build-python3-image: [3.12, BASE_IMAGE_TAG=3.12-bookworm, Dockerfile.python-3] ○ success
⏱
Duration: 25s
⏳
Queued: 1s
📁
Stage: docker-image
🖥
Runner: linux-aws-1
Average Duration
30s
This job: 25s
Failure Rate
0.7%
last 30 days
External Links
▶
Job Execution Phases
💡 Tip: Click on any phase bar to jump to that section in the log below
▶
Job Analysis
Job Status: Passed
Status: Job passed successfully
▶
Full Job Log
292 lines
Match - of 0
1
10:47:47
Running with gitlab-runner 18.9.0 (07e534ba)
2
10:47:47
on gitlab-runner-linux-1-746bdd58fd-xxrl5 wRxjPbsJX, system ID: r_yEOGA5M1ahq0
3
10:47:47
feature flags: FF_USE_FASTZIP:true, FF_USE_NEW_BASH_EVAL_STRATEGY:true, FF_USE_DYNAMIC_TRACE_FORCE_SEND_INTERVAL:true, FF_SCRIPT_SECTIONS:true, FF_USE_ADVANCED_POD_SPEC_CONFIGURATION:true, FF_PRINT_POD_EVENTS:true, FF_USE_DUMB_INIT_WITH_KUBERNETES_EXECUTOR:true, FF_LOG_IMAGES_CONFIGURED_FOR_JOB:true, FF_CLEAN_UP_FAILED_CACHE_EXTRACT:true, FF_GIT_URLS_WITHOUT_TOKENS:true, FF_WAIT_FOR_POD_TO_BE_REACHABLE:true, FF_USE_FLEETING_ACQUIRE_HEARTBEATS:true, FF_USE_JOB_ROUTER:true
4
10:47:47
Resolving secrets
5
10:47:47
section_start:1778237267:prepare_executor
6
10:47:47
+Preparing the "kubernetes" executor
7
10:47:47
"CPURequest" overwritten with "2"
8
10:47:47
"MemoryRequest" overwritten with "4G"
9
10:47:47
Using Kubernetes namespace: gitlab-runner
10
10:47:47
Using Kubernetes executor with image registry.scandit.com/dockerfiles/kaniko:v1.27.3-crane@sha256:72bdc063db14f38a45910d33ccf066ecb088d4833fb2437fef336e49b81fd4ac ...
11
10:47:47
Using attach strategy to execute scripts...
12
10:47:47
Using effective pull policy of [Always] for container build
13
10:47:47
Using effective pull policy of [Always] for container helper
14
10:47:47
Using effective pull policy of [Always] for container init-permissions
15
10:47:47
section_end:1778237267:prepare_executor
16
10:47:47
+section_start:1778237267:prepare_script
17
10:47:47
+Preparing environment
18
10:47:47
Using FF_USE_POD_ACTIVE_DEADLINE_SECONDS, the Pod activeDeadlineSeconds will be set to the job timeout: 1h0m0s...
19
10:47:47
WARNING: Advanced Pod Spec configuration enabled, merging the provided PodSpec to the generated one. This is a beta feature and is subject to change. Feedback is collected in this issue: https://gitlab.com/gitlab-org/gitlab-runner/-/issues/29659 ...
20
10:47:48
Subscribing to Kubernetes Pod events...
21
10:47:49
Type Reason Message
22
10:47:49
Normal Scheduled Successfully assigned gitlab-runner/runner-wrxjpbsjx-project-621-concurrent-0-aqp5bsqk to ip-10-0-56-102.eu-central-1.compute.internal
23
10:47:49
Normal Pulled Container image "gitlab/gitlab-runner-helper:x86_64-v18.8.0" already present on machine
24
10:47:49
Normal Created Created container: init-permissions
25
10:47:49
Normal Started Started container init-permissions
26
10:47:53
Normal Pulled Container image "498954711405.dkr.ecr.eu-central-1.amazonaws.com/dockerfiles/kaniko@sha256:72bdc063db14f38a45910d33ccf066ecb088d4833fb2437fef336e49b81fd4ac" already present on machine
27
10:47:58
Normal Created Created container: build
28
10:47:58
Normal Started Started container build
29
10:47:58
Normal Pulled Container image "gitlab/gitlab-runner-helper:x86_64-v18.8.0" already present on machine
30
10:47:58
Normal Created Created container: helper
31
10:47:58
Normal Started Started container helper
32
10:48:02
Running on runner-wrxjpbsjx-project-621-concurrent-0-aqp5bsqk via gitlab-runner-linux-1-746bdd58fd-xxrl5...
