build-sc-gitlab-utils-image ○ success

Duration: 14s
Queued: 0s
📁 Stage: docker-image
🖥 Runner: linux-aws-1
Average Duration
32s
This job: 14s
Failure Rate
12.8%
last 30 days

Job Execution Phases

💡 Tip: Click on any phase bar to jump to that section in the log below

Job Analysis

Job Status: Passed

Status: Job passed successfully

Full Job Log

287 lines
Match - of 0
1 10:47:57 Running with gitlab-runner 18.9.0 (07e534ba)
2 10:47:57 on gitlab-runner-linux-1-746bdd58fd-tts8x wRxjPbsJX, system ID: r_m6TL6gRr35Rk
3 10:47:57 feature flags: FF_USE_FASTZIP:true, FF_USE_NEW_BASH_EVAL_STRATEGY:true, FF_USE_DYNAMIC_TRACE_FORCE_SEND_INTERVAL:true, FF_SCRIPT_SECTIONS:true, FF_USE_ADVANCED_POD_SPEC_CONFIGURATION:true, FF_PRINT_POD_EVENTS:true, FF_USE_DUMB_INIT_WITH_KUBERNETES_EXECUTOR:true, FF_LOG_IMAGES_CONFIGURED_FOR_JOB:true, FF_CLEAN_UP_FAILED_CACHE_EXTRACT:true, FF_GIT_URLS_WITHOUT_TOKENS:true, FF_WAIT_FOR_POD_TO_BE_REACHABLE:true, FF_USE_FLEETING_ACQUIRE_HEARTBEATS:true, FF_USE_JOB_ROUTER:true
4 10:47:57 Resolving secrets
5 10:47:57 section_start:1778237277:prepare_executor
6 10:47:57 +Preparing the "kubernetes" executor
7 10:47:57 "CPURequest" overwritten with "2"
8 10:47:57 "MemoryRequest" overwritten with "4G"
9 10:47:57 Using Kubernetes namespace: gitlab-runner
10 10:47:57 Using Kubernetes executor with image registry.scandit.com/dockerfiles/kaniko:v1.27.3-crane@sha256:72bdc063db14f38a45910d33ccf066ecb088d4833fb2437fef336e49b81fd4ac ...
11 10:47:57 Using attach strategy to execute scripts...
12 10:47:57 Using effective pull policy of [Always] for container helper
13 10:47:57 Using effective pull policy of [Always] for container init-permissions
14 10:47:57 Using effective pull policy of [Always] for container build
15 10:47:57 section_end:1778237277:prepare_executor
16 10:47:57 +section_start:1778237277:prepare_script
17 10:47:57 +Preparing environment
18 10:47:57 Using FF_USE_POD_ACTIVE_DEADLINE_SECONDS, the Pod activeDeadlineSeconds will be set to the job timeout: 1h0m0s...
19 10:47:57 WARNING: Advanced Pod Spec configuration enabled, merging the provided PodSpec to the generated one. This is a beta feature and is subject to change. Feedback is collected in this issue: https://gitlab.com/gitlab-org/gitlab-runner/-/issues/29659 ...
20 10:47:58 Subscribing to Kubernetes Pod events...
21 10:47:59 Type Reason Message
22 10:47:59 Normal Scheduled Successfully assigned gitlab-runner/runner-wrxjpbsjx-project-621-concurrent-1-w88jnyqp to ip-10-0-39-5.eu-central-1.compute.internal
23 10:47:59 Normal Pulled Container image "gitlab/gitlab-runner-helper:x86_64-v18.8.0" already present on machine
24 10:47:59 Normal Created Created container: init-permissions
25 10:47:59 Normal Started Started container init-permissions
26 10:48:00 Normal Pulling Pulling image "498954711405.dkr.ecr.eu-central-1.amazonaws.com/dockerfiles/kaniko@sha256:72bdc063db14f38a45910d33ccf066ecb088d4833fb2437fef336e49b81fd4ac"
27 10:48:00 Normal Pulled Successfully pulled image "498954711405.dkr.ecr.eu-central-1.amazonaws.com/dockerfiles/kaniko@sha256:72bdc063db14f38a45910d33ccf066ecb088d4833fb2437fef336e49b81fd4ac" in 518ms (518ms including waiting). Image size: 49989654 bytes.
