build-sc-gitlab-utils-image ○ success
⏱
Duration: 12s
⏳
Queued: 2s
📁
Stage: docker-image
🖥
Runner: linux-3
Average Duration
32s
This job: 12s
Failure Rate
12.8%
last 30 days
External Links
▶
Job Execution Phases
💡 Tip: Click on any phase bar to jump to that section in the log below
▶
Job Analysis
Job Status: Passed
Status: Job passed successfully
▶
Full Job Log
269 lines
Match - of 0
1
17:05:27
Running with gitlab-runner 18.9.0 (07e534ba)
2
17:05:27
on gitlab-runner-linux-3-59cc58cb8f-zhhfl m6BsGHXRX, system ID: r_cd3Y9Qk7x1y9
3
17:05:27
feature flags: FF_USE_FASTZIP:true, FF_USE_NEW_BASH_EVAL_STRATEGY:true, FF_USE_DYNAMIC_TRACE_FORCE_SEND_INTERVAL:true, FF_SCRIPT_SECTIONS:true, FF_ENABLE_JOB_CLEANUP:true, FF_USE_ADVANCED_POD_SPEC_CONFIGURATION:true, FF_PRINT_POD_EVENTS:true, FF_USE_DUMB_INIT_WITH_KUBERNETES_EXECUTOR:true, FF_LOG_IMAGES_CONFIGURED_FOR_JOB:true, FF_CLEAN_UP_FAILED_CACHE_EXTRACT:true, FF_GIT_URLS_WITHOUT_TOKENS:true, FF_WAIT_FOR_POD_TO_BE_REACHABLE:true, FF_USE_FLEETING_ACQUIRE_HEARTBEATS:true, FF_USE_JOB_ROUTER:true
4
17:05:27
Resolving secrets
5
17:05:27
section_start:1777827927:prepare_executor
6
17:05:27
+Preparing the "kubernetes" executor
7
17:05:27
"CPURequest" overwritten with "2"
8
17:05:27
"MemoryRequest" overwritten with "4G"
9
17:05:27
Using Kubernetes namespace: gitlab-runner
10
17:05:27
Using Kubernetes executor with image registry.scandit.com/dockerfiles/kaniko:v1.27.3-crane@sha256:72bdc063db14f38a45910d33ccf066ecb088d4833fb2437fef336e49b81fd4ac ...
11
17:05:27
Using attach strategy to execute scripts...
12
17:05:27
Using effective pull policy of [Always] for container build
13
17:05:27
Using effective pull policy of [Always] for container helper
14
17:05:27
Using effective pull policy of [Always] for container init-permissions
15
17:05:27
section_end:1777827927:prepare_executor
16
17:05:27
+section_start:1777827927:prepare_script
17
17:05:27
+Preparing environment
18
17:05:27
Using FF_USE_POD_ACTIVE_DEADLINE_SECONDS, the Pod activeDeadlineSeconds will be set to the job timeout: 1h0m0s...
19
17:05:27
WARNING: Advanced Pod Spec configuration enabled, merging the provided PodSpec to the generated one. This is a beta feature and is subject to change. Feedback is collected in this issue: https://gitlab.com/gitlab-org/gitlab-runner/-/issues/29659 ...
20
17:05:27
Subscribing to Kubernetes Pod events...
