build-sc-git-utilities-image ○ success

Duration: 25s
Queued: 5s
📁 Stage: docker-image
🖥 Runner: linux-aws-1
Average Duration
30s
This job: 25s
Failure Rate
11.8%
last 30 days

Job Execution Phases

💡 Tip: Click on any phase bar to jump to that section in the log below

Job Analysis

Job Status: Passed

Status: Job passed successfully

Full Job Log

289 lines
Match - of 0
1 22:37:31 Running with gitlab-runner 18.9.0 (07e534ba)
2 22:37:31 on gitlab-runner-linux-1-746bdd58fd-4cqkw wRxjPbsJX, system ID: r_f0gJVPIyznax
3 22:37:31 feature flags: FF_USE_FASTZIP:true, FF_USE_NEW_BASH_EVAL_STRATEGY:true, FF_USE_DYNAMIC_TRACE_FORCE_SEND_INTERVAL:true, FF_SCRIPT_SECTIONS:true, FF_USE_ADVANCED_POD_SPEC_CONFIGURATION:true, FF_PRINT_POD_EVENTS:true, FF_USE_DUMB_INIT_WITH_KUBERNETES_EXECUTOR:true, FF_LOG_IMAGES_CONFIGURED_FOR_JOB:true, FF_CLEAN_UP_FAILED_CACHE_EXTRACT:true, FF_GIT_URLS_WITHOUT_TOKENS:true, FF_WAIT_FOR_POD_TO_BE_REACHABLE:true, FF_USE_FLEETING_ACQUIRE_HEARTBEATS:true, FF_USE_JOB_ROUTER:true
4 22:37:31 Resolving secrets
5 22:37:31 section_start:1778020651:prepare_executor
6 22:37:31 +Preparing the "kubernetes" executor
7 22:37:31 "CPURequest" overwritten with "2"
8 22:37:31 "MemoryRequest" overwritten with "4G"
9 22:37:31 Using Kubernetes namespace: gitlab-runner
10 22:37:31 Using Kubernetes executor with image registry.scandit.com/dockerfiles/kaniko:v1.27.3-crane@sha256:72bdc063db14f38a45910d33ccf066ecb088d4833fb2437fef336e49b81fd4ac ...
11 22:37:31 Using attach strategy to execute scripts...
12 22:37:31 Using effective pull policy of [Always] for container init-permissions
13 22:37:31 Using effective pull policy of [Always] for container build
14 22:37:31 Using effective pull policy of [Always] for container helper
15 22:37:31 section_end:1778020651:prepare_executor
16 22:37:31 +section_start:1778020651:prepare_script
17 22:37:31 +Preparing environment
18 22:37:31 Using FF_USE_POD_ACTIVE_DEADLINE_SECONDS, the Pod activeDeadlineSeconds will be set to the job timeout: 1h0m0s...
19 22:37:31 WARNING: Advanced Pod Spec configuration enabled, merging the provided PodSpec to the generated one. This is a beta feature and is subject to change. Feedback is collected in this issue: https://gitlab.com/gitlab-org/gitlab-runner/-/issues/29659 ...
20 22:37:32 Subscribing to Kubernetes Pod events...
21 22:37:32 Type Reason Message
22 22:37:32 Normal Scheduled Successfully assigned gitlab-runner/runner-wrxjpbsjx-project-621-concurrent-3-2ietn4u4 to ip-10-0-36-227.eu-central-1.compute.internal
23 22:37:32 Normal Pulling Pulling image "gitlab/gitlab-runner-helper:x86_64-v18.8.0"
24 22:37:34 Normal TaintManagerEviction Cancelling deletion of Pod gitlab-runner/runner-wrxjpbsjx-project-621-concurrent-3-2ietn4u4
25 22:37:40 Normal Pulled Successfully pulled image "gitlab/gitlab-runner-helper:x86_64-v18.8.0" in 7.925s (7.925s including waiting). Image size: 39949060 bytes.