28 10:48:00 Normal Created Created container: build
29 10:48:00 Normal Started Started container build
30 10:48:00 Normal Pulled Container image "gitlab/gitlab-runner-helper:x86_64-v18.8.0" already present on machine
31 10:48:00 Normal Created Created container: helper
32 10:48:01 Normal Started Started container helper
33 10:48:03 Running on runner-wrxjpbsjx-project-621-concurrent-1-w88jnyqp via gitlab-runner-linux-1-746bdd58fd-tts8x...
34 10:48:03
35 10:48:03 section_end:1778237283:prepare_script
36 10:48:03 +section_start:1778237283:get_sources
37 10:48:03 +Getting source from Git repository
38 10:48:03 Gitaly correlation ID: 01KR3K6ZZXZKEHKBK7NH6WV1EM
39 10:48:03 Fetching changes with git depth set to 1...
40 10:48:03 Initialized empty Git repository in /build/internal/gitlab-templates/.git/
41 10:48:03 Created fresh repository.
42 10:48:04 Checking out 6e76a6a0 as detached HEAD (ref is refs/merge-requests/641/merge)...
43 10:48:04
44 10:48:04 Skipping Git submodules setup
45 10:48:04
46 10:48:04 section_end:1778237284:get_sources
47 10:48:04 +section_start:1778237284:step_script
48 10:48:04 +Executing "step_script" stage of the job script
49 10:48:05 section_start:1778237284:section_pre_build_script_0[hide_duration=true,collapsed=true] $ function cleanup {
50 10:48:05 rv=$?
51 10:48:05 if [ $rv -ne 0 ]; then
52 10:48:05 echo ""
53 10:48:05 echo " Failure Cause Analysis might help, please open this link:"
54 10:48:05 echo " https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
55 10:48:05 echo ""
56 10:48:05 fi
57 10:48:05 echo ""
58 10:48:05 echo "Scout Analysis: https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
59 10:48:05 echo ""
60 10:48:05 echo ""
61 10:48:05 echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=${EPOCHSECONDS}000"
62 10:48:05 echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=${EPOCHSECONDS}000"
63 10:48:05 echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group|=|gitlab-runner&var-filters=source|=|${LOKI_LOGSOURCE}&var-filters=namespace|=|${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID|=|${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID|=|${CI_PIPELINE_ID}&var-filters=CI_JOB_ID|=|${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=${EPOCHSECONDS}000"
64 10:48:05 echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=$(date -d '-7 days' +%Y-%m-%d)~$(date -d '+7 days' +%Y-%m-%d)&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
65 10:48:05 echo ""
66 10:48:05 exit $rv
67 10:48:05 }
68 10:48:05 trap cleanup EXIT
69 10:48:05 echo "INFO: This is the CI job pre_build_script"
70 10:48:05 echo "INFO: It's defined in the backend/infra/aws repo."