21
17:05:27
Type Reason Message
22
17:05:27
Normal Scheduled Successfully assigned gitlab-runner/runner-m6bsghxrx-project-621-concurrent-4-xfhbqq51 to ci7
23
17:05:29
Normal Pulled Container image "registry.gitlab.com/gitlab-org/gitlab-runner/gitlab-runner-helper:x86_64-v18.9.0" already present on machine
24
17:05:29
Normal Created Created container: init-permissions
25
17:05:29
Normal Started Started container init-permissions
26
17:05:30
Normal Pulled Container image "registry.gitlab.com/gitlab-org/gitlab-runner/gitlab-runner-helper:x86_64-v18.9.0" already present on machine
27
17:05:30
Normal Created Created container: helper
28
17:05:30
Normal Started Started container helper
29
17:05:30
Normal Pulling Pulling image "registry.scandit.com/dockerfiles/kaniko:v1.27.3-crane@sha256:72bdc063db14f38a45910d33ccf066ecb088d4833fb2437fef336e49b81fd4ac"
30
17:05:31
Normal Pulled Successfully pulled image "registry.scandit.com/dockerfiles/kaniko:v1.27.3-crane@sha256:72bdc063db14f38a45910d33ccf066ecb088d4833fb2437fef336e49b81fd4ac" in 735ms (735ms including waiting). Image size: 49989654 bytes.
31
17:05:31
Normal Created Created container: build
32
17:05:31
Normal Started Started container build
33
17:05:34
Running on runner-m6bsghxrx-project-621-concurrent-4-xfhbqq51 via gitlab-runner-linux-3-59cc58cb8f-zhhfl...
34
17:05:34
35
17:05:34
section_end:1777827934:prepare_script
36
17:05:34
+section_start:1777827934:get_sources
37
17:05:34
+Getting source from Git repository
38
17:05:34
Gitaly correlation ID: 01KQQCTMEGQKK54HG6H1Z5AM7A
39
17:05:34
Fetching changes with git depth set to 1...
40
17:05:34
Initialized empty Git repository in /build/internal/gitlab-templates/.git/
41
17:05:34
Created fresh repository.
42
17:05:35
Checking out 32840034 as detached HEAD (ref is master)...
43
17:05:35
44
17:05:35
Skipping Git submodules setup
45
17:05:35
46
17:05:35
section_end:1777827935:get_sources
47
17:05:35
+section_start:1777827935:step_script
48
17:05:35
+Executing "step_script" stage of the job script
49
17:05:36
section_start:1777827936:section_pre_build_script_0[hide_duration=true,collapsed=true]
$ function cleanup {
50
17:05:36
rv=$?
51
17:05:36
if [ $rv -ne 0 ]; then
52
17:05:36
echo ""
53
17:05:36
echo " Failure Cause Analysis might help, please open this link:"
54
17:05:36
echo " https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
55
17:05:36
echo ""
56
17:05:36
fi
57
17:05:36
echo ""
58
17:05:36
echo "Scout Analysis: https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
59
17:05:36
echo ""
60
17:05:36
echo ""
61
17:05:36
echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=${EPOCHSECONDS}000"
62
17:05:36
echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=${EPOCHSECONDS}000"
63
17:05:36
echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group%7C=%7Cgitlab-runner&var-filters=source%7C%3D%7C${LOKI_LOGSOURCE}&var-filters=namespace%7C%3D%7C${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID%7C%3D%7C${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID%7C%3D%7C${CI_PIPELINE_ID}&var-filters=CI_JOB_ID%7C%3D%7C${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=${EPOCHSECONDS}000"
64
17:05:36
__date_from=$(date -d "@$(( EPOCHSECONDS - 604800 ))" +%Y-%m-%d)
65
17:05:36
__date_to=$(date -d "@$(( EPOCHSECONDS + 604800 ))" +%Y-%m-%d)
66
17:05:36
echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=${__date_from}~${__date_to}&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
67
17:05:36
echo ""
68
17:05:36
exit $rv
69
17:05:36
}
70
17:05:36
trap cleanup EXIT
71
17:05:36
echo "INFO: This is the CI job pre_build_script"
72
17:05:36
echo "INFO: It's defined in the backend/infra/onprem/k8s repo."