26 22:37:40 Normal Created Created container: init-permissions
27 22:37:41 Normal Started Started container init-permissions
28 22:37:41 Normal Pulling Pulling image "498954711405.dkr.ecr.eu-central-1.amazonaws.com/dockerfiles/kaniko@sha256:72bdc063db14f38a45910d33ccf066ecb088d4833fb2437fef336e49b81fd4ac"
29 22:37:48 Normal Pulled Successfully pulled image "498954711405.dkr.ecr.eu-central-1.amazonaws.com/dockerfiles/kaniko@sha256:72bdc063db14f38a45910d33ccf066ecb088d4833fb2437fef336e49b81fd4ac" in 6.377s (6.377s including waiting). Image size: 49989654 bytes.
30 22:37:48 Normal Created Created container: build
31 22:37:48 Normal Started Started container build
32 22:37:48 Normal Pulled Container image "gitlab/gitlab-runner-helper:x86_64-v18.8.0" already present on machine
33 22:37:48 Normal Created Created container: helper
34 22:37:48 Normal Started Started container helper
35 22:37:51 Running on runner-wrxjpbsjx-project-621-concurrent-3-2ietn4u4 via gitlab-runner-linux-1-746bdd58fd-4cqkw...
36 22:37:51
37 22:37:51 section_end:1778020671:prepare_script
38 22:37:51 +section_start:1778020671:get_sources
39 22:37:51 +Getting source from Git repository
40 22:37:51 Gitaly correlation ID: 01KQX4M3Y9BZDPJHQABDZVMKZX
41 22:37:51 Fetching changes with git depth set to 1...
42 22:37:51 Initialized empty Git repository in /build/internal/gitlab-templates/.git/
43 22:37:51 Created fresh repository.
44 22:37:52 Checking out 13881c4b as detached HEAD (ref is refs/merge-requests/638/merge)...
45 22:37:52
46 22:37:52 Skipping Git submodules setup
47 22:37:52
48 22:37:52 section_end:1778020672:get_sources
49 22:37:52 +section_start:1778020672:step_script
50 22:37:52 +Executing "step_script" stage of the job script
51 22:37:52 section_start:1778020672:section_pre_build_script_0[hide_duration=true,collapsed=true] $ function cleanup {
52 22:37:52 rv=$?
53 22:37:52 if [ $rv -ne 0 ]; then
54 22:37:52 echo ""
55 22:37:52 echo " Failure Cause Analysis might help, please open this link:"
56 22:37:52 echo " https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
57 22:37:52 echo ""
58 22:37:52 fi
59 22:37:52 echo ""
60 22:37:52 echo "Scout Analysis: https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
61 22:37:52 echo ""
62 22:37:52 echo ""
63 22:37:52 echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=${EPOCHSECONDS}000"
64 22:37:52 echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=${EPOCHSECONDS}000"
65 22:37:52 echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group|=|gitlab-runner&var-filters=source|=|${LOKI_LOGSOURCE}&var-filters=namespace|=|${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID|=|${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID|=|${CI_PIPELINE_ID}&var-filters=CI_JOB_ID|=|${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=${EPOCHSECONDS}000"
66 22:37:52 echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=$(date -d '-7 days' +%Y-%m-%d)~$(date -d '+7 days' +%Y-%m-%d)&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
67 22:37:52 echo ""
68 22:37:52 exit $rv
69 22:37:52 }
70 22:37:52 trap cleanup EXIT
71 22:37:52 echo "INFO: This is the CI job pre_build_script"
72 22:37:52 echo "INFO: It's defined in the backend/infra/aws repo."