33
10:48:02
34
10:48:02
section_end:1778237282:prepare_script
35
10:48:02
+section_start:1778237282:get_sources
36
10:48:02
+Getting source from Git repository
37
10:48:03
Gitaly correlation ID: 01KR3K6PHV745RHECCSHQ54W37
38
10:48:03
Fetching changes with git depth set to 1...
39
10:48:03
Initialized empty Git repository in /build/internal/gitlab-templates/.git/
40
10:48:03
Created fresh repository.
41
10:48:04
Checking out 6e76a6a0 as detached HEAD (ref is refs/merge-requests/641/merge)...
42
10:48:04
43
10:48:04
Skipping Git submodules setup
44
10:48:04
45
10:48:04
section_end:1778237284:get_sources
46
10:48:04
+section_start:1778237284:step_script
47
10:48:04
+Executing "step_script" stage of the job script
48
10:48:05
section_start:1778237284:section_pre_build_script_0[hide_duration=true,collapsed=true]
$ function cleanup {
49
10:48:05
rv=$?
50
10:48:05
if [ $rv -ne 0 ]; then
51
10:48:05
echo ""
52
10:48:05
echo " Failure Cause Analysis might help, please open this link:"
53
10:48:05
echo " https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
54
10:48:05
echo ""
55
10:48:05
fi
56
10:48:05
echo ""
57
10:48:05
echo "Scout Analysis: https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
58
10:48:05
echo ""
59
10:48:05
echo ""
60
10:48:05
echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=${EPOCHSECONDS}000"
61
10:48:05
echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=${EPOCHSECONDS}000"
62
10:48:05
echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group|=|gitlab-runner&var-filters=source|=|${LOKI_LOGSOURCE}&var-filters=namespace|=|${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID|=|${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID|=|${CI_PIPELINE_ID}&var-filters=CI_JOB_ID|=|${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=${EPOCHSECONDS}000"
63
10:48:05
echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=$(date -d '-7 days' +%Y-%m-%d)~$(date -d '+7 days' +%Y-%m-%d)&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
64
10:48:05
echo ""
65
10:48:05
exit $rv
66
10:48:05
}
67
10:48:05
trap cleanup EXIT
68
10:48:05
echo "INFO: This is the CI job pre_build_script"
69
10:48:05
echo "INFO: It's defined in the backend/infra/aws repo."
