build-sc-git-utilities-image ○ success

Duration: 15s
Queued: 1s
📁 Stage: docker-image
🖥 Runner: linux-aws-1
Average Duration
30s
This job: 15s
Failure Rate
11.8%
last 30 days

Job Execution Phases

💡 Tip: Click on any phase bar to jump to that section in the log below

Job Analysis

Job Status: Passed

Status: Job passed successfully

Full Job Log

286 lines
Match - of 0
1 10:47:56 Running with gitlab-runner 18.9.0 (07e534ba)
2 10:47:56 on gitlab-runner-linux-1-746bdd58fd-tnh7j wRxjPbsJX, system ID: r_u8Qk6qrlK3xa
3 10:47:56 feature flags: FF_USE_FASTZIP:true, FF_USE_NEW_BASH_EVAL_STRATEGY:true, FF_USE_DYNAMIC_TRACE_FORCE_SEND_INTERVAL:true, FF_SCRIPT_SECTIONS:true, FF_USE_ADVANCED_POD_SPEC_CONFIGURATION:true, FF_PRINT_POD_EVENTS:true, FF_USE_DUMB_INIT_WITH_KUBERNETES_EXECUTOR:true, FF_LOG_IMAGES_CONFIGURED_FOR_JOB:true, FF_CLEAN_UP_FAILED_CACHE_EXTRACT:true, FF_GIT_URLS_WITHOUT_TOKENS:true, FF_WAIT_FOR_POD_TO_BE_REACHABLE:true, FF_USE_FLEETING_ACQUIRE_HEARTBEATS:true, FF_USE_JOB_ROUTER:true
4 10:47:56 Resolving secrets
5 10:47:56 section_start:1778237276:prepare_executor
6 10:47:56 +Preparing the "kubernetes" executor
7 10:47:56 "CPURequest" overwritten with "2"
8 10:47:56 "MemoryRequest" overwritten with "4G"
9 10:47:56 Using Kubernetes namespace: gitlab-runner
10 10:47:56 Using Kubernetes executor with image registry.scandit.com/dockerfiles/kaniko:v1.27.3-crane@sha256:72bdc063db14f38a45910d33ccf066ecb088d4833fb2437fef336e49b81fd4ac ...
11 10:47:56 Using attach strategy to execute scripts...
12 10:47:56 Using effective pull policy of [Always] for container helper
13 10:47:56 Using effective pull policy of [Always] for container init-permissions
14 10:47:56 Using effective pull policy of [Always] for container build
15 10:47:57 section_end:1778237277:prepare_executor
16 10:47:57 +section_start:1778237277:prepare_script
17 10:47:57 +Preparing environment
18 10:47:57 Using FF_USE_POD_ACTIVE_DEADLINE_SECONDS, the Pod activeDeadlineSeconds will be set to the job timeout: 1h0m0s...
19 10:47:57 WARNING: Advanced Pod Spec configuration enabled, merging the provided PodSpec to the generated one. This is a beta feature and is subject to change. Feedback is collected in this issue: https://gitlab.com/gitlab-org/gitlab-runner/-/issues/29659 ...
20 10:47:57 Subscribing to Kubernetes Pod events...
21 10:47:59 Type Reason Message
22 10:47:59 Normal Scheduled Successfully assigned gitlab-runner/runner-wrxjpbsjx-project-621-concurrent-0-k5l2mt38 to ip-10-0-36-48.eu-central-1.compute.internal
23 10:47:59 Normal Pulled Container image "gitlab/gitlab-runner-helper:x86_64-v18.8.0" already present on machine
24 10:47:59 Normal Created Created container: init-permissions
25 10:47:59 Normal Started Started container init-permissions
26 10:47:59 Normal Pulled Container image "498954711405.dkr.ecr.eu-central-1.amazonaws.com/dockerfiles/kaniko@sha256:72bdc063db14f38a45910d33ccf066ecb088d4833fb2437fef336e49b81fd4ac" already present on machine
27 10:47:59 Normal Created Created container: build
28 10:47:59 Normal Started Started container build
29 10:47:59 Normal Pulled Container image "gitlab/gitlab-runner-helper:x86_64-v18.8.0" already present on machine
30 10:47:59 Normal Created Created container: helper
31 10:47:59 Normal Started Started container helper
32 10:48:02 Running on runner-wrxjpbsjx-project-621-concurrent-0-k5l2mt38 via gitlab-runner-linux-1-746bdd58fd-tnh7j...