73 22:37:52 echo "INFO: These additional Scandit variables are available to you:"
74 22:37:52 echo " SC_K8S_NODE_NAME: $SC_K8S_NODE_NAME"
75 22:37:52 echo " SC_K8S_IMAGE_ID: $SC_K8S_IMAGE_ID"
76 22:37:52 echo " SC_K8S_KYVERNO_PATCHES: |"
77 22:37:52 echo "$SC_K8S_KYVERNO_PATCHES" | sed 's/^/ /'
78 22:37:52 echo "cpu (r/l): ${SC_K8S_REQUESTS_CPU}/${SC_K8S_LIMITS_CPU}"
79 22:37:52 if command -v numfmt >/dev/null 2>&1; then
80 22:37:52 echo "memory (r/l): $(numfmt --to=iec --suffix=B $SC_K8S_REQUESTS_MEMORY)/$(numfmt --to=iec --suffix=B $SC_K8S_LIMITS_MEMORY)"
81 22:37:52 else
82 22:37:52 echo "memory (r/l): ${SC_K8S_REQUESTS_MEMORY}/${SC_K8S_LIMITS_MEMORY}"
83 22:37:52 fi
84 22:37:52 __start_time=${EPOCHSECONDS}
85 22:37:52 echo ""
86 22:37:52 echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=now"
87 22:37:52 echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=now"
88 22:37:52 echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group|=|gitlab-runner&var-filters=source|=|${LOKI_LOGSOURCE}&var-filters=namespace|=|${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID|=|${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID|=|${CI_PIPELINE_ID}&var-filters=CI_JOB_ID|=|${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=now"
89 22:37:52 echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=$(date -d '-7 days' +%Y-%m-%d)~$(date -d '+7 days' +%Y-%m-%d)&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
90 22:37:52 echo ""
91 22:37:52 echo "Setting up credentials for Gitlab Python registries"
92 22:37:52 mkdir -p ~
93 22:37:52 echo "machine gitlab.scandit.com" > ~/.netrc
94 22:37:52 echo "login gitlab-ci-token" >> ~/.netrc
95 22:37:52 echo "password ${CI_JOB_TOKEN}" >> ~/.netrc
96 22:37:52 chmod 600 ~/.netrc
97 22:37:52 if command -v git &> /dev/null && [ "$(id -u)" -ne 0 ]; then
98 22:37:52 git config --global --add safe.directory $CI_PROJECT_DIR
99 22:37:52 fi
100 22:37:52 # Sonarqube server is running on the same cluster. Use internal address
101 22:37:52 export SONAR_HOST_URL="http://sonarqube.sonarqube.svc.cluster.local:9000"
102 22:37:52 section_end:1778020672:section_pre_build_script_0
103 22:37:52 INFO: This is the CI job pre_build_script
104 22:37:52 INFO: It's defined in the backend/infra/aws repo.
105 22:37:52 INFO: These additional Scandit variables are available to you:
106 22:37:52 SC_K8S_NODE_NAME: ip-10-0-36-227.eu-central-1.compute.internal
107 22:37:52 SC_K8S_IMAGE_ID:
108 22:37:52 SC_K8S_KYVERNO_PATCHES: |
109 22:37:52
110 22:37:52 cpu (r/l): 2/4
111 22:37:52 memory (r/l): 4000000000/17179869184
112 22:37:52
113 22:37:52 Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-host=ip-10-0-36-227.eu-central-1.compute.internal&var-namespace=gitlab-runner&var-pod=runner-wrxjpbsjx-project-621-concurrent-3-2ietn4u4&var-resolution=15&from=1778020672000&to=now
114 22:37:52 Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-node=ip-10-0-36-227.eu-central-1.compute.internal&var-resolution=15s&from=1778020672000&to=now
115 22:37:52 Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group|=|gitlab-runner&var-filters=source|=|k8s-ci.aws.scandit.io&var-filters=namespace|=|gitlab-runner&var-filters=CI_PROJECT_ID|=|621&var-filters=CI_PIPELINE_ID|=|1580353&var-filters=CI_JOB_ID|=|54442835&sortOrder=Ascending&from=1778020672000&to=now
