build ○ success
⏱
Duration: 18s
⏳
Queued: 1s
📁
Stage: build
🖥
Runner: linux-aws-1
Average Duration
27s
This job: 18s
Failure Rate
16.8%
last 30 days
External Links
▶
Job Execution Phases
💡 Tip: Click on any phase bar to jump to that section in the log below
▶
Job Analysis
Job Status: Passed
Status: Job passed successfully
▶
Full Job Log
289 lines
Match - of 0
1
22:29:25
Running with gitlab-runner 18.9.0 (07e534ba)
2
22:29:25
on gitlab-runner-linux-1-746bdd58fd-jb69w wRxjPbsJX, system ID: r_1Ff6mPEZuEtQ
3
22:29:25
feature flags: FF_USE_FASTZIP:true, FF_USE_NEW_BASH_EVAL_STRATEGY:true, FF_USE_DYNAMIC_TRACE_FORCE_SEND_INTERVAL:true, FF_SCRIPT_SECTIONS:true, FF_USE_ADVANCED_POD_SPEC_CONFIGURATION:true, FF_PRINT_POD_EVENTS:true, FF_USE_DUMB_INIT_WITH_KUBERNETES_EXECUTOR:true, FF_LOG_IMAGES_CONFIGURED_FOR_JOB:true, FF_CLEAN_UP_FAILED_CACHE_EXTRACT:true, FF_GIT_URLS_WITHOUT_TOKENS:true, FF_WAIT_FOR_POD_TO_BE_REACHABLE:true, FF_USE_FLEETING_ACQUIRE_HEARTBEATS:true, FF_USE_JOB_ROUTER:true
4
22:29:25
Resolving secrets
5
22:29:25
section_start:1778279365:prepare_executor
6
22:29:25
+Preparing the "kubernetes" executor
7
22:29:25
"CPURequest" overwritten with "2"
8
22:29:25
"MemoryRequest" overwritten with "4G"
9
22:29:25
Using Kubernetes namespace: gitlab-runner
10
22:29:25
Using Kubernetes executor with image registry.scandit.com/dockerfiles/kaniko:v1.27.3-crane@sha256:72bdc063db14f38a45910d33ccf066ecb088d4833fb2437fef336e49b81fd4ac ...
11
22:29:25
Using attach strategy to execute scripts...
12
22:29:25
Using effective pull policy of [Always] for container build
13
22:29:25
Using effective pull policy of [Always] for container helper
14
22:29:25
Using effective pull policy of [Always] for container init-permissions
15
22:29:25
section_end:1778279365:prepare_executor
16
22:29:25
+section_start:1778279365:prepare_script
17
22:29:25
+Preparing environment
18
22:29:25
Using FF_USE_POD_ACTIVE_DEADLINE_SECONDS, the Pod activeDeadlineSeconds will be set to the job timeout: 1h0m0s...
19
22:29:25
WARNING: Advanced Pod Spec configuration enabled, merging the provided PodSpec to the generated one. This is a beta feature and is subject to change. Feedback is collected in this issue: https://gitlab.com/gitlab-org/gitlab-runner/-/issues/29659 ...
20
22:29:26
Subscribing to Kubernetes Pod events...
21
22:29:26
Type Reason Message
22
22:29:26
Normal Scheduled Successfully assigned gitlab-runner/runner-wrxjpbsjx-project-621-concurrent-2-7agj5w51 to ip-10-0-46-40.eu-central-1.compute.internal
23
22:29:27
Normal Pulled Container image "gitlab/gitlab-runner-helper:x86_64-v18.8.0" already present on machine
24
22:29:28
Normal Created Created container: init-permissions
25
22:29:28
Normal Started Started container init-permissions
26
22:29:36
Normal Pulling Pulling image "498954711405.dkr.ecr.eu-central-1.amazonaws.com/dockerfiles/kaniko@sha256:72bdc063db14f38a45910d33ccf066ecb088d4833fb2437fef336e49b81fd4ac"
27
22:29:36
Normal Pulled Successfully pulled image "498954711405.dkr.ecr.eu-central-1.amazonaws.com/dockerfiles/kaniko@sha256:72bdc063db14f38a45910d33ccf066ecb088d4833fb2437fef336e49b81fd4ac" in 514ms (514ms including waiting). Image size: 49989654 bytes.
