:${_TAG}${_EXT}" "${_BACKUP_EXT}"
212 14:27:31 done
213 14:27:31 if [ "${PIPELINE_IMAGE_REFS}" == "1" ]; then
214 14:27:31 _EXT="-P${CI_PROJECT_ID}-${CI_PIPELINE_ID}"
215 14:27:31 echo "Copying ${final_image_url} to ${final_image_url}${_EXT}"
216 14:27:31 copy_image "${final_image_url}" "${final_image_url}${_EXT}"
217 14:27:31 for _TAG in $CONTAINER_IMAGE_TAG; do
218 14:27:31 echo "Copying ${final_image_url} to ${final_image_name}:${_TAG}${_EXT}"
219 14:27:31 copy_image "${final_image_url}" "${final_image_name}:${_TAG}${_EXT}"
220 14:27:31 done
221 14:27:31 fi
222 14:27:31 exit 0
223 14:27:31 fi
224 14:27:31 section_end:1765290451:section_script_step_12
225 14:27:31 $ DESTINATIONS="--destination=$final_image_url"
226 14:27:31 section_start:1765290451:section_script_step_14[hide_duration=true,collapsed=true] $ if [[ "$CI_COMMIT_BRANCH" == "$CI_DEFAULT_BRANCH" ]]; then
227 14:27:31 _EXT=""
228 14:27:31 TIMESTAMP_TAGS=$CONTAINER_IMAGE_TAG
229 14:27:31 elif [[ -n "$CI_MERGE_REQUEST_ID" ]]; then
230 14:27:31 _EXT="-MR${CI_MERGE_REQUEST_IID}"
231 14:27:31 TIMESTAMP_TAGS=""
232 14:27:31 elif [[ "$CI_COMMIT_REF_PROTECTED" == "true" ]]; then
233 14:27:31 _EXT="-${CI_COMMIT_REF_SLUG}"
234 14:27:31 TIMESTAMP_TAGS=$CONTAINER_IMAGE_TAG
235 14:27:31 fi
236 14:27:31 section_end:1765290451:section_script_step_14
237 14:27:31 section_start:1765290451:section_script_step_15[hide_duration=true,collapsed=true] $ for _TAG in $CONTAINER_IMAGE_TAG; do
238 14:27:31 DESTINATIONS="${DESTINATIONS} --destination=${final_image_name}:${_TAG}${_EXT}"
239 14:27:31 done
240 14:27:31 section_end:1765290451:section_script_step_15
241 14:27:31 section_start:1765290451:section_script_step_16[hide_duration=true,collapsed=true] $ if [ "${PIPELINE_IMAGE_REFS}" == "1" ]; then
242 14:27:31 _EXT="-P${CI_PROJECT_ID}-${CI_PIPELINE_ID}"
243 14:27:31 DESTINATIONS="${DESTINATIONS} --destination=${final_image_url}${_EXT}"
244 14:27:31 for _TAG in $CONTAINER_IMAGE_TAG; do
245 14:27:31 DESTINATIONS="${DESTINATIONS} --destination=${final_image_name}:${_TAG}${_EXT}"
246 14:27:31 done
247 14:27:31 fi
248 14:27:31 section_end:1765290451:section_script_step_16
249 14:27:31 section_start:1765290451:section_script_step_17[hide_duration=true,collapsed=true] $ DATE=$(date '+%Y%m%d')
250 14:27:31 for _TAG in $TIMESTAMP_TAGS; do
251 14:27:31 DESTINATIONS="${DESTINATIONS} --destination=${final_image_name}:${_TAG}${_EXT}-CI${CI_JOB_ID}-${DATE}"
252 14:27:31 done
253 14:27:31 section_end:1765290451:section_script_step_17
254 14:27:31 section_start:1765290451:section_script_step_18[hide_duration=true,collapsed=true] $ if [ -n "${CONTAINER_BUILD_ARGS}" ]; then
255 14:27:31 for _BUILD_ARG in $CONTAINER_BUILD_ARGS; do
256 14:27:31 FINAL_BUILD_ARGS="--build-arg $_BUILD_ARG $FINAL_BUILD_ARGS"
257 14:27:31 done
258 14:27:31 fi
259 14:27:31 section_end:1765290451:section_script_step_18
260 14:27:31 section_start:1765290451:section_script_step_19[hide_duration=true,collapsed=true] $ for _PATH in $CONTAINER_IGNORE_PATHS; do
261 14:27:31 FINAL_IGNORE_PATHS="--ignore-path=$_PATH $FINAL_IGNORE_PATHS"
262 14:27:31 done
263 14:27:31 section_end:1765290451:section_script_step_19
264 14:27:31 section_start:1765290451:section_script_step_20[hide_duration=true,collapsed=true] $ if [ -n "${CONTAINER_PLATFORM}" ]; then
265 14:27:31 KANIKO_PLATFORM="--custom-platform=${CONTAINER_PLATFORM}"