71 10:48:05 echo "INFO: These additional Scandit variables are available to you:"
72 10:48:05 echo " SC_K8S_NODE_NAME: $SC_K8S_NODE_NAME"
73 10:48:05 echo " SC_K8S_IMAGE_ID: $SC_K8S_IMAGE_ID"
74 10:48:05 echo " SC_K8S_KYVERNO_PATCHES: |"
75 10:48:05 echo "$SC_K8S_KYVERNO_PATCHES" | sed 's/^/ /'
76 10:48:05 echo "cpu (r/l): ${SC_K8S_REQUESTS_CPU}/${SC_K8S_LIMITS_CPU}"
77 10:48:05 if command -v numfmt >/dev/null 2>&1; then
78 10:48:05 echo "memory (r/l): $(numfmt --to=iec --suffix=B $SC_K8S_REQUESTS_MEMORY)/$(numfmt --to=iec --suffix=B $SC_K8S_LIMITS_MEMORY)"
79 10:48:05 else
80 10:48:05 echo "memory (r/l): ${SC_K8S_REQUESTS_MEMORY}/${SC_K8S_LIMITS_MEMORY}"
81 10:48:05 fi
82 10:48:05 __start_time=${EPOCHSECONDS}
83 10:48:05 echo ""
84 10:48:05 echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=now"
85 10:48:05 echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=now"
86 10:48:05 echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group|=|gitlab-runner&var-filters=source|=|${LOKI_LOGSOURCE}&var-filters=namespace|=|${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID|=|${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID|=|${CI_PIPELINE_ID}&var-filters=CI_JOB_ID|=|${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=now"
87 10:48:05 echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=$(date -d '-7 days' +%Y-%m-%d)~$(date -d '+7 days' +%Y-%m-%d)&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
88 10:48:05 echo ""
89 10:48:05 echo "Setting up credentials for Gitlab Python registries"
90 10:48:05 mkdir -p ~
91 10:48:05 echo "machine gitlab.scandit.com" > ~/.netrc
92 10:48:05 echo "login gitlab-ci-token" >> ~/.netrc
93 10:48:05 echo "password ${CI_JOB_TOKEN}" >> ~/.netrc
94 10:48:05 chmod 600 ~/.netrc
95 10:48:05 if command -v git &> /dev/null && [ "$(id -u)" -ne 0 ]; then
96 10:48:05 git config --global --add safe.directory $CI_PROJECT_DIR
97 10:48:05 fi
98 10:48:05 # Sonarqube server is running on the same cluster. Use internal address
99 10:48:05 export SONAR_HOST_URL="http://sonarqube.sonarqube.svc.cluster.local:9000"
100 10:48:05 section_end:1778237284:section_pre_build_script_0
101 10:48:05 INFO: This is the CI job pre_build_script
102 10:48:05 INFO: It's defined in the backend/infra/aws repo.
103 10:48:05 INFO: These additional Scandit variables are available to you:
104 10:48:05 SC_K8S_NODE_NAME: ip-10-0-39-5.eu-central-1.compute.internal
105 10:48:05 SC_K8S_IMAGE_ID:
106 10:48:05 SC_K8S_KYVERNO_PATCHES: |
107 10:48:05
108 10:48:05 cpu (r/l): 2/4
109 10:48:05 memory (r/l): 4000000000/17179869184
110 10:48:05
111 10:48:05 Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-host=ip-10-0-39-5.eu-central-1.compute.internal&var-namespace=gitlab-runner&var-pod=runner-wrxjpbsjx-project-621-concurrent-1-w88jnyqp&var-resolution=15&from=1778237284000&to=now
112 10:48:05 Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-node=ip-10-0-39-5.eu-central-1.compute.internal&var-resolution=15s&from=1778237284000&to=now
113 10:48:05 Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group|=|gitlab-runner&var-filters=source|=|k8s-ci.aws.scandit.io&var-filters=namespace|=|gitlab-runner&var-filters=CI_PROJECT_ID|=|621&var-filters=CI_PIPELINE_ID|=|1585539&var-filters=CI_JOB_ID|=|54677893&sortOrder=Ascending&from=1778237284000&to=now