70
10:48:05
echo "INFO: These additional Scandit variables are available to you:"
71
10:48:05
echo " SC_K8S_NODE_NAME: $SC_K8S_NODE_NAME"
72
10:48:05
echo " SC_K8S_IMAGE_ID: $SC_K8S_IMAGE_ID"
73
10:48:05
echo " SC_K8S_KYVERNO_PATCHES: |"
74
10:48:05
echo "$SC_K8S_KYVERNO_PATCHES" | sed 's/^/ /'
75
10:48:05
echo "cpu (r/l): ${SC_K8S_REQUESTS_CPU}/${SC_K8S_LIMITS_CPU}"
76
10:48:05
if command -v numfmt >/dev/null 2>&1; then
77
10:48:05
echo "memory (r/l): $(numfmt --to=iec --suffix=B $SC_K8S_REQUESTS_MEMORY)/$(numfmt --to=iec --suffix=B $SC_K8S_LIMITS_MEMORY)"
78
10:48:05
else
79
10:48:05
echo "memory (r/l): ${SC_K8S_REQUESTS_MEMORY}/${SC_K8S_LIMITS_MEMORY}"
80
10:48:05
fi
81
10:48:05
__start_time=${EPOCHSECONDS}
82
10:48:05
echo ""
83
10:48:05
echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=now"
84
10:48:05
echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=now"
85
10:48:05
echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group|=|gitlab-runner&var-filters=source|=|${LOKI_LOGSOURCE}&var-filters=namespace|=|${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID|=|${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID|=|${CI_PIPELINE_ID}&var-filters=CI_JOB_ID|=|${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=now"
86
10:48:05
echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=$(date -d '-7 days' +%Y-%m-%d)~$(date -d '+7 days' +%Y-%m-%d)&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
87
10:48:05
echo ""
88
10:48:05
echo "Setting up credentials for Gitlab Python registries"
89
10:48:05
mkdir -p ~
90
10:48:05
echo "machine gitlab.scandit.com" > ~/.netrc
91
10:48:05
echo "login gitlab-ci-token" >> ~/.netrc
92
10:48:05
echo "password ${CI_JOB_TOKEN}" >> ~/.netrc
93
10:48:05
chmod 600 ~/.netrc
94
10:48:05
if command -v git &> /dev/null && [ "$(id -u)" -ne 0 ]; then
95
10:48:05
git config --global --add safe.directory $CI_PROJECT_DIR
96
10:48:05
fi
97
10:48:05
# Sonarqube server is running on the same cluster. Use internal address
98
10:48:05
export SONAR_HOST_URL="http://sonarqube.sonarqube.svc.cluster.local:9000"
99
10:48:05
section_end:1778237284:section_pre_build_script_0
100
10:48:05
INFO: This is the CI job pre_build_script
101
10:48:05
INFO: It's defined in the backend/infra/aws repo.
102
10:48:05
INFO: These additional Scandit variables are available to you:
103
10:48:05
SC_K8S_NODE_NAME: ip-10-0-56-102.eu-central-1.compute.internal
104
10:48:05
SC_K8S_IMAGE_ID:
105
10:48:05
SC_K8S_KYVERNO_PATCHES: |
106
10:48:05
107
10:48:05
cpu (r/l): 2/4
108
10:48:05
memory (r/l): 4000000000/17179869184
109
10:48:05
110
10:48:05
Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-host=ip-10-0-56-102.eu-central-1.compute.internal&var-namespace=gitlab-runner&var-pod=runner-wrxjpbsjx-project-621-concurrent-0-aqp5bsqk&var-resolution=15&from=1778237284000&to=now
111
10:48:05
Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-node=ip-10-0-56-102.eu-central-1.compute.internal&var-resolution=15s&from=1778237284000&to=now
112
10:48:05
Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group|=|gitlab-runner&var-filters=source|=|k8s-ci.aws.scandit.io&var-filters=namespace|=|gitlab-runner&var-filters=CI_PROJECT_ID|=|621&var-filters=CI_PIPELINE_ID|=|1585539&var-filters=CI_JOB_ID|=|54677877&sortOrder=Ascending&from=1778237284000&to=now
