build-pre-commit-base-image: [3.14, 4.5.1, 3.14-4.5.1] ○ success

Duration: 20s
Queued: 3s
📁 Stage: docker-image
🖥 Runner: linux-aws-1
Average Duration
26s
This job: 20s
Failure Rate
0.0%
last 30 days

Job Execution Phases

💡 Tip: Click on any phase bar to jump to that section in the log below

Job Analysis

Job Status: Passed

Status: Job passed successfully

Full Job Log

266 lines
Match - of 0
1 11:09:36 Running with gitlab-runner 18.9.0 (07e534ba)
2 11:09:36 on gitlab-runner-linux-1-746bdd58fd-kxshj wRxjPbsJX, system ID: r_ldbmQ551Swzx
3 11:09:36 feature flags: FF_USE_FASTZIP:true, FF_USE_NEW_BASH_EVAL_STRATEGY:true, FF_USE_DYNAMIC_TRACE_FORCE_SEND_INTERVAL:true, FF_SCRIPT_SECTIONS:true, FF_USE_ADVANCED_POD_SPEC_CONFIGURATION:true, FF_PRINT_POD_EVENTS:true, FF_USE_DUMB_INIT_WITH_KUBERNETES_EXECUTOR:true, FF_LOG_IMAGES_CONFIGURED_FOR_JOB:true, FF_CLEAN_UP_FAILED_CACHE_EXTRACT:true, FF_GIT_URLS_WITHOUT_TOKENS:true, FF_WAIT_FOR_POD_TO_BE_REACHABLE:true, FF_USE_FLEETING_ACQUIRE_HEARTBEATS:true, FF_USE_JOB_ROUTER:true
4 11:09:36 Resolving secrets
5 11:09:36 section_start:1778065776:prepare_executor
6 11:09:36 +Preparing the "kubernetes" executor
7 11:09:36 "CPURequest" overwritten with "2"
8 11:09:36 "MemoryRequest" overwritten with "4G"
9 11:09:36 Using Kubernetes namespace: gitlab-runner
10 11:09:36 Using Kubernetes executor with image registry.scandit.com/dockerfiles/kaniko:v1.27.3-crane@sha256:72bdc063db14f38a45910d33ccf066ecb088d4833fb2437fef336e49b81fd4ac ...
11 11:09:36 Using attach strategy to execute scripts...
12 11:09:36 Using effective pull policy of [Always] for container build
13 11:09:36 Using effective pull policy of [Always] for container helper
14 11:09:36 Using effective pull policy of [Always] for container init-permissions
15 11:09:36 section_end:1778065776:prepare_executor
16 11:09:36 +section_start:1778065776:prepare_script
17 11:09:36 +Preparing environment
18 11:09:36 Using FF_USE_POD_ACTIVE_DEADLINE_SECONDS, the Pod activeDeadlineSeconds will be set to the job timeout: 1h0m0s...
19 11:09:36 WARNING: Advanced Pod Spec configuration enabled, merging the provided PodSpec to the generated one. This is a beta feature and is subject to change. Feedback is collected in this issue: https://gitlab.com/gitlab-org/gitlab-runner/-/issues/29659 ...
20 11:09:37 Subscribing to Kubernetes Pod events...
21 11:09:37 Type Reason Message
22 11:09:37 Normal Scheduled Successfully assigned gitlab-runner/runner-wrxjpbsjx-project-621-concurrent-3-k38493al to ip-10-0-18-154.eu-central-1.compute.internal
23 11:09:37 Normal Pulled Container image "gitlab/gitlab-runner-helper:x86_64-v18.8.0" already present on machine
24 11:09:37 Normal Created Created container: init-permissions
25 11:09:37 Normal Started Started container init-permissions
26 11:09:38 Normal Pulling Pulling image "498954711405.dkr.ecr.eu-central-1.amazonaws.com/dockerfiles/kaniko@sha256:72bdc063db14f38a45910d33ccf066ecb088d4833fb2437fef336e49b81fd4ac"
27 11:09:39 Normal Pulled Successfully pulled image "498954711405.dkr.ecr.eu-central-1.amazonaws.com/dockerfiles/kaniko@sha256:72bdc063db14f38a45910d33ccf066ecb088d4833fb2437fef336e49b81fd4ac" in 439ms (439ms including waiting). Image size: 49989654 bytes.
28 11:09:39 Normal Created Created container: build
29 11:09:39 Normal Started Started container build
30 11:09:39 Normal Pulled Container image "gitlab/gitlab-runner-helper:x86_64-v18.8.0" already present on machine
31 11:09:39 Normal Created Created container: helper
32 11:09:39 Normal Started Started container helper
33 11:09:40 Running on runner-wrxjpbsjx-project-621-concurrent-3-k38493al via gitlab-runner-linux-1-746bdd58fd-kxshj...