114 10:48:05 date: invalid date '-7 days'
115 10:48:05 date: invalid date '+7 days'
116 10:48:05 Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=~&job_name=build-sc-gitlab-utils-image&project=internal/gitlab-templates
117 10:48:05
118 10:48:05 Setting up credentials for Gitlab Python registries
119 10:48:05 $ echo $DOCKER_CONFIG_JSON > /kaniko/.docker/config.json
120 10:48:05 $ mv /root/.netrc /kaniko/.netrc
121 10:48:05 section_start:1778237284:section_script_step_2[hide_duration=true,collapsed=true] $ function copy_files() {
122 10:48:05 local src="$1"
123 10:48:05 local trg="$2"
124 10:48:05 for f in $src; do
125 10:48:05 t="$trg/`dirname $f`"
126 10:48:05 mkdir -p $t || true
127 10:48:05 echo "Copy $f"
128 10:48:05 cp -pr $f $trg/$f
129 10:48:05 done
130 10:48:05 }
131 10:48:05 function recursive_hash() {
132 10:48:05 local dir="$1"
133 10:48:05 find "$dir" -exec stat -c '%F|%a|%u:%g|%n' {} + -type f -exec sha256sum {} + | sort | sha256sum | cut -d ' ' -f1
134 10:48:05 }
135 10:48:05 function remote_docker_digest() {
136 10:48:05 local images="$1"
137 10:48:05 echo $images | xargs -n 1 crane digest
138 10:48:05 }
139 10:48:05 function remote_image_exists() {
140 10:48:05 local image="$1"
141 10:48:05 crane manifest $image > /dev/null 2>&1
142 10:48:05 }
143 10:48:05 function remote_images_are_identical() {
144 10:48:05 local imageA="$1"
145 10:48:05 local imageB="$2"
146 10:48:05 if [[ $(remote_docker_digest "$imageA") == $(remote_docker_digest "$imageB") ]]; then
147 10:48:05 return 0
148 10:48:05 else
149 10:48:05 return 1
150 10:48:05 fi
151 10:48:05 }
152 10:48:05 function copy_image() {
153 10:48:05 local image="$1"
154 10:48:05 local remotes="$2"
155 10:48:05 local backup_ext="$3"
156 10:48:05 echo "$image"
157 10:48:05 local source_digest=$(remote_docker_digest $image)
158 10:48:05 local target_digest
159 10:48:05 for registry in $remotes; do
160 10:48:05 if target_digest=$(remote_docker_digest $registry); then
161 10:48:05 if [ "$target_digest" != "$source_digest" ]; then
162 10:48:05 echo "image outdated, overwriting with newest version"
163 10:48:05 crane copy $image $registry
164 10:48:05 crane copy $image ${registry}${backup_ext}
165 10:48:05 fi
166 10:48:05 else
167 10:48:05 echo "image does not exist, writing newest version"
168 10:48:05 crane copy $image $registry
169 10:48:05 crane copy $image ${registry}${backup_ext}
170 10:48:05 fi
171 10:48:05 done
172 10:48:05 }
173 10:48:05 section_end:1778237284:section_script_step_2
174 10:48:05 section_start:1778237284:section_script_step_3[hide_duration=true,collapsed=true] $ if [ "$CONTAINER_SUBDIR" != "" ]; then
175 10:48:05 echo "Entering subpath $CONTAINER_SUBDIR"
176 10:48:05 cd $CONTAINER_SUBDIR
177 10:48:05 fi
178 10:48:05 section_end:1778237284:section_script_step_3
179 10:48:05 $ copy_files "$CONTAINER_IMPLICIT_REQUIREMENTS $CONTAINER_REQUIREMENTS" "$CONTAINER_CONTEXT_PATH"
180 10:48:05 Copy Dockerfile.sc-gitlab-utils
181 10:48:05 $ echo "$CONTAINER_BUILD_ENVIRONMENT" > $CONTAINER_CONTEXT_PATH/.docker-build-env
182 10:48:05 $ docker_checksum=$(recursive_hash $CONTAINER_CONTEXT_PATH)
183 10:48:05 section_start:1778237284:section_script_step_7[hide_duration=true,collapsed=true] $ if [ "$CONTAINER_IMAGE_NAME" == "" ]; then