116 22:37:52 date: invalid date '-7 days'
117 22:37:52 date: invalid date '+7 days'
118 22:37:52 Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=~&job_name=build-sc-git-utilities-image&project=internal/gitlab-templates
119 22:37:52
120 22:37:52 Setting up credentials for Gitlab Python registries
121 22:37:52 $ echo $DOCKER_CONFIG_JSON > /kaniko/.docker/config.json
122 22:37:52 $ mv /root/.netrc /kaniko/.netrc
123 22:37:52 section_start:1778020672:section_script_step_2[hide_duration=true,collapsed=true] $ function copy_files() {
124 22:37:52 local src="$1"
125 22:37:52 local trg="$2"
126 22:37:52 for f in $src; do
127 22:37:52 t="$trg/`dirname $f`"
128 22:37:52 mkdir -p $t || true
129 22:37:52 echo "Copy $f"
130 22:37:52 cp -pr $f $trg/$f
131 22:37:52 done
132 22:37:52 }
133 22:37:52 function recursive_hash() {
134 22:37:52 local dir="$1"
135 22:37:52 find "$dir" -exec stat -c '%F|%a|%u:%g|%n' {} + -type f -exec sha256sum {} + | sort | sha256sum | cut -d ' ' -f1
136 22:37:52 }
137 22:37:52 function remote_docker_digest() {
138 22:37:52 local images="$1"
139 22:37:52 echo $images | xargs -n 1 crane digest
140 22:37:52 }
141 22:37:52 function remote_image_exists() {
142 22:37:52 local image="$1"
143 22:37:52 crane manifest $image > /dev/null 2>&1
144 22:37:52 }
145 22:37:52 function remote_images_are_identical() {
146 22:37:52 local imageA="$1"
147 22:37:52 local imageB="$2"
148 22:37:52 if [[ $(remote_docker_digest "$imageA") == $(remote_docker_digest "$imageB") ]]; then
149 22:37:52 return 0
150 22:37:52 else
151 22:37:52 return 1
152 22:37:52 fi
153 22:37:52 }
154 22:37:52 function copy_image() {
155 22:37:52 local image="$1"
156 22:37:52 local remotes="$2"
157 22:37:52 local backup_ext="$3"
158 22:37:52 echo "$image"
159 22:37:52 local source_digest=$(remote_docker_digest $image)
160 22:37:52 local target_digest
161 22:37:52 for registry in $remotes; do
162 22:37:52 if target_digest=$(remote_docker_digest $registry); then
163 22:37:52 if [ "$target_digest" != "$source_digest" ]; then
164 22:37:52 echo "image outdated, overwriting with newest version"
165 22:37:52 crane copy $image $registry
166 22:37:52 crane copy $image ${registry}${backup_ext}
167 22:37:52 fi
168 22:37:52 else
169 22:37:52 echo "image does not exist, writing newest version"
170 22:37:52 crane copy $image $registry
171 22:37:52 crane copy $image ${registry}${backup_ext}
172 22:37:52 fi
173 22:37:52 done
174 22:37:52 }
175 22:37:52 section_end:1778020672:section_script_step_2
176 22:37:52 section_start:1778020672:section_script_step_3[hide_duration=true,collapsed=true] $ if [ "$CONTAINER_SUBDIR" != "" ]; then
177 22:37:52 echo "Entering subpath $CONTAINER_SUBDIR"
178 22:37:52 cd $CONTAINER_SUBDIR
179 22:37:52 fi
180 22:37:52 section_end:1778020672:section_script_step_3
181 22:37:52 $ copy_files "$CONTAINER_IMPLICIT_REQUIREMENTS $CONTAINER_REQUIREMENTS" "$CONTAINER_CONTEXT_PATH"
182 22:37:52 Copy Dockerfile.sc-git-utilities
183 22:37:52 $ echo "$CONTAINER_BUILD_ENVIRONMENT" > $CONTAINER_CONTEXT_PATH/.docker-build-env
184 22:37:52 $ docker_checksum=$(recursive_hash $CONTAINER_CONTEXT_PATH)
185 22:37:52 section_start:1778020672:section_script_step_7[hide_duration=true,collapsed=true] $ if [ "$CONTAINER_IMAGE_NAME" == "" ]; then