34 11:09:40
35 11:09:40 section_end:1778065780:prepare_script
36 11:09:40 +section_start:1778065780:get_sources
37 11:09:40 +Getting source from Git repository
38 11:09:41 Gitaly correlation ID: 01KQYFN73ATNJH94J7ZK315HVX
39 11:09:41 Fetching changes with git depth set to 1...
40 11:09:41 Initialized empty Git repository in /build/internal/gitlab-templates/.git/
41 11:09:41 Created fresh repository.
42 11:09:43 Checking out 19a8ce14 as detached HEAD (ref is master)...
43 11:09:43
44 11:09:43 Skipping Git submodules setup
45 11:09:43
46 11:09:43 section_end:1778065783:get_sources
47 11:09:43 +section_start:1778065783:step_script
48 11:09:43 +Executing "step_script" stage of the job script
49 11:09:44 section_start:1778065783:section_pre_build_script_0[hide_duration=true,collapsed=true] $ function cleanup {
50 11:09:44 rv=$?
51 11:09:44 if [ $rv -ne 0 ]; then
52 11:09:44 echo ""
53 11:09:44 echo " Failure Cause Analysis might help, please open this link:"
54 11:09:44 echo " https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
55 11:09:44 echo ""
56 11:09:44 fi
57 11:09:44 echo ""
58 11:09:44 echo "Scout Analysis: https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
59 11:09:44 echo ""
60 11:09:44 echo ""
61 11:09:44 echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=${EPOCHSECONDS}000"
62 11:09:44 echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=${EPOCHSECONDS}000"
63 11:09:44 echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group|=|gitlab-runner&var-filters=source|=|${LOKI_LOGSOURCE}&var-filters=namespace|=|${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID|=|${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID|=|${CI_PIPELINE_ID}&var-filters=CI_JOB_ID|=|${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=${EPOCHSECONDS}000"
64 11:09:44 echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=$(date -d '-7 days' +%Y-%m-%d)~$(date -d '+7 days' +%Y-%m-%d)&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
65 11:09:44 echo ""
66 11:09:44 exit $rv
67 11:09:44 }
68 11:09:44 trap cleanup EXIT
69 11:09:44 echo "INFO: This is the CI job pre_build_script"
70 11:09:44 echo "INFO: It's defined in the backend/infra/aws repo."
71 11:09:44 echo "INFO: These additional Scandit variables are available to you:"
72 11:09:44 echo " SC_K8S_NODE_NAME: $SC_K8S_NODE_NAME"
73 11:09:44 echo " SC_K8S_IMAGE_ID: $SC_K8S_IMAGE_ID"
74 11:09:44 echo " SC_K8S_KYVERNO_PATCHES: |"
75 11:09:44 echo "$SC_K8S_KYVERNO_PATCHES" | sed 's/^/ /'
76 11:09:44 echo "cpu (r/l): ${SC_K8S_REQUESTS_CPU}/${SC_K8S_LIMITS_CPU}"
77 11:09:44 if command -v numfmt >/dev/null 2>&1; then
78 11:09:44 echo "memory (r/l): $(numfmt --to=iec --suffix=B $SC_K8S_REQUESTS_MEMORY)/$(numfmt --to=iec --suffix=B $SC_K8S_LIMITS_MEMORY)"
79 11:09:44 else
80 11:09:44 echo "memory (r/l): ${SC_K8S_REQUESTS_MEMORY}/${SC_K8S_LIMITS_MEMORY}"
81 11:09:44 fi
82 11:09:44 __start_time=${EPOCHSECONDS}
83 11:09:44 echo ""
84 11:09:44 echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=now"
85 11:09:44 echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=now"
86 11:09:44 echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group|=|gitlab-runner&var-filters=source|=|${LOKI_LOGSOURCE}&var-filters=namespace|=|${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID|=|${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID|=|${CI_PIPELINE_ID}&var-filters=CI_JOB_ID|=|${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=now"
87 11:09:44 echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=$(date -d '-7 days' +%Y-%m-%d)~$(date -d '+7 days' +%Y-%m-%d)&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
88 11:09:44 echo ""
89 11:09:44 echo "Setting up credentials for Gitlab Python registries"
90 11:09:44 mkdir -p ~
91 11:09:44 echo "machine gitlab.scandit.com" > ~/.netrc
92 11:09:44 echo "login gitlab-ci-token" >> ~/.netrc
93 11:09:44 echo "password ${CI_JOB_TOKEN}" >> ~/.netrc
94 11:09:44 chmod 600 ~/.netrc
95 11:09:44 if command -v git &> /dev/null && [ "$(id -u)" -ne 0 ]; then
96 11:09:44 git config --global --add safe.directory $CI_PROJECT_DIR
97 11:09:44 fi
98 11:09:44 # Sonarqube server is running on the same cluster. Use internal address
99 11:09:44 export SONAR_HOST_URL="http://sonarqube.sonarqube.svc.cluster.local:9000"
100 11:09:44 section_end:1778065783:section_pre_build_script_0
101 11:09:44 INFO: This is the CI job pre_build_script
102 11:09:44 INFO: It's defined in the backend/infra/aws repo.