113
10:48:05
date: invalid date '-7 days'
114
10:48:05
date: invalid date '+7 days'
115
10:48:05
Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=~&job_name=build-python3-image: [3.12, BASE_IMAGE_TAG=3.12-bookworm, Dockerfile.python-3]&project=internal/gitlab-templates
116
10:48:05
117
10:48:05
Setting up credentials for Gitlab Python registries
118
10:48:05
$ echo $DOCKER_CONFIG_JSON > /kaniko/.docker/config.json
119
10:48:05
$ mv /root/.netrc /kaniko/.netrc
120
10:48:05
section_start:1778237285:section_script_step_2[hide_duration=true,collapsed=true]
$ function copy_files() {
121
10:48:05
local src="$1"
122
10:48:05
local trg="$2"
123
10:48:05
for f in $src; do
124
10:48:05
t="$trg/`dirname $f`"
125
10:48:05
mkdir -p $t || true
126
10:48:05
echo "Copy $f"
127
10:48:05
cp -pr $f $trg/$f
128
10:48:05
done
129
10:48:05
}
130
10:48:05
function recursive_hash() {
131
10:48:05
local dir="$1"
132
10:48:05
find "$dir" -exec stat -c '%F|%a|%u:%g|%n' {} + -type f -exec sha256sum {} + | sort | sha256sum | cut -d ' ' -f1
133
10:48:05
}
134
10:48:05
function remote_docker_digest() {
135
10:48:05
local images="$1"
136
10:48:05
echo $images | xargs -n 1 crane digest
137
10:48:05
}
138
10:48:05
function remote_image_exists() {
139
10:48:05
local image="$1"
140
10:48:05
crane manifest $image > /dev/null 2>&1
141
10:48:05
}
142
10:48:05
function remote_images_are_identical() {
143
10:48:05
local imageA="$1"
144
10:48:05
local imageB="$2"
145
10:48:05
if [[ $(remote_docker_digest "$imageA") == $(remote_docker_digest "$imageB") ]]; then
146
10:48:05
return 0
147
10:48:05
else
148
10:48:05
return 1
149
10:48:05
fi
150
10:48:05
}
151
10:48:05
function copy_image() {
152
10:48:05
local image="$1"
153
10:48:05
local remotes="$2"
154
10:48:05
local backup_ext="$3"
155
10:48:05
echo "$image"
156
10:48:05
local source_digest=$(remote_docker_digest $image)
157
10:48:05
local target_digest
158
10:48:05
for registry in $remotes; do
159
10:48:05
if target_digest=$(remote_docker_digest $registry); then
160
10:48:05
if [ "$target_digest" != "$source_digest" ]; then
161
10:48:05
echo "image outdated, overwriting with newest version"
162
10:48:05
crane copy $image $registry
163
10:48:05
crane copy $image ${registry}${backup_ext}
164
10:48:05
fi
165
10:48:05
else
166
10:48:05
echo "image does not exist, writing newest version"
167
10:48:05
crane copy $image $registry
168
10:48:05
crane copy $image ${registry}${backup_ext}
169
10:48:05
fi
170
10:48:05
done
171
10:48:05
}
172
10:48:05
section_end:1778237285:section_script_step_2
173
10:48:05
section_start:1778237285:section_script_step_3[hide_duration=true,collapsed=true]
$ if [ "$CONTAINER_SUBDIR" != "" ]; then
174
10:48:05
echo "Entering subpath $CONTAINER_SUBDIR"
175
10:48:05
cd $CONTAINER_SUBDIR
176
10:48:05
fi
177
10:48:05
section_end:1778237285:section_script_step_3
178
10:48:05
$ copy_files "$CONTAINER_IMPLICIT_REQUIREMENTS $CONTAINER_REQUIREMENTS" "$CONTAINER_CONTEXT_PATH"
179
10:48:05
Copy Dockerfile.python-3
180
10:48:05
Copy requirements.txt
181
10:48:05
Copy .python-version
182
10:48:05
Copy .pip-version
183
10:48:05
$ echo "$CONTAINER_BUILD_ENVIRONMENT" > $CONTAINER_CONTEXT_PATH/.docker-build-env
184
10:48:05
$ docker_checksum=$(recursive_hash $CONTAINER_CONTEXT_PATH)
185
10:48:05