186 22:37:52 final_image_name=${CONTAINER_IMAGE_URL}
187 22:37:52 else
188 22:37:52 final_image_name=${CONTAINER_IMAGE_URL}/${CONTAINER_IMAGE_NAME}
189 22:37:52 fi
190 22:37:52 section_end:1778020672:section_script_step_7
191 22:37:52 $ final_image_url=${final_image_name}:${docker_checksum}
192 22:37:52 section_start:1778020672:section_script_step_9[hide_duration=true,collapsed=true] $ if [ "${PIPELINE_IMAGE_REFS}" == "1" ]; then
193 22:37:52 echo $CONTAINER_IMAGE_VARIABLE=${final_image_url}-P${CI_PROJECT_ID}-${CI_PIPELINE_ID} > $CI_PROJECT_DIR/docker_image_build.env
194 22:37:52 else
195 22:37:52 echo $CONTAINER_IMAGE_VARIABLE=$final_image_url > $CI_PROJECT_DIR/docker_image_build.env
196 22:37:52 fi
197 22:37:52 section_end:1778020672:section_script_step_9
198 22:37:52 $ echo ${CONTAINER_IMAGE_VARIABLE}_HASH=$docker_checksum >> $CI_PROJECT_DIR/docker_image_build.env
199 22:37:52 section_start:1778020672:section_script_step_11[hide_duration=true,collapsed=true] $ if [ "${FORCE_BUILD}" != "true" ] || command -v crane &> /dev/null; then
200 22:37:52 echo $REGISTRY_PASSWORD | crane auth login $REGISTRY -u $REGISTRY_USER --password-stdin
201 22:37:52 fi
202 22:37:52 section_end:1778020672:section_script_step_11
203 22:37:52
204 22:37:52 WARNING! Your credentials are stored unencrypted in '/kaniko/.docker/config.json'.
205 22:37:52 Configure a credential helper to remove this warning. See
206 22:37:52 https://docs.docker.com/go/credential-store/
207 22:37:52
208 22:37:52 2026/05/05 22:37:52 logged in via /kaniko/.docker/config.json
209 22:37:52 section_start:1778020672:section_script_step_12[hide_duration=true,collapsed=true] $ if [ "${FORCE_BUILD}" != "true" ] && remote_image_exists "$final_image_url"; then
210 22:37:52 echo "Image already exists, skip the build."
211 22:37:52 echo "$final_image_url"
212 22:37:52 if [[ "$CI_COMMIT_BRANCH" == "$CI_DEFAULT_BRANCH" ]]; then
213 22:37:52 _EXT=""
214 22:37:52 _BACKUP_EXT="-CI${CI_JOB_ID}-$(date '+%Y%m%d')"
215 22:37:52 elif [[ -n "$CI_MERGE_REQUEST_ID" ]]; then
216 22:37:52 _EXT="-MR${CI_MERGE_REQUEST_IID}"
217 22:37:52 _BACKUP_EXT=""
218 22:37:52 elif [[ "$CI_COMMIT_REF_PROTECTED" == "true" ]]; then
219 22:37:52 _EXT="-${CI_COMMIT_REF_SLUG}"
220 22:37:52 _BACKUP_EXT="-CI${CI_JOB_ID}-$(date '+%Y%m%d')"
221 22:37:52 fi
222 22:37:52 for _TAG in $CONTAINER_IMAGE_TAG; do
223 22:37:52 echo "Copying ${final_image_url} to ${final_image_name}:${_TAG}${_EXT}"
224 22:37:52 copy_image "${final_image_url}" "${final_image_name}:${_TAG}${_EXT}" "${_BACKUP_EXT}"
225 22:37:52 done
226 22:37:52 if [ "${PIPELINE_IMAGE_REFS}" == "1" ]; then
227 22:37:52 _EXT="-P${CI_PROJECT_ID}-${CI_PIPELINE_ID}"
228 22:37:52 echo "Copying ${final_image_url} to ${final_image_url}${_EXT}"
229 22:37:52 copy_image "${final_image_url}" "${final_image_url}${_EXT}"
230 22:37:52 for _TAG in $CONTAINER_IMAGE_TAG; do
231 22:37:52 echo "Copying ${final_image_url} to ${final_image_name}:${_TAG}${_EXT}"
232 22:37:52 copy_image "${final_image_url}" "${final_image_name}:${_TAG}${_EXT}"
233 22:37:52 done
234 22:37:52 fi
235 22:37:52 exit 0
236 22:37:52 fi
237 22:37:52 section_end:1778020672:section_script_step_12
238 22:37:53 Image already exists, skip the build.