103 11:09:44 INFO: These additional Scandit variables are available to you:
104 11:09:44 SC_K8S_NODE_NAME: ip-10-0-18-154.eu-central-1.compute.internal
105 11:09:44 SC_K8S_IMAGE_ID:
106 11:09:44 SC_K8S_KYVERNO_PATCHES: |
107 11:09:44
108 11:09:44 cpu (r/l): 2/4
109 11:09:44 memory (r/l): 4000000000/17179869184
110 11:09:44
111 11:09:44 Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-host=ip-10-0-18-154.eu-central-1.compute.internal&var-namespace=gitlab-runner&var-pod=runner-wrxjpbsjx-project-621-concurrent-3-k38493al&var-resolution=15&from=1778065783000&to=now
112 11:09:44 Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-node=ip-10-0-18-154.eu-central-1.compute.internal&var-resolution=15s&from=1778065783000&to=now
113 11:09:44 Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group|=|gitlab-runner&var-filters=source|=|k8s-ci.aws.scandit.io&var-filters=namespace|=|gitlab-runner&var-filters=CI_PROJECT_ID|=|621&var-filters=CI_PIPELINE_ID|=|1581320&var-filters=CI_JOB_ID|=|54484707&sortOrder=Ascending&from=1778065783000&to=now
114 11:09:44 date: invalid date '-7 days'
115 11:09:44 date: invalid date '+7 days'
116 11:09:44 Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=~&job_name=build-pre-commit-base-image: [3.14, 4.5.1, 3.14-4.5.1]&project=internal/gitlab-templates
117 11:09:44
118 11:09:44 Setting up credentials for Gitlab Python registries
119 11:09:44 $ echo $DOCKER_CONFIG_JSON > /kaniko/.docker/config.json
120 11:09:44 $ mv /root/.netrc /kaniko/.netrc
121 11:09:44 section_start:1778065783:section_script_step_2[hide_duration=true,collapsed=true] $ function copy_files() {
122 11:09:44 local src="$1"
123 11:09:44 local trg="$2"
124 11:09:44 for f in $src; do
125 11:09:44 t="$trg/`dirname $f`"
126 11:09:44 mkdir -p $t || true
127 11:09:44 echo "Copy $f"
128 11:09:44 cp -pr $f $trg/$f
129 11:09:44 done
130 11:09:44 }
131 11:09:44 function recursive_hash() {
132 11:09:44 local dir="$1"
133 11:09:44 find "$dir" -exec stat -c '%F|%a|%u:%g|%n' {} + -type f -exec sha256sum {} + | sort | sha256sum | cut -d ' ' -f1
134 11:09:44 }
135 11:09:44 function remote_docker_digest() {
136 11:09:44 local images="$1"
137 11:09:44 echo $images | xargs -n 1 crane digest
138 11:09:44 }
139 11:09:44 function remote_image_exists() {
140 11:09:44 local image="$1"
141 11:09:44 crane manifest $image > /dev/null 2>&1
142 11:09:44 }
143 11:09:44 function remote_images_are_identical() {
144 11:09:44 local imageA="$1"
145 11:09:44 local imageB="$2"
146 11:09:44 if [[ $(remote_docker_digest "$imageA") == $(remote_docker_digest "$imageB") ]]; then
147 11:09:44 return 0
148 11:09:44 else
149 11:09:44 return 1
150 11:09:44 fi
151 11:09:44 }
152 11:09:44 function copy_image() {
153 11:09:44 local image="$1"
154 11:09:44 local remotes="$2"
155 11:09:44 local backup_ext="$3"
156 11:09:44 echo "$image"
157 11:09:44 local source_digest=$(remote_docker_digest $image)
158 11:09:44 local target_digest
159 11:09:44 for registry in $remotes; do
160 11:09:44 if target_digest=$(remote_docker_digest $registry); then