33 10:48:02
34 10:48:02 section_end:1778237282:prepare_script
35 10:48:02 +section_start:1778237282:get_sources
36 10:48:02 +Getting source from Git repository
37 10:48:03 Gitaly correlation ID: 01KR3K6ZDVCCMJM0A6CK8JG8PC
38 10:48:03 Fetching changes with git depth set to 1...
39 10:48:03 Initialized empty Git repository in /build/internal/gitlab-templates/.git/
40 10:48:03 Created fresh repository.
41 10:48:04 Checking out 6e76a6a0 as detached HEAD (ref is refs/merge-requests/641/merge)...
42 10:48:04
43 10:48:04 Skipping Git submodules setup
44 10:48:04
45 10:48:04 section_end:1778237284:get_sources
46 10:48:04 +section_start:1778237284:step_script
47 10:48:04 +Executing "step_script" stage of the job script
48 10:48:04 section_start:1778237284:section_pre_build_script_0[hide_duration=true,collapsed=true] $ function cleanup {
49 10:48:04 rv=$?
50 10:48:04 if [ $rv -ne 0 ]; then
51 10:48:04 echo ""
52 10:48:04 echo " Failure Cause Analysis might help, please open this link:"
53 10:48:04 echo " https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
54 10:48:04 echo ""
55 10:48:04 fi
56 10:48:04 echo ""
57 10:48:04 echo "Scout Analysis: https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
58 10:48:04 echo ""
59 10:48:04 echo ""
60 10:48:04 echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=${EPOCHSECONDS}000"
61 10:48:04 echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=${EPOCHSECONDS}000"
62 10:48:04 echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group|=|gitlab-runner&var-filters=source|=|${LOKI_LOGSOURCE}&var-filters=namespace|=|${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID|=|${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID|=|${CI_PIPELINE_ID}&var-filters=CI_JOB_ID|=|${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=${EPOCHSECONDS}000"
63 10:48:04 echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=$(date -d '-7 days' +%Y-%m-%d)~$(date -d '+7 days' +%Y-%m-%d)&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
64 10:48:04 echo ""
65 10:48:04 exit $rv
66 10:48:04 }
67 10:48:04 trap cleanup EXIT
68 10:48:04 echo "INFO: This is the CI job pre_build_script"
69 10:48:04 echo "INFO: It's defined in the backend/infra/aws repo."