73
17:05:36
echo "INFO: These additional Scandit variables are available to you:"
74
17:05:36
echo " SC_K8S_NODE_NAME: $SC_K8S_NODE_NAME"
75
17:05:36
echo " SC_K8S_IMAGE_ID: $SC_K8S_IMAGE_ID"
76
17:05:36
echo " SC_K8S_KYVERNO_PATCHES: |"
77
17:05:36
echo "$SC_K8S_KYVERNO_PATCHES" | sed 's/^/ /'
78
17:05:36
echo "cpu (r/l): ${SC_K8S_REQUESTS_CPU}/${SC_K8S_LIMITS_CPU}"
79
17:05:36
if command -v numfmt >/dev/null 2>&1; then
80
17:05:36
echo "memory (r/l): $(numfmt --to=iec --suffix=B $SC_K8S_REQUESTS_MEMORY)/$(numfmt --to=iec --suffix=B $SC_K8S_LIMITS_MEMORY)"
81
17:05:36
else
82
17:05:36
echo "memory (r/l): ${SC_K8S_REQUESTS_MEMORY}/${SC_K8S_LIMITS_MEMORY}"
83
17:05:36
fi
84
17:05:36
__start_time=${EPOCHSECONDS}
85
17:05:36
echo ""
86
17:05:36
echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=now"
87
17:05:36
echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=now"
88
17:05:36
echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group%7C%3D%7Cgitlab-runner&var-filters=source%7C%3D%7C${LOKI_LOGSOURCE}&var-filters=namespace%7C%3D%7C${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID%7C%3D%7C${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID%7C%3D%7C${CI_PIPELINE_ID}&var-filters=CI_JOB_ID%7C%3D%7C${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=now"
89
17:05:36
__date_from=$(date -d "@$(( EPOCHSECONDS - 604800 ))" +%Y-%m-%d)
90
17:05:36
__date_to=$(date -d "@$(( EPOCHSECONDS + 604800 ))" +%Y-%m-%d)
91
17:05:36
echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=${__date_from}~${__date_to}&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
92
17:05:36
echo ""
93
17:05:36
echo "Setting up credentials for Gitlab Python registries"
94
17:05:36
mkdir -p ~
95
17:05:36
echo "machine gitlab.scandit.com" > ~/.netrc
96
17:05:36
echo "login gitlab-ci-token" >> ~/.netrc
97
17:05:36
echo "password ${CI_JOB_TOKEN}" >> ~/.netrc
98
17:05:36
chmod 600 ~/.netrc
99
17:05:36
if command -v git &> /dev/null && [ "$(id -u)" -ne 0 ]; then
100
17:05:36
git config --global --add safe.directory $CI_PROJECT_DIR
101
17:05:36
fi
102
17:05:36
sleep infinity &
103
17:05:36
echo $! > ~/.bg_pid
104
17:05:36
section_end:1777827936:section_pre_build_script_0
105
17:05:36
INFO: This is the CI job pre_build_script
106
17:05:36
INFO: It's defined in the backend/infra/onprem/k8s repo.
107
17:05:36
INFO: These additional Scandit variables are available to you:
108
17:05:36
SC_K8S_NODE_NAME: ci7
109
17:05:36
SC_K8S_IMAGE_ID:
110
17:05:36
SC_K8S_KYVERNO_PATCHES: |
111
17:05:36
112
17:05:36
cpu (r/l): 2/8
113
17:05:36
memory (r/l): 4000000000/17179869184
114
17:05:36
115
17:05:36
Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=KpIiby5Vz&var-host=ci7&var-namespace=gitlab-runner&var-pod=runner-m6bsghxrx-project-621-concurrent-4-xfhbqq51&var-resolution=15&from=1777827936000&to=now
116
17:05:36
Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=KpIiby5Vz&var-node=ci7&var-resolution=15s&from=1777827936000&to=now
117
17:05:36
Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group%7C%3D%7Cgitlab-runner&var-filters=source%7C%3D%7Czrh.int.scandit.io&var-filters=namespace%7C%3D%7Cgitlab-runner&var-filters=CI_PROJECT_ID%7C%3D%7C621&var-filters=CI_PIPELINE_ID%7C%3D%7C1576293&var-filters=CI_JOB_ID%7C%3D%7C54273480&sortOrder=Ascending&from=1777827936000&to=now
