Skip to content

Instantly share code, notes, and snippets.

@jbd
Created July 31, 2017 10:01
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save jbd/6b6983514e6c430d2c8db147af025f66 to your computer and use it in GitHub Desktop.
Save jbd/6b6983514e6c430d2c8db147af025f66 to your computer and use it in GitHub Desktop.
Enabling debugging
Ending argument loop
Singularity version: 2.3.1-development.ga78190c8
Exec'ing: /usr/local/libexec/singularity/cli/shell.exec
Evaluating args: 'docker://centos:6'
VERBOSE2 SINGULARITY_COMMAND_ASIS found as False
VERBOSE2 SINGULARITY_ROOTFS found as /tmp/.singularity-runtime.aihvo2qb/centos:6
VERBOSE2 SINGULARITY_METADATA_FOLDER found as /tmp/.singularity-runtime.aihvo2qb/centos:6/.singularity.d
VERBOSE2 SINGULARITY_FIX_PERMS found as False
VERBOSE2 SINGULARITY_COLORIZE not defined (None)
VERBOSE2 SINGULARITY_DISABLE_CACHE found as False
VERBOSE2 SINGULARITY_CACHEDIR found as /home/jbdenis/.singularity
VERBOSE2 SINGULARITY_ENVIRONMENT found as /tmp/.singularity-runtime.aihvo2qb/centos:6/.singularity.d/environment
VERBOSE2 SINGULARITY_RUNSCRIPT found as /tmp/.singularity-runtime.aihvo2qb/centos:6/singularity
VERBOSE2 SINGULARITY_TESTFILE found as /tmp/.singularity-runtime.aihvo2qb/centos:6/.singularity.d/test
VERBOSE2 SINGULARITY_DEFFILE found as /tmp/.singularity-runtime.aihvo2qb/centos:6/.singularity.d/Singularity
VERBOSE2 SINGULARITY_ENVBASE found as /tmp/.singularity-runtime.aihvo2qb/centos:6/.singularity.d/env
VERBOSE2 SINGULARITY_LABELFILE found as /tmp/.singularity-runtime.aihvo2qb/centos:6/.singularity.d/labels.json
VERBOSE2 SINGULARITY_INCLUDECMD found as False
VERBOSE2 SINGULARITY_PULLFOLDER found as /home/jbdenis
VERBOSE2 SHUB_NAMEBYHASH not defined (None)
VERBOSE2 SHUB_NAMEBYCOMMIT not defined (None)
VERBOSE2 SHUB_CONTAINERNAME not defined (None)
VERBOSE2 SINGULARITY_CONTENTS found as /tmp/.singularity-layers.1writyZF
VERBOSE2 SINGULARITY_PYTHREADS found as 9
VERBOSE2 SINGULARITY_CONTAINER found as docker://centos:6
DEBUG Found uri docker://
DEBUG
*** STARTING DOCKER IMPORT PYTHON ****
DEBUG Docker layers and metadata will be written to: /tmp/.singularity-layers.1writyZF
VERBOSE2 SINGULARITY_DOCKER_USERNAME not defined (None)
VERBOSE2 SINGULARITY_DOCKER_PASSWORD found
DEBUG Starting Docker IMPORT, includes environment, runscript, and metadata.
VERBOSE Docker image: centos:6
VERBOSE2 Specified Docker ENTRYPOINT as %runscript.
DEBUG Headers found: Content-Type,Accept
VERBOSE Registry: index.docker.io
VERBOSE Namespace: library
VERBOSE Repo Name: centos
VERBOSE Repo Tag: 6
VERBOSE Version: None
VERBOSE Obtaining tags: https://index.docker.io/v2/library/centos/tags/list
DEBUG GET https://index.docker.io/v2/library/centos/tags/list
DEBUG Http Error with code 401
DEBUG GET https://auth.docker.io/token?service=registry.docker.io&expires_in=9000&scope=repository:library/centos:pull
DEBUG Headers found: Content-Type,Authorization,Accept
VERBOSE3 Response on obtaining token is None.
VERBOSE Obtaining manifest: https://index.docker.io/v2/library/centos/manifests/6
DEBUG GET https://index.docker.io/v2/library/centos/manifests/6
DEBUG Image manifest version 2.2 found.
DEBUG Adding digest sha256:8b04204cfecd799ca315da5d0460363f2c114ed699bc0a2e023bb26fd85243ee
VERBOSE Obtaining manifest: https://index.docker.io/v2/library/centos/manifests/6
DEBUG GET https://index.docker.io/v2/library/centos/manifests/6
DEBUG Using 9 workers for multiprocess.
VERBOSE3 Found Docker command (Entrypoint) None
VERBOSE3 Found Docker command (Cmd) /bin/bash
VERBOSE3 Adding Docker CMD as Singularity runscript...
DEBUG /bin/bash
VERBOSE3 Found Docker command (Env) PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
VERBOSE3 Found Docker container environment!
VERBOSE3 Adding Docker environment to metadata tar
DEBUG Found template for tarinfo
VERBOSE3 Found Docker command (Labels) {u'build-date': u'20170705', u'vendor': u'CentOS', u'name': u'CentOS Base Image', u'license': u'GPLv2'}
VERBOSE3 Found Docker container labels!
VERBOSE3 Adding Docker labels to metadata tar
DEBUG Found template for tarinfo
VERBOSE3 Adding Docker runscript to metadata tar
DEBUG Found template for tarinfo
DEBUG metadata file /home/jbdenis/.singularity/metadata/sha256:60e3079474b1671bcc20b340572ee6cae735ecdd5a13d6686475ca4916eb6003.tar.gz already exists will over-write.
VERBOSE2 Tar file with Docker env and labels: /home/jbdenis/.singularity/metadata/sha256:60e3079474b1671bcc20b340572ee6cae735ecdd5a13d6686475ca4916eb6003.tar.gz
VERBOSE3 Writing Docker layers files to /tmp/.singularity-layers.1writyZF
VERBOSE2 Writing file /tmp/.singularity-layers.1writyZF with mode w.
VERBOSE2 Writing file /tmp/.singularity-layers.1writyZF with mode a.
DEBUG *** FINISHING DOCKER IMPORT PYTHON PORTION ****
Docker image path: index.docker.io/library/centos:6
Cache folder set to /home/jbdenis/.singularity/docker
Creating container runtime...