184 10:48:05 final_image_name=${CONTAINER_IMAGE_URL}
185 10:48:05 else
186 10:48:05 final_image_name=${CONTAINER_IMAGE_URL}/${CONTAINER_IMAGE_NAME}
187 10:48:05 fi
188 10:48:05 section_end:1778237284:section_script_step_7
189 10:48:05 $ final_image_url=${final_image_name}:${docker_checksum}
190 10:48:05 section_start:1778237284:section_script_step_9[hide_duration=true,collapsed=true] $ if [ "${PIPELINE_IMAGE_REFS}" == "1" ]; then
191 10:48:05 echo $CONTAINER_IMAGE_VARIABLE=${final_image_url}-P${CI_PROJECT_ID}-${CI_PIPELINE_ID} > $CI_PROJECT_DIR/docker_image_build.env
192 10:48:05 else
193 10:48:05 echo $CONTAINER_IMAGE_VARIABLE=$final_image_url > $CI_PROJECT_DIR/docker_image_build.env
194 10:48:05 fi
195 10:48:05 section_end:1778237284:section_script_step_9
196 10:48:05 $ echo ${CONTAINER_IMAGE_VARIABLE}_HASH=$docker_checksum >> $CI_PROJECT_DIR/docker_image_build.env
197 10:48:05 section_start:1778237284:section_script_step_11[hide_duration=true,collapsed=true] $ if [ "${FORCE_BUILD}" != "true" ] || command -v crane &> /dev/null; then
198 10:48:05 echo $REGISTRY_PASSWORD | crane auth login $REGISTRY -u $REGISTRY_USER --password-stdin
199 10:48:05 fi
200 10:48:05 section_end:1778237284:section_script_step_11
201 10:48:05
202 10:48:05 WARNING! Your credentials are stored unencrypted in '/kaniko/.docker/config.json'.
203 10:48:05 Configure a credential helper to remove this warning. See
204 10:48:05 https://docs.docker.com/go/credential-store/
205 10:48:05
206 10:48:05 2026/05/08 10:48:04 logged in via /kaniko/.docker/config.json
207 10:48:05 section_start:1778237284:section_script_step_12[hide_duration=true,collapsed=true] $ if [ "${FORCE_BUILD}" != "true" ] && remote_image_exists "$final_image_url"; then
208 10:48:05 echo "Image already exists, skip the build."
209 10:48:05 echo "$final_image_url"
210 10:48:05 if [[ "$CI_COMMIT_BRANCH" == "$CI_DEFAULT_BRANCH" ]]; then
211 10:48:05 _EXT=""
212 10:48:05 _BACKUP_EXT="-CI${CI_JOB_ID}-$(date '+%Y%m%d')"
213 10:48:05 elif [[ -n "$CI_MERGE_REQUEST_ID" ]]; then
214 10:48:05 _EXT="-MR${CI_MERGE_REQUEST_IID}"
215 10:48:05 _BACKUP_EXT=""
216 10:48:05 elif [[ "$CI_COMMIT_REF_PROTECTED" == "true" ]]; then
217 10:48:05 _EXT="-${CI_COMMIT_REF_SLUG}"
218 10:48:05 _BACKUP_EXT="-CI${CI_JOB_ID}-$(date '+%Y%m%d')"
219 10:48:05 fi
220 10:48:05 for _TAG in $CONTAINER_IMAGE_TAG; do
221 10:48:05 echo "Copying ${final_image_url} to ${final_image_name}:${_TAG}${_EXT}"
222 10:48:05 copy_image "${final_image_url}" "${final_image_name}:${_TAG}${_EXT}" "${_BACKUP_EXT}"
223 10:48:05 done
224 10:48:05 if [ "${PIPELINE_IMAGE_REFS}" == "1" ]; then
225 10:48:05 _EXT="-P${CI_PROJECT_ID}-${CI_PIPELINE_ID}"
226 10:48:05 echo "Copying ${final_image_url} to ${final_image_url}${_EXT}"
227 10:48:05 copy_image "${final_image_url}" "${final_image_url}${_EXT}"
228 10:48:05 for _TAG in $CONTAINER_IMAGE_TAG; do
229 10:48:05 echo "Copying ${final_image_url} to ${final_image_name}:${_TAG}${_EXT}"
230 10:48:05 copy_image "${final_image_url}" "${final_image_name}:${_TAG}${_EXT}"
231 10:48:05 done
232 10:48:05 fi
233 10:48:05 exit 0
234 10:48:05 fi
235 10:48:05 section_end:1778237284:section_script_step_12
236 10:48:05 Image already exists, skip the build.
237 10:48:05 registry.scandit.com/internal/gitlab-templates/sc-gitlab-utils:59003e3462b00087db2b801ece0598b6029d3522b568d83b63e9e719788c699c
238 10:48:05 Copying registry.scandit.com/internal/gitlab-templates/sc-gitlab-utils:59003e3462b00087db2b801ece0598b6029d3522b568d83b63e9e719788c699c to registry.scandit.com/internal/gitlab-templates/sc-gitlab-utils:3.12-0.3.2-MR641
239 10:48:05 registry.scandit.com/internal/gitlab-templates/sc-gitlab-utils:59003e3462b00087db2b801ece0598b6029d3522b568d83b63e9e719788c699c
240 10:48:06 2026/05/08 10:48:06 HEAD request failed, falling back on GET: HEAD https://registry.scandit.com/v2/internal/gitlab-templates/sc-gitlab-utils/manifests/3.12-0.3.2-MR641: unexpected status code 404 Not Found (HEAD responses have no body, use GET for details)
241 10:48:06 Error: GET https://registry.scandit.com/v2/internal/gitlab-templates/sc-gitlab-utils/manifests/3.12-0.3.2-MR641: MANIFEST_UNKNOWN: manifest unknown; map[Tag:3.12-0.3.2-MR641]
242 10:48:06 image does not exist, writing newest version
243 10:48:06 2026/05/08 10:48:06 Copying from registry.scandit.com/internal/gitlab-templates/sc-gitlab-utils:59003e3462b00087db2b801ece0598b6029d3522b568d83b63e9e719788c699c to registry.scandit.com/internal/gitlab-templates/sc-gitlab-utils:3.12-0.3.2-MR641
244 10:48:07 2026/05/08 10:48:06 existing blob: sha256:89732bc7504122601f40269fc9ddfb70982e633ea9caf641ae45736f2846b004
245 10:48:07 2026/05/08 10:48:06 existing blob: sha256:589002ba0eaed121a1dbf42f6648f29e5be55d5c8a6ee0f8eaa0285cc21ac153
246 10:48:07 2026/05/08 10:48:06 existing blob: sha256:25f52706dddd459c4ec225fc3783af3011979ed8992f5b188b4dc1055d8f691f
247 10:48:07 2026/05/08 10:48:07 existing blob: sha256:23944bd889fc9f889509c8df620754c5aa0fd06a6df4c0f9c0452d8482789de0
248 10:48:07 2026/05/08 10:48:07 existing blob: sha256:cfeaf45843df8c04edf50d8cc35e028b432d02dbb575593ce171d4f6985b41d2
249 10:48:07 2026/05/08 10:48:07 existing blob: sha256:e7476e4ecde1416957960abb98d761bef694153785b006a93b39c50434071103
250 10:48:07 2026/05/08 10:48:07 existing blob: sha256:3b63668625e48fc58f80e042a2dd4b7c0e8a4bc8cacb862a52007aff4d752ca0
251 10:48:07 2026/05/08 10:48:07 existing blob: sha256:75d5ae32dd1d4a592e2d0faa9ec41e6c93bfabd1427aaa937352d5c8347047fb
252 10:48:07 2026/05/08 10:48:07 existing blob: sha256:b7a16e6fe0f1913a251a858462abe82e01446bf817931819c8dfb048563df573
253 10:48:07 2026/05/08 10:48:07 existing blob: sha256:445a47880624564b25497295298b7b8f622a2a10ce6710a337121e28feb36993
254 10:48:07 2026/05/08 10:48:07 existing blob: sha256:c47de55b7c1baeb917c8ec59a81da6abc636882059146ee9372d8a148a0ed3ab
255 10:48:07 2026/05/08 10:48:07 existing blob: sha256:4ddcc878fadc66d37e54727c991e0467a4cb7e613f206d085fc31b2b5bf34f20
256 10:48:07 2026/05/08 10:48:07 existing blob: sha256:412f6c30104a5dcaf9e97d47a4db7b977d7619743f27de174c02365aa8206f31
257 10:48:07 2026/05/08 10:48:07 existing blob: sha256:b75c3aeaa9a158ab7b82123f5708d4ffe4cdd088b5863d778c19772df44e61ab
258 10:48:07 2026/05/08 10:48:07 registry.scandit.com/internal/gitlab-templates/sc-gitlab-utils:3.12-0.3.2-MR641: digest: sha256:554348fb710301a6212006ef9a8d45fa5d6602ffe8ed9772bd3a13cc0da54052 size: 5500
259 10:48:07 2026/05/08 10:48:07 Copying from registry.scandit.com/internal/gitlab-templates/sc-gitlab-utils:59003e3462b00087db2b801ece0598b6029d3522b568d83b63e9e719788c699c to registry.scandit.com/internal/gitlab-templates/sc-gitlab-utils:3.12-0.3.2-MR641
260 10:48:08 2026/05/08 10:48:08 existing manifest: 3.12-0.3.2-MR641@sha256:554348fb710301a6212006ef9a8d45fa5d6602ffe8ed9772bd3a13cc0da54052
261 10:48:08
262 10:48:08 Scout Analysis: https://scout.scandit.io/analysis/projects/621/jobs/54677893
263 10:48:08
264 10:48:08
265 10:48:08 Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-host=ip-10-0-39-5.eu-central-1.compute.internal&var-namespace=gitlab-runner&var-pod=runner-wrxjpbsjx-project-621-concurrent-1-w88jnyqp&var-resolution=15&from=1778237284000&to=1778237288000
266 10:48:08 Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-node=ip-10-0-39-5.eu-central-1.compute.internal&var-resolution=15s&from=1778237284000&to=1778237288000
267 10:48:08 Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group|=|gitlab-runner&var-filters=source|=|k8s-ci.aws.scandit.io&var-filters=namespace|=|gitlab-runner&var-filters=CI_PROJECT_ID|=|621&var-filters=CI_PIPELINE_ID|=|1585539&var-filters=CI_JOB_ID|=|54677893&sortOrder=Ascending&from=1778237284000&to=1778237288000
268 10:48:08 date: invalid date '-7 days'
269 10:48:08 date: invalid date '+7 days'
270 10:48:08 Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=~&job_name=build-sc-gitlab-utils-image&project=internal/gitlab-templates
271 10:48:08
272 10:48:08
273 10:48:08 section_end:1778237288:step_script
274 10:48:08 +section_start:1778237288:upload_artifacts_on_success
275 10:48:08 +Uploading artifacts for successful job
276 10:48:09 Uploading artifacts...
277 10:48:09 docker_image_build.env: found 1 matching artifact files and directories
278 10:48:10 Uploading artifacts as "dotenv" to coordinator... 201 Created correlation_id=01KR3K7CKWF70MG98JZARG7EZD id=54677893 responseStatus=201 Created token=64_8VEtsD
279 10:48:10
280 10:48:10 section_end:1778237290:upload_artifacts_on_success
281 10:48:10 +section_start:1778237290:cleanup_file_variables
282 10:48:10 +Cleaning up project directory and file based variables
283 10:48:10
284 10:48:10 section_end:1778237290:cleanup_file_variables
285 10:48:10 +
286 10:48:10 Job succeeded
287