239 22:37:53 registry.scandit.com/internal/gitlab-templates/sc-git-utilities:baa4b9d66f12d6a5ebcc30c346703c4708cd59c189797a52ee2e47201c344985
240 22:37:53 Copying registry.scandit.com/internal/gitlab-templates/sc-git-utilities:baa4b9d66f12d6a5ebcc30c346703c4708cd59c189797a52ee2e47201c344985 to registry.scandit.com/internal/gitlab-templates/sc-git-utilities:3.12-0.0.7-MR638
241 22:37:53 registry.scandit.com/internal/gitlab-templates/sc-git-utilities:baa4b9d66f12d6a5ebcc30c346703c4708cd59c189797a52ee2e47201c344985
242 22:37:53 2026/05/05 22:37:53 HEAD request failed, falling back on GET: HEAD https://registry.scandit.com/v2/internal/gitlab-templates/sc-git-utilities/manifests/3.12-0.0.7-MR638: unexpected status code 404 Not Found (HEAD responses have no body, use GET for details)
243 22:37:53 Error: GET https://registry.scandit.com/v2/internal/gitlab-templates/sc-git-utilities/manifests/3.12-0.0.7-MR638: MANIFEST_UNKNOWN: manifest unknown; map[Tag:3.12-0.0.7-MR638]
244 22:37:53 image does not exist, writing newest version
245 22:37:53 2026/05/05 22:37:53 Copying from registry.scandit.com/internal/gitlab-templates/sc-git-utilities:baa4b9d66f12d6a5ebcc30c346703c4708cd59c189797a52ee2e47201c344985 to registry.scandit.com/internal/gitlab-templates/sc-git-utilities:3.12-0.0.7-MR638
246 22:37:53 2026/05/05 22:37:53 existing blob: sha256:89732bc7504122601f40269fc9ddfb70982e633ea9caf641ae45736f2846b004
247 22:37:54 2026/05/05 22:37:53 existing blob: sha256:589002ba0eaed121a1dbf42f6648f29e5be55d5c8a6ee0f8eaa0285cc21ac153
248 22:37:54 2026/05/05 22:37:53 existing blob: sha256:60434a9981900eb1fe8a9b0e152842139c0596fdbe0c351b2e1427d61b74038e
249 22:37:54 2026/05/05 22:37:53 existing blob: sha256:fdaeb1fd0f0e3d8180168d1dde26c0372ea8e1a47172c1dce059d39a4625eb83
250 22:37:54 2026/05/05 22:37:53 existing blob: sha256:0cd751d7b2d9d2ca69ea84264bbc44c55f084686b9e1eb30e853b57f71563a1d
251 22:37:54 2026/05/05 22:37:53 existing blob: sha256:b7197ee3402b76b836b08e1931518238672f836d8296cc57aae37d8c014a3cb7
252 22:37:54 2026/05/05 22:37:53 existing blob: sha256:263ee11216ec86b10ddd097f9fce6c58b2872e9745ff25739fdbb5a356a12177
253 22:37:54 2026/05/05 22:37:53 existing blob: sha256:08d04ec851182f147833a80fcb3e33a241cb7d2e1aa4195217b44f5f0db91f98
254 22:37:54 2026/05/05 22:37:53 existing blob: sha256:5302e5d2df80ddaf667c433e20e71f39cfbf6df3b812e6b1f7ebdd170ec4807f
255 22:37:54 2026/05/05 22:37:53 existing blob: sha256:c364c9d2c4c603799c427a6438d6566c9f9891be2eedf05521744495506f72f6
256 22:37:54 2026/05/05 22:37:53 existing blob: sha256:912c0cd376bfb64de48b12f07db19b26dfd81f6efb16639a08fec55fa1c37404
257 22:37:54 2026/05/05 22:37:53 existing blob: sha256:9972dc69255b505dd52f9b7847fc19f6deadb901d9604004f088e906da17ad9d