Importing: base Singularity environment
Exploding layer: sha256:8b04204cfecd799ca315da5d0460363f2c114ed699bc0a2e023bb26fd85243ee.tar.gz
Exploding layer: sha256:60e3079474b1671bcc20b340572ee6cae735ecdd5a13d6686475ca4916eb6003.tar.gz
VERBOSE [U=0,P=24268] message_init() Set messagelevel to: 5
VERBOSE [U=0,P=24268] singularity_config_parse() Initialize configuration file: /usr/local/etc/singularity/singularity.conf
DEBUG [U=0,P=24268] singularity_config_parse() Starting parse of configuration file /usr/local/etc/singularity/singularity.conf
VERBOSE [U=0,P=24268] singularity_config_parse() Got config key allow setuid = 'yes'
VERBOSE [U=0,P=24268] singularity_config_parse() Got config key max loop devices = '256'
VERBOSE [U=0,P=24268] singularity_config_parse() Got config key allow pid ns = 'yes'
VERBOSE [U=0,P=24268] singularity_config_parse() Got config key config passwd = 'yes'
VERBOSE [U=0,P=24268] singularity_config_parse() Got config key config group = 'yes'
VERBOSE [U=0,P=24268] singularity_config_parse() Got config key config resolv_conf = 'yes'
VERBOSE [U=0,P=24268] singularity_config_parse() Got config key mount proc = 'yes'
VERBOSE [U=0,P=24268] singularity_config_parse() Got config key mount sys = 'yes'
VERBOSE [U=0,P=24268] singularity_config_parse() Got config key mount dev = 'yes'
VERBOSE [U=0,P=24268] singularity_config_parse() Got config key mount home = 'yes'
VERBOSE [U=0,P=24268] singularity_config_parse() Got config key mount tmp = 'yes'
VERBOSE [U=0,P=24268] singularity_config_parse() Got config key mount hostfs = 'no'
VERBOSE [U=0,P=24268] singularity_config_parse() Got config key bind path = '/etc/localtime'
VERBOSE [U=0,P=24268] singularity_config_parse() Got config key bind path = '/etc/hosts'
VERBOSE [U=0,P=24268] singularity_config_parse() Got config key user bind control = 'yes'
VERBOSE [U=0,P=24268] singularity_config_parse() Got config key enable overlay = 'yes'
VERBOSE [U=0,P=24268] singularity_config_parse() Got config key mount slave = 'yes'
VERBOSE [U=0,P=24268] singularity_config_parse() Got config key sessiondir max size = '16'
DEBUG [U=0,P=24268] singularity_config_parse() Finished parsing configuration file '/usr/local/etc/singularity/singularity.conf'
VERBOSE [U=0,P=24268] singularity_registry_init() Initializing Singularity Registry
VERBOSE [U=0,P=24268] singularity_registry_set() Adding value to registry: 'COMMAND' = 'shell'
DEBUG [U=0,P=24268] singularity_registry_set() Returning singularity_registry_set(COMMAND, shell) = 0
VERBOSE [U=0,P=24268] singularity_registry_set() Adding value to registry: 'SYSCONFDIR' = '/usr/local/etc'
DEBUG [U=0,P=24268] singularity_registry_set() Returning singularity_registry_set(sysconfdir, /usr/local/etc) = 0
VERBOSE [U=0,P=24268] singularity_registry_set() Adding value to registry: 'CLEANUPDIR' = '/tmp/.singularity-runtime.aihvo2qb'
DEBUG [U=0,P=24268] singularity_registry_set() Returning singularity_registry_set(CLEANUPDIR, /tmp/.singularity-runtime.aihvo2qb) = 0
VERBOSE [U=0,P=24268] singularity_registry_set() Adding value to registry: 'ROOTFS' = '/tmp/.singularity-runtime.aihvo2qb/centos:6'
DEBUG [U=0,P=24268] singularity_registry_set() Returning singularity_registry_set(ROOTFS, /tmp/.singularity-runtime.aihvo2qb/centos:6) = 0
VERBOSE [U=0,P=24268] singularity_registry_set() Adding value to registry: 'CONTAINER' = 'docker://centos:6'
DEBUG [U=0,P=24268] singularity_registry_set() Returning singularity_registry_set(CONTAINER, docker://centos:6) = 0
VERBOSE [U=0,P=24268] singularity_registry_set() Adding value to registry: 'VERSION' = '2.3.1-development.ga78190c8'
DEBUG [U=0,P=24268] singularity_registry_set() Returning singularity_registry_set(version, 2.3.1-development.ga78190c8) = 0
VERBOSE [U=0,P=24268] singularity_registry_set() Adding value to registry: 'IMAGE' = '/tmp/.singularity-runtime.aihvo2qb/centos:6'
DEBUG [U=0,P=24268] singularity_registry_set() Returning singularity_registry_set(IMAGE, /tmp/.singularity-runtime.aihvo2qb/centos:6) = 0
VERBOSE [U=0,P=24268] singularity_registry_set() Adding value to registry: 'MESSAGELEVEL' = '5'
DEBUG [U=0,P=24268] singularity_registry_set() Returning singularity_registry_set(MESSAGELEVEL, 5) = 0
VERBOSE [U=0,P=24268] singularity_registry_set() Adding value to registry: 'CONTENTS' = '/tmp/.singularity-layers.1writyZF'
DEBUG [U=0,P=24268] singularity_registry_set() Returning singularity_registry_set(CONTENTS, /tmp/.singularity-layers.1writyZF) = 0
VERBOSE [U=0,P=24268] singularity_registry_set() Adding value to registry: 'BINDIR' = '/usr/local/bin'
DEBUG [U=0,P=24268] singularity_registry_set() Returning singularity_registry_set(bindir, /usr/local/bin) = 0
VERBOSE [U=0,P=24268] singularity_registry_set() Adding value to registry: 'LOCALSTATEDIR' = '/usr/local/var'
DEBUG [U=0,P=24268] singularity_registry_set() Returning singularity_registry_set(localstatedir, /usr/local/var) = 0
VERBOSE [U=0,P=24268] singularity_registry_set() Adding value to registry: 'LIBEXECDIR' = '/usr/local/libexec'
DEBUG [U=0,P=24268] singularity_registry_set() Returning singularity_registry_set(libexecdir, /usr/local/libexec) = 0
DEBUG [U=0,P=24268] singularity_registry_get() Returning NULL on 'HOME'
DEBUG [U=0,P=24268] singularity_registry_get() Returning NULL on 'TARGET_UID'
DEBUG [U=0,P=24268] singularity_registry_get() Returning NULL on 'TARGET_GID'
DEBUG [U=0,P=24268] singularity_priv_init() Initializing user info
DEBUG [U=0,P=24268] singularity_priv_init() Set the calling user's username to: jbdenis
DEBUG [U=0,P=24268] singularity_priv_init() Marking uinfo structure as ready
DEBUG [U=0,P=24268] singularity_priv_init() Obtaining home directory
VERBOSE [U=0,P=24268] singularity_priv_init() Set home (via getpwuid()) to: /home/jbdenis
VERBOSE [U=0,P=24268] singularity_suid_init() Running SUID program workflow
VERBOSE [U=0,P=24268] singularity_suid_init() Checking program has appropriate permissions
VERBOSE [U=0,P=24268] singularity_suid_init() Checking configuration file is properly owned by root
VERBOSE [U=0,P=24268] singularity_suid_init() Checking if singularity.conf allows us to run as suid
DEBUG [U=0,P=24268] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(allow setuid, yes)
DEBUG [U=0,P=24268] singularity_config_get_value_impl() Returning configuration value allow setuid='yes'
DEBUG [U=0,P=24268] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(allow setuid, yes) = 1
DEBUG [U=0,P=24268] singularity_registry_get() Returning NULL on 'NOSUID'
VERBOSE [U=0,P=24268] singularity_priv_userns() Invoking the user namespace
DEBUG [U=0,P=24268] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(allow user ns, yes)
DEBUG [U=0,P=24268] singularity_config_get_value_impl() No configuration entry found for 'allow user ns'; returning default value 'yes'
DEBUG [U=0,P=24268] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(allow user ns, yes) = 1
VERBOSE [U=0,P=24268] singularity_priv_userns() Not virtualizing USER namespace: running as SUID
DEBUG [U=0,P=24268] singularity_priv_userns() Returning singularity_priv_init(void)
DEBUG [U=0,P=24268] singularity_priv_drop() Dropping privileges to UID=21489, GID=1000 (13 supplementary GIDs)
DEBUG [U=0,P=24268] singularity_priv_drop() Restoring supplementary groups
DEBUG [U=21489,P=24268] singularity_priv_drop() Confirming we have correct UID/GID
DEBUG [U=21489,P=24268] singularity_registry_get() Returning value from registry: 'CLEANUPDIR' = '/tmp/.singularity-runtime.aihvo2qb'
DEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'NOSESSIONCLEANUP'
DEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'NOCLEANUP'
DEBUG [U=21489,P=24268] singularity_cleanupd() Creating new cleanup trigger file: /tmp/.singularity-cleanuptrigger.xupuco7z
DEBUG [U=21489,P=24268] singularity_cleanupd() Opening cleanup trigger file: /tmp/.singularity-cleanuptrigger.xupuco7z
DEBUG [U=21489,P=24268] singularity_cleanupd() Gaining an exclusive flock on FD 4
VERBOSE [U=21489,P=2949] singularity_cleanupd() Exec'ing cleanupd thread: /usr/local/libexec/singularity/bin/cleanupd
DEBUG [U=21489,P=2949] envar_set() Setting environment variable: 'SINGULARITY_CLEANUPDIR' = '/tmp/.singularity-runtime.aihvo2qb'
DEBUG [U=21489,P=2949] envar_set() Setting environment variable: 'SINGULARITY_CLEANUPTRIGGER' = '/tmp/.singularity-cleanuptrigger.xupuco7z'