266 14:27:31 fi
267 14:27:31 section_end:1765290451:section_script_step_20
268 14:27:31 $ ANNOTATIONS=""
269 14:27:31 section_start:1765290451:section_script_step_22[hide_duration=true,collapsed=true] $ if [[ -n "$CI_COMMIT_REF_NAME" ]]; then
270 14:27:31 ANNOTATIONS="${ANNOTATIONS} $KANIKO_ANNOTATION_KEY org.opencontainers.image.ref.name=${CI_COMMIT_REF_NAME}"
271 14:27:31 fi
272 14:27:31 section_end:1765290451:section_script_step_22
273 14:27:31 section_start:1765290451:section_script_step_23[hide_duration=true,collapsed=true] $ if [[ -n "$CI_COMMIT_SHA" ]]; then
274 14:27:31 ANNOTATIONS="${ANNOTATIONS} $KANIKO_ANNOTATION_KEY org.opencontainers.image.revision=${CI_COMMIT_SHA}"
275 14:27:31 fi
276 14:27:31 section_end:1765290451:section_script_step_23
277 14:27:31 section_start:1765290451:section_script_step_24[hide_duration=true,collapsed=true] $ if [[ -n "$CI_JOB_URL" ]]; then
278 14:27:31 ANNOTATIONS="${ANNOTATIONS} $KANIKO_ANNOTATION_KEY org.opencontainers.image.url=${CI_JOB_URL}"
279 14:27:31 fi
280 14:27:31 section_end:1765290451:section_script_step_24
281 14:27:31 section_start:1765290451:section_script_step_25[hide_duration=true,collapsed=true] $ if [[ -n "$CI_PIPELINE_ID" ]]; then
282 14:27:31 ANNOTATIONS="${ANNOTATIONS} $KANIKO_ANNOTATION_KEY io.gitlab.ci.pipeline_id=${CI_PIPELINE_ID}"
283 14:27:31 fi
284 14:27:31 section_end:1765290451:section_script_step_25
285 14:27:31 section_start:1765290451:section_script_step_26[hide_duration=true,collapsed=true] $ if [[ -n "$CI_JOB_ID" ]]; then
286 14:27:31 ANNOTATIONS="${ANNOTATIONS} $KANIKO_ANNOTATION_KEY io.gitlab.ci.job_id=${CI_JOB_ID}"
287 14:27:31 fi
288 14:27:31 section_end:1765290451:section_script_step_26
289 14:27:31 section_start:1765290451:section_script_step_27[hide_duration=true,collapsed=true] $ if [[ -n "$CI_JOB_IMAGE" ]]; then
290 14:27:31 ANNOTATIONS="${ANNOTATIONS} $KANIKO_ANNOTATION_KEY io.gitlab.ci.job_image=${CI_JOB_IMAGE}"
291 14:27:31 fi
292 14:27:31 section_end:1765290451:section_script_step_27
293 14:27:31 $ ANNOTATIONS="${ANNOTATIONS} $KANIKO_ANNOTATION_KEY org.opencontainers.image.title=${final_image_name}:$(echo $CONTAINER_IMAGE_TAG | cut -d' ' -f1)"
294 14:27:31 $ ANNOTATIONS="${ANNOTATIONS} $KANIKO_ANNOTATION_KEY org.opencontainers.image.created=$(date -u +%Y-%m-%dT%H:%M:%SZ)"
295 14:27:31 $ ANNOTATIONS="${ANNOTATIONS} $KANIKO_ANNOTATION_KEY org.opencontainers.image.vendor=Scandit"
296 14:27:31 $ ANNOTATIONS="${ANNOTATIONS} $KANIKO_ANNOTATION_KEY io.scandit.ci.hash=${docker_checksum}"
297 14:27:31 section_start:1765290451:section_script_step_32[hide_duration=true,collapsed=true] $ if [ -n "${CONTAINER_TARGET_STAGE}" ]; then
298 14:27:31 KANIKO_TARGET="--target $CONTAINER_TARGET_STAGE"
299 14:27:31 fi
300 14:27:31 section_end:1765290451:section_script_step_32
301 14:27:31 $ set -x
302 14:27:31 + echo '$ /kaniko/executor --context $CONTAINER_CONTEXT_PATH --dockerfile $CONTAINER_DOCKERFILE $DESTINATIONS --cache=true --cache-copy-layers --cache-dir /cache/kaniko --cache-repo ${CI_REGISTRY_IMAGE}/cache --cache-ttl=$CONTAINER_CACHE_TTL $FINAL_IGNORE_PATHS $KANIKO_TARGET $FINAL_BUILD_ARGS $KANIKO_PLATFORM $ANNOTATIONS $KANIKO_DEFAULT_FLAGS $KANIKO_EXTRA_FLAGS'
303 14:27:31 $ /kaniko/executor --context $CONTAINER_CONTEXT_PATH --dockerfile $CONTAINER_DOCKERFILE $DESTINATIONS --cache=true --cache-copy-layers --cache-dir /cache/kaniko --cache-repo ${CI_REGISTRY_IMAGE}/cache --cache-ttl=$CONTAINER_CACHE_TTL $FINAL_IGNORE_PATHS $KANIKO_TARGET $FINAL_BUILD_ARGS $KANIKO_PLATFORM $ANNOTATIONS $KANIKO_DEFAULT_FLAGS $KANIKO_EXTRA_FLAGS
