build-sc-git-utilities-image ○ success
⏱
Duration: 15s
⏳
Queued: 1s
📁
Stage: docker-image
🖥
Runner: linux-aws-1
Average Duration
30s
This job: 15s
Failure Rate
11.8%
last 30 days
External Links
▶
Job Execution Phases
💡 Tip: Click on any phase bar to jump to that section in the log below
▶
Job Analysis
Job Status: Passed
Status: Job passed successfully
▶
Full Job Log
286 lines
Match - of 0
1
10:47:56
Running with gitlab-runner 18.9.0 (07e534ba)
2
10:47:56
on gitlab-runner-linux-1-746bdd58fd-tnh7j wRxjPbsJX, system ID: r_u8Qk6qrlK3xa
3
10:47:56
feature flags: FF_USE_FASTZIP:true, FF_USE_NEW_BASH_EVAL_STRATEGY:true, FF_USE_DYNAMIC_TRACE_FORCE_SEND_INTERVAL:true, FF_SCRIPT_SECTIONS:true, FF_USE_ADVANCED_POD_SPEC_CONFIGURATION:true, FF_PRINT_POD_EVENTS:true, FF_USE_DUMB_INIT_WITH_KUBERNETES_EXECUTOR:true, FF_LOG_IMAGES_CONFIGURED_FOR_JOB:true, FF_CLEAN_UP_FAILED_CACHE_EXTRACT:true, FF_GIT_URLS_WITHOUT_TOKENS:true, FF_WAIT_FOR_POD_TO_BE_REACHABLE:true, FF_USE_FLEETING_ACQUIRE_HEARTBEATS:true, FF_USE_JOB_ROUTER:true
4
10:47:56
Resolving secrets
5
10:47:56
section_start:1778237276:prepare_executor
6
10:47:56
+Preparing the "kubernetes" executor
7
10:47:56
"CPURequest" overwritten with "2"
8
10:47:56
"MemoryRequest" overwritten with "4G"
9
10:47:56
Using Kubernetes namespace: gitlab-runner
10
10:47:56
Using Kubernetes executor with image registry.scandit.com/dockerfiles/kaniko:v1.27.3-crane@sha256:72bdc063db14f38a45910d33ccf066ecb088d4833fb2437fef336e49b81fd4ac ...
11
10:47:56
Using attach strategy to execute scripts...
12
10:47:56
Using effective pull policy of [Always] for container helper
13
10:47:56
Using effective pull policy of [Always] for container init-permissions
14
10:47:56
Using effective pull policy of [Always] for container build
15
10:47:57
section_end:1778237277:prepare_executor
16
10:47:57
+section_start:1778237277:prepare_script
17
10:47:57
+Preparing environment
18
10:47:57
Using FF_USE_POD_ACTIVE_DEADLINE_SECONDS, the Pod activeDeadlineSeconds will be set to the job timeout: 1h0m0s...
19
10:47:57
WARNING: Advanced Pod Spec configuration enabled, merging the provided PodSpec to the generated one. This is a beta feature and is subject to change. Feedback is collected in this issue: https://gitlab.com/gitlab-org/gitlab-runner/-/issues/29659 ...
20
10:47:57
Subscribing to Kubernetes Pod events...
21
10:47:59
Type Reason Message
22
10:47:59
Normal Scheduled Successfully assigned gitlab-runner/runner-wrxjpbsjx-project-621-concurrent-0-k5l2mt38 to ip-10-0-36-48.eu-central-1.compute.internal
23
10:47:59
Normal Pulled Container image "gitlab/gitlab-runner-helper:x86_64-v18.8.0" already present on machine
24
10:47:59
Normal Created Created container: init-permissions
25
10:47:59
Normal Started Started container init-permissions
26
10:47:59
Normal Pulled Container image "498954711405.dkr.ecr.eu-central-1.amazonaws.com/dockerfiles/kaniko@sha256:72bdc063db14f38a45910d33ccf066ecb088d4833fb2437fef336e49b81fd4ac" already present on machine
27
10:47:59
Normal Created Created container: build
28
10:47:59
Normal Started Started container build
29
10:47:59
Normal Pulled Container image "gitlab/gitlab-runner-helper:x86_64-v18.8.0" already present on machine
30
10:47:59
Normal Created Created container: helper
31
10:47:59
Normal Started Started container helper
32
10:48:02
Running on runner-wrxjpbsjx-project-621-concurrent-0-k5l2mt38 via gitlab-runner-linux-1-746bdd58fd-tnh7j...
33
10:48:02
34
10:48:02
section_end:1778237282:prepare_script
35
10:48:02
+section_start:1778237282:get_sources
36
10:48:02
+Getting source from Git repository
37
10:48:03
Gitaly correlation ID: 01KR3K6ZDVCCMJM0A6CK8JG8PC
38
10:48:03
Fetching changes with git depth set to 1...
39
10:48:03
Initialized empty Git repository in /build/internal/gitlab-templates/.git/
40
10:48:03
Created fresh repository.
41
10:48:04
Checking out 6e76a6a0 as detached HEAD (ref is refs/merge-requests/641/merge)...
42
10:48:04
43
10:48:04
Skipping Git submodules setup
44
10:48:04
45
10:48:04
section_end:1778237284:get_sources
46
10:48:04
+section_start:1778237284:step_script
47
10:48:04
+Executing "step_script" stage of the job script
48
10:48:04
section_start:1778237284:section_pre_build_script_0[hide_duration=true,collapsed=true]
$ function cleanup {
49
10:48:04
rv=$?
50
10:48:04
if [ $rv -ne 0 ]; then
51
10:48:04
echo ""
52
10:48:04
echo " Failure Cause Analysis might help, please open this link:"
53
10:48:04
echo " https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
54
10:48:04
echo ""
55
10:48:04
fi
56
10:48:04
echo ""
57
10:48:04
echo "Scout Analysis: https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
58
10:48:04
echo ""
59
10:48:04
echo ""
60
10:48:04
echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=${EPOCHSECONDS}000"
61
10:48:04
echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=${EPOCHSECONDS}000"
62
10:48:04
echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group|=|gitlab-runner&var-filters=source|=|${LOKI_LOGSOURCE}&var-filters=namespace|=|${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID|=|${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID|=|${CI_PIPELINE_ID}&var-filters=CI_JOB_ID|=|${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=${EPOCHSECONDS}000"
63
10:48:04
echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=$(date -d '-7 days' +%Y-%m-%d)~$(date -d '+7 days' +%Y-%m-%d)&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
64
10:48:04
echo ""
65
10:48:04
exit $rv
66
10:48:04
}
67
10:48:04
trap cleanup EXIT
68
10:48:04
echo "INFO: This is the CI job pre_build_script"
69
10:48:04
echo "INFO: It's defined in the backend/infra/aws repo."
70
10:48:04
echo "INFO: These additional Scandit variables are available to you:"
71
10:48:04
echo " SC_K8S_NODE_NAME: $SC_K8S_NODE_NAME"
72
10:48:04
echo " SC_K8S_IMAGE_ID: $SC_K8S_IMAGE_ID"
73
10:48:04
echo " SC_K8S_KYVERNO_PATCHES: |"
74
10:48:04
echo "$SC_K8S_KYVERNO_PATCHES" | sed 's/^/ /'
75
10:48:04
echo "cpu (r/l): ${SC_K8S_REQUESTS_CPU}/${SC_K8S_LIMITS_CPU}"
76
10:48:04
if command -v numfmt >/dev/null 2>&1; then
77
10:48:04
echo "memory (r/l): $(numfmt --to=iec --suffix=B $SC_K8S_REQUESTS_MEMORY)/$(numfmt --to=iec --suffix=B $SC_K8S_LIMITS_MEMORY)"
78
10:48:04
else
79
10:48:04
echo "memory (r/l): ${SC_K8S_REQUESTS_MEMORY}/${SC_K8S_LIMITS_MEMORY}"
80
10:48:04
fi
81
10:48:04
__start_time=${EPOCHSECONDS}
82
10:48:04
echo ""
83
10:48:04
echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=now"
84
10:48:04
echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=now"
85
10:48:04
echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group|=|gitlab-runner&var-filters=source|=|${LOKI_LOGSOURCE}&var-filters=namespace|=|${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID|=|${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID|=|${CI_PIPELINE_ID}&var-filters=CI_JOB_ID|=|${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=now"
86
10:48:04
echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=$(date -d '-7 days' +%Y-%m-%d)~$(date -d '+7 days' +%Y-%m-%d)&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
87
10:48:04
echo ""
88
10:48:04
echo "Setting up credentials for Gitlab Python registries"
89
10:48:04
mkdir -p ~
90
10:48:04
echo "machine gitlab.scandit.com" > ~/.netrc
91
10:48:04
echo "login gitlab-ci-token" >> ~/.netrc
92
10:48:04
echo "password ${CI_JOB_TOKEN}" >> ~/.netrc
93
10:48:04
chmod 600 ~/.netrc
94
10:48:04
if command -v git &> /dev/null && [ "$(id -u)" -ne 0 ]; then
95
10:48:04
git config --global --add safe.directory $CI_PROJECT_DIR
96
10:48:04
fi
97
10:48:04
# Sonarqube server is running on the same cluster. Use internal address
98
10:48:04
export SONAR_HOST_URL="http://sonarqube.sonarqube.svc.cluster.local:9000"
99
10:48:04
section_end:1778237284:section_pre_build_script_0
100
10:48:04
INFO: This is the CI job pre_build_script
101
10:48:04
INFO: It's defined in the backend/infra/aws repo.
102
10:48:04
INFO: These additional Scandit variables are available to you:
103
10:48:04
SC_K8S_NODE_NAME: ip-10-0-36-48.eu-central-1.compute.internal
104
10:48:04
SC_K8S_IMAGE_ID:
105
10:48:04
SC_K8S_KYVERNO_PATCHES: |
106
10:48:04
107
10:48:04
cpu (r/l): 2/4
108
10:48:04
memory (r/l): 4000000000/17179869184
109
10:48:04
110
10:48:04
Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-host=ip-10-0-36-48.eu-central-1.compute.internal&var-namespace=gitlab-runner&var-pod=runner-wrxjpbsjx-project-621-concurrent-0-k5l2mt38&var-resolution=15&from=1778237284000&to=now
111
10:48:04
Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-node=ip-10-0-36-48.eu-central-1.compute.internal&var-resolution=15s&from=1778237284000&to=now
112
10:48:04
Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group|=|gitlab-runner&var-filters=source|=|k8s-ci.aws.scandit.io&var-filters=namespace|=|gitlab-runner&var-filters=CI_PROJECT_ID|=|621&var-filters=CI_PIPELINE_ID|=|1585539&var-filters=CI_JOB_ID|=|54677891&sortOrder=Ascending&from=1778237284000&to=now
113
10:48:04
date: invalid date '-7 days'
114
10:48:04
date: invalid date '+7 days'
115
10:48:04
Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=~&job_name=build-sc-git-utilities-image&project=internal/gitlab-templates
116
10:48:04
117
10:48:04
Setting up credentials for Gitlab Python registries
118
10:48:04
$ echo $DOCKER_CONFIG_JSON > /kaniko/.docker/config.json
119
10:48:04
$ mv /root/.netrc /kaniko/.netrc
120
10:48:04
section_start:1778237284:section_script_step_2[hide_duration=true,collapsed=true]
$ function copy_files() {
121
10:48:04
local src="$1"
122
10:48:04
local trg="$2"
123
10:48:04
for f in $src; do
124
10:48:04
t="$trg/`dirname $f`"
125
10:48:04
mkdir -p $t || true
126
10:48:04
echo "Copy $f"
127
10:48:04
cp -pr $f $trg/$f
128
10:48:04
done
129
10:48:04
}
130
10:48:04
function recursive_hash() {
131
10:48:04
local dir="$1"
132
10:48:04
find "$dir" -exec stat -c '%F|%a|%u:%g|%n' {} + -type f -exec sha256sum {} + | sort | sha256sum | cut -d ' ' -f1
133
10:48:04
}
134
10:48:04
function remote_docker_digest() {
135
10:48:04
local images="$1"
136
10:48:04
echo $images | xargs -n 1 crane digest
137
10:48:04
}
138
10:48:04
function remote_image_exists() {
139
10:48:04
local image="$1"
140
10:48:04
crane manifest $image > /dev/null 2>&1
141
10:48:04
}
142
10:48:04
function remote_images_are_identical() {
143
10:48:04
local imageA="$1"
144
10:48:04
local imageB="$2"
145
10:48:04
if [[ $(remote_docker_digest "$imageA") == $(remote_docker_digest "$imageB") ]]; then
146
10:48:04
return 0
147
10:48:04
else
148
10:48:04
return 1
149
10:48:04
fi
150
10:48:04
}
151
10:48:04
function copy_image() {
152
10:48:04
local image="$1"
153
10:48:04
local remotes="$2"
154
10:48:04
local backup_ext="$3"
155
10:48:04
echo "$image"
156
10:48:04
local source_digest=$(remote_docker_digest $image)
157
10:48:04
local target_digest
158
10:48:04
for registry in $remotes; do
159
10:48:04
if target_digest=$(remote_docker_digest $registry); then
160
10:48:04
if [ "$target_digest" != "$source_digest" ]; then
161
10:48:04
echo "image outdated, overwriting with newest version"
162
10:48:04
crane copy $image $registry
163
10:48:04
crane copy $image ${registry}${backup_ext}
164
10:48:04
fi
165
10:48:04
else
166
10:48:04
echo "image does not exist, writing newest version"
167
10:48:04
crane copy $image $registry
168
10:48:04
crane copy $image ${registry}${backup_ext}
169
10:48:04
fi
170
10:48:04
done
171
10:48:04
}
172
10:48:04
section_end:1778237284:section_script_step_2
173
10:48:04
section_start:1778237284:section_script_step_3[hide_duration=true,collapsed=true]
$ if [ "$CONTAINER_SUBDIR" != "" ]; then
174
10:48:04
echo "Entering subpath $CONTAINER_SUBDIR"
175
10:48:04
cd $CONTAINER_SUBDIR
176
10:48:04
fi
177
10:48:04
section_end:1778237284:section_script_step_3
178
10:48:04
$ copy_files "$CONTAINER_IMPLICIT_REQUIREMENTS $CONTAINER_REQUIREMENTS" "$CONTAINER_CONTEXT_PATH"
179
10:48:04
Copy Dockerfile.sc-git-utilities
180
10:48:04
$ echo "$CONTAINER_BUILD_ENVIRONMENT" > $CONTAINER_CONTEXT_PATH/.docker-build-env
181
10:48:04
$ docker_checksum=$(recursive_hash $CONTAINER_CONTEXT_PATH)
182
10:48:04
section_start:1778237284:section_script_step_7[hide_duration=true,collapsed=true]
$ if [ "$CONTAINER_IMAGE_NAME" == "" ]; then
183
10:48:04
final_image_name=${CONTAINER_IMAGE_URL}
184
10:48:04
else
185
10:48:04
final_image_name=${CONTAINER_IMAGE_URL}/${CONTAINER_IMAGE_NAME}
186
10:48:04
fi
187
10:48:04
section_end:1778237284:section_script_step_7
188
10:48:04
$ final_image_url=${final_image_name}:${docker_checksum}
189
10:48:04
section_start:1778237284:section_script_step_9[hide_duration=true,collapsed=true]
$ if [ "${PIPELINE_IMAGE_REFS}" == "1" ]; then
190
10:48:04
echo $CONTAINER_IMAGE_VARIABLE=${final_image_url}-P${CI_PROJECT_ID}-${CI_PIPELINE_ID} > $CI_PROJECT_DIR/docker_image_build.env
191
10:48:04
else
192
10:48:04
echo $CONTAINER_IMAGE_VARIABLE=$final_image_url > $CI_PROJECT_DIR/docker_image_build.env
193
10:48:04
fi
194
10:48:04
section_end:1778237284:section_script_step_9
195
10:48:04
$ echo ${CONTAINER_IMAGE_VARIABLE}_HASH=$docker_checksum >> $CI_PROJECT_DIR/docker_image_build.env
196
10:48:04
section_start:1778237284:section_script_step_11[hide_duration=true,collapsed=true]
$ if [ "${FORCE_BUILD}" != "true" ] || command -v crane &> /dev/null; then
197
10:48:04
echo $REGISTRY_PASSWORD | crane auth login $REGISTRY -u $REGISTRY_USER --password-stdin
198
10:48:04
fi
199
10:48:04
section_end:1778237284:section_script_step_11
200
10:48:04
201
10:48:04
WARNING! Your credentials are stored unencrypted in '/kaniko/.docker/config.json'.
202
10:48:04
Configure a credential helper to remove this warning. See
203
10:48:04
https://docs.docker.com/go/credential-store/
204
10:48:04
205
10:48:04
2026/05/08 10:48:04 logged in via /kaniko/.docker/config.json
206
10:48:04
section_start:1778237284:section_script_step_12[hide_duration=true,collapsed=true]
$ if [ "${FORCE_BUILD}" != "true" ] && remote_image_exists "$final_image_url"; then
207
10:48:04
echo "Image already exists, skip the build."
208
10:48:04
echo "$final_image_url"
209
10:48:04
if [[ "$CI_COMMIT_BRANCH" == "$CI_DEFAULT_BRANCH" ]]; then
210
10:48:04
_EXT=""
211
10:48:04
_BACKUP_EXT="-CI${CI_JOB_ID}-$(date '+%Y%m%d')"
212
10:48:04
elif [[ -n "$CI_MERGE_REQUEST_ID" ]]; then
213
10:48:04
_EXT="-MR${CI_MERGE_REQUEST_IID}"
214
10:48:04
_BACKUP_EXT=""
215
10:48:04
elif [[ "$CI_COMMIT_REF_PROTECTED" == "true" ]]; then
216
10:48:04
_EXT="-${CI_COMMIT_REF_SLUG}"
217
10:48:04
_BACKUP_EXT="-CI${CI_JOB_ID}-$(date '+%Y%m%d')"
218
10:48:04
fi
219
10:48:04
for _TAG in $CONTAINER_IMAGE_TAG; do
220
10:48:04
echo "Copying ${final_image_url} to ${final_image_name}:${_TAG}${_EXT}"
221
10:48:04
copy_image "${final_image_url}" "${final_image_name}:${_TAG}${_EXT}" "${_BACKUP_EXT}"
222
10:48:04
done
223
10:48:04
if [ "${PIPELINE_IMAGE_REFS}" == "1" ]; then
224
10:48:04
_EXT="-P${CI_PROJECT_ID}-${CI_PIPELINE_ID}"
225
10:48:04
echo "Copying ${final_image_url} to ${final_image_url}${_EXT}"
226
10:48:04
copy_image "${final_image_url}" "${final_image_url}${_EXT}"
227
10:48:04
for _TAG in $CONTAINER_IMAGE_TAG; do
228
10:48:04
echo "Copying ${final_image_url} to ${final_image_name}:${_TAG}${_EXT}"
229
10:48:04
copy_image "${final_image_url}" "${final_image_name}:${_TAG}${_EXT}"
230
10:48:04
done
231
10:48:04
fi
232
10:48:04
exit 0
233
10:48:04
fi
234
10:48:04
section_end:1778237284:section_script_step_12
235
10:48:05
Image already exists, skip the build.
236
10:48:05
registry.scandit.com/internal/gitlab-templates/sc-git-utilities:baa4b9d66f12d6a5ebcc30c346703c4708cd59c189797a52ee2e47201c344985
237
10:48:05
Copying registry.scandit.com/internal/gitlab-templates/sc-git-utilities:baa4b9d66f12d6a5ebcc30c346703c4708cd59c189797a52ee2e47201c344985 to registry.scandit.com/internal/gitlab-templates/sc-git-utilities:3.12-0.0.7-MR641
238
10:48:05
registry.scandit.com/internal/gitlab-templates/sc-git-utilities:baa4b9d66f12d6a5ebcc30c346703c4708cd59c189797a52ee2e47201c344985
239
10:48:05
2026/05/08 10:48:05 HEAD request failed, falling back on GET: HEAD https://registry.scandit.com/v2/internal/gitlab-templates/sc-git-utilities/manifests/3.12-0.0.7-MR641: unexpected status code 404 Not Found (HEAD responses have no body, use GET for details)
240
10:48:06
Error: GET https://registry.scandit.com/v2/internal/gitlab-templates/sc-git-utilities/manifests/3.12-0.0.7-MR641: MANIFEST_UNKNOWN: manifest unknown; map[Tag:3.12-0.0.7-MR641]
241
10:48:06
image does not exist, writing newest version
242
10:48:06
2026/05/08 10:48:06 Copying from registry.scandit.com/internal/gitlab-templates/sc-git-utilities:baa4b9d66f12d6a5ebcc30c346703c4708cd59c189797a52ee2e47201c344985 to registry.scandit.com/internal/gitlab-templates/sc-git-utilities:3.12-0.0.7-MR641
243
10:48:06
2026/05/08 10:48:06 existing blob: sha256:89732bc7504122601f40269fc9ddfb70982e633ea9caf641ae45736f2846b004
244
10:48:06
2026/05/08 10:48:06 existing blob: sha256:589002ba0eaed121a1dbf42f6648f29e5be55d5c8a6ee0f8eaa0285cc21ac153
245
10:48:06
2026/05/08 10:48:06 existing blob: sha256:25f52706dddd459c4ec225fc3783af3011979ed8992f5b188b4dc1055d8f691f
246
10:48:06
2026/05/08 10:48:06 existing blob: sha256:23944bd889fc9f889509c8df620754c5aa0fd06a6df4c0f9c0452d8482789de0
247
10:48:06
2026/05/08 10:48:06 existing blob: sha256:cfeaf45843df8c04edf50d8cc35e028b432d02dbb575593ce171d4f6985b41d2
248
10:48:06
2026/05/08 10:48:06 existing blob: sha256:e7476e4ecde1416957960abb98d761bef694153785b006a93b39c50434071103
249
10:48:06
2026/05/08 10:48:06 existing blob: sha256:3b63668625e48fc58f80e042a2dd4b7c0e8a4bc8cacb862a52007aff4d752ca0
250
10:48:07
2026/05/08 10:48:06 existing blob: sha256:b7a16e6fe0f1913a251a858462abe82e01446bf817931819c8dfb048563df573
251
10:48:07
2026/05/08 10:48:06 existing blob: sha256:75d5ae32dd1d4a592e2d0faa9ec41e6c93bfabd1427aaa937352d5c8347047fb
252
10:48:07
2026/05/08 10:48:06 existing blob: sha256:445a47880624564b25497295298b7b8f622a2a10ce6710a337121e28feb36993
253
10:48:07
2026/05/08 10:48:06 existing blob: sha256:c47de55b7c1baeb917c8ec59a81da6abc636882059146ee9372d8a148a0ed3ab
254
10:48:07
2026/05/08 10:48:06 existing blob: sha256:4ddcc878fadc66d37e54727c991e0467a4cb7e613f206d085fc31b2b5bf34f20
255
10:48:07
2026/05/08 10:48:06 existing blob: sha256:d2db8cb7be454d9646fd534bf03fdc0ccb6a29ec8ee64393c55bc217c400467a
256
10:48:07
2026/05/08 10:48:06 existing blob: sha256:b945f8e67ab65960c9cc1ed59cee0d89e3ba9e90c68490446f14e7e935874f9a
257
10:48:07
2026/05/08 10:48:07 registry.scandit.com/internal/gitlab-templates/sc-git-utilities:3.12-0.0.7-MR641: digest: sha256:c8dfd6fc32a29ee50afce33eaea91e2c461c6311f0752d1227e842d7943125ca size: 5501
258
10:48:07
2026/05/08 10:48:07 Copying from registry.scandit.com/internal/gitlab-templates/sc-git-utilities:baa4b9d66f12d6a5ebcc30c346703c4708cd59c189797a52ee2e47201c344985 to registry.scandit.com/internal/gitlab-templates/sc-git-utilities:3.12-0.0.7-MR641
259
10:48:08
2026/05/08 10:48:07 existing manifest: 3.12-0.0.7-MR641@sha256:c8dfd6fc32a29ee50afce33eaea91e2c461c6311f0752d1227e842d7943125ca
260
10:48:08
261
10:48:08
Scout Analysis: https://scout.scandit.io/analysis/projects/621/jobs/54677891
262
10:48:08
263
10:48:08
264
10:48:08
Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-host=ip-10-0-36-48.eu-central-1.compute.internal&var-namespace=gitlab-runner&var-pod=runner-wrxjpbsjx-project-621-concurrent-0-k5l2mt38&var-resolution=15&from=1778237284000&to=1778237287000
265
10:48:08
Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-node=ip-10-0-36-48.eu-central-1.compute.internal&var-resolution=15s&from=1778237284000&to=1778237287000
266
10:48:08
Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group|=|gitlab-runner&var-filters=source|=|k8s-ci.aws.scandit.io&var-filters=namespace|=|gitlab-runner&var-filters=CI_PROJECT_ID|=|621&var-filters=CI_PIPELINE_ID|=|1585539&var-filters=CI_JOB_ID|=|54677891&sortOrder=Ascending&from=1778237284000&to=1778237287000
267
10:48:08
date: invalid date '-7 days'
268
10:48:08
date: invalid date '+7 days'
269
10:48:08
Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=~&job_name=build-sc-git-utilities-image&project=internal/gitlab-templates
270
10:48:08
271
10:48:08
272
10:48:08
section_end:1778237288:step_script
273
10:48:08
+section_start:1778237288:upload_artifacts_on_success
274
10:48:08
+Uploading artifacts for successful job
275
10:48:08
Uploading artifacts...
276
10:48:08
docker_image_build.env: found 1 matching artifact files and directories
277
10:48:09
Uploading artifacts as "dotenv" to coordinator... 201 Created correlation_id=01KR3K7CD5W2V66ZTW3F82GHDA id=54677891 responseStatus=201 Created token=64_7BKgxf
278
10:48:09
279
10:48:09
section_end:1778237289:upload_artifacts_on_success
280
10:48:09
+section_start:1778237289:cleanup_file_variables
281
10:48:09
+Cleaning up project directory and file based variables
282
10:48:10
283
10:48:10
section_end:1778237290:cleanup_file_variables
284
10:48:10
+
285
10:48:10
Job succeeded
286