161 11:09:44 if [ "$target_digest" != "$source_digest" ]; then
162 11:09:44 echo "image outdated, overwriting with newest version"
163 11:09:44 crane copy $image $registry
164 11:09:44 crane copy $image ${registry}${backup_ext}
165 11:09:44 fi
166 11:09:44 else
167 11:09:44 echo "image does not exist, writing newest version"
168 11:09:44 crane copy $image $registry
169 11:09:44 crane copy $image ${registry}${backup_ext}
170 11:09:44 fi
171 11:09:44 done
172 11:09:44 }
173 11:09:44 section_end:1778065783:section_script_step_2
174 11:09:44 section_start:1778065783:section_script_step_3[hide_duration=true,collapsed=true] $ if [ "$CONTAINER_SUBDIR" != "" ]; then
175 11:09:44 echo "Entering subpath $CONTAINER_SUBDIR"
176 11:09:44 cd $CONTAINER_SUBDIR
177 11:09:44 fi
178 11:09:44 section_end:1778065783:section_script_step_3
179 11:09:44 $ copy_files "$CONTAINER_IMPLICIT_REQUIREMENTS $CONTAINER_REQUIREMENTS" "$CONTAINER_CONTEXT_PATH"
180 11:09:44 Copy Dockerfile.pre-commit
181 11:09:44 $ echo "$CONTAINER_BUILD_ENVIRONMENT" > $CONTAINER_CONTEXT_PATH/.docker-build-env
182 11:09:44 $ docker_checksum=$(recursive_hash $CONTAINER_CONTEXT_PATH)
183 11:09:44 section_start:1778065783:section_script_step_7[hide_duration=true,collapsed=true] $ if [ "$CONTAINER_IMAGE_NAME" == "" ]; then
184 11:09:44 final_image_name=${CONTAINER_IMAGE_URL}
185 11:09:44 else
186 11:09:44 final_image_name=${CONTAINER_IMAGE_URL}/${CONTAINER_IMAGE_NAME}
187 11:09:44 fi
188 11:09:44 section_end:1778065783:section_script_step_7
189 11:09:44 $ final_image_url=${final_image_name}:${docker_checksum}
190 11:09:44 section_start:1778065783:section_script_step_9[hide_duration=true,collapsed=true] $ if [ "${PIPELINE_IMAGE_REFS}" == "1" ]; then
191 11:09:44 echo $CONTAINER_IMAGE_VARIABLE=${final_image_url}-P${CI_PROJECT_ID}-${CI_PIPELINE_ID} > $CI_PROJECT_DIR/docker_image_build.env
192 11:09:44 else
193 11:09:44 echo $CONTAINER_IMAGE_VARIABLE=$final_image_url > $CI_PROJECT_DIR/docker_image_build.env
194 11:09:44 fi
195 11:09:44 section_end:1778065783:section_script_step_9
196 11:09:44 $ echo ${CONTAINER_IMAGE_VARIABLE}_HASH=$docker_checksum >> $CI_PROJECT_DIR/docker_image_build.env
197 11:09:44 section_start:1778065783:section_script_step_11[hide_duration=true,collapsed=true] $ if [ "${FORCE_BUILD}" != "true" ] || command -v crane &> /dev/null; then
198 11:09:44 echo $REGISTRY_PASSWORD | crane auth login $REGISTRY -u $REGISTRY_USER --password-stdin
199 11:09:44 fi
200 11:09:44 section_end:1778065783:section_script_step_11
201 11:09:44
202 11:09:44 WARNING! Your credentials are stored unencrypted in '/kaniko/.docker/config.json'.
203 11:09:44 Configure a credential helper to remove this warning. See
204 11:09:44 https://docs.docker.com/go/credential-store/
205 11:09:44
206 11:09:44 2026/05/06 11:09:43 logged in via /kaniko/.docker/config.json
207 11:09:44 section_start:1778065783:section_script_step_12[hide_duration=true,collapsed=true] $ if [ "${FORCE_BUILD}" != "true" ] && remote_image_exists "$final_image_url"; then
208 11:09:44 echo "Image already exists, skip the build."