section_start:1778237285:section_script_step_7[hide_duration=true,collapsed=true]
$ if [ "$CONTAINER_IMAGE_NAME" == "" ]; then
186
10:48:05
final_image_name=${CONTAINER_IMAGE_URL}
187
10:48:05
else
188
10:48:05
final_image_name=${CONTAINER_IMAGE_URL}/${CONTAINER_IMAGE_NAME}
189
10:48:05
fi
190
10:48:05
section_end:1778237285:section_script_step_7
191
10:48:05
$ final_image_url=${final_image_name}:${docker_checksum}
192
10:48:05
section_start:1778237285:section_script_step_9[hide_duration=true,collapsed=true]
$ if [ "${PIPELINE_IMAGE_REFS}" == "1" ]; then
193
10:48:05
echo $CONTAINER_IMAGE_VARIABLE=${final_image_url}-P${CI_PROJECT_ID}-${CI_PIPELINE_ID} > $CI_PROJECT_DIR/docker_image_build.env
194
10:48:05
else
195
10:48:05
echo $CONTAINER_IMAGE_VARIABLE=$final_image_url > $CI_PROJECT_DIR/docker_image_build.env
196
10:48:05
fi
197
10:48:05
section_end:1778237285:section_script_step_9
198
10:48:05
$ echo ${CONTAINER_IMAGE_VARIABLE}_HASH=$docker_checksum >> $CI_PROJECT_DIR/docker_image_build.env
199
10:48:05
section_start:1778237285:section_script_step_11[hide_duration=true,collapsed=true]
$ if [ "${FORCE_BUILD}" != "true" ] || command -v crane &> /dev/null; then
200
10:48:05
echo $REGISTRY_PASSWORD | crane auth login $REGISTRY -u $REGISTRY_USER --password-stdin
201
10:48:05
fi
202
10:48:05
section_end:1778237285:section_script_step_11
203
10:48:05
204
10:48:05
WARNING! Your credentials are stored unencrypted in '/kaniko/.docker/config.json'.
205
10:48:05
Configure a credential helper to remove this warning. See
206
10:48:05
https://docs.docker.com/go/credential-store/
207
10:48:05
208
10:48:05
2026/05/08 10:48:05 logged in via /kaniko/.docker/config.json
209
10:48:05
section_start:1778237285:section_script_step_12[hide_duration=true,collapsed=true]
$ if [ "${FORCE_BUILD}" != "true" ] && remote_image_exists "$final_image_url"; then
210
10:48:05
echo "Image already exists, skip the build."
211
10:48:05
echo "$final_image_url"
212
10:48:05
if [[ "$CI_COMMIT_BRANCH" == "$CI_DEFAULT_BRANCH" ]]; then
213
10:48:05
_EXT=""
214
10:48:05
_BACKUP_EXT="-CI${CI_JOB_ID}-$(date '+%Y%m%d')"
215
10:48:05
elif [[ -n "$CI_MERGE_REQUEST_ID" ]]; then
216
10:48:05
_EXT="-MR${CI_MERGE_REQUEST_IID}"
217
10:48:05
_BACKUP_EXT=""
218
10:48:05
elif [[ "$CI_COMMIT_REF_PROTECTED" == "true" ]]; then
219
10:48:05
_EXT="-${CI_COMMIT_REF_SLUG}"
220
10:48:05
_BACKUP_EXT="-CI${CI_JOB_ID}-$(date '+%Y%m%d')"
221
10:48:05
fi
222
10:48:05
for _TAG in $CONTAINER_IMAGE_TAG; do
223
10:48:05
echo "Copying ${final_image_url} to ${final_image_name}:${_TAG}${_EXT}"
224
10:48:05
copy_image "${final_image_url}" "${final_image_name}:${_TAG}${_EXT}" "${_BACKUP_EXT}"
225
10:48:05
done
226
10:48:05
if [ "${PIPELINE_IMAGE_REFS}" == "1" ]; then
227
10:48:05
_EXT="-P${CI_PROJECT_ID}-${CI_PIPELINE_ID}"
228
10:48:05
echo "Copying ${final_image_url} to ${final_image_url}${_EXT}"
229
10:48:05
copy_image "${final_image_url}" "${final_image_url}${_EXT}"
230
10:48:05
for _TAG in $CONTAINER_IMAGE_TAG; do
231
10:48:05
echo "Copying ${final_image_url} to ${final_image_name}:${_TAG}${_EXT}"
232
10:48:05
copy_image "${final_image_url}" "${final_image_name}:${_TAG}${_EXT}"
233
10:48:05
done
234
10:48:05
fi
235
10:48:05
exit 0
236
10:48:05
fi
237
10:48:05
section_end:1778237285:section_script_step_12
238
10:48:05
Image already exists, skip the build.
239
10:48:05
registry.scandit.com/internal/gitlab-templates/python:b7a61fbe98d60d936734108b169c932f88fff8d0aac5a5a2234432e2dd18ac21
240
10:48:05
Copying registry.scandit.com/internal/gitlab-templates/python:b7a61fbe98d60d936734108b169c932f88fff8d0aac5a5a2234432e2dd18ac21 to registry.scandit.com/internal/gitlab-templates/python:3.12-MR641
241
10:48:05
registry.scandit.com/internal/gitlab-templates/python:b7a61fbe98d60d936734108b169c932f88fff8d0aac5a5a2234432e2dd18ac21
242
10:48:06
2026/05/08 10:48:06 HEAD request failed, falling back on GET: HEAD https://registry.scandit.com/v2/internal/gitlab-templates/python/manifests/3.12-MR641: unexpected status code 404 Not Found (HEAD responses have no body, use GET for details)
243
10:48:06
Error: GET https://registry.scandit.com/v2/internal/gitlab-templates/python/manifests/3.12-MR641: MANIFEST_UNKNOWN: manifest unknown; map[Tag:3.12-MR641]
244
10:48:06
image does not exist, writing newest version
245
10:48:06
2026/05/08 10:48:06 Copying from registry.scandit.com/internal/gitlab-templates/python:b7a61fbe98d60d936734108b169c932f88fff8d0aac5a5a2234432e2dd18ac21 to registry.scandit.com/internal/gitlab-templates/python:3.12-MR641
246
10:48:08
2026/05/08 10:48:07 existing blob: sha256:e5203b2bfeff92b72e816dc6cbb1f16856f0cd592e521e3c0cfa195a78fe180e
247
10:48:08
2026/05/08 10:48:07 existing blob: sha256:db53381ee51f9e43304e236099ba097ae1b33ae41a8007e0b6319992eb55fd00
248
10:48:08
2026/05/08 10:48:07 existing blob: sha256:8fcda2b4d7993820b00c5488d173051e76d01ba6b85620617ba77001b0f9e2fa
249
10:48:08
2026/05/08 10:48:07 existing blob: sha256:dfc792c67fd1c4f6f03f68173f31ce330935554f04aab717b390b7398f83e6c8
250
10:48:08
2026/05/08 10:48:07 existing blob: sha256:2933ecab0f11302fd71f29aa83ad2904683246f7a8320ad0dc3a60b23f05fee9
251
10:48:08
2026/05/08 10:48:07 existing blob: sha256:6ada59ee1c4457a2478c31272454fb7a47283d9c90904ea2e9479488c4948f68
252
10:48:08
2026/05/08 10:48:07 existing blob: sha256:89732bc7504122601f40269fc9ddfb70982e633ea9caf641ae45736f2846b004
253
10:48:08
2026/05/08 10:48:07 existing blob: sha256:7e2b65e636fe1d2e8e87a94742e1f5a0f1174af50bc1930967df2d8f9d6e311a
254
10:48:08
2026/05/08 10:48:07 existing blob: sha256:73489fbdbc560c299d50d216cb15e89e9f51ba904d121987258dcdf8699b4660
255
10:48:08
2026/05/08 10:48:07 existing blob: sha256:196aab2ff32193998e6659eac4cc421d96e66d29a5d53db3d9d9e0f495df573d
256
10:48:08
2026/05/08 10:48:07 existing blob: sha256:4d27ef1892f6f6de3128d6f169016496fc5274ab1f2815f2bfd64b387b706585
257
10:48:08
2026/05/08 10:48:07 existing blob: sha256:4ea7b3c64b794cd3419b5eb8600f0f4f635a59cc5e7252a873a4329c0ffd9af0
258
10:48:08
2026/05/08 10:48:07 existing blob: sha256:98f3b9bb3cbd471251cb0431a3253ef6f5f718b0aa3875ff23ce19c9466ec061
259
10:48:08
2026/05/08 10:48:08 existing blob: sha256:35df8b37acff6dfd1c3ebc0f55cf326e790af79949cadc0b191e6a9f08da367a
260
10:48:08