28
22:29:36
Normal Created Created container: build
29
22:29:36
Normal Started Started container build
30
22:29:36
Normal Pulled Container image "gitlab/gitlab-runner-helper:x86_64-v18.8.0" already present on machine
31
22:29:36
Normal Created Created container: helper
32
22:29:37
Normal Started Started container helper
33
22:29:38
Running on runner-wrxjpbsjx-project-621-concurrent-2-7agj5w51 via gitlab-runner-linux-1-746bdd58fd-jb69w...
34
22:29:38
35
22:29:38
section_end:1778279378:prepare_script
36
22:29:38
+section_start:1778279378:get_sources
37
22:29:38
+Getting source from Git repository
38
22:29:39
Gitaly correlation ID: 01KR4VBECXF3M94P1DBRFQ4DDC
39
22:29:39
Fetching changes with git depth set to 1...
40
22:29:39
Initialized empty Git repository in /build/internal/gitlab-templates/.git/
41
22:29:39
Created fresh repository.
42
22:29:39
Checking out d5797a8b as detached HEAD (ref is refs/merge-requests/642/merge)...
43
22:29:39
44
22:29:39
Skipping Git submodules setup
45
22:29:39
46
22:29:39
section_end:1778279379:get_sources
47
22:29:39
+section_start:1778279379:step_script
48
22:29:39
+Executing "step_script" stage of the job script
49
22:29:40
section_start:1778279379:section_pre_build_script_0[hide_duration=true,collapsed=true]
$ function cleanup {
50
22:29:40
rv=$?
51
22:29:40
if [ $rv -ne 0 ]; then
52
22:29:40
echo ""
53
22:29:40
echo " Failure Cause Analysis might help, please open this link:"
54
22:29:40
echo " https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
55
22:29:40
echo ""
56
22:29:40
fi
57
22:29:40
echo ""
58
22:29:40
echo "Scout Analysis: https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
59
22:29:40
echo ""
60
22:29:40
echo ""
61
22:29:40
echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=${EPOCHSECONDS}000"
62
22:29:40
echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=${EPOCHSECONDS}000"
63
22:29:40
echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group|=|gitlab-runner&var-filters=source|=|${LOKI_LOGSOURCE}&var-filters=namespace|=|${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID|=|${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID|=|${CI_PIPELINE_ID}&var-filters=CI_JOB_ID|=|${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=${EPOCHSECONDS}000"
64
22:29:40
echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=$(date -d '-7 days' +%Y-%m-%d)~$(date -d '+7 days' +%Y-%m-%d)&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
65
22:29:40
echo ""
66
22:29:40
exit $rv
67
22:29:40
}
68
22:29:40
trap cleanup EXIT
69
22:29:40
echo "INFO: This is the CI job pre_build_script"
70
22:29:40
echo "INFO: It's defined in the backend/infra/aws repo."