VERBOSE [U=21489,P=2949] message_init() Set messagelevel to: 5
DEBUG [U=21489,P=2949] envar_path() Checking environment variable is valid path: 'SINGULARITY_CLEANUPDIR'
VERBOSE [U=21489,P=2949] envar_get() Checking input from environment: 'SINGULARITY_CLEANUPDIR'
DEBUG [U=21489,P=2949] envar_get() Checking environment variable is defined: SINGULARITY_CLEANUPDIR
DEBUG [U=21489,P=2949] envar_get() Checking environment variable length (<= 4096): SINGULARITY_CLEANUPDIR
DEBUG [U=21489,P=2949] envar_get() Checking environment variable has allowed characters: SINGULARITY_CLEANUPDIR
VERBOSE [U=21489,P=2949] envar_get() Obtained input from environment 'SINGULARITY_CLEANUPDIR' = '/tmp/.singularity-runtime.aihvo2qb'
DEBUG [U=21489,P=2949] envar_path() Checking environment variable is valid path: 'SINGULARITY_CLEANUPTRIGGER'
VERBOSE [U=21489,P=2949] envar_get() Checking input from environment: 'SINGULARITY_CLEANUPTRIGGER'
DEBUG [U=21489,P=2949] envar_get() Checking environment variable is defined: SINGULARITY_CLEANUPTRIGGER
DEBUG [U=21489,P=2949] envar_get() Checking environment variable length (<= 4096): SINGULARITY_CLEANUPTRIGGER
DEBUG [U=21489,P=2949] envar_get() Checking environment variable has allowed characters: SINGULARITY_CLEANUPTRIGGER
VERBOSE [U=21489,P=2949] envar_get() Obtained input from environment 'SINGULARITY_CLEANUPTRIGGER' = '/tmp/.singularity-cleanuptrigger.xupuco7z'
DEBUG [U=21489,P=2949] main() Starting cleanup process
DEBUG [U=21489,P=2949] main() Opening cleanup trigger file: /tmp/.singularity-cleanuptrigger.xupuco7z
DEBUG [U=21489,P=2949] main() Checking to see if we need to daemonize
VERBOSE [U=21489,P=2949] main() Daemonizing cleandir cleanup process
DEBUG [U=21489,P=2950] main() Waiting for exclusive flock() on trigger file descriptor: 4
DEBUG [U=21489,P=24268] singularity_runtime_ns() Calling: _singularity_runtime_ns_pid()
DEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(allow pid ns, yes)
DEBUG [U=21489,P=24268] singularity_config_get_value_impl() Returning configuration value allow pid ns='yes'
DEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(allow pid ns, yes) = 1
DEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'UNSHARE_PID'
VERBOSE [U=21489,P=24268] singularity_runtime_ns_pid() Not virtualizing PID namespace on user request
DEBUG [U=21489,P=24268] singularity_runtime_ns() Calling: _singularity_runtime_ns_ipc()
DEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(allow ipc ns, yes)
DEBUG [U=21489,P=24268] singularity_config_get_value_impl() No configuration entry found for 'allow ipc ns'; returning default value 'yes'
DEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(allow ipc ns, yes) = 1
DEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'UNSHARE_IPC'
VERBOSE [U=21489,P=24268] singularity_runtime_ns_ipc() Not virtualizing IPC namespace on user request
DEBUG [U=21489,P=24268] singularity_runtime_ns() Calling: _singularity_runtime_ns_mnt()
DEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(mount slave, yes)
DEBUG [U=21489,P=24268] singularity_config_get_value_impl() Returning configuration value mount slave='yes'
DEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(mount slave, yes) = 1
DEBUG [U=21489,P=24268] singularity_priv_escalate() Temporarily escalating privileges (U=21489)
DEBUG [U=0,P=24268] singularity_priv_escalate() Clearing supplementary GIDs.
DEBUG [U=0,P=24268] singularity_runtime_ns_mnt() Virtualizing FS namespace
DEBUG [U=0,P=24268] singularity_runtime_ns_mnt() Virtualizing mount namespace
DEBUG [U=0,P=24268] singularity_runtime_ns_mnt() Making mounts slave
DEBUG [U=0,P=24268] singularity_priv_drop() Dropping privileges to UID=21489, GID=1000 (13 supplementary GIDs)
DEBUG [U=0,P=24268] singularity_priv_drop() Restoring supplementary groups
DEBUG [U=21489,P=24268] singularity_priv_drop() Confirming we have correct UID/GID
DEBUG [U=21489,P=24268] singularity_sessiondir() Setting sessiondir
VERBOSE [U=21489,P=24268] singularity_sessiondir() Using session directory: /usr/local/var/singularity/mnt/session
DEBUG [U=21489,P=24268] singularity_sessiondir() Checking for session directory: /usr/local/var/singularity/mnt/session
DEBUG [U=21489,P=24268] singularity_sessiondir() Obtaining the default sessiondir size
DEBUG [U=21489,P=24268] singularity_config_get_value_impl() Returning configuration value sessiondir max size='16'
DEBUG [U=21489,P=24268] singularity_sessiondir() Converted sessiondir size to: 16
DEBUG [U=21489,P=24268] singularity_sessiondir() Creating the sessiondir size mount option length
DEBUG [U=21489,P=24268] singularity_sessiondir() Got size length of: 9
DEBUG [U=21489,P=24268] singularity_sessiondir() Creating the sessiondir size mount option string
DEBUG [U=21489,P=24268] singularity_sessiondir() Checking to make sure the string was allocated correctly
DEBUG [U=21489,P=24268] singularity_priv_escalate() Temporarily escalating privileges (U=21489)
DEBUG [U=0,P=24268] singularity_priv_escalate() Clearing supplementary GIDs.
DEBUG [U=0,P=24268] singularity_sessiondir() Mounting sessiondir tmpfs: /usr/local/var/singularity/mnt/session
DEBUG [U=0,P=24268] singularity_priv_drop() Dropping privileges to UID=21489, GID=1000 (13 supplementary GIDs)
DEBUG [U=0,P=24268] singularity_priv_drop() Restoring supplementary groups
DEBUG [U=21489,P=24268] singularity_priv_drop() Confirming we have correct UID/GID
VERBOSE [U=21489,P=24268] singularity_registry_set() Adding value to registry: 'SESSIONDIR' = '/usr/local/var/singularity/mnt/session'
DEBUG [U=21489,P=24268] singularity_registry_set() Returning singularity_registry_set(SESSIONDIR, /usr/local/var/singularity/mnt/session) = 0
DEBUG [U=21489,P=24268] singularity_registry_get() Returning value from registry: 'IMAGE' = '/tmp/.singularity-runtime.aihvo2qb/centos:6'
DEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'WRITABLE'
DEBUG [U=21489,P=24268] singularity_config_get_value_impl() No configuration entry found for 'limit container owners'; returning default value 'NULL'
DEBUG [U=21489,P=24268] singularity_config_get_value_impl() No configuration entry found for 'limit container paths'; returning default value 'NULL'
DEBUG [U=21489,P=24268] singularity_image_open() Opening file descriptor to image: /tmp/.singularity-runtime.aihvo2qb/centos:6
VERBOSE [U=21489,P=24268] singularity_image_check() Checking what kind of image we are mounting
VERBOSE [U=21489,P=24268] singularity_image_check_image() Image is a directory, returning retval=1: /tmp/.singularity-runtime.aihvo2qb/centos:6
DEBUG [U=21489,P=24268] singularity_image_check_squashfs() Image does not appear to be of type '.sqsh': /tmp/.singularity-runtime.aihvo2qb/centos:6
DEBUG [U=21489,P=24268] singularity_image_check_dir() Checking if image is a directory
DEBUG [U=21489,P=24268] singularity_config_get_value_impl() Returning configuration value max loop devices='256'
DEBUG [U=21489,P=24268] singularity_image_bind() Entered singularity_image_bind()
DEBUG [U=21489,P=24268] singularity_image_bind() Converting max_loop_devs_string to int: '256'
DEBUG [U=21489,P=24268] singularity_image_bind() Converted max_loop_devs_string to int: '256' -> 256
DEBUG [U=21489,P=24268] singularity_image_bind() Checking if this image has been properly opened
DEBUG [U=21489,P=24268] singularity_image_bind() Checking if image is valid file
VERBOSE [U=21489,P=24268] singularity_image_bind() Skipping image bind, container is not a file
VERBOSE [U=21489,P=24268] singularity_runtime_rootfs() Set container directory to: /usr/local/var/singularity/mnt/container
DEBUG [U=21489,P=24268] singularity_runtime_rootfs() Checking for container directory
DEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/container
DEBUG [U=21489,P=24268] chk_mode() Checking exact mode (40755) on: /usr/local/var/singularity/mnt/container
DEBUG [U=21489,P=24268] chk_mode() Found appropriate mode on file: /usr/local/var/singularity/mnt/container
VERBOSE [U=21489,P=24268] singularity_image_mount() Checking what kind of image we are mounting
VERBOSE [U=21489,P=24268] singularity_image_mount() Attempting to mount as directory image
DEBUG [U=21489,P=24268] singularity_priv_escalate() Temporarily escalating privileges (U=21489)
DEBUG [U=0,P=24268] singularity_priv_escalate() Clearing supplementary GIDs.