304 14:27:31 + /kaniko/executor --context /build/internal/gitlab-templates/context/ --dockerfile Dockerfile.python-3-no-requirements '--destination=registry.scandit.com/internal/gitlab-templates:c2730dcff7ac732d36125357928a6f845a331fe83118f151638054758cf29518' '--destination=registry.scandit.com/internal/gitlab-templates:latest-MR507' '--cache=true' --cache-copy-layers --cache-dir /cache/kaniko --cache-repo registry.scandit.com/internal/gitlab-templates/cache '--cache-ttl=336h' --annotation 'org.opencontainers.image.ref.name=martin.zihlmann-master-patch-ac03' --annotation 'org.opencontainers.image.revision=940006ccdb5cae9f992061bdd618ea8cc79c4306' --annotation 'org.opencontainers.image.url=https://gitlab.scandit.com/internal/gitlab-templates/-/jobs/46308184' --annotation 'io.gitlab.ci.pipeline_id=1391810' --annotation 'io.gitlab.ci.job_id=46308184' --annotation 'io.gitlab.ci.job_image=martizih/kaniko:v1.26.2-debug' --annotation 'org.opencontainers.image.title=registry.scandit.com/internal/gitlab-templates:latest' --annotation 'org.opencontainers.image.created=2025-12-09T14:27:31Z' --annotation 'org.opencontainers.image.vendor=Scandit' --annotation 'io.scandit.ci.hash=c2730dcff7ac732d36125357928a6f845a331fe83118f151638054758cf29518' --preserve-context '--credential-helpers=gitlab' --secret 'id=netrc,src=/root/.netrc' --secret 'id=ci_job_token,env=CI_JOB_TOKEN'
305 14:27:31 Error: unknown flag: --secret
306 14:27:31 Usage:
307 14:27:31 executor [flags]
308 14:27:31 executor [command]
309 14:27:31
310 14:27:31 Available Commands:
311 14:27:31 completion Generate the autocompletion script for the specified shell
312 14:27:31 help Help about any command
313 14:27:31 version Print the version number of kaniko
314 14:27:31
315 14:27:31 Flags:
316 14:27:31 --annotation key-value-arg type Set metadata annotations for the image in key=value format. Set it repeatedly for multiple annotations.
317 14:27:31 --build-arg multi-arg type This flag allows you to pass in ARG values at build time. Set it repeatedly for multiple values.
318 14:27:31 --cache Use cache when building image
319 14:27:31 --cache-copy-layers Caches copy layers
320 14:27:31 --cache-dir string Specify a local directory to use as a cache. (default "/cache")
321 14:27:31 --cache-repo string Specify a repository to use as a cache, otherwise one will be inferred from the destination provided; when prefixed with 'oci:' the repository will be written in OCI image layout format at the path provided
322 14:27:31 --cache-run-layers Caches run layers (default true)
323 14:27:31 --cache-ttl duration Cache timeout, requires value and unit of duration -> ex: 6h. Defaults to two weeks. (default 336h0m0s)
324 14:27:31 --cleanup Clean the filesystem at the end
325 14:27:31 --compressed-caching Compress the cached layers. Decreases build time, but increases memory usage. (default true)
326 14:27:31 --compression compression Compression algorithm (gzip, zstd)
327 14:27:31 --compression-level int Compression level (default -1)
328 14:27:31 -c, --context string Path to the dockerfile build context. (default "/workspace/")
329 14:27:31 --context-sub-path string Sub path within the given context.
330 14:27:31 --credential-helpers multi-arg type Use these credential helpers automatically, select from (env, google, ecr, acr, gitlab). Set it repeatedly for multiple helpers, defaults to all, set it to empty string to deactivate.
331 14:27:31 --custom-platform string Specify the build platform if different from the current host
332 14:27:31 --customPlatform string This flag is deprecated. Please use '--custom-platform'.
333 14:27:31 -d, --destination multi-arg type Registry the final image should be pushed to. Set it repeatedly for multiple destinations.
334 14:27:31 --digest-file string Specify a file to save the digest of the built image to.
335 14:27:31 -f, --dockerfile string Path to the dockerfile to be built. (default "Dockerfile")
336 14:27:31 --force Force building outside of a container
337 14:27:31 --force-build-metadata This flag is deprecated. This is the new default behaviour
338 14:27:31 --git gitoptions Branch to clone if build context is a git repository (default branch=,single-branch=false,depth=0,recurse-submodules=false,insecure-skip-tls=false)
339 14:27:31 -h, --help help for executor
340 14:27:31 --ignore-path multi-arg type Ignore these paths when taking a snapshot. Set it repeatedly for multiple paths.
341 14:27:31 --ignore-var-run Ignore /var/run directory when taking image snapshot. Set it to false to preserve /var/run/ in destination image. (default true)
342 14:27:31 --image-download-retry int Number of retries for downloading the remote image
343 14:27:31 --image-fs-extract-retry int Number of retries for image FS extraction
344 14:27:31 --image-name-tag-with-digest-file string Specify a file to save the image name w/ image tag w/ digest of the built image to.
345 14:27:31 --image-name-with-digest-file string Specify a file to save the image name w/ digest of the built image to.
346 14:27:31 --insecure Push to insecure registry using plain HTTP
347 14:27:31 --insecure-pull Pull from insecure registry using plain HTTP
348 14:27:31 --insecure-registry multi-arg type Insecure registry using plain HTTP to push and pull. Set it repeatedly for multiple registries.
349 14:27:31 --kaniko-dir string Path to the kaniko directory, this takes precedence over the KANIKO_DIR environment variable. (default "/kaniko")
350 14:27:31 --label multi-arg type Set metadata for an image. Set it repeatedly for multiple labels.
351 14:27:31 --log-format string Log format (text, color, json) (default "color")
352 14:27:31 --log-timestamp Timestamp in log output
353 14:27:31 --materialize Guarantee that the final state of the file system corresponds to what was specified as the build target, even if we have 100% cache hitrate and wouldn't need to unpack any layers
354 14:27:31 --no-push Do not push the image to the registry
355 14:27:31 --no-push-cache Do not push the cache layers to the registry
356 14:27:31 --oci-layout-path string Path to save the OCI image layout of the built image.
357 14:27:31 --pre-cleanup Clean the filesystem before the build
358 14:27:31 --preserve-context Preserve build context across build stages by taking a snapshot of the full filesystem before build and restore it after we switch stages. Restores in the end too if passed together with 'cleanup'
359 14:27:31 --push-ignore-immutable-tag-errors If true, known tag immutability errors are ignored and the push finishes with success.
360 14:27:31 --push-retry int Number of retries for the push operation
361 14:27:31 --registry-certificate key-value-arg type Use the provided certificate for TLS communication with the given registry. Expected format is 'my.registry.url=/path/to/the/server/certificate'.
362 14:27:31 --registry-client-cert key-value-arg type Use the provided client certificate for mutual TLS (mTLS) communication with the given registry. Expected format is 'my.registry.url=/path/to/client/cert,/path/to/client/key'.
363 14:27:31 --registry-map key-multi-value-arg type Registry map of mirror to use as pull-through cache instead. Expected format is 'orignal.registry=new.registry;other-original.registry=other-remap.registry'
364 14:27:31 --registry-mirror multi-arg type Registry mirror to use as pull-through cache instead of docker.io. Set it repeatedly for multiple mirrors.
365 14:27:31 --reproducible Strip timestamps out of the image to make it reproducible
366 14:27:31 --single-snapshot Take a single snapshot at the end of the build.
367 14:27:31 --skip-default-registry-fallback If an image is not found on any mirrors (defined with registry-mirror) do not fallback to the default registry. If registry-mirror is not defined, this flag is ignored.
368 14:27:31 --skip-push-permission-check Skip check of the push permission
369 14:27:31 --skip-tls-verify Push to insecure registry ignoring TLS verify
370 14:27:31 --skip-tls-verify-pull Pull from insecure registry ignoring TLS verify
371 14:27:31 --skip-tls-verify-registry multi-arg type Insecure registry ignoring TLS verify to push and pull. Set it repeatedly for multiple registries.
372 14:27:31 --skip-unused-stages Build only used stages if defined to true. Otherwise it builds by default all stages, even the unnecessaries ones until it reaches the target stage / end of Dockerfile (default true)
373 14:27:31 --snapshot-mode string Change the file attributes inspected during snapshotting (default "full")
374 14:27:31 --snapshotMode string This flag is deprecated. Please use '--snapshot-mode'.
375 14:27:31 --tar-path string Path to save the image in as a tarball instead of pushing
376 14:27:31 --tarPath string This flag is deprecated. Please use '--tar-path'.
377 14:27:31 --target string Set the target build stage to build
378 14:27:31 --use-new-run Use the experimental run implementation for detecting changes without requiring file system snapshots.
379 14:27:31 -v, --verbosity string Log level (trace, debug, info, warn, error, fatal, panic) (default "info")
380 14:27:31
381 14:27:31 Use "executor [command] --help" for more information about a command.
382 14:27:31
383 14:27:31 + cleanup
384 14:27:31 + rv=1
385 14:27:31 + '[' 1 -ne 0 ]
386 14:27:31 + echo
387 14:27:31
388 14:27:31 + echo ' Failure Cause Analysis might help, please open this link:'
389 14:27:31 Failure Cause Analysis might help, please open this link:
390 14:27:31 + echo ' https://failure-cause-analysis.zrh.int.scandit.io/analysis/projects/621/jobs/46308184'
391 14:27:31 https://failure-cause-analysis.zrh.int.scandit.io/analysis/projects/621/jobs/46308184
392 14:27:31 + echo
393 14:27:31
394 14:27:31 + echo
395 14:27:31
396 14:27:31 + echo 'Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-host=ip-10-0-23-99.eu-central-1.compute.internal&var-namespace=gitlab-runner&var-pod=runner-wrxjpbsjx-project-621-concurrent-0-w4u5fxip&var-resolution=15&from=1765290451000&to=1765290451000'
397 14:27:31 Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-host=ip-10-0-23-99.eu-central-1.compute.internal&var-namespace=gitlab-runner&var-pod=runner-wrxjpbsjx-project-621-concurrent-0-w4u5fxip&var-resolution=15&from=1765290451000&to=1765290451000
398 14:27:31 + echo 'Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-node=ip-10-0-23-99.eu-central-1.compute.internal&var-resolution=15s&from=1765290451000&to=1765290451000'
399 14:27:31 Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-node=ip-10-0-23-99.eu-central-1.compute.internal&var-resolution=15s&from=1765290451000&to=1765290451000
400 14:27:31 + echo
401 14:27:31
402 14:27:31 + exit 1
403 14:27:31
404 14:27:31 section_end:1765290451:step_script
405 14:27:31 +section_start:1765290451:upload_artifacts_on_failure
406 14:27:31 +Uploading artifacts for failed job
407 14:27:32 Uploading artifacts...
408 14:27:32 docker_image_build.env: found 1 matching artifact files and directories
409 14:27:32 Uploading artifacts as "dotenv" to coordinator... 201 Created correlation_id=01KC1R59A6VSA3Q56N83A508KZ id=46308184 responseStatus=201 Created token=64_17dz93
410 14:27:32
411 14:27:32 section_end:1765290452:upload_artifacts_on_failure
412 14:27:32 +section_start:1765290452:cleanup_file_variables
413 14:27:32 +Cleaning up project directory and file based variables
414 14:27:33
415 14:27:33 section_end:1765290453:cleanup_file_variables
416 14:27:33 +
417 14:27:33 ERROR: Job failed: command terminated with exit code 1
418 14:27:33
419