118
17:05:36
Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=2026-04-26~2026-05-10&job_name=build-sc-gitlab-utils-image&project=internal/gitlab-templates
119
17:05:36
120
17:05:36
Setting up credentials for Gitlab Python registries
121
17:05:36
$ echo $DOCKER_CONFIG_JSON > /kaniko/.docker/config.json
122
17:05:36
$ mv /root/.netrc /kaniko/.netrc
123
17:05:36
section_start:1777827936:section_script_step_2[hide_duration=true,collapsed=true]
$ function copy_files() {
124
17:05:36
local src="$1"
125
17:05:36
local trg="$2"
126
17:05:36
for f in $src; do
127
17:05:36
t="$trg/`dirname $f`"
128
17:05:36
mkdir -p $t || true
129
17:05:36
echo "Copy $f"
130
17:05:36
cp -pr $f $trg/$f
131
17:05:36
done
132
17:05:36
}
133
17:05:36
function recursive_hash() {
134
17:05:36
local dir="$1"
135
17:05:36
find "$dir" -exec stat -c '%F|%a|%u:%g|%n' {} + -type f -exec sha256sum {} + | sort | sha256sum | cut -d ' ' -f1
136
17:05:36
}
137
17:05:36
function remote_docker_digest() {
138
17:05:36
local images="$1"
139
17:05:36
echo $images | xargs -n 1 crane digest
140
17:05:36
}
141
17:05:36
function remote_image_exists() {
142
17:05:36
local image="$1"
143
17:05:36
crane manifest $image > /dev/null 2>&1
144
17:05:36
}
145
17:05:36
function remote_images_are_identical() {
146
17:05:36
local imageA="$1"
147
17:05:36
local imageB="$2"
148
17:05:36
if [[ $(remote_docker_digest "$imageA") == $(remote_docker_digest "$imageB") ]]; then
149
17:05:36
return 0
150
17:05:36
else
151
17:05:36
return 1
152
17:05:36
fi
153
17:05:36
}
154
17:05:36
function copy_image() {
155
17:05:36
local image="$1"
156
17:05:36
local remotes="$2"
157
17:05:36
local backup_ext="$3"
158
17:05:36
echo "$image"
159
17:05:36
local source_digest=$(remote_docker_digest $image)
160
17:05:36
local target_digest
161
17:05:36
for registry in $remotes; do
162
17:05:36
if target_digest=$(remote_docker_digest $registry); then
163
17:05:36
if [ "$target_digest" != "$source_digest" ]; then
164
17:05:36
echo "image outdated, overwriting with newest version"
165
17:05:36
crane copy $image $registry
166
17:05:36
crane copy $image ${registry}${backup_ext}
167
17:05:36
fi
168
17:05:36
else
169
17:05:36
echo "image does not exist, writing newest version"
170
17:05:36
crane copy $image $registry
171
17:05:36
crane copy $image ${registry}${backup_ext}
172
17:05:36
fi
173
17:05:36
done
174
17:05:36
}
175
17:05:36
section_end:1777827936:section_script_step_2
176
17:05:36
section_start:1777827936:section_script_step_3[hide_duration=true,collapsed=true]
$ if [ "$CONTAINER_SUBDIR" != "" ]; then
177
17:05:36
echo "Entering subpath $CONTAINER_SUBDIR"
178
17:05:36
cd $CONTAINER_SUBDIR
179
17:05:36
fi
180
17:05:36
section_end:1777827936:section_script_step_3
181
17:05:36
$ copy_files "$CONTAINER_IMPLICIT_REQUIREMENTS $CONTAINER_REQUIREMENTS" "$CONTAINER_CONTEXT_PATH"
182
17:05:36
Copy Dockerfile.sc-gitlab-utils
183
17:05:36
$ echo "$CONTAINER_BUILD_ENVIRONMENT" > $CONTAINER_CONTEXT_PATH/.docker-build-env
184
17:05:36
$ docker_checksum=$(recursive_hash $CONTAINER_CONTEXT_PATH)
185
17:05:36
section_start:1777827936:section_script_step_7[hide_duration=true,collapsed=true]