DEBUG [U=0,P=24268] singularity_image_mount_dir_mount() Mounting container directory /tmp/.singularity-runtime.aihvo2qb/centos:6->/usr/local/var/singularity/mnt/container
DEBUG [U=0,P=24268] singularity_priv_drop() Dropping privileges to UID=21489, GID=1000 (13 supplementary GIDs)
DEBUG [U=0,P=24268] singularity_priv_drop() Restoring supplementary groups
DEBUG [U=21489,P=24268] singularity_priv_drop() Confirming we have correct UID/GID
DEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/container
DEBUG [U=21489,P=24268] action_ready() Checking if container is valid at: /usr/local/var/singularity/mnt/container
DEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/container
DEBUG [U=21489,P=24268] singularity_runtime_overlayfs() Checking if overlayfs should be used
DEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(enable overlay, yes)
DEBUG [U=21489,P=24268] singularity_config_get_value_impl() Returning configuration value enable overlay='yes'
DEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(enable overlay, yes) = 1
DEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'DISABLE_OVERLAYFS'
DEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'WRITABLE'
DEBUG [U=21489,P=24268] singularity_runtime_overlayfs() OverlayFS enabled by host build
DEBUG [U=21489,P=24268] singularity_runtime_overlayfs() Setting up overlay mount options
DEBUG [U=21489,P=24268] singularity_runtime_overlayfs() Checking for existance of overlay directory: /usr/local/var/singularity/mnt/overlay
DEBUG [U=21489,P=24268] singularity_priv_escalate() Temporarily escalating privileges (U=21489)
DEBUG [U=0,P=24268] singularity_priv_escalate() Clearing supplementary GIDs.
DEBUG [U=0,P=24268] singularity_runtime_overlayfs() Mounting overlay tmpfs: /usr/local/var/singularity/mnt/overlay
DEBUG [U=0,P=24268] singularity_runtime_overlayfs() Creating upper overlay directory: /usr/local/var/singularity/mnt/overlay/upper
DEBUG [U=0,P=24268] s_mkpath() Creating directory: /usr/local/var/singularity/mnt/overlay/upper
DEBUG [U=0,P=24268] singularity_runtime_overlayfs() Creating overlay work directory: /usr/local/var/singularity/mnt/overlay/work
DEBUG [U=0,P=24268] s_mkpath() Creating directory: /usr/local/var/singularity/mnt/overlay/work
DEBUG [U=0,P=24268] singularity_runtime_overlayfs() Creating overlay_final directory: /usr/local/var/singularity/mnt/overlay/final
DEBUG [U=0,P=24268] s_mkpath() Creating directory: /usr/local/var/singularity/mnt/overlay/final
VERBOSE [U=0,P=24268] singularity_runtime_overlayfs() Mounting overlay with options: lowerdir=/usr/local/var/singularity/mnt/container,upperdir=/usr/local/var/singularity/mnt/overlay/upper,workdir=/usr/local/var/singularity/mnt/overlay/work
DEBUG [U=0,P=24268] singularity_priv_drop() Dropping privileges to UID=21489, GID=1000 (13 supplementary GIDs)
DEBUG [U=0,P=24268] singularity_priv_drop() Restoring supplementary groups
DEBUG [U=21489,P=24268] singularity_priv_drop() Confirming we have correct UID/GID
VERBOSE [U=21489,P=24268] singularity_registry_set() Adding value to registry: 'OVERLAYFS_ENABLED' = '1'
DEBUG [U=21489,P=24268] singularity_registry_set() Returning singularity_registry_set(OVERLAYFS_ENABLED, 1) = 0
VERBOSE [U=21489,P=24268] singularity_runtime_overlayfs() Updating the containerdir to: /usr/local/var/singularity/mnt/overlay/final
DEBUG [U=21489,P=24268] singularity_runtime_rootfs() Setting container_directory = '/usr/local/var/singularity/mnt/overlay/final'
DEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final
DEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final
VERBOSE [U=21489,P=24268] singularity_runtime_mounts() Running all mount components
DEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final
DEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(mount hostfs, no)
DEBUG [U=21489,P=24268] singularity_config_get_value_impl() Returning configuration value mount hostfs='no'
DEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(mount hostfs, no) = 0
DEBUG [U=21489,P=24268] singularity_runtime_mount_hostfs() Not mounting host file systems per configuration
DEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final
DEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'CONTAIN'
DEBUG [U=21489,P=24268] singularity_runtime_mount_binds() Checking configuration file for 'bind path'
VERBOSE [U=21489,P=24268] singularity_runtime_mount_binds() Found 'bind path' = /etc/localtime, /etc/localtime
DEBUG [U=21489,P=24268] singularity_runtime_mount_binds() Checking if bind point is already mounted: /etc/localtime
DEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final
DEBUG [U=21489,P=24268] check_mounted() Opening /proc/mounts
DEBUG [U=21489,P=24268] check_mounted() Iterating through /proc/mounts
DEBUG [U=21489,P=24268] singularity_priv_escalate() Temporarily escalating privileges (U=21489)
DEBUG [U=0,P=24268] singularity_priv_escalate() Clearing supplementary GIDs.
VERBOSE [U=0,P=24268] singularity_runtime_mount_binds() Binding '/etc/localtime' to '/usr/local/var/singularity/mnt/overlay/final//etc/localtime'
DEBUG [U=0,P=24268] singularity_priv_drop() Dropping privileges to UID=21489, GID=1000 (13 supplementary GIDs)
DEBUG [U=0,P=24268] singularity_priv_drop() Restoring supplementary groups
DEBUG [U=21489,P=24268] singularity_priv_drop() Confirming we have correct UID/GID
VERBOSE [U=21489,P=24268] singularity_runtime_mount_binds() Found 'bind path' = /etc/hosts, /etc/hosts
DEBUG [U=21489,P=24268] singularity_runtime_mount_binds() Checking if bind point is already mounted: /etc/hosts
DEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final
DEBUG [U=21489,P=24268] check_mounted() Opening /proc/mounts
DEBUG [U=21489,P=24268] check_mounted() Iterating through /proc/mounts
DEBUG [U=21489,P=24268] singularity_priv_escalate() Temporarily escalating privileges (U=21489)
DEBUG [U=0,P=24268] singularity_priv_escalate() Clearing supplementary GIDs.