209 11:09:44 echo "$final_image_url"
210 11:09:44 if [[ "$CI_COMMIT_BRANCH" == "$CI_DEFAULT_BRANCH" ]]; then
211 11:09:44 _EXT=""
212 11:09:44 _BACKUP_EXT="-CI${CI_JOB_ID}-$(date '+%Y%m%d')"
213 11:09:44 elif [[ -n "$CI_MERGE_REQUEST_ID" ]]; then
214 11:09:44 _EXT="-MR${CI_MERGE_REQUEST_IID}"
215 11:09:44 _BACKUP_EXT=""
216 11:09:44 elif [[ "$CI_COMMIT_REF_PROTECTED" == "true" ]]; then
217 11:09:44 _EXT="-${CI_COMMIT_REF_SLUG}"
218 11:09:44 _BACKUP_EXT="-CI${CI_JOB_ID}-$(date '+%Y%m%d')"
219 11:09:44 fi
220 11:09:44 for _TAG in $CONTAINER_IMAGE_TAG; do
221 11:09:44 echo "Copying ${final_image_url} to ${final_image_name}:${_TAG}${_EXT}"
222 11:09:44 copy_image "${final_image_url}" "${final_image_name}:${_TAG}${_EXT}" "${_BACKUP_EXT}"
223 11:09:44 done
224 11:09:44 if [ "${PIPELINE_IMAGE_REFS}" == "1" ]; then
225 11:09:44 _EXT="-P${CI_PROJECT_ID}-${CI_PIPELINE_ID}"
226 11:09:44 echo "Copying ${final_image_url} to ${final_image_url}${_EXT}"
227 11:09:44 copy_image "${final_image_url}" "${final_image_url}${_EXT}"
228 11:09:44 for _TAG in $CONTAINER_IMAGE_TAG; do
229 11:09:44 echo "Copying ${final_image_url} to ${final_image_name}:${_TAG}${_EXT}"
230 11:09:44 copy_image "${final_image_url}" "${final_image_name}:${_TAG}${_EXT}"
231 11:09:44 done
232 11:09:44 fi
233 11:09:44 exit 0
234 11:09:44 fi
235 11:09:44 section_end:1778065783:section_script_step_12
236 11:09:54 Image already exists, skip the build.
237 11:09:54 registry.scandit.com/internal/gitlab-templates/pre-commit:62ac7ba22c7713574b9d35be41b72771b36937cfe264f1c1b5efc965e3b6a265
238 11:09:54 Copying registry.scandit.com/internal/gitlab-templates/pre-commit:62ac7ba22c7713574b9d35be41b72771b36937cfe264f1c1b5efc965e3b6a265 to registry.scandit.com/internal/gitlab-templates/pre-commit:3.14-4.5.1
239 11:09:54 registry.scandit.com/internal/gitlab-templates/pre-commit:62ac7ba22c7713574b9d35be41b72771b36937cfe264f1c1b5efc965e3b6a265
240 11:09:54
241 11:09:54 Scout Analysis: https://scout.scandit.io/analysis/projects/621/jobs/54484707
242 11:09:54
243 11:09:54
244 11:09:54 Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-host=ip-10-0-18-154.eu-central-1.compute.internal&var-namespace=gitlab-runner&var-pod=runner-wrxjpbsjx-project-621-concurrent-3-k38493al&var-resolution=15&from=1778065783000&to=1778065794000
245 11:09:54 Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-node=ip-10-0-18-154.eu-central-1.compute.internal&var-resolution=15s&from=1778065783000&to=1778065794000
246 11:09:54 Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group|=|gitlab-runner&var-filters=source|=|k8s-ci.aws.scandit.io&var-filters=namespace|=|gitlab-runner&var-filters=CI_PROJECT_ID|=|621&var-filters=CI_PIPELINE_ID|=|1581320&var-filters=CI_JOB_ID|=|54484707&sortOrder=Ascending&from=1778065783000&to=1778065794000
247 11:09:54 date: invalid date '-7 days'
248 11:09:54 date: invalid date '+7 days'
249 11:09:54 Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=~&job_name=build-pre-commit-base-image: [3.14, 4.5.1, 3.14-4.5.1]&project=internal/gitlab-templates
250 11:09:54
251 11:09:54
252 11:09:54 section_end:1778065794:step_script
253 11:09:54 +section_start:1778065794:upload_artifacts_on_success
254 11:09:54 +Uploading artifacts for successful job
255 11:09:55 Uploading artifacts...
256 11:09:55 docker_image_build.env: found 1 matching artifact files and directories
257 11:09:55 Uploading artifacts as "dotenv" to coordinator... 201 Created correlation_id=01KQYFNT0VXAD5MBC53WS4YY0F id=54484707 responseStatus=201 Created token=64_fT8Rhr
258 11:09:55
259 11:09:55 section_end:1778065795:upload_artifacts_on_success
260 11:09:55 +section_start:1778065795:cleanup_file_variables
261 11:09:55 +Cleaning up project directory and file based variables
262 11:09:56
263 11:09:56 section_end:1778065796:cleanup_file_variables
264 11:09:56 +
265 11:09:56 Job succeeded
266