$ if [ "$CONTAINER_IMAGE_NAME" == "" ]; then
186
17:05:36
final_image_name=${CONTAINER_IMAGE_URL}
187
17:05:36
else
188
17:05:36
final_image_name=${CONTAINER_IMAGE_URL}/${CONTAINER_IMAGE_NAME}
189
17:05:36
fi
190
17:05:36
section_end:1777827936:section_script_step_7
191
17:05:36
$ final_image_url=${final_image_name}:${docker_checksum}
192
17:05:36
section_start:1777827936:section_script_step_9[hide_duration=true,collapsed=true]
$ if [ "${PIPELINE_IMAGE_REFS}" == "1" ]; then
193
17:05:36
echo $CONTAINER_IMAGE_VARIABLE=${final_image_url}-P${CI_PROJECT_ID}-${CI_PIPELINE_ID} > $CI_PROJECT_DIR/docker_image_build.env
194
17:05:36
else
195
17:05:36
echo $CONTAINER_IMAGE_VARIABLE=$final_image_url > $CI_PROJECT_DIR/docker_image_build.env
196
17:05:36
fi
197
17:05:36
section_end:1777827936:section_script_step_9
198
17:05:36
$ echo ${CONTAINER_IMAGE_VARIABLE}_HASH=$docker_checksum >> $CI_PROJECT_DIR/docker_image_build.env
199
17:05:36
section_start:1777827936:section_script_step_11[hide_duration=true,collapsed=true]
$ if [ "${FORCE_BUILD}" != "true" ] || command -v crane &> /dev/null; then
200
17:05:36
echo $REGISTRY_PASSWORD | crane auth login $REGISTRY -u $REGISTRY_USER --password-stdin
201
17:05:36
fi
202
17:05:36
section_end:1777827936:section_script_step_11
203
17:05:36
204
17:05:36
WARNING! Your credentials are stored unencrypted in '/kaniko/.docker/config.json'.
205
17:05:36
Configure a credential helper to remove this warning. See
206
17:05:36
https://docs.docker.com/go/credential-store/
207
17:05:36
208
17:05:36
2026/05/03 17:05:36 logged in via /kaniko/.docker/config.json
209
17:05:36
section_start:1777827936:section_script_step_12[hide_duration=true,collapsed=true]
$ if [ "${FORCE_BUILD}" != "true" ] && remote_image_exists "$final_image_url"; then
210
17:05:36
echo "Image already exists, skip the build."
211
17:05:36
echo "$final_image_url"
212
17:05:36
if [[ "$CI_COMMIT_BRANCH" == "$CI_DEFAULT_BRANCH" ]]; then
213
17:05:36
_EXT=""
214
17:05:36
_BACKUP_EXT="-CI${CI_JOB_ID}-$(date '+%Y%m%d')"
215
17:05:36
elif [[ -n "$CI_MERGE_REQUEST_ID" ]]; then
216
17:05:36
_EXT="-MR${CI_MERGE_REQUEST_IID}"
217
17:05:36
_BACKUP_EXT=""
218
17:05:36
elif [[ "$CI_COMMIT_REF_PROTECTED" == "true" ]]; then
219
17:05:36
_EXT="-${CI_COMMIT_REF_SLUG}"
220
17:05:36
_BACKUP_EXT="-CI${CI_JOB_ID}-$(date '+%Y%m%d')"
221
17:05:36
fi
222
17:05:36
for _TAG in $CONTAINER_IMAGE_TAG; do
223
17:05:36
echo "Copying ${final_image_url} to ${final_image_name}:${_TAG}${_EXT}"
224
17:05:36
copy_image "${final_image_url}" "${final_image_name}:${_TAG}${_EXT}" "${_BACKUP_EXT}"
225
17:05:36
done
226
17:05:36
if [ "${PIPELINE_IMAGE_REFS}" == "1" ]; then
227
17:05:36
_EXT="-P${CI_PROJECT_ID}-${CI_PIPELINE_ID}"
228
17:05:36
echo "Copying ${final_image_url} to ${final_image_url}${_EXT}"
229
17:05:36
copy_image "${final_image_url}" "${final_image_url}${_EXT}"
230
17:05:36
for _TAG in $CONTAINER_IMAGE_TAG; do
231
17:05:36
echo "Copying ${final_image_url} to ${final_image_name}:${_TAG}${_EXT}"
232
17:05:36
copy_image "${final_image_url}" "${final_image_name}:${_TAG}${_EXT}"
233
17:05:36
done
234
17:05:36
fi
235
17:05:36
exit 0
236
17:05:36
fi
237
17:05:36
section_end:1777827936:section_script_step_12
238
17:05:36
Image already exists, skip the build.
239
17:05:36
registry.scandit.com/internal/gitlab-templates/sc-gitlab-utils:59003e3462b00087db2b801ece0598b6029d3522b568d83b63e9e719788c699c
240
17:05:36
Copying registry.scandit.com/internal/gitlab-templates/sc-gitlab-utils:59003e3462b00087db2b801ece0598b6029d3522b568d83b63e9e719788c699c to registry.scandit.com/internal/gitlab-templates/sc-gitlab-utils:3.12-0.3.2
241
17:05:36
registry.scandit.com/internal/gitlab-templates/sc-gitlab-utils:59003e3462b00087db2b801ece0598b6029d3522b568d83b63e9e719788c699c
242
17:05:36
243
17:05:36
Scout Analysis: https://scout.scandit.io/analysis/projects/621/jobs/54273480
244
17:05:36
245
17:05:36
246
17:05:36
Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=KpIiby5Vz&var-host=ci7&var-namespace=gitlab-runner&var-pod=runner-m6bsghxrx-project-621-concurrent-4-xfhbqq51&var-resolution=15&from=1777827936000&to=1777827936000
247
17:05:37
Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=KpIiby5Vz&var-node=ci7&var-resolution=15s&from=1777827936000&to=1777827936000
248
17:05:37
Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group%7C=%7Cgitlab-runner&var-filters=source%7C%3D%7Czrh.int.scandit.io&var-filters=namespace%7C%3D%7Cgitlab-runner&var-filters=CI_PROJECT_ID%7C%3D%7C621&var-filters=CI_PIPELINE_ID%7C%3D%7C1576293&var-filters=CI_JOB_ID%7C%3D%7C54273480&sortOrder=Ascending&from=1777827936000&to=1777827936000
249
17:05:37
Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=2026-04-26~2026-05-10&job_name=build-sc-gitlab-utils-image&project=internal/gitlab-templates
250
17:05:37
251
17:05:37
252
17:05:37
section_end:1777827937:step_script
253
17:05:37
+section_start:1777827937:upload_artifacts_on_success
254
17:05:37
+Uploading artifacts for successful job
255
17:05:37
Uploading artifacts...
256
17:05:37
docker_image_build.env: found 1 matching artifact files and directories
257
17:05:38
Uploading artifacts as "dotenv" to coordinator... 201 Created correlation_id=01KQQCTZ8F57YN1CY1NS2HJCEP id=54273480 responseStatus=201 Created token=64_c_ZWqu
258
17:05:38
259
17:05:38
section_end:1777827938:upload_artifacts_on_success
260
17:05:38
+section_start:1777827938:cleanup_file_variables
261
17:05:38
+Cleaning up project directory and file based variables
262
17:05:38
Removing context/
263
17:05:38
Removing docker_image_build.env
264
17:05:38
HEAD is now at 3284003 Merge branch 'renovate/docker-digests' into 'master'
265
17:05:38
266
17:05:38
section_end:1777827938:cleanup_file_variables
267
17:05:38
+
268
17:05:38
Job succeeded
269