VERBOSE [U=0,P=24268] singularity_runtime_mount_binds() Binding '/etc/hosts' to '/usr/local/var/singularity/mnt/overlay/final//etc/hosts'
DEBUG [U=0,P=24268] singularity_priv_drop() Dropping privileges to UID=21489, GID=1000 (13 supplementary GIDs)
DEBUG [U=0,P=24268] singularity_priv_drop() Restoring supplementary groups
DEBUG [U=21489,P=24268] singularity_priv_drop() Confirming we have correct UID/GID
DEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final
DEBUG [U=21489,P=24268] singularity_runtime_mount_kernelfs() Checking configuration file for 'mount proc'
DEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(mount proc, yes)
DEBUG [U=21489,P=24268] singularity_config_get_value_impl() Returning configuration value mount proc='yes'
DEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(mount proc, yes) = 1
DEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'PIDNS_ENABLED'
DEBUG [U=21489,P=24268] singularity_priv_escalate() Temporarily escalating privileges (U=21489)
DEBUG [U=0,P=24268] singularity_priv_escalate() Clearing supplementary GIDs.
VERBOSE [U=0,P=24268] singularity_runtime_mount_kernelfs() Bind-mounting host /proc
DEBUG [U=0,P=24268] singularity_priv_drop() Dropping privileges to UID=21489, GID=1000 (13 supplementary GIDs)
DEBUG [U=0,P=24268] singularity_priv_drop() Restoring supplementary groups
DEBUG [U=21489,P=24268] singularity_priv_drop() Confirming we have correct UID/GID
DEBUG [U=21489,P=24268] singularity_runtime_mount_kernelfs() Checking configuration file for 'mount sys'
DEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(mount sys, yes)
DEBUG [U=21489,P=24268] singularity_config_get_value_impl() Returning configuration value mount sys='yes'
DEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(mount sys, yes) = 1
DEBUG [U=21489,P=24268] singularity_priv_escalate() Temporarily escalating privileges (U=21489)
DEBUG [U=0,P=24268] singularity_priv_escalate() Clearing supplementary GIDs.
VERBOSE [U=0,P=24268] singularity_runtime_mount_kernelfs() Mounting /sys
DEBUG [U=0,P=24268] singularity_priv_drop() Dropping privileges to UID=21489, GID=1000 (13 supplementary GIDs)
DEBUG [U=0,P=24268] singularity_priv_drop() Restoring supplementary groups
DEBUG [U=21489,P=24268] singularity_priv_drop() Confirming we have correct UID/GID
DEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final
DEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'CONTAIN'
DEBUG [U=21489,P=24268] singularity_config_get_value_impl() Returning configuration value mount dev='yes'
DEBUG [U=21489,P=24268] singularity_runtime_mount_dev() Checking configuration file for 'mount dev'
DEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(mount dev, yes)
DEBUG [U=21489,P=24268] singularity_config_get_value_impl() Returning configuration value mount dev='yes'
DEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(mount dev, yes) = 1
DEBUG [U=21489,P=24268] singularity_priv_escalate() Temporarily escalating privileges (U=21489)
DEBUG [U=0,P=24268] singularity_priv_escalate() Clearing supplementary GIDs.
VERBOSE [U=0,P=24268] singularity_runtime_mount_dev() Bind mounting /dev
DEBUG [U=0,P=24268] singularity_priv_drop() Dropping privileges to UID=21489, GID=1000 (13 supplementary GIDs)
DEBUG [U=0,P=24268] singularity_priv_drop() Restoring supplementary groups
DEBUG [U=21489,P=24268] singularity_priv_drop() Confirming we have correct UID/GID
DEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final
DEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(mount home, yes)
DEBUG [U=21489,P=24268] singularity_config_get_value_impl() Returning configuration value mount home='yes'
DEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(mount home, yes) = 1
DEBUG [U=21489,P=24268] singularity_runtime_mount_home() Checking that home directry is configured: /home/jbdenis
DEBUG [U=21489,P=24268] singularity_runtime_mount_home() Checking if SINGULARITY_CONTAIN is set
DEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'CONTAIN'
DEBUG [U=21489,P=24268] singularity_runtime_mount_home() Checking if home directories are being influenced by user
DEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'HOME'
DEBUG [U=21489,P=24268] singularity_runtime_mount_home() Checking ownership of home directory source: /home/jbdenis
DEBUG [U=21489,P=24268] singularity_runtime_mount_home() Checking to make sure home directory destination is a full path: /home/jbdenis
DEBUG [U=21489,P=24268] singularity_runtime_mount_home() Checking if home directory is already mounted: /home/jbdenis
DEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final
DEBUG [U=21489,P=24268] check_mounted() Opening /proc/mounts
DEBUG [U=21489,P=24268] check_mounted() Iterating through /proc/mounts
DEBUG [U=21489,P=24268] singularity_runtime_mount_home() Checking if overlay is enabled
DEBUG [U=21489,P=24268] singularity_registry_get() Returning value from registry: 'OVERLAYFS_ENABLED' = '1'
DEBUG [U=21489,P=24268] singularity_runtime_mount_home() Binding home directory direct (no staging)
DEBUG [U=21489,P=24268] singularity_runtime_mount_home() Setting home directory source to: '/home/jbdenis'
DEBUG [U=21489,P=24268] singularity_runtime_mount_home() Setting home directory dest to: '/usr/local/var/singularity/mnt/overlay/final' + '/home/jbdenis'
DEBUG [U=21489,P=24268] singularity_runtime_mount_home() Creating home directry within container: /usr/local/var/singularity/mnt/overlay/final/home/jbdenis
DEBUG [U=21489,P=24268] singularity_priv_escalate() Temporarily escalating privileges (U=21489)
DEBUG [U=0,P=24268] singularity_priv_escalate() Clearing supplementary GIDs.
DEBUG [U=0,P=24268] s_mkpath() Creating directory: /usr/local/var/singularity/mnt/overlay/final/home/jbdenis
DEBUG [U=0,P=24268] singularity_priv_drop() Dropping privileges to UID=21489, GID=1000 (13 supplementary GIDs)
DEBUG [U=0,P=24268] singularity_priv_drop() Restoring supplementary groups
DEBUG [U=21489,P=24268] singularity_priv_drop() Confirming we have correct UID/GID
DEBUG [U=21489,P=24268] singularity_runtime_mount_home() Created home directory within the container: /usr/local/var/singularity/mnt/overlay/final/home/jbdenis
DEBUG [U=21489,P=24268] singularity_priv_escalate() Temporarily escalating privileges (U=21489)
DEBUG [U=0,P=24268] singularity_priv_escalate() Clearing supplementary GIDs.
VERBOSE [U=0,P=24268] singularity_runtime_mount_home() Mounting home directory source into container: /home/jbdenis -> /usr/local/var/singularity/mnt/overlay/final/home/jbdenis
DEBUG [U=0,P=24268] singularity_priv_drop() Dropping privileges to UID=21489, GID=1000 (13 supplementary GIDs)
DEBUG [U=0,P=24268] singularity_priv_drop() Restoring supplementary groups
DEBUG [U=21489,P=24268] singularity_priv_drop() Confirming we have correct UID/GID
DEBUG [U=21489,P=24268] envar_set() Setting environment variable: 'HOME' = '/home/jbdenis'
DEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final
DEBUG [U=21489,P=24268] singularity_runtime_mount_userbinds() Checking for environment variable 'SINGULARITY_BINDPATH'
DEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'BINDPATH'
DEBUG [U=21489,P=24268] singularity_runtime_mount_userbinds() No user bind mounts specified.
DEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final
DEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(mount tmp, yes)
DEBUG [U=21489,P=24268] singularity_config_get_value_impl() Returning configuration value mount tmp='yes'
DEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(mount tmp, yes) = 1
DEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'CONTAIN'
DEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final
DEBUG [U=21489,P=24268] check_mounted() Opening /proc/mounts
DEBUG [U=21489,P=24268] check_mounted() Iterating through /proc/mounts
DEBUG [U=21489,P=24268] s_mkpath() Directory exists, returning '0': /tmp
DEBUG [U=21489,P=24268] singularity_priv_escalate() Temporarily escalating privileges (U=21489)
DEBUG [U=0,P=24268] singularity_priv_escalate() Clearing supplementary GIDs.
