snyk-container-test ○ success

Duration: 34s
Queued: 4s
📁 Stage: test
🖥 Runner: linux-aws-1
Average Duration
52s
This job: 34s
Failure Rate
0.0%
last 30 days

Job Execution Phases

💡 Tip: Click on any phase bar to jump to that section in the log below

Job Analysis

Job Status: Passed

Status: Job passed successfully

Full Job Log

166 lines
Match - of 0
1 23:36:30 Running with gitlab-runner 18.9.0 (07e534ba)
2 23:36:30 on gitlab-runner-linux-1-5fd7c4d488-2p5ws wRxjPbsJX, system ID: r_ApPziMY2hZUA
3 23:36:30 feature flags: FF_USE_FASTZIP:true, FF_USE_NEW_BASH_EVAL_STRATEGY:true, FF_USE_DYNAMIC_TRACE_FORCE_SEND_INTERVAL:true, FF_SCRIPT_SECTIONS:true, FF_USE_ADVANCED_POD_SPEC_CONFIGURATION:true, FF_PRINT_POD_EVENTS:true, FF_USE_DUMB_INIT_WITH_KUBERNETES_EXECUTOR:true, FF_LOG_IMAGES_CONFIGURED_FOR_JOB:true, FF_CLEAN_UP_FAILED_CACHE_EXTRACT:true, FF_GIT_URLS_WITHOUT_TOKENS:true, FF_WAIT_FOR_POD_TO_BE_REACHABLE:true, FF_USE_FLEETING_ACQUIRE_HEARTBEATS:true, FF_USE_JOB_ROUTER:true
4 23:36:30 Resolving secrets
5 23:36:30 section_start:1777678590:prepare_executor
6 23:36:30 +Preparing the "kubernetes" executor
7 23:36:30 Using Kubernetes namespace: gitlab-runner
8 23:36:30 Using Kubernetes executor with image registry.scandit.com/dockerfiles/snyk:ubuntu@sha256:c488e3de6b1d5adc01d19a85bd9753c1a3ae142e5e13d97e0bdb4d6659dfd958 ...
9 23:36:30 Using attach strategy to execute scripts...
10 23:36:30 Using effective pull policy of [Always] for container build
11 23:36:30 Using effective pull policy of [Always] for container helper
12 23:36:30 Using effective pull policy of [Always] for container init-permissions
13 23:36:30 section_end:1777678590:prepare_executor
14 23:36:30 +section_start:1777678590:prepare_script
15 23:36:30 +Preparing environment
16 23:36:30 Using FF_USE_POD_ACTIVE_DEADLINE_SECONDS, the Pod activeDeadlineSeconds will be set to the job timeout: 1h0m0s...
17 23:36:30 WARNING: Advanced Pod Spec configuration enabled, merging the provided PodSpec to the generated one. This is a beta feature and is subject to change. Feedback is collected in this issue: https://gitlab.com/gitlab-org/gitlab-runner/-/issues/29659 ...
18 23:36:31 Subscribing to Kubernetes Pod events...
19 23:36:31 Type Reason Message
20 23:36:31 Normal Scheduled Successfully assigned gitlab-runner/runner-wrxjpbsjx-project-621-concurrent-5-5klofq2w to ip-10-0-51-181.eu-central-1.compute.internal
21 23:36:32 Normal Pulled Container image "gitlab/gitlab-runner-helper:x86_64-v18.8.0" already present on machine
22 23:36:32 Normal Created Created container: init-permissions
23 23:36:32 Normal Started Started container init-permissions
24 23:36:32 Normal Pulling Pulling image "498954711405.dkr.ecr.eu-central-1.amazonaws.com/dockerfiles/snyk@sha256:c488e3de6b1d5adc01d19a85bd9753c1a3ae142e5e13d97e0bdb4d6659dfd958"
25 23:36:34 Normal Pulled Successfully pulled image "498954711405.dkr.ecr.eu-central-1.amazonaws.com/dockerfiles/snyk@sha256:c488e3de6b1d5adc01d19a85bd9753c1a3ae142e5e13d97e0bdb4d6659dfd958" in 1.477s (1.477s including waiting). Image size: 123873044 bytes.
26 23:36:34 Normal Created Created container: build
27 23:36:34 Normal Started Started container build
28 23:36:34 Normal Pulled Container image "gitlab/gitlab-runner-helper:x86_64-v18.8.0" already present on machine
29 23:36:34 Normal Created Created container: helper
30 23:36:34 Normal Started Started container helper
31 23:36:37 Running on runner-wrxjpbsjx-project-621-concurrent-5-5klofq2w via gitlab-runner-linux-1-5fd7c4d488-2p5ws...
32 23:36:37
33 23:36:37 section_end:1777678597:prepare_script
34 23:36:37 +section_start:1777678597:get_sources
35 23:36:37 +Getting source from Git repository
36 23:36:38 Gitaly correlation ID: 01KQJYD8537MH6SKNE4DDCE1GH
37 23:36:38 Fetching changes with git depth set to 50...
38 23:36:38 Initialized empty Git repository in /build/internal/gitlab-templates/.git/
39 23:36:38 Created fresh repository.
40 23:36:39 Checking out 50468f6f as detached HEAD (ref is refs/merge-requests/636/merge)...
41 23:36:39
42 23:36:39 Skipping Git submodules setup
43 23:36:39
44 23:36:39 section_end:1777678599:get_sources
45 23:36:39 +section_start:1777678599:step_script
46 23:36:39 +Executing "step_script" stage of the job script
47 23:36:39 section_start:1777678599:section_pre_build_script_0[hide_duration=true,collapsed=true] $ function cleanup {
48 23:36:39 rv=$?
49 23:36:39 if [ $rv -ne 0 ]; then
50 23:36:39 echo ""
51 23:36:39 echo " Failure Cause Analysis might help, please open this link:"
52 23:36:39 echo " https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
53 23:36:39 echo ""
54 23:36:39 fi
55 23:36:39 echo ""
56 23:36:39 echo "Scout Analysis: https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
57 23:36:39 echo ""
58 23:36:39 echo ""
59 23:36:39 echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=${EPOCHSECONDS}000"
60 23:36:39 echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=${EPOCHSECONDS}000"
61 23:36:39 echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group|=|gitlab-runner&var-filters=source|=|${LOKI_LOGSOURCE}&var-filters=namespace|=|${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID|=|${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID|=|${CI_PIPELINE_ID}&var-filters=CI_JOB_ID|=|${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=${EPOCHSECONDS}000"
62 23:36:39 echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=$(date -d '-7 days' +%Y-%m-%d)~$(date -d '+7 days' +%Y-%m-%d)&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
63 23:36:39 echo ""
64 23:36:39 exit $rv
65 23:36:39 }
66 23:36:39 trap cleanup EXIT
67 23:36:39 echo "INFO: This is the CI job pre_build_script"
68 23:36:39 echo "INFO: It's defined in the backend/infra/aws repo."
69 23:36:39 echo "INFO: These additional Scandit variables are available to you:"
70 23:36:39 echo " SC_K8S_NODE_NAME: $SC_K8S_NODE_NAME"
71 23:36:39 echo " SC_K8S_IMAGE_ID: $SC_K8S_IMAGE_ID"
72 23:36:39 echo " SC_K8S_KYVERNO_PATCHES: |"
73 23:36:39 echo "$SC_K8S_KYVERNO_PATCHES" | sed 's/^/ /'
74 23:36:39 echo "cpu (r/l): ${SC_K8S_REQUESTS_CPU}/${SC_K8S_LIMITS_CPU}"
75 23:36:39 if command -v numfmt >/dev/null 2>&1; then
76 23:36:39 echo "memory (r/l): $(numfmt --to=iec --suffix=B $SC_K8S_REQUESTS_MEMORY)/$(numfmt --to=iec --suffix=B $SC_K8S_LIMITS_MEMORY)"
77 23:36:39 else
78 23:36:39 echo "memory (r/l): ${SC_K8S_REQUESTS_MEMORY}/${SC_K8S_LIMITS_MEMORY}"
79 23:36:39 fi
80 23:36:39 __start_time=${EPOCHSECONDS}
81 23:36:39 echo ""
82 23:36:39 echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=now"