2026/05/08 10:48:08 existing blob: sha256:814e2c3cad38dcf2765af67caaaf1ca60a5867c9dc6e47367d076361ee4751c8
261
10:48:08
2026/05/08 10:48:08 existing blob: sha256:cfdcf22149b154908e3bc6d9eaae9599bda81286deda8ab51c1dd47cf1ebae4f
262
10:48:08
2026/05/08 10:48:08 existing blob: sha256:5ae667ffc688dcc8b2610659868d9acfe645c3f092b30cd281ad0d84b7a2fc2f
263
10:48:08
2026/05/08 10:48:08 registry.scandit.com/internal/gitlab-templates/python:3.12-MR641: digest: sha256:09b443a843587e8bf4be21f99c1e5926f0a2a7d52c781c74c315411898ce86a7 size: 4123
264
10:48:08
2026/05/08 10:48:08 Copying from registry.scandit.com/internal/gitlab-templates/python:b7a61fbe98d60d936734108b169c932f88fff8d0aac5a5a2234432e2dd18ac21 to registry.scandit.com/internal/gitlab-templates/python:3.12-MR641
265
10:48:09
2026/05/08 10:48:09 existing manifest: 3.12-MR641@sha256:09b443a843587e8bf4be21f99c1e5926f0a2a7d52c781c74c315411898ce86a7
266
10:48:09
267
10:48:09
Scout Analysis: https://scout.scandit.io/analysis/projects/621/jobs/54677877
268
10:48:09
269
10:48:09
270
10:48:09
Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-host=ip-10-0-56-102.eu-central-1.compute.internal&var-namespace=gitlab-runner&var-pod=runner-wrxjpbsjx-project-621-concurrent-0-aqp5bsqk&var-resolution=15&from=1778237284000&to=1778237289000
271
10:48:09
Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-node=ip-10-0-56-102.eu-central-1.compute.internal&var-resolution=15s&from=1778237284000&to=1778237289000
272
10:48:09
Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group|=|gitlab-runner&var-filters=source|=|k8s-ci.aws.scandit.io&var-filters=namespace|=|gitlab-runner&var-filters=CI_PROJECT_ID|=|621&var-filters=CI_PIPELINE_ID|=|1585539&var-filters=CI_JOB_ID|=|54677877&sortOrder=Ascending&from=1778237284000&to=1778237289000
273
10:48:09
date: invalid date '-7 days'
274
10:48:09
date: invalid date '+7 days'
275
10:48:09
Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=~&job_name=build-python3-image: [3.12, BASE_IMAGE_TAG=3.12-bookworm, Dockerfile.python-3]&project=internal/gitlab-templates
276
10:48:09
277
10:48:09
278
10:48:09
section_end:1778237289:step_script
279
10:48:09
+section_start:1778237289:upload_artifacts_on_success
280
10:48:09
+Uploading artifacts for successful job
281
10:48:09
Uploading artifacts...
282
10:48:09
docker_image_build.env: found 1 matching artifact files and directories
283
10:48:10
Uploading artifacts as "dotenv" to coordinator... 201 Created correlation_id=01KR3K7DCTZH92G1SYARAZR7FK id=54677877 responseStatus=201 Created token=64_8s-e4J
284
10:48:10
285
10:48:10
section_end:1778237290:upload_artifacts_on_success
286
10:48:10
+section_start:1778237290:cleanup_file_variables
287
10:48:10
+Cleaning up project directory and file based variables
288
10:48:11
289
10:48:11
section_end:1778237291:cleanup_file_variables
290
10:48:11
+
291
10:48:11
Job succeeded
292