VERBOSE [U=0,P=24268] singularity_runtime_mount_tmp() Mounting directory: /tmp
DEBUG [U=0,P=24268] singularity_priv_drop() Dropping privileges to UID=21489, GID=1000 (13 supplementary GIDs)
DEBUG [U=0,P=24268] singularity_priv_drop() Restoring supplementary groups
DEBUG [U=21489,P=24268] singularity_priv_drop() Confirming we have correct UID/GID
DEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final
DEBUG [U=21489,P=24268] check_mounted() Opening /proc/mounts
DEBUG [U=21489,P=24268] check_mounted() Iterating through /proc/mounts
DEBUG [U=21489,P=24268] s_mkpath() Directory exists, returning '0': /var/tmp
DEBUG [U=21489,P=24268] singularity_priv_escalate() Temporarily escalating privileges (U=21489)
DEBUG [U=0,P=24268] singularity_priv_escalate() Clearing supplementary GIDs.
VERBOSE [U=0,P=24268] singularity_runtime_mount_tmp() Mounting directory: /var/tmp
DEBUG [U=0,P=24268] singularity_priv_drop() Dropping privileges to UID=21489, GID=1000 (13 supplementary GIDs)
DEBUG [U=0,P=24268] singularity_priv_drop() Restoring supplementary groups
DEBUG [U=21489,P=24268] singularity_priv_drop() Confirming we have correct UID/GID
DEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final
DEBUG [U=21489,P=24268] singularity_runtime_mount_scratch() Getting SINGULARITY_SCRATCHDIR from environment
DEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'SCRATCHDIR'
DEBUG [U=21489,P=24268] singularity_runtime_mount_scratch() Not mounting scratch directory: Not requested
DEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final
DEBUG [U=21489,P=24268] singularity_runtime_mount_cwd() Checking to see if we should mount current working directory
DEBUG [U=21489,P=24268] singularity_runtime_mount_cwd() Getting current working directory
DEBUG [U=21489,P=24268] singularity_runtime_mount_cwd() Checking if current directory exists in container
DEBUG [U=21489,P=24268] file_devino() Called file_devino(/home/jbdenis)
DEBUG [U=21489,P=24268] file_devino() Returning file_devino(/home/jbdenis) = 65025.1610612929
DEBUG [U=21489,P=24268] file_devino() Called file_devino(/usr/local/var/singularity/mnt/overlay/final/home/jbdenis)
DEBUG [U=21489,P=24268] file_devino() Returning file_devino(/usr/local/var/singularity/mnt/overlay/final/home/jbdenis) = 65025.1610612929
DEBUG [U=21489,P=24268] singularity_runtime_mount_cwd() Checking if container's cwd == host's cwd
VERBOSE [U=21489,P=24268] singularity_runtime_mount_cwd() Not mounting current directory: location already available within container
DEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final
VERBOSE [U=21489,P=24268] singularity_runtime_files() Running file components
DEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final
DEBUG [U=21489,P=24268] singularity_registry_get() Returning value from registry: 'SESSIONDIR' = '/usr/local/var/singularity/mnt/session'
DEBUG [U=21489,P=24268] singularity_runtime_files_passwd() Called singularity_file_passwd_create()
DEBUG [U=21489,P=24268] singularity_runtime_files_passwd() Checking configuration option: 'config passwd'
DEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(config passwd, yes)
DEBUG [U=21489,P=24268] singularity_config_get_value_impl() Returning configuration value config passwd='yes'
DEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(config passwd, yes) = 1
VERBOSE [U=21489,P=24268] singularity_runtime_files_passwd() Checking for template passwd file: /usr/local/var/singularity/mnt/overlay/final/etc/passwd
VERBOSE [U=21489,P=24268] singularity_runtime_files_passwd() Creating template of /etc/passwd
DEBUG [U=21489,P=24268] copy_file() Called copy_file(/usr/local/var/singularity/mnt/overlay/final/etc/passwd, /usr/local/var/singularity/mnt/session/passwd)
DEBUG [U=21489,P=24268] copy_file() Opening source file: /usr/local/var/singularity/mnt/overlay/final/etc/passwd
DEBUG [U=21489,P=24268] copy_file() Opening destination file: /usr/local/var/singularity/mnt/session/passwd
DEBUG [U=21489,P=24268] copy_file() Calling fstat() on source file descriptor: 8
DEBUG [U=21489,P=24268] copy_file() Cloning permission string of source to dest
DEBUG [U=21489,P=24268] copy_file() Copying file data...
DEBUG [U=21489,P=24268] copy_file() Done copying data, closing file pointers
DEBUG [U=21489,P=24268] copy_file() Returning copy_file(/usr/local/var/singularity/mnt/overlay/final/etc/passwd, /usr/local/var/singularity/mnt/session/passwd) = 0
VERBOSE [U=21489,P=24268] singularity_runtime_files_passwd() Creating template passwd file and appending user data: /usr/local/var/singularity/mnt/session/passwd
DEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final
DEBUG [U=21489,P=24268] container_file_bind() Called file_bind(/usr/local/var/singularity/mnt/session/passwd, /etc/passwd()
DEBUG [U=21489,P=24268] singularity_priv_escalate() Temporarily escalating privileges (U=21489)
DEBUG [U=0,P=24268] singularity_priv_escalate() Clearing supplementary GIDs.
VERBOSE [U=0,P=24268] container_file_bind() Binding file '/usr/local/var/singularity/mnt/session/passwd' to '/usr/local/var/singularity/mnt/overlay/final/etc/passwd'
DEBUG [U=0,P=24268] singularity_priv_drop() Dropping privileges to UID=21489, GID=1000 (13 supplementary GIDs)
DEBUG [U=0,P=24268] singularity_priv_drop() Restoring supplementary groups
DEBUG [U=21489,P=24268] singularity_priv_drop() Confirming we have correct UID/GID
DEBUG [U=21489,P=24268] envar_set() Setting environment variable: 'HOME' = '/home/jbdenis'
DEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final
DEBUG [U=21489,P=24268] singularity_registry_get() Returning value from registry: 'SESSIONDIR' = '/usr/local/var/singularity/mnt/session'
DEBUG [U=21489,P=24268] singularity_runtime_files_group() Called singularity_file_group_create()
DEBUG [U=21489,P=24268] singularity_runtime_files_group() Checking configuration option: 'config group'
DEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(config group, yes)
DEBUG [U=21489,P=24268] singularity_config_get_value_impl() Returning configuration value config group='yes'
DEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(config group, yes) = 1
VERBOSE [U=21489,P=24268] singularity_runtime_files_group() Creating template of /etc/group for containment
DEBUG [U=21489,P=24268] copy_file() Called copy_file(/usr/local/var/singularity/mnt/overlay/final/etc/group, /usr/local/var/singularity/mnt/session/group)
DEBUG [U=21489,P=24268] copy_file() Opening source file: /usr/local/var/singularity/mnt/overlay/final/etc/group
DEBUG [U=21489,P=24268] copy_file() Opening destination file: /usr/local/var/singularity/mnt/session/group
DEBUG [U=21489,P=24268] copy_file() Calling fstat() on source file descriptor: 8
DEBUG [U=21489,P=24268] copy_file() Cloning permission string of source to dest
DEBUG [U=21489,P=24268] copy_file() Copying file data...