258 22:37:54 2026/05/05 22:37:53 existing blob: sha256:1b5051785493ea95ef4ea453fd73d9c320a27770c14a0277d12b6c267d21f272
259 22:37:54 2026/05/05 22:37:53 existing blob: sha256:bbc257cd0d98e60f293b7cfba9aa63402e8939f6d9d5c98f3c3b582cba2c4af6
260 22:37:54 2026/05/05 22:37:54 registry.scandit.com/internal/gitlab-templates/sc-git-utilities:3.12-0.0.7-MR638: digest: sha256:2839a8ea212d632fc7580491fb7ffb9de13e9b6da078a7dd10a7681d19c59227 size: 5518
261 22:37:54 2026/05/05 22:37:54 Copying from registry.scandit.com/internal/gitlab-templates/sc-git-utilities:baa4b9d66f12d6a5ebcc30c346703c4708cd59c189797a52ee2e47201c344985 to registry.scandit.com/internal/gitlab-templates/sc-git-utilities:3.12-0.0.7-MR638
262 22:37:54 2026/05/05 22:37:54 existing manifest: 3.12-0.0.7-MR638@sha256:2839a8ea212d632fc7580491fb7ffb9de13e9b6da078a7dd10a7681d19c59227
263 22:37:54
264 22:37:54 Scout Analysis: https://scout.scandit.io/analysis/projects/621/jobs/54442835
265 22:37:54
266 22:37:54
267 22:37:54 Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-host=ip-10-0-36-227.eu-central-1.compute.internal&var-namespace=gitlab-runner&var-pod=runner-wrxjpbsjx-project-621-concurrent-3-2ietn4u4&var-resolution=15&from=1778020672000&to=1778020674000
268 22:37:54 Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-node=ip-10-0-36-227.eu-central-1.compute.internal&var-resolution=15s&from=1778020672000&to=1778020674000
269 22:37:54 Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group|=|gitlab-runner&var-filters=source|=|k8s-ci.aws.scandit.io&var-filters=namespace|=|gitlab-runner&var-filters=CI_PROJECT_ID|=|621&var-filters=CI_PIPELINE_ID|=|1580353&var-filters=CI_JOB_ID|=|54442835&sortOrder=Ascending&from=1778020672000&to=1778020674000
270 22:37:54 date: invalid date '-7 days'
271 22:37:54 date: invalid date '+7 days'
272 22:37:54 Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=~&job_name=build-sc-git-utilities-image&project=internal/gitlab-templates
273 22:37:54
274 22:37:54
275 22:37:54 section_end:1778020674:step_script
276 22:37:54 +section_start:1778020674:upload_artifacts_on_success
277 22:37:54 +Uploading artifacts for successful job
278 22:37:55 Uploading artifacts...
279 22:37:55 docker_image_build.env: found 1 matching artifact files and directories
280 22:37:55 Uploading artifacts as "dotenv" to coordinator... 201 Created correlation_id=01KQX4MVCZ6EJZS9AK5JHYPAJR id=54442835 responseStatus=201 Created token=64_Bq_UnU
281 22:37:55
282 22:37:55 section_end:1778020675:upload_artifacts_on_success
283 22:37:55 +section_start:1778020675:cleanup_file_variables
284 22:37:55 +Cleaning up project directory and file based variables
285 22:37:56
286 22:37:56 section_end:1778020676:cleanup_file_variables
287 22:37:56 +
288 22:37:56 Job succeeded
289