71
22:29:40
echo "INFO: These additional Scandit variables are available to you:"
72
22:29:40
echo " SC_K8S_NODE_NAME: $SC_K8S_NODE_NAME"
73
22:29:40
echo " SC_K8S_IMAGE_ID: $SC_K8S_IMAGE_ID"
74
22:29:40
echo " SC_K8S_KYVERNO_PATCHES: |"
75
22:29:40
echo "$SC_K8S_KYVERNO_PATCHES" | sed 's/^/ /'
76
22:29:40
echo "cpu (r/l): ${SC_K8S_REQUESTS_CPU}/${SC_K8S_LIMITS_CPU}"
77
22:29:40
if command -v numfmt >/dev/null 2>&1; then
78
22:29:40
echo "memory (r/l): $(numfmt --to=iec --suffix=B $SC_K8S_REQUESTS_MEMORY)/$(numfmt --to=iec --suffix=B $SC_K8S_LIMITS_MEMORY)"
79
22:29:40
else
80
22:29:40
echo "memory (r/l): ${SC_K8S_REQUESTS_MEMORY}/${SC_K8S_LIMITS_MEMORY}"
81
22:29:40
fi
82
22:29:40
__start_time=${EPOCHSECONDS}
83
22:29:40
echo ""
84
22:29:40
echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=now"
85
22:29:40
echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=now"
86
22:29:40
echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group|=|gitlab-runner&var-filters=source|=|${LOKI_LOGSOURCE}&var-filters=namespace|=|${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID|=|${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID|=|${CI_PIPELINE_ID}&var-filters=CI_JOB_ID|=|${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=now"
87
22:29:40
echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=$(date -d '-7 days' +%Y-%m-%d)~$(date -d '+7 days' +%Y-%m-%d)&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
88
22:29:40
echo ""
89
22:29:40
echo "Setting up credentials for Gitlab Python registries"
90
22:29:40
mkdir -p ~
91
22:29:40
echo "machine gitlab.scandit.com" > ~/.netrc
92
22:29:40
echo "login gitlab-ci-token" >> ~/.netrc
93
22:29:40
echo "password ${CI_JOB_TOKEN}" >> ~/.netrc
94
22:29:40
chmod 600 ~/.netrc
95
22:29:40
if command -v git &> /dev/null && [ "$(id -u)" -ne 0 ]; then
96
22:29:40
git config --global --add safe.directory $CI_PROJECT_DIR
97
22:29:40
fi
98
22:29:40
# Sonarqube server is running on the same cluster. Use internal address
99
22:29:40
export SONAR_HOST_URL="http://sonarqube.sonarqube.svc.cluster.local:9000"
100
22:29:40
section_end:1778279379:section_pre_build_script_0
101
22:29:40
INFO: This is the CI job pre_build_script
102
22:29:40
INFO: It's defined in the backend/infra/aws repo.
103
22:29:40
INFO: These additional Scandit variables are available to you:
104
22:29:40
SC_K8S_NODE_NAME: ip-10-0-46-40.eu-central-1.compute.internal
105
22:29:40
SC_K8S_IMAGE_ID:
106
22:29:40
SC_K8S_KYVERNO_PATCHES: |
107
22:29:40
108
22:29:40
cpu (r/l): 2/4
109
22:29:40
memory (r/l): 4000000000/17179869184
110
22:29:40
111
22:29:40
Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-host=ip-10-0-46-40.eu-central-1.compute.internal&var-namespace=gitlab-runner&var-pod=runner-wrxjpbsjx-project-621-concurrent-2-7agj5w51&var-resolution=15&from=1778279379000&to=now
112
22:29:40
Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-node=ip-10-0-46-40.eu-central-1.compute.internal&var-resolution=15s&from=1778279379000&to=now
113
22:29:40
Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group|=|gitlab-runner&var-filters=source|=|k8s-ci.aws.scandit.io&var-filters=namespace|=|gitlab-runner&var-filters=CI_PROJECT_ID|=|621&var-filters=CI_PIPELINE_ID|=|1586735&var-filters=CI_JOB_ID|=|54740790&sortOrder=Ascending&from=1778279379000&to=now
114
22:29:40
date: invalid date '-7 days'
115
22:29:40
date: invalid date '+7 days'
116
22:29:40
Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=~&job_name=build&project=internal/gitlab-templates
117
22:29:40
118
22:29:40
Setting up credentials for Gitlab Python registries
119
22:29:40
$ echo $DOCKER_CONFIG_JSON > /kaniko/.docker/config.json
120
22:29:40
$ mv /root/.netrc /kaniko/.netrc
121
22:29:40
section_start:1778279379:section_script_step_2[hide_duration=true,collapsed=true]
$ function copy_files() {
122
22:29:40
local src="$1"
123
22:29:40
local trg="$2"
124
22:29:40
for f in $src; do
125
22:29:40
t="$trg/`dirname $f`"
126
22:29:40
mkdir -p $t || true
127
22:29:40
echo "Copy $f"
128
22:29:40
cp -pr $f $trg/$f
129
22:29:40
done
130
22:29:40
}
131
22:29:40
function recursive_hash() {
132
22:29:40
local dir="$1"
133
22:29:40
find "$dir" -exec stat -c '%F|%a|%u:%g|%n' {} + -type f -exec sha256sum {} + | sort | sha256sum | cut -d ' ' -f1
134
22:29:40
}
135
22:29:40
function remote_docker_digest() {
136
22:29:40
local images="$1"
137
22:29:40
echo $images | xargs -n 1 crane digest
138
22:29:40
}
139
22:29:40
function remote_image_exists() {
140
22:29:40
local image="$1"
141
22:29:40
crane manifest $image > /dev/null 2>&1
142
22:29:40
}
143
22:29:40
function remote_images_are_identical() {
144
22:29:40
local imageA="$1"
145
22:29:40
local imageB="$2"
146
22:29:40
if [[ $(remote_docker_digest "$imageA") == $(remote_docker_digest "$imageB") ]]; then
147
22:29:40
return 0
148
22:29:40
else
149
22:29:40
return 1
150
22:29:40
fi
151
22:29:40
}
152
22:29:40
function copy_image() {
153
22:29:40
local image="$1"
154
22:29:40
local remotes="$2"
155
22:29:40
local backup_ext="$3"
156
22:29:40
echo "$image"
157
22:29:40
local source_digest=$(remote_docker_digest $image)
158
22:29:40
local target_digest
159
22:29:40
for registry in $remotes; do
160
22:29:40
if target_digest=$(remote_docker_digest $registry); then
161
22:29:40
if [ "$target_digest" != "$source_digest" ]; then
162
22:29:40
echo "image outdated, overwriting with newest version"
163
22:29:40
crane copy $image $registry
164
22:29:40
crane copy $image ${registry}${backup_ext}
165
22:29:40
fi
166
22:29:40
else
167
22:29:40
echo "image does not exist, writing newest version"
168
22:29:40
crane copy $image $registry
169
22:29:40
crane copy $image ${registry}${backup_ext}
170
22:29:40
fi
171
22:29:40
done
172
22:29:40
}
173
22:29:40
section_end:1778279379:section_script_step_2
174
22:29:40
section_start:1778279379:section_script_step_3[hide_duration=true,collapsed=true]
$ if [ "$CONTAINER_SUBDIR" != "" ]; then
175
22:29:40
echo "Entering subpath $CONTAINER_SUBDIR"
176
22:29:40
cd $CONTAINER_SUBDIR
177
22:29:40
fi
178
22:29:40
section_end:1778279379:section_script_step_3
179
22:29:40
Entering subpath sc-uv-example
180
22:29:40
$ copy_files "$CONTAINER_IMPLICIT_REQUIREMENTS $CONTAINER_REQUIREMENTS" "$CONTAINER_CONTEXT_PATH"
181
22:29:40
Copy /build/internal/gitlab-templates/Dockerfile.uv
182
22:29:40
Copy uv.lock
183
22:29:40
Copy pyproject.toml
184
22:29:40
$ echo "$CONTAINER_BUILD_ENVIRONMENT" > $CONTAINER_CONTEXT_PATH/.docker-build-env
185
22:29:40
$ docker_checksum=$(recursive_hash $CONTAINER_CONTEXT_PATH)
186
22:29:40
section_start:1778279379:section_script_step_7[hide_duration=true,collapsed=true]
$ if [ "$CONTAINER_IMAGE_NAME" == "" ]; then
187
22:29:40
final_image_name=${CONTAINER_IMAGE_URL}
188
22:29:40
else
189
22:29:40
final_image_name=${CONTAINER_IMAGE_URL}/${CONTAINER_IMAGE_NAME}
190
22:29:40
fi
191
22:29:40
section_end:1778279379:section_script_step_7
192
22:29:40
$ final_image_url=${final_image_name}:${docker_checksum}
193
22:29:40
section_start:1778279379:section_script_step_9[hide_duration=true,collapsed=true]
$ if [ "${PIPELINE_IMAGE_REFS}" == "1" ]; then
194
22:29:40
echo $CONTAINER_IMAGE_VARIABLE=${final_image_url}-P${CI_PROJECT_ID}-${CI_PIPELINE_ID} > $CI_PROJECT_DIR/docker_image_build.env
195
22:29:40
else
196
22:29:40
echo $CONTAINER_IMAGE_VARIABLE=$final_image_url > $CI_PROJECT_DIR/docker_image_build.env
197
22:29:40
fi
198
22:29:40
section_end:1778279379:section_script_step_9
199
22:29:40
$ echo ${CONTAINER_IMAGE_VARIABLE}_HASH=$docker_checksum >> $CI_PROJECT_DIR/docker_image_build.env
200
22:29:40
section_start:1778279379:section_script_step_11[hide_duration=true,collapsed=true]
$ if [ "${FORCE_BUILD}" != "true" ] || command -v crane &> /dev/null; then
201
22:29:40
echo $REGISTRY_PASSWORD | crane auth login $REGISTRY -u $REGISTRY_USER --password-stdin
202
22:29:40
fi
203
22:29:40
section_end:1778279379:section_script_step_11
204
22:29:40
205
22:29:40
WARNING! Your credentials are stored unencrypted in '/kaniko/.docker/config.json'.
206
22:29:40
Configure a credential helper to remove this warning. See
207
22:29:40
https://docs.docker.com/go/credential-store/
208
22:29:40
209
22:29:40
2026/05/08 22:29:39 logged in via /kaniko/.docker/config.json
210
22:29:40
section_start:1778279379:section_script_step_12[hide_duration=true,collapsed=true]
$ if [ "${FORCE_BUILD}" != "true" ] && remote_image_exists "$final_image_url"; then
211
22:29:40
echo "Image already exists, skip the build."
212
22:29:40
echo "$final_image_url"
213
22:29:40
if [[ "$CI_COMMIT_BRANCH" == "$CI_DEFAULT_BRANCH" ]]; then
214
22:29:40
_EXT=""
215
22:29:40
_BACKUP_EXT="-CI${CI_JOB_ID}-$(date '+%Y%m%d')"
216
22:29:40
elif [[ -n "$CI_MERGE_REQUEST_ID" ]]; then
217
22:29:40
_EXT="-MR${CI_MERGE_REQUEST_IID}"
218
22:29:40
_BACKUP_EXT=""
219
22:29:40
elif [[ "$CI_COMMIT_REF_PROTECTED" == "true" ]]; then
220
22:29:40
_EXT="-${CI_COMMIT_REF_SLUG}"
221
22:29:40
_BACKUP_EXT="-CI${CI_JOB_ID}-$(date '+%Y%m%d')"
222
22:29:40
fi
223
22:29:40
for _TAG in $CONTAINER_IMAGE_TAG; do
224
22:29:40
echo "Copying ${final_image_url} to ${final_image_name}:${_TAG}${_EXT}"
225
22:29:40
copy_image "${final_image_url}" "${final_image_name}:${_TAG}${_EXT}" "${_BACKUP_EXT}"
226
22:29:40
done
227
22:29:40
if [ "${PIPELINE_IMAGE_REFS}" == "1" ]; then
228
22:29:40
_EXT="-P${CI_PROJECT_ID}-${CI_PIPELINE_ID}"
229
22:29:40
echo "Copying ${final_image_url} to ${final_image_url}${_EXT}"
230
22:29:40
copy_image "${final_image_url}" "${final_image_url}${_EXT}"
231
22:29:40
for _TAG in $CONTAINER_IMAGE_TAG; do
232
22:29:40
echo "Copying ${final_image_url} to ${final_image_name}:${_TAG}${_EXT}"
233
22:29:40
copy_image "${final_image_url}" "${final_image_name}:${_TAG}${_EXT}"
234
22:29:40
done
235
22:29:40
fi
236
22:29:40
exit 0
237
22:29:40
fi
238
22:29:40
section_end:1778279379:section_script_step_12
239
22:29:40
Image already exists, skip the build.
240
22:29:40
registry.scandit.com/internal/gitlab-templates/sc-uv-example-dev:a0627644f5b19a5299950b9d06386a69ed2ca73d2843193725069ae656cd6167
241
22:29:40
Copying registry.scandit.com/internal/gitlab-templates/sc-uv-example-dev:a0627644f5b19a5299950b9d06386a69ed2ca73d2843193725069ae656cd6167 to registry.scandit.com/internal/gitlab-templates/sc-uv-example-dev:latest-MR642
242
22:29:40
registry.scandit.com/internal/gitlab-templates/sc-uv-example-dev:a0627644f5b19a5299950b9d06386a69ed2ca73d2843193725069ae656cd6167
243
22:29:40
2026/05/08 22:29:40 HEAD request failed, falling back on GET: HEAD https://registry.scandit.com/v2/internal/gitlab-templates/sc-uv-example-dev/manifests/latest-MR642: unexpected status code 404 Not Found (HEAD responses have no body, use GET for details)
244
22:29:41
Error: GET https://registry.scandit.com/v2/internal/gitlab-templates/sc-uv-example-dev/manifests/latest-MR642: MANIFEST_UNKNOWN: manifest unknown; map[Tag:latest-MR642]
245
22:29:41
image does not exist, writing newest version
246
22:29:41
2026/05/08 22:29:40 Copying from registry.scandit.com/internal/gitlab-templates/sc-uv-example-dev:a0627644f5b19a5299950b9d06386a69ed2ca73d2843193725069ae656cd6167 to registry.scandit.com/internal/gitlab-templates/sc-uv-example-dev:latest-MR642
247
22:29:41
2026/05/08 22:29:41 existing blob: sha256:55cab8de839fd4db3f8ccd4a0ec43ad27c5e112834e9e6ee2b1a68ebb49b64d0
248
22:29:41
2026/05/08 22:29:41 existing blob: sha256:b40150c1c2717d324cdb17278c8efdfa4dfcd2ffe083e976f0bcedf31115f081
249
22:29:41
2026/05/08 22:29:41 existing blob: sha256:5957ac4c1fdd681289811aec6fdcfdab5af82ebf72bb1d095726a3db3ae49601
250
22:29:41
2026/05/08 22:29:41 existing blob: sha256:25c95bc50f6df2aef8cc6217d03c85fdb351d25e009a73aad25e8a8b1f69dda7
251
22:29:41
2026/05/08 22:29:41 existing blob: sha256:0e188e6a6d38dcb0203c2a32ea25e2521594a7619ba8b508f5b695684b9878a7
252
22:29:41
2026/05/08 22:29:41 existing blob: sha256:03e82c1b170c1fe933744d07af0abf9f491c7c8ca6488768c31e0929aa5cdd0f
253
22:29:41
2026/05/08 22:29:41 existing blob: sha256:89732bc7504122601f40269fc9ddfb70982e633ea9caf641ae45736f2846b004
254
22:29:41
2026/05/08 22:29:41 existing blob: sha256:23d857050f81a653f157eae1b84232244f89a72838eac1f926d8dcdaa49e1a18
255
22:29:41
2026/05/08 22:29:41 existing blob: sha256:333d6461d4fea818d630d9d534403cde23af442fe22aee2568f203373413a61f
256
22:29:41
2026/05/08 22:29:41 existing blob: sha256:96d627c048c1a2c73ea2b44c64984d60ce0ce303d20e45e40130ef2464845f85
257
22:29:41
2026/05/08 22:29:41 existing blob: sha256:0c967f157feebfed80e7990c11f55fb71b78472af9e73df10f10af56b6417d52
258
22:29:41
2026/05/08 22:29:41 existing blob: sha256:07ea59b974c77cbab3d5ed0ad5a6acfd32b3ef589677ef12a1bc3f00764bd90d
259
22:29:41
2026/05/08 22:29:41 existing blob: sha256:aefbe12b98ea591e7e1e647cdaf5154348c0b8e83a25c7a40fc4308a6da1b83d
260
22:29:41
2026/05/08 22:29:41 registry.scandit.com/internal/gitlab-templates/sc-uv-example-dev:latest-MR642: digest: sha256:e660fe300b157b91562d27feca078814dfc97dd76d26efbb31d4c7c35a0d38ed size: 3955
261
22:29:41
2026/05/08 22:29:41 Copying from registry.scandit.com/internal/gitlab-templates/sc-uv-example-dev:a0627644f5b19a5299950b9d06386a69ed2ca73d2843193725069ae656cd6167 to registry.scandit.com/internal/gitlab-templates/sc-uv-example-dev:latest-MR642
262
22:29:42
2026/05/08 22:29:41 existing manifest: latest-MR642@sha256:e660fe300b157b91562d27feca078814dfc97dd76d26efbb31d4c7c35a0d38ed
263
22:29:42
264
22:29:42
Scout Analysis: https://scout.scandit.io/analysis/projects/621/jobs/54740790
265
22:29:42
266
22:29:42
267
22:29:42
Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-host=ip-10-0-46-40.eu-central-1.compute.internal&var-namespace=gitlab-runner&var-pod=runner-wrxjpbsjx-project-621-concurrent-2-7agj5w51&var-resolution=15&from=1778279379000&to=1778279381000
268
22:29:42
Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-node=ip-10-0-46-40.eu-central-1.compute.internal&var-resolution=15s&from=1778279379000&to=1778279381000
269
22:29:42
Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group|=|gitlab-runner&var-filters=source|=|k8s-ci.aws.scandit.io&var-filters=namespace|=|gitlab-runner&var-filters=CI_PROJECT_ID|=|621&var-filters=CI_PIPELINE_ID|=|1586735&var-filters=CI_JOB_ID|=|54740790&sortOrder=Ascending&from=1778279379000&to=1778279381000
270
22:29:42
date: invalid date '-7 days'
271
22:29:42
date: invalid date '+7 days'
272
22:29:42
Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=~&job_name=build&project=internal/gitlab-templates
273
22:29:42
274
22:29:42
275
22:29:42
section_end:1778279382:step_script
276
22:29:42
+section_start:1778279382:upload_artifacts_on_success
277
22:29:42
+Uploading artifacts for successful job
278
22:29:42
Uploading artifacts...
279
22:29:42
docker_image_build.env: found 1 matching artifact files and directories
280
22:29:43
Uploading artifacts as "dotenv" to coordinator... 201 Created correlation_id=01KR4VBZH60MQW2B4CBEEC44P6 id=54740790 responseStatus=201 Created token=64_KM__w9
281
22:29:43
282
22:29:43
section_end:1778279383:upload_artifacts_on_success
283
22:29:43
+section_start:1778279383:cleanup_file_variables
284
22:29:43
+Cleaning up project directory and file based variables
285
22:29:43
286
22:29:43
section_end:1778279383:cleanup_file_variables
287
22:29:43
+
288
22:29:43
Job succeeded
289