DEBUG [U=21489,P=24268] copy_file() Done copying data, closing file pointers
DEBUG [U=21489,P=24268] copy_file() Returning copy_file(/usr/local/var/singularity/mnt/overlay/final/etc/group, /usr/local/var/singularity/mnt/session/group) = 0
VERBOSE [U=21489,P=24268] singularity_runtime_files_group() Updating group file with user info
DEBUG [U=21489,P=24268] singularity_runtime_files_group() Getting supplementary group info
VERBOSE [U=21489,P=24268] singularity_runtime_files_group() Found supplementary group membership in: 24
VERBOSE [U=21489,P=24268] singularity_runtime_files_group() Adding user's supplementary group ('cdrom') info to template group file
VERBOSE [U=21489,P=24268] singularity_runtime_files_group() Found supplementary group membership in: 25
VERBOSE [U=21489,P=24268] singularity_runtime_files_group() Adding user's supplementary group ('floppy') info to template group file
VERBOSE [U=21489,P=24268] singularity_runtime_files_group() Found supplementary group membership in: 27
VERBOSE [U=21489,P=24268] singularity_runtime_files_group() Adding user's supplementary group ('sudo') info to template group file
VERBOSE [U=21489,P=24268] singularity_runtime_files_group() Found supplementary group membership in: 29
VERBOSE [U=21489,P=24268] singularity_runtime_files_group() Adding user's supplementary group ('audio') info to template group file
VERBOSE [U=21489,P=24268] singularity_runtime_files_group() Found supplementary group membership in: 30
VERBOSE [U=21489,P=24268] singularity_runtime_files_group() Adding user's supplementary group ('dip') info to template group file
VERBOSE [U=21489,P=24268] singularity_runtime_files_group() Found supplementary group membership in: 44
VERBOSE [U=21489,P=24268] singularity_runtime_files_group() Adding user's supplementary group ('video') info to template group file
VERBOSE [U=21489,P=24268] singularity_runtime_files_group() Found supplementary group membership in: 46
VERBOSE [U=21489,P=24268] singularity_runtime_files_group() Adding user's supplementary group ('plugdev') info to template group file
VERBOSE [U=21489,P=24268] singularity_runtime_files_group() Found supplementary group membership in: 108
VERBOSE [U=21489,P=24268] singularity_runtime_files_group() Adding user's supplementary group ('netdev') info to template group file
VERBOSE [U=21489,P=24268] singularity_runtime_files_group() Found supplementary group membership in: 112
VERBOSE [U=21489,P=24268] singularity_runtime_files_group() Adding user's supplementary group ('lpadmin') info to template group file
VERBOSE [U=21489,P=24268] singularity_runtime_files_group() Found supplementary group membership in: 113
VERBOSE [U=21489,P=24268] singularity_runtime_files_group() Adding user's supplementary group ('scanner') info to template group file
VERBOSE [U=21489,P=24268] singularity_runtime_files_group() Found supplementary group membership in: 126
VERBOSE [U=21489,P=24268] singularity_runtime_files_group() Adding user's supplementary group ('libvirt') info to template group file
DEBUG [U=21489,P=24268] singularity_runtime_files_group() Skipping duplicate supplementary group
VERBOSE [U=21489,P=24268] singularity_runtime_files_group() Found supplementary group membership in: 64055
VERBOSE [U=21489,P=24268] singularity_runtime_files_group() Adding user's supplementary group ('libvirt-qemu') info to template group file
DEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final
DEBUG [U=21489,P=24268] container_file_bind() Called file_bind(/usr/local/var/singularity/mnt/session/group, /etc/group()
DEBUG [U=21489,P=24268] singularity_priv_escalate() Temporarily escalating privileges (U=21489)
DEBUG [U=0,P=24268] singularity_priv_escalate() Clearing supplementary GIDs.
VERBOSE [U=0,P=24268] container_file_bind() Binding file '/usr/local/var/singularity/mnt/session/group' to '/usr/local/var/singularity/mnt/overlay/final/etc/group'
DEBUG [U=0,P=24268] singularity_priv_drop() Dropping privileges to UID=21489, GID=1000 (13 supplementary GIDs)
DEBUG [U=0,P=24268] singularity_priv_drop() Restoring supplementary groups
DEBUG [U=21489,P=24268] singularity_priv_drop() Confirming we have correct UID/GID
DEBUG [U=21489,P=24268] singularity_runtime_files_resolvconf() Checking configuration option
DEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Called singularity_config_get_bool(config resolv_conf, yes)
DEBUG [U=21489,P=24268] singularity_config_get_value_impl() Returning configuration value config resolv_conf='yes'
DEBUG [U=21489,P=24268] singularity_config_get_bool_char_impl() Return singularity_config_get_bool(config resolv_conf, yes) = 1
DEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final
DEBUG [U=21489,P=24268] container_file_bind() Called file_bind(/etc/resolv.conf, /etc/resolv.conf()
DEBUG [U=21489,P=24268] singularity_priv_escalate() Temporarily escalating privileges (U=21489)
DEBUG [U=0,P=24268] singularity_priv_escalate() Clearing supplementary GIDs.
VERBOSE [U=0,P=24268] container_file_bind() Binding file '/etc/resolv.conf' to '/usr/local/var/singularity/mnt/overlay/final/etc/resolv.conf'
DEBUG [U=0,P=24268] singularity_priv_drop() Dropping privileges to UID=21489, GID=1000 (13 supplementary GIDs)
DEBUG [U=0,P=24268] singularity_priv_drop() Restoring supplementary groups
DEBUG [U=21489,P=24268] singularity_priv_drop() Confirming we have correct UID/GID
DEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final
DEBUG [U=21489,P=24268] singularity_registry_get() Returning value from registry: 'SESSIONDIR' = '/usr/local/var/singularity/mnt/session'
DEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'CONTAINLIBS'
DEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final
VERBOSE [U=21489,P=24268] singularity_runtime_enter() Containing all rootfs components
DEBUG [U=21489,P=24268] singularity_runtime_rootfs() Returning container_directory: /usr/local/var/singularity/mnt/overlay/final
DEBUG [U=21489,P=24268] singularity_priv_escalate() Temporarily escalating privileges (U=21489)
DEBUG [U=0,P=24268] singularity_priv_escalate() Clearing supplementary GIDs.
VERBOSE [U=0,P=24268] singularity_runtime_enter_chroot() Entering container file system root: /usr/local/var/singularity/mnt/overlay/final
DEBUG [U=0,P=24268] singularity_priv_drop() Dropping privileges to UID=21489, GID=1000 (13 supplementary GIDs)
DEBUG [U=0,P=24268] singularity_priv_drop() Restoring supplementary groups
DEBUG [U=21489,P=24268] singularity_priv_drop() Confirming we have correct UID/GID
DEBUG [U=21489,P=24268] singularity_runtime_enter_chroot() Changing dir to '/' within the new root
DEBUG [U=21489,P=24268] singularity_runtime_environment() Cloning environment
DEBUG [U=21489,P=24268] singularity_runtime_environment() Counted 57 environment elements
DEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'CLEANENV'
DEBUG [U=21489,P=24268] singularity_runtime_environment() Cleaning environment
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: SINGULARITY_COMMAND=shell
DEBUG [U=21489,P=24268] singularity_runtime_environment() Unsetting environment variable: SINGULARITY_COMMAND
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: LS_COLORS=rs=0:di=01;34:ln=01;36:mh=00:pi=40;33:so=01;35:do=01;35:bd=40;33;01:cd=40;33;01:or=40;31;01:mi=00:su=37;41:sg=30;43:ca=30;41:tw=30;42:ow=34;42:st=37;44:ex=01;32:*.tar=01;31:*.tgz=01;31:*.arc=01;31:*.arj=01;31:*.taz=01;31:*.lha=01;31:*.lz4=01;31:*.lzh=01;31:*.lzma=01;31:*.tlz=01;31:*.txz=01;31:*.tzo=01;31:*.t7z=01;31:*.zip=01;31:*.z=01;31:*.Z=01;31:*.dz=01;31:*.gz=01;31:*.lrz=01;31:*.lz=01;31:*.lzo=01;31:*.xz=01;31:*.zst=01;31:*.tzst=01;31:*.bz2=01;31:*.bz(TRUNCATED...)