83 23:36:39 echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=now"
84 23:36:39 echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group|=|gitlab-runner&var-filters=source|=|${LOKI_LOGSOURCE}&var-filters=namespace|=|${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID|=|${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID|=|${CI_PIPELINE_ID}&var-filters=CI_JOB_ID|=|${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=now"
85 23:36:39 echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=$(date -d '-7 days' +%Y-%m-%d)~$(date -d '+7 days' +%Y-%m-%d)&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
86 23:36:39 echo ""
87 23:36:39 echo "Setting up credentials for Gitlab Python registries"
88 23:36:39 mkdir -p ~
89 23:36:39 echo "machine gitlab.scandit.com" > ~/.netrc
90 23:36:39 echo "login gitlab-ci-token" >> ~/.netrc
91 23:36:39 echo "password ${CI_JOB_TOKEN}" >> ~/.netrc
92 23:36:39 chmod 600 ~/.netrc
93 23:36:39 if command -v git &> /dev/null && [ "$(id -u)" -ne 0 ]; then
94 23:36:39 git config --global --add safe.directory $CI_PROJECT_DIR
95 23:36:39 fi
96 23:36:39 # Sonarqube server is running on the same cluster. Use internal address
97 23:36:39 export SONAR_HOST_URL="http://sonarqube.sonarqube.svc.cluster.local:9000"
98 23:36:39 section_end:1777678599:section_pre_build_script_0
99 23:36:39 INFO: This is the CI job pre_build_script
100 23:36:39 INFO: It's defined in the backend/infra/aws repo.
101 23:36:39 INFO: These additional Scandit variables are available to you:
102 23:36:39 SC_K8S_NODE_NAME: ip-10-0-51-181.eu-central-1.compute.internal
103 23:36:39 SC_K8S_IMAGE_ID:
104 23:36:39 SC_K8S_KYVERNO_PATCHES: |
105 23:36:39
106 23:36:39 cpu (r/l): 1/4
107 23:36:39 memory (r/l): 1.0GB/16GB
108 23:36:39
109 23:36:39 Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-host=ip-10-0-51-181.eu-central-1.compute.internal&var-namespace=gitlab-runner&var-pod=runner-wrxjpbsjx-project-621-concurrent-5-5klofq2w&var-resolution=15&from=1777678599000&to=now
110 23:36:39 Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-node=ip-10-0-51-181.eu-central-1.compute.internal&var-resolution=15s&from=1777678599000&to=now
111 23:36:39 Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group|=|gitlab-runner&var-filters=source|=|k8s-ci.aws.scandit.io&var-filters=namespace|=|gitlab-runner&var-filters=CI_PROJECT_ID|=|621&var-filters=CI_PIPELINE_ID|=|1575288&var-filters=CI_JOB_ID|=|54243467&sortOrder=Ascending&from=1777678599000&to=now
112 23:36:39 Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=2026-04-24~2026-05-08&job_name=snyk-container-test&project=internal/gitlab-templates
113 23:36:39
114 23:36:39 Setting up credentials for Gitlab Python registries
115 23:36:39 $ test -n "${SNYK_TOKEN}" || (echo "No SNYK_TOKEN defined. You have to provide a valid token for accessing Snyk."; false)
116 23:36:39 $ test -n "${IMAGE_URL}" || (echo "No IMAGE_URL defined. You have to provide a valid image for container scanner."; false)
117 23:36:39 $ echo "This job scans the given image for known vulnerabilities and outputs the result in the console."
118 23:36:39 This job scans the given image for known vulnerabilities and outputs the result in the console.
119 23:36:39 $ echo "Running 'snyk container test' on image $IMAGE_URL."
120 23:36:39 Running 'snyk container test' on image registry.scandit.com/internal/gitlab-templates/python:3.12-MR636.
121 23:36:39 $ snyk container test ${IMAGE_URL} --file=${DOCKERFILE_PATH} --exclude-base-image-vulns --exclude-app-vulns --policy-path=${SNYK_POLICY_PATH} --org=${SNYK_ORG} --json-file-output=${OUTPUT_FILE} ${SNYK_EXTRA_PARAMETERS}
122 23:37:02
123 23:37:02 Testing registry.scandit.com/internal/gitlab-templates/python:3.12-MR636...
124 23:37:02
125 23:37:02 Organization: scandit-internal
126 23:37:02 Package manager: deb
127 23:37:02 Target file: Dockerfile.python-3
128 23:37:02 Project name: docker-image|registry.scandit.com/internal/gitlab-templates/python
129 23:37:02 Docker image: registry.scandit.com/internal/gitlab-templates/python:3.12-MR636
130 23:37:02 Platform: linux/amd64
131 23:37:02 Target OS: Debian GNU/Linux 12 (bookworm)
132 23:37:02 Base image: python:3.12-bookworm
133 23:37:02 Local Snyk policy: found
134 23:37:02 Licenses: enabled
135 23:37:02
136 23:37:02 ✔ Tested 429 dependencies for known issues, no vulnerable paths found.
137 23:37:02
138 23:37:02
139 23:37:03
140 23:37:03 Scout Analysis: https://scout.scandit.io/analysis/projects/621/jobs/54243467
141 23:37:03
142 23:37:03
143 23:37:03 Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-host=ip-10-0-51-181.eu-central-1.compute.internal&var-namespace=gitlab-runner&var-pod=runner-wrxjpbsjx-project-621-concurrent-5-5klofq2w&var-resolution=15&from=1777678599000&to=1777678623000
144 23:37:03 Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-node=ip-10-0-51-181.eu-central-1.compute.internal&var-resolution=15s&from=1777678599000&to=1777678623000
145 23:37:03 Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group|=|gitlab-runner&var-filters=source|=|k8s-ci.aws.scandit.io&var-filters=namespace|=|gitlab-runner&var-filters=CI_PROJECT_ID|=|621&var-filters=CI_PIPELINE_ID|=|1575288&var-filters=CI_JOB_ID|=|54243467&sortOrder=Ascending&from=1777678599000&to=1777678623000
146 23:37:03 Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=2026-04-24~2026-05-08&job_name=snyk-container-test&project=internal/gitlab-templates
147 23:37:03
148 23:37:03
149 23:37:03 section_end:1777678623:step_script
150 23:37:03 +section_start:1777678623:upload_artifacts_on_success
151 23:37:03 +Uploading artifacts for successful job
152 23:37:03 Uploading artifacts...
153 23:37:03 snyk-container-test.json: found 1 matching artifact files and directories
154 23:37:04 Uploading artifacts as "archive" to coordinator... 201 Created correlation_id=01KQJYE93HCYK3491S36CEJNX7 id=54243467 responseStatus=201 Created token=64__zqsGm
155 23:37:04 Uploading artifacts...
156 23:37:04 snyk-container-test.json: found 1 matching artifact files and directories
157 23:37:04 Uploading artifacts as "container_scanning" to coordinator... 201 Created correlation_id=01KQJYE9GZP3G2YZB4366TWXPR id=54243467 responseStatus=201 Created token=64__zqsGm
158 23:37:04
159 23:37:04 section_end:1777678624:upload_artifacts_on_success
160 23:37:04 +section_start:1777678624:cleanup_file_variables
161 23:37:04 +Cleaning up project directory and file based variables
162 23:37:04
163 23:37:04 section_end:1777678624:cleanup_file_variables
164 23:37:04 +
165 23:37:04 Job succeeded
166