70 10:48:04 echo "INFO: These additional Scandit variables are available to you:"
71 10:48:04 echo " SC_K8S_NODE_NAME: $SC_K8S_NODE_NAME"
72 10:48:04 echo " SC_K8S_IMAGE_ID: $SC_K8S_IMAGE_ID"
73 10:48:04 echo " SC_K8S_KYVERNO_PATCHES: |"
74 10:48:04 echo "$SC_K8S_KYVERNO_PATCHES" | sed 's/^/ /'
75 10:48:04 echo "cpu (r/l): ${SC_K8S_REQUESTS_CPU}/${SC_K8S_LIMITS_CPU}"
76 10:48:04 if command -v numfmt >/dev/null 2>&1; then
77 10:48:04 echo "memory (r/l): $(numfmt --to=iec --suffix=B $SC_K8S_REQUESTS_MEMORY)/$(numfmt --to=iec --suffix=B $SC_K8S_LIMITS_MEMORY)"
78 10:48:04 else
79 10:48:04 echo "memory (r/l): ${SC_K8S_REQUESTS_MEMORY}/${SC_K8S_LIMITS_MEMORY}"
80 10:48:04 fi
81 10:48:04 __start_time=${EPOCHSECONDS}
82 10:48:04 echo ""
83 10:48:04 echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=now"
84 10:48:04 echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=now"
85 10:48:04 echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group|=|gitlab-runner&var-filters=source|=|${LOKI_LOGSOURCE}&var-filters=namespace|=|${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID|=|${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID|=|${CI_PIPELINE_ID}&var-filters=CI_JOB_ID|=|${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=now"
86 10:48:04 echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=$(date -d '-7 days' +%Y-%m-%d)~$(date -d '+7 days' +%Y-%m-%d)&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
87 10:48:04 echo ""
88 10:48:04 echo "Setting up credentials for Gitlab Python registries"
89 10:48:04 mkdir -p ~
90 10:48:04 echo "machine gitlab.scandit.com" > ~/.netrc
91 10:48:04 echo "login gitlab-ci-token" >> ~/.netrc
92 10:48:04 echo "password ${CI_JOB_TOKEN}" >> ~/.netrc
93 10:48:04 chmod 600 ~/.netrc
94 10:48:04 if command -v git &> /dev/null && [ "$(id -u)" -ne 0 ]; then
95 10:48:04 git config --global --add safe.directory $CI_PROJECT_DIR
96 10:48:04 fi
97 10:48:04 # Sonarqube server is running on the same cluster. Use internal address
98 10:48:04 export SONAR_HOST_URL="http://sonarqube.sonarqube.svc.cluster.local:9000"
99 10:48:04 section_end:1778237284:section_pre_build_script_0
100 10:48:04 INFO: This is the CI job pre_build_script
101 10:48:04 INFO: It's defined in the backend/infra/aws repo.
102 10:48:04 INFO: These additional Scandit variables are available to you:
103 10:48:04 SC_K8S_NODE_NAME: ip-10-0-36-48.eu-central-1.compute.internal
104 10:48:04 SC_K8S_IMAGE_ID:
105 10:48:04 SC_K8S_KYVERNO_PATCHES: |
106 10:48:04
107 10:48:04 cpu (r/l): 2/4
108 10:48:04 memory (r/l): 4000000000/17179869184
109 10:48:04
110 10:48:04 Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-host=ip-10-0-36-48.eu-central-1.compute.internal&var-namespace=gitlab-runner&var-pod=runner-wrxjpbsjx-project-621-concurrent-0-k5l2mt38&var-resolution=15&from=1778237284000&to=now
111 10:48:04 Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-node=ip-10-0-36-48.eu-central-1.compute.internal&var-resolution=15s&from=1778237284000&to=now
112 10:48:04 Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group|=|gitlab-runner&var-filters=source|=|k8s-ci.aws.scandit.io&var-filters=namespace|=|gitlab-runner&var-filters=CI_PROJECT_ID|=|621&var-filters=CI_PIPELINE_ID|=|1585539&var-filters=CI_JOB_ID|=|54677891&sortOrder=Ascending&from=1778237284000&to=now
113 10:48:04 date: invalid date '-7 days'
114 10:48:04 date: invalid date '+7 days'
115 10:48:04 Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=~&job_name=build-sc-git-utilities-image&project=internal/gitlab-templates
116 10:48:04
117 10:48:04 Setting up credentials for Gitlab Python registries
118 10:48:04 $ echo $DOCKER_CONFIG_JSON > /kaniko/.docker/config.json
119 10:48:04 $ mv /root/.netrc /kaniko/.netrc
120 10:48:04 section_start:1778237284:section_script_step_2[hide_duration=true,collapsed=true] $ function copy_files() {
121 10:48:04 local src="$1"
122 10:48:04 local trg="$2"
123 10:48:04 for f in $src; do
124 10:48:04 t="$trg/`dirname $f`"
125 10:48:04 mkdir -p $t || true
126 10:48:04 echo "Copy $f"
127 10:48:04 cp -pr $f $trg/$f
128 10:48:04 done
129 10:48:04 }
130 10:48:04 function recursive_hash() {
131 10:48:04 local dir="$1"
132 10:48:04 find "$dir" -exec stat -c '%F|%a|%u:%g|%n' {} + -type f -exec sha256sum {} + | sort | sha256sum | cut -d ' ' -f1
133 10:48:04 }
134 10:48:04 function remote_docker_digest() {
135 10:48:04 local images="$1"
136 10:48:04 echo $images | xargs -n 1 crane digest
137 10:48:04 }
138 10:48:04 function remote_image_exists() {
139 10:48:04 local image="$1"
140 10:48:04 crane manifest $image > /dev/null 2>&1
141 10:48:04 }
142 10:48:04 function remote_images_are_identical() {
143 10:48:04 local imageA="$1"
144 10:48:04 local imageB="$2"
145 10:48:04 if [[ $(remote_docker_digest "$imageA") == $(remote_docker_digest "$imageB") ]]; then
146 10:48:04 return 0
147 10:48:04 else
148 10:48:04 return 1
149 10:48:04 fi
150 10:48:04 }
151 10:48:04 function copy_image() {
152 10:48:04 local image="$1"
153 10:48:04 local remotes="$2"
154 10:48:04 local backup_ext="$3"
155 10:48:04 echo "$image"
156 10:48:04 local source_digest=$(remote_docker_digest $image)
157 10:48:04 local target_digest
158 10:48:04 for registry in $remotes; do
159 10:48:04 if target_digest=$(remote_docker_digest $registry); then
160 10:48:04 if [ "$target_digest" != "$source_digest" ]; then
161 10:48:04 echo "image outdated, overwriting with newest version"
162 10:48:04 crane copy $image $registry
163 10:48:04 crane copy $image ${registry}${backup_ext}
164 10:48:04 fi
165 10:48:04 else
166 10:48:04 echo "image does not exist, writing newest version"
167 10:48:04 crane copy $image $registry
168 10:48:04 crane copy $image ${registry}${backup_ext}
169 10:48:04 fi
170 10:48:04 done
171 10:48:04 }
172 10:48:04 section_end:1778237284:section_script_step_2
173 10:48:04 section_start:1778237284:section_script_step_3[hide_duration=true,collapsed=true] $ if [ "$CONTAINER_SUBDIR" != "" ]; then
174 10:48:04 echo "Entering subpath $CONTAINER_SUBDIR"
175 10:48:04 cd $CONTAINER_SUBDIR
176 10:48:04 fi
177 10:48:04 section_end:1778237284:section_script_step_3
178 10:48:04 $ copy_files "$CONTAINER_IMPLICIT_REQUIREMENTS $CONTAINER_REQUIREMENTS" "$CONTAINER_CONTEXT_PATH"
179 10:48:04 Copy Dockerfile.sc-git-utilities
180 10:48:04 $ echo "$CONTAINER_BUILD_ENVIRONMENT" > $CONTAINER_CONTEXT_PATH/.docker-build-env
181 10:48:04 $ docker_checksum=$(recursive_hash $CONTAINER_CONTEXT_PATH)
182 10:48:04 section_start:1778237284:section_script_step_7[hide_duration=true,collapsed=true] $ if [ "$CONTAINER_IMAGE_NAME" == "" ]; then
183 10:48:04 final_image_name=${CONTAINER_IMAGE_URL}
184 10:48:04 else
185 10:48:04 final_image_name=${CONTAINER_IMAGE_URL}/${CONTAINER_IMAGE_NAME}
186 10:48:04 fi
187 10:48:04 section_end:1778237284:section_script_step_7
188 10:48:04 $ final_image_url=${final_image_name}:${docker_checksum}
189 10:48:04 section_start:1778237284:section_script_step_9[hide_duration=true,collapsed=true] $ if [ "${PIPELINE_IMAGE_REFS}" == "1" ]; then
190 10:48:04 echo $CONTAINER_IMAGE_VARIABLE=${final_image_url}-P${CI_PROJECT_ID}-${CI_PIPELINE_ID} > $CI_PROJECT_DIR/docker_image_build.env
191 10:48:04 else
192 10:48:04 echo $CONTAINER_IMAGE_VARIABLE=$final_image_url > $CI_PROJECT_DIR/docker_image_build.env
193 10:48:04 fi
194 10:48:04 section_end:1778237284:section_script_step_9
195 10:48:04 $ echo ${CONTAINER_IMAGE_VARIABLE}_HASH=$docker_checksum >> $CI_PROJECT_DIR/docker_image_build.env
196 10:48:04 section_start:1778237284:section_script_step_11[hide_duration=true,collapsed=true] $ if [ "${FORCE_BUILD}" != "true" ] || command -v crane &> /dev/null; then
197 10:48:04 echo $REGISTRY_PASSWORD | crane auth login $REGISTRY -u $REGISTRY_USER --password-stdin
198 10:48:04 fi
199 10:48:04 section_end:1778237284:section_script_step_11
200 10:48:04
201 10:48:04 WARNING! Your credentials are stored unencrypted in '/kaniko/.docker/config.json'.
202 10:48:04 Configure a credential helper to remove this warning. See
203 10:48:04 https://docs.docker.com/go/credential-store/
204 10:48:04
205 10:48:04 2026/05/08 10:48:04 logged in via /kaniko/.docker/config.json
206 10:48:04 section_start:1778237284:section_script_step_12[hide_duration=true,collapsed=true] $ if [ "${FORCE_BUILD}" != "true" ] && remote_image_exists "$final_image_url"; then
207 10:48:04 echo "Image already exists, skip the build."
208 10:48:04 echo "$final_image_url"
209 10:48:04 if [[ "$CI_COMMIT_BRANCH" == "$CI_DEFAULT_BRANCH" ]]; then
210 10:48:04 _EXT=""
211 10:48:04 _BACKUP_EXT="-CI${CI_JOB_ID}-$(date '+%Y%m%d')"
212 10:48:04 elif [[ -n "$CI_MERGE_REQUEST_ID" ]]; then
213 10:48:04 _EXT="-MR${CI_MERGE_REQUEST_IID}"
214 10:48:04 _BACKUP_EXT=""
215 10:48:04 elif [[ "$CI_COMMIT_REF_PROTECTED" == "true" ]]; then
216 10:48:04 _EXT="-${CI_COMMIT_REF_SLUG}"
217 10:48:04 _BACKUP_EXT="-CI${CI_JOB_ID}-$(date '+%Y%m%d')"
218 10:48:04 fi
219 10:48:04 for _TAG in $CONTAINER_IMAGE_TAG; do
220 10:48:04 echo "Copying ${final_image_url} to ${final_image_name}:${_TAG}${_EXT}"
221 10:48:04 copy_image "${final_image_url}" "${final_image_name}:${_TAG}${_EXT}" "${_BACKUP_EXT}"
222 10:48:04 done
223 10:48:04 if [ "${PIPELINE_IMAGE_REFS}" == "1" ]; then
224 10:48:04 _EXT="-P${CI_PROJECT_ID}-${CI_PIPELINE_ID}"
225 10:48:04 echo "Copying ${final_image_url} to ${final_image_url}${_EXT}"
226 10:48:04 copy_image "${final_image_url}" "${final_image_url}${_EXT}"
227 10:48:04 for _TAG in $CONTAINER_IMAGE_TAG; do
228 10:48:04 echo "Copying ${final_image_url} to ${final_image_name}:${_TAG}${_EXT}"
229 10:48:04 copy_image "${final_image_url}" "${final_image_name}:${_TAG}${_EXT}"
230 10:48:04 done
231 10:48:04 fi
232 10:48:04 exit 0
233 10:48:04 fi
234 10:48:04 section_end:1778237284:section_script_step_12
235 10:48:05 Image already exists, skip the build.
236 10:48:05 registry.scandit.com/internal/gitlab-templates/sc-git-utilities:baa4b9d66f12d6a5ebcc30c346703c4708cd59c189797a52ee2e47201c344985
237 10:48:05 Copying registry.scandit.com/internal/gitlab-templates/sc-git-utilities:baa4b9d66f12d6a5ebcc30c346703c4708cd59c189797a52ee2e47201c344985 to registry.scandit.com/internal/gitlab-templates/sc-git-utilities:3.12-0.0.7-MR641
238 10:48:05 registry.scandit.com/internal/gitlab-templates/sc-git-utilities:baa4b9d66f12d6a5ebcc30c346703c4708cd59c189797a52ee2e47201c344985
239 10:48:05 2026/05/08 10:48:05 HEAD request failed, falling back on GET: HEAD https://registry.scandit.com/v2/internal/gitlab-templates/sc-git-utilities/manifests/3.12-0.0.7-MR641: unexpected status code 404 Not Found (HEAD responses have no body, use GET for details)
240 10:48:06 Error: GET https://registry.scandit.com/v2/internal/gitlab-templates/sc-git-utilities/manifests/3.12-0.0.7-MR641: MANIFEST_UNKNOWN: manifest unknown; map[Tag:3.12-0.0.7-MR641]
241 10:48:06 image does not exist, writing newest version
242 10:48:06 2026/05/08 10:48:06 Copying from registry.scandit.com/internal/gitlab-templates/sc-git-utilities:baa4b9d66f12d6a5ebcc30c346703c4708cd59c189797a52ee2e47201c344985 to registry.scandit.com/internal/gitlab-templates/sc-git-utilities:3.12-0.0.7-MR641
243 10:48:06 2026/05/08 10:48:06 existing blob: sha256:89732bc7504122601f40269fc9ddfb70982e633ea9caf641ae45736f2846b004
244 10:48:06 2026/05/08 10:48:06 existing blob: sha256:589002ba0eaed121a1dbf42f6648f29e5be55d5c8a6ee0f8eaa0285cc21ac153
245 10:48:06 2026/05/08 10:48:06 existing blob: sha256:25f52706dddd459c4ec225fc3783af3011979ed8992f5b188b4dc1055d8f691f
246 10:48:06 2026/05/08 10:48:06 existing blob: sha256:23944bd889fc9f889509c8df620754c5aa0fd06a6df4c0f9c0452d8482789de0
247 10:48:06 2026/05/08 10:48:06 existing blob: sha256:cfeaf45843df8c04edf50d8cc35e028b432d02dbb575593ce171d4f6985b41d2
248 10:48:06 2026/05/08 10:48:06 existing blob: sha256:e7476e4ecde1416957960abb98d761bef694153785b006a93b39c50434071103
249 10:48:06 2026/05/08 10:48:06 existing blob: sha256:3b63668625e48fc58f80e042a2dd4b7c0e8a4bc8cacb862a52007aff4d752ca0
250 10:48:07 2026/05/08 10:48:06 existing blob: sha256:b7a16e6fe0f1913a251a858462abe82e01446bf817931819c8dfb048563df573
251 10:48:07 2026/05/08 10:48:06 existing blob: sha256:75d5ae32dd1d4a592e2d0faa9ec41e6c93bfabd1427aaa937352d5c8347047fb
252 10:48:07 2026/05/08 10:48:06 existing blob: sha256:445a47880624564b25497295298b7b8f622a2a10ce6710a337121e28feb36993
253 10:48:07 2026/05/08 10:48:06 existing blob: sha256:c47de55b7c1baeb917c8ec59a81da6abc636882059146ee9372d8a148a0ed3ab
254 10:48:07 2026/05/08 10:48:06 existing blob: sha256:4ddcc878fadc66d37e54727c991e0467a4cb7e613f206d085fc31b2b5bf34f20
255 10:48:07 2026/05/08 10:48:06 existing blob: sha256:d2db8cb7be454d9646fd534bf03fdc0ccb6a29ec8ee64393c55bc217c400467a
256 10:48:07 2026/05/08 10:48:06 existing blob: sha256:b945f8e67ab65960c9cc1ed59cee0d89e3ba9e90c68490446f14e7e935874f9a
257 10:48:07 2026/05/08 10:48:07 registry.scandit.com/internal/gitlab-templates/sc-git-utilities:3.12-0.0.7-MR641: digest: sha256:c8dfd6fc32a29ee50afce33eaea91e2c461c6311f0752d1227e842d7943125ca size: 5501
258 10:48:07 2026/05/08 10:48:07 Copying from registry.scandit.com/internal/gitlab-templates/sc-git-utilities:baa4b9d66f12d6a5ebcc30c346703c4708cd59c189797a52ee2e47201c344985 to registry.scandit.com/internal/gitlab-templates/sc-git-utilities:3.12-0.0.7-MR641
259 10:48:08 2026/05/08 10:48:07 existing manifest: 3.12-0.0.7-MR641@sha256:c8dfd6fc32a29ee50afce33eaea91e2c461c6311f0752d1227e842d7943125ca
260 10:48:08
261 10:48:08 Scout Analysis: https://scout.scandit.io/analysis/projects/621/jobs/54677891
262 10:48:08
263 10:48:08
264 10:48:08 Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-host=ip-10-0-36-48.eu-central-1.compute.internal&var-namespace=gitlab-runner&var-pod=runner-wrxjpbsjx-project-621-concurrent-0-k5l2mt38&var-resolution=15&from=1778237284000&to=1778237287000
265 10:48:08 Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-node=ip-10-0-36-48.eu-central-1.compute.internal&var-resolution=15s&from=1778237284000&to=1778237287000
266 10:48:08 Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group|=|gitlab-runner&var-filters=source|=|k8s-ci.aws.scandit.io&var-filters=namespace|=|gitlab-runner&var-filters=CI_PROJECT_ID|=|621&var-filters=CI_PIPELINE_ID|=|1585539&var-filters=CI_JOB_ID|=|54677891&sortOrder=Ascending&from=1778237284000&to=1778237287000
267 10:48:08 date: invalid date '-7 days'
268 10:48:08 date: invalid date '+7 days'
269 10:48:08 Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=~&job_name=build-sc-git-utilities-image&project=internal/gitlab-templates
270 10:48:08
271 10:48:08
272 10:48:08 section_end:1778237288:step_script
273 10:48:08 +section_start:1778237288:upload_artifacts_on_success
274 10:48:08 +Uploading artifacts for successful job
275 10:48:08 Uploading artifacts...
276 10:48:08 docker_image_build.env: found 1 matching artifact files and directories
277 10:48:09 Uploading artifacts as "dotenv" to coordinator... 201 Created correlation_id=01KR3K7CD5W2V66ZTW3F82GHDA id=54677891 responseStatus=201 Created token=64_7BKgxf
278 10:48:09
279 10:48:09 section_end:1778237289:upload_artifacts_on_success
280 10:48:09 +section_start:1778237289:cleanup_file_variables
281 10:48:09 +Cleaning up project directory and file based variables
282 10:48:10
283 10:48:10 section_end:1778237290:cleanup_file_variables
284 10:48:10 +
285 10:48:10 Job succeeded
286