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: SINGULARITY_sysconfdir=/usr/local/etc
DEBUG [U=21489,P=24268] singularity_runtime_environment() Unsetting environment variable: SINGULARITY_sysconfdir
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: LANG=en_US.UTF-8
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: GDM_LANG=en_US.UTF-8
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: PROFILEHOME=
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: DISPLAY=:0
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: OLDPWD=/usr/local
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: SHELL_SESSION_ID=d1e7c8c96cab445d95feda2ab3fd6dfd
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: SINGULARITYENV_PATH=/bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: COLORTERM=truecolor
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: USERNAME=jbdenis
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: SINGULARITY_CLEANUPDIR=/tmp/.singularity-runtime.aihvo2qb
DEBUG [U=21489,P=24268] singularity_runtime_environment() Unsetting environment variable: SINGULARITY_CLEANUPDIR
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: XDG_VTNR=2
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: SSH_AUTH_SOCK=/tmp/ssh-cnDAwFU4WJii/agent.1207
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: S_COLORS=auto
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: XDG_SESSION_ID=4
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: USER=jbdenis
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: SINGULARITY_ROOTFS=/tmp/.singularity-runtime.aihvo2qb/centos:6
DEBUG [U=21489,P=24268] singularity_runtime_environment() Unsetting environment variable: SINGULARITY_ROOTFS
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: DESKTOP_SESSION=i3
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: SINGULARITY_CONTAINER=docker://centos:6
DEBUG [U=21489,P=24268] singularity_runtime_environment() Unsetting environment variable: SINGULARITY_CONTAINER
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: SINGULARITY_version=2.3.1-development.ga78190c8
DEBUG [U=21489,P=24268] singularity_runtime_environment() Unsetting environment variable: SINGULARITY_version
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: PWD=/home/jbdenis
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: HOME=/home/jbdenis
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: JOURNAL_STREAM=9:22298
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: SSH_AGENT_PID=1262
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: QT_ACCESSIBILITY=1
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: XDG_SESSION_TYPE=x11
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: KONSOLE_DBUS_SESSION=/Sessions/1
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: XDG_SESSION_DESKTOP=i3
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: KONSOLE_DBUS_WINDOW=/Windows/1
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: SINGULARITY_IMAGE=/tmp/.singularity-runtime.aihvo2qb/centos:6
DEBUG [U=21489,P=24268] singularity_runtime_environment() Unsetting environment variable: SINGULARITY_IMAGE
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: WINDOWPATH=2
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: TERM=xterm-256color
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: SHELL=/bin/bash
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: KONSOLE_DBUS_SERVICE=:1.198
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: SINGULARITY_MESSAGELEVEL=5
DEBUG [U=21489,P=24268] singularity_runtime_environment() Unsetting environment variable: SINGULARITY_MESSAGELEVEL
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: SINGULARITY_CONTENTS=/tmp/.singularity-layers.1writyZF
DEBUG [U=21489,P=24268] singularity_runtime_environment() Unsetting environment variable: SINGULARITY_CONTENTS
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: XDG_CURRENT_DESKTOP=i3
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: GPG_AGENT_INFO=/run/user/21489/gnupg/S.gpg-agent:0:1
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: KONSOLE_PROFILE_NAME=Profile 6
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: QT_LINUX_ACCESSIBILITY_ALWAYS_ON=1
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: SHLVL=1
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: COLORFGBG=15;0
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: XDG_SEAT=seat0
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: LANGUAGE=
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: SINGULARITY_bindir=/usr/local/bin
DEBUG [U=21489,P=24268] singularity_runtime_environment() Unsetting environment variable: SINGULARITY_bindir
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: WINDOWID=50331654
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: GDMSESSION=i3
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: LOGNAME=jbdenis
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: DBUS_SESSION_BUS_ADDRESS=unix:path=/run/user/21489/bus
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: XDG_RUNTIME_DIR=/run/user/21489
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: XAUTHORITY=/run/user/21489/gdm/Xauthority
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: PATH=/bin:/usr/bin:/usr/local/bin:/sbin:/usr/sbin:/usr/local/sbin
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: SINGULARITY_localstatedir=/usr/local/var
DEBUG [U=21489,P=24268] singularity_runtime_environment() Unsetting environment variable: SINGULARITY_localstatedir
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: SINGULARITYENV_HISTFILE=
DEBUG [U=21489,P=24268] singularity_runtime_environment() Evaluating envar to clean: SINGULARITY_libexecdir=/usr/local/libexec
DEBUG [U=21489,P=24268] singularity_runtime_environment() Unsetting environment variable: SINGULARITY_libexecdir
DEBUG [U=21489,P=24268] singularity_runtime_environment() Transposing environment
DEBUG [U=21489,P=24268] singularity_runtime_environment() Converting envar 'SINGULARITYENV_PATH' to 'PATH' = '/bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin'
DEBUG [U=21489,P=24268] envar_set() Setting environment variable: 'PATH' = '/bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin'
DEBUG [U=21489,P=24268] singularity_runtime_environment() Converting envar 'SINGULARITYENV_HISTFILE' to 'HISTFILE' = '(null)'
DEBUG [U=21489,P=24268] envar_set() Unsetting environment variable: HISTFILE
DEBUG [U=21489,P=24268] singularity_priv_drop_perm() Called singularity_priv_drop_perm(void)
DEBUG [U=21489,P=24268] singularity_priv_drop_perm() Escalating permissison so we can properly drop permission
DEBUG [U=21489,P=24268] singularity_priv_escalate() Temporarily escalating privileges (U=21489)
DEBUG [U=0,P=24268] singularity_priv_escalate() Clearing supplementary GIDs.
DEBUG [U=0,P=24268] singularity_priv_drop_perm() Resetting supplementary groups
DEBUG [U=0,P=24268] singularity_priv_drop_perm() Dropping to group ID '1000'
DEBUG [U=0,P=24268] singularity_priv_drop_perm() Dropping real and effective privileges to GID = '1000'
DEBUG [U=0,P=24268] singularity_priv_drop_perm() Dropping real and effective privileges to UID = '21489'
DEBUG [U=21489,P=24268] singularity_priv_drop_perm() Confirming we have correct GID
DEBUG [U=21489,P=24268] singularity_priv_drop_perm() Confirming we have correct UID
DEBUG [U=21489,P=24268] singularity_priv_drop_perm() Setting NO_NEW_PRIVS to prevent future privilege escalations.
DEBUG [U=21489,P=24268] singularity_priv_drop_perm() Finished dropping privileges
DEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'CONTAIN'
DEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'TARGET_PWD'
DEBUG [U=21489,P=24268] main() Attempting to chdir to CWD: /home/jbdenis
DEBUG [U=21489,P=24268] envar_set() Setting environment variable: 'SINGULARITY_CONTAINER' = 'centos:6'
DEBUG [U=21489,P=24268] envar_set() Setting environment variable: 'SINGULARITY_NAME' = 'centos:6'
DEBUG [U=21489,P=24268] singularity_registry_get() Returning NULL on 'SHELL'
DEBUG [U=21489,P=24268] envar_set() Unsetting environment variable: SINGULARITY_SHELL
DEBUG [U=21489,P=24268] singularity_registry_get() Returning value from registry: 'COMMAND' = 'shell'
DEBUG [U=21489,P=24268] singularity_registry_get() Returning value from registry: 'COMMAND' = 'shell'
LOG [U=21489,P=24268] main() USER=jbdenis, IMAGE='centos:6', COMMAND='shell'
INFO [U=21489,P=24268] action_shell() Singularity: Invoking an interactive shell within container...
DEBUG [U=21489,P=24268] action_shell() Exec'ing /.singularity.d/actions/shell
VERBOSE [U=21489,P=2950] main() Cleaning directory: /tmp/.singularity-runtime.aihvo2qb
DEBUG [U=21489,P=2950] s_rmdir() Removing directory: /tmp/.singularity-runtime.aihvo2qb

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment