snyk-container-test ○ success

Duration: 38s
Queued: 0s
📁 Stage: test
🖥 Runner: linux-aws-1
Average Duration
52s
This job: 38s
Failure Rate
0.0%
last 30 days

Job Execution Phases

💡 Tip: Click on any phase bar to jump to that section in the log below

Job Analysis

Job Status: Passed

Status: Job passed successfully

Full Job Log

167 lines
Match - of 0
1 22:37:59 Running with gitlab-runner 18.9.0 (07e534ba)
2 22:37:59 on gitlab-runner-linux-1-746bdd58fd-24gct wRxjPbsJX, system ID: r_bgxRZBcGp1pE
3 22:37:59 feature flags: FF_USE_FASTZIP:true, FF_USE_NEW_BASH_EVAL_STRATEGY:true, FF_USE_DYNAMIC_TRACE_FORCE_SEND_INTERVAL:true, FF_SCRIPT_SECTIONS:true, FF_USE_ADVANCED_POD_SPEC_CONFIGURATION:true, FF_PRINT_POD_EVENTS:true, FF_USE_DUMB_INIT_WITH_KUBERNETES_EXECUTOR:true, FF_LOG_IMAGES_CONFIGURED_FOR_JOB:true, FF_CLEAN_UP_FAILED_CACHE_EXTRACT:true, FF_GIT_URLS_WITHOUT_TOKENS:true, FF_WAIT_FOR_POD_TO_BE_REACHABLE:true, FF_USE_FLEETING_ACQUIRE_HEARTBEATS:true, FF_USE_JOB_ROUTER:true
4 22:37:59 Resolving secrets
5 22:37:59 section_start:1778020679:prepare_executor
6 22:37:59 +Preparing the "kubernetes" executor
7 22:37:59 Using Kubernetes namespace: gitlab-runner
8 22:37:59 Using Kubernetes executor with image registry.scandit.com/dockerfiles/snyk:ubuntu@sha256:c488e3de6b1d5adc01d19a85bd9753c1a3ae142e5e13d97e0bdb4d6659dfd958 ...
9 22:37:59 Using attach strategy to execute scripts...
10 22:37:59 Using effective pull policy of [Always] for container build
11 22:37:59 Using effective pull policy of [Always] for container helper
12 22:37:59 Using effective pull policy of [Always] for container init-permissions
13 22:37:59 section_end:1778020679:prepare_executor
14 22:37:59 +section_start:1778020679:prepare_script
15 22:37:59 +Preparing environment
16 22:37:59 Using FF_USE_POD_ACTIVE_DEADLINE_SECONDS, the Pod activeDeadlineSeconds will be set to the job timeout: 1h0m0s...
17 22:37:59 WARNING: Advanced Pod Spec configuration enabled, merging the provided PodSpec to the generated one. This is a beta feature and is subject to change. Feedback is collected in this issue: https://gitlab.com/gitlab-org/gitlab-runner/-/issues/29659 ...
18 22:38:00 Subscribing to Kubernetes Pod events...
19 22:38:00 Type Reason Message
20 22:38:00 Warning FailedScheduling 0/31 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }, 1 node(s) had untolerated taint {scandit.io/clickhouse: production}, 1 node(s) had untolerated taint {scandit.io/clickhouse: staging}, 1 node(s) had untolerated taint {scandit.io/sonarqube: dedicated}, 21 node(s) didn't match Pod's node affinity/selector, 6 Insufficient cpu. preemption: 0/31 nodes are available: 25 Preemption is not helpful for scheduling, 6 No preemption victims found for incoming pod.
21 22:38:07 Warning FailedScheduling 0/31 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }, 1 node(s) had untolerated taint {scandit.io/clickhouse: production}, 1 node(s) had untolerated taint {scandit.io/clickhouse: staging}, 1 node(s) had untolerated taint {scandit.io/sonarqube: dedicated}, 21 node(s) didn't match Pod's node affinity/selector, 6 Insufficient cpu. preemption: 0/31 nodes are available: 25 Preemption is not helpful for scheduling, 6 No preemption victims found for incoming pod.
22 22:38:08 Normal Scheduled Successfully assigned gitlab-runner/runner-wrxjpbsjx-project-621-concurrent-0-9ka4q6vq to ip-10-0-20-43.eu-central-1.compute.internal
23 22:38:08 Normal Pulled Container image "gitlab/gitlab-runner-helper:x86_64-v18.8.0" already present on machine
24 22:38:08 Normal Created Created container: init-permissions
25 22:38:08 Normal Started Started container init-permissions
26 22:38:09 Normal Pulled Container image "498954711405.dkr.ecr.eu-central-1.amazonaws.com/dockerfiles/snyk@sha256:c488e3de6b1d5adc01d19a85bd9753c1a3ae142e5e13d97e0bdb4d6659dfd958" already present on machine
27 22:38:09 Normal Created Created container: build
28 22:38:09 Normal Started Started container build
29 22:38:09 Normal Pulled Container image "gitlab/gitlab-runner-helper:x86_64-v18.8.0" already present on machine
30 22:38:09 Normal Created Created container: helper
31 22:38:09 Normal Started Started container helper
32 22:38:12 Running on runner-wrxjpbsjx-project-621-concurrent-0-9ka4q6vq via gitlab-runner-linux-1-746bdd58fd-24gct...
33 22:38:12
34 22:38:12 section_end:1778020692:prepare_script
35 22:38:12 +section_start:1778020692:get_sources
36 22:38:12 +Getting source from Git repository
37 22:38:13 Gitaly correlation ID: 01KQX4MZ0VY3AZ12JBQZRAGDQM
38 22:38:13 Fetching changes with git depth set to 50...
39 22:38:13 Initialized empty Git repository in /build/internal/gitlab-templates/.git/
40 22:38:13 Created fresh repository.
41 22:38:14 Checking out 13881c4b as detached HEAD (ref is refs/merge-requests/638/merge)...
42 22:38:14
43 22:38:14 Skipping Git submodules setup
44 22:38:14
45 22:38:14 section_end:1778020694:get_sources
46 22:38:14 +section_start:1778020694:step_script
47 22:38:14 +Executing "step_script" stage of the job script
48 22:38:14 section_start:1778020694:section_pre_build_script_0[hide_duration=true,collapsed=true] $ function cleanup {
49 22:38:14 rv=$?
50 22:38:14 if [ $rv -ne 0 ]; then
51 22:38:14 echo ""
52 22:38:14 echo " Failure Cause Analysis might help, please open this link:"
53 22:38:14 echo " https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
54 22:38:14 echo ""
55 22:38:14 fi
56 22:38:14 echo ""
57 22:38:14 echo "Scout Analysis: https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
58 22:38:14 echo ""
59 22:38:14 echo ""
60 22:38:14 echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=${EPOCHSECONDS}000"
61 22:38:14 echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=${EPOCHSECONDS}000"
62 22:38:14 echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group|=|gitlab-runner&var-filters=source|=|${LOKI_LOGSOURCE}&var-filters=namespace|=|${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID|=|${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID|=|${CI_PIPELINE_ID}&var-filters=CI_JOB_ID|=|${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=${EPOCHSECONDS}000"
63 22:38:14 echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=$(date -d '-7 days' +%Y-%m-%d)~$(date -d '+7 days' +%Y-%m-%d)&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
64 22:38:14 echo ""
65 22:38:14 exit $rv
66 22:38:14 }
67 22:38:14 trap cleanup EXIT
68 22:38:14 echo "INFO: This is the CI job pre_build_script"
69 22:38:14 echo "INFO: It's defined in the backend/infra/aws repo."
70 22:38:14 echo "INFO: These additional Scandit variables are available to you:"
71 22:38:14 echo " SC_K8S_NODE_NAME: $SC_K8S_NODE_NAME"
72 22:38:14 echo " SC_K8S_IMAGE_ID: $SC_K8S_IMAGE_ID"
73 22:38:14 echo " SC_K8S_KYVERNO_PATCHES: |"
74 22:38:14 echo "$SC_K8S_KYVERNO_PATCHES" | sed 's/^/ /'
75 22:38:14 echo "cpu (r/l): ${SC_K8S_REQUESTS_CPU}/${SC_K8S_LIMITS_CPU}"
76 22:38:14 if command -v numfmt >/dev/null 2>&1; then
77 22:38:14 echo "memory (r/l): $(numfmt --to=iec --suffix=B $SC_K8S_REQUESTS_MEMORY)/$(numfmt --to=iec --suffix=B $SC_K8S_LIMITS_MEMORY)"
78 22:38:14 else
79 22:38:14 echo "memory (r/l): ${SC_K8S_REQUESTS_MEMORY}/${SC_K8S_LIMITS_MEMORY}"
80 22:38:14 fi
81 22:38:14 __start_time=${EPOCHSECONDS}
82 22:38:14 echo ""
83 22:38:14 echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=now"
84 22:38:14 echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=now"
85 22:38:14 echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group|=|gitlab-runner&var-filters=source|=|${LOKI_LOGSOURCE}&var-filters=namespace|=|${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID|=|${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID|=|${CI_PIPELINE_ID}&var-filters=CI_JOB_ID|=|${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=now"
86 22:38:14 echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=$(date -d '-7 days' +%Y-%m-%d)~$(date -d '+7 days' +%Y-%m-%d)&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
87 22:38:14 echo ""
88 22:38:14 echo "Setting up credentials for Gitlab Python registries"
89 22:38:14 mkdir -p ~
90 22:38:14 echo "machine gitlab.scandit.com" > ~/.netrc
91 22:38:14 echo "login gitlab-ci-token" >> ~/.netrc
92 22:38:14 echo "password ${CI_JOB_TOKEN}" >> ~/.netrc
93 22:38:14 chmod 600 ~/.netrc
94 22:38:14 if command -v git &> /dev/null && [ "$(id -u)" -ne 0 ]; then
95 22:38:14 git config --global --add safe.directory $CI_PROJECT_DIR
96 22:38:14 fi
97 22:38:14 # Sonarqube server is running on the same cluster. Use internal address
98 22:38:14 export SONAR_HOST_URL="http://sonarqube.sonarqube.svc.cluster.local:9000"
99 22:38:14 section_end:1778020694:section_pre_build_script_0
100 22:38:14 INFO: This is the CI job pre_build_script
101 22:38:14 INFO: It's defined in the backend/infra/aws repo.
102 22:38:14 INFO: These additional Scandit variables are available to you:
103 22:38:14 SC_K8S_NODE_NAME: ip-10-0-20-43.eu-central-1.compute.internal
104 22:38:14 SC_K8S_IMAGE_ID:
105 22:38:14 SC_K8S_KYVERNO_PATCHES: |
106 22:38:14
107 22:38:14 cpu (r/l): 1/4
108 22:38:14 memory (r/l): 1.0GB/16GB
109 22:38:14
110 22:38:14 Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-host=ip-10-0-20-43.eu-central-1.compute.internal&var-namespace=gitlab-runner&var-pod=runner-wrxjpbsjx-project-621-concurrent-0-9ka4q6vq&var-resolution=15&from=1778020694000&to=now
111 22:38:14 Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-node=ip-10-0-20-43.eu-central-1.compute.internal&var-resolution=15s&from=1778020694000&to=now
112 22:38:14 Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group|=|gitlab-runner&var-filters=source|=|k8s-ci.aws.scandit.io&var-filters=namespace|=|gitlab-runner&var-filters=CI_PROJECT_ID|=|621&var-filters=CI_PIPELINE_ID|=|1580353&var-filters=CI_JOB_ID|=|54442851&sortOrder=Ascending&from=1778020694000&to=now
113 22:38:14 Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=2026-04-28~2026-05-12&job_name=snyk-container-test&project=internal/gitlab-templates
114 22:38:14
115 22:38:14 Setting up credentials for Gitlab Python registries
116 22:38:14 $ test -n "${SNYK_TOKEN}" || (echo "No SNYK_TOKEN defined. You have to provide a valid token for accessing Snyk."; false)
117 22:38:14 $ test -n "${IMAGE_URL}" || (echo "No IMAGE_URL defined. You have to provide a valid image for container scanner."; false)
118 22:38:14 $ echo "This job scans the given image for known vulnerabilities and outputs the result in the console."
119 22:38:14 This job scans the given image for known vulnerabilities and outputs the result in the console.
120 22:38:14 $ echo "Running 'snyk container test' on image $IMAGE_URL."
121 22:38:14 Running 'snyk container test' on image registry.scandit.com/internal/gitlab-templates/python:3.12-MR638.
122 22:38:14 $ snyk container test ${IMAGE_URL} --file=${DOCKERFILE_PATH} --exclude-base-image-vulns --exclude-app-vulns --policy-path=${SNYK_POLICY_PATH} --org=${SNYK_ORG} --json-file-output=${OUTPUT_FILE} ${SNYK_EXTRA_PARAMETERS}
123 22:38:35
124 22:38:35 Testing registry.scandit.com/internal/gitlab-templates/python:3.12-MR638...
125 22:38:35
126 22:38:35 Organization: scandit-internal
127 22:38:35 Package manager: deb
128 22:38:35 Target file: Dockerfile.python-3
129 22:38:35 Project name: docker-image|registry.scandit.com/internal/gitlab-templates/python
130 22:38:35 Docker image: registry.scandit.com/internal/gitlab-templates/python:3.12-MR638
131 22:38:35 Platform: linux/amd64
132 22:38:35 Target OS: Debian GNU/Linux 12 (bookworm)
133 22:38:35 Base image: python:3.12-bookworm
134 22:38:35 Local Snyk policy: found
135 22:38:35 Licenses: enabled
136 22:38:35
137 22:38:35 ✔ Tested 429 dependencies for known issues, no vulnerable paths found.
138 22:38:35
139 22:38:35
140 22:38:35
141 22:38:35 Scout Analysis: https://scout.scandit.io/analysis/projects/621/jobs/54442851
142 22:38:35
143 22:38:35
144 22:38:35 Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-host=ip-10-0-20-43.eu-central-1.compute.internal&var-namespace=gitlab-runner&var-pod=runner-wrxjpbsjx-project-621-concurrent-0-9ka4q6vq&var-resolution=15&from=1778020694000&to=1778020715000
145 22:38:35 Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-node=ip-10-0-20-43.eu-central-1.compute.internal&var-resolution=15s&from=1778020694000&to=1778020715000
146 22:38:35 Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group|=|gitlab-runner&var-filters=source|=|k8s-ci.aws.scandit.io&var-filters=namespace|=|gitlab-runner&var-filters=CI_PROJECT_ID|=|621&var-filters=CI_PIPELINE_ID|=|1580353&var-filters=CI_JOB_ID|=|54442851&sortOrder=Ascending&from=1778020694000&to=1778020715000
147 22:38:35 Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=2026-04-28~2026-05-12&job_name=snyk-container-test&project=internal/gitlab-templates
148 22:38:35
149 22:38:35
150 22:38:35 section_end:1778020715:step_script
151 22:38:35 +section_start:1778020715:upload_artifacts_on_success
152 22:38:35 +Uploading artifacts for successful job
153 22:38:36 Uploading artifacts...
154 22:38:36 snyk-container-test.json: found 1 matching artifact files and directories
155 22:38:36 Uploading artifacts as "archive" to coordinator... 201 Created correlation_id=01KQX4P3B8WHM286BN7VY27KNQ id=54442851 responseStatus=201 Created token=64__ASwDy
156 22:38:36 Uploading artifacts...
157 22:38:36 snyk-container-test.json: found 1 matching artifact files and directories
158 22:38:37 Uploading artifacts as "container_scanning" to coordinator... 201 Created correlation_id=01KQX4P3WNW76RJBX7QT05AGP3 id=54442851 responseStatus=201 Created token=64__ASwDy
159 22:38:37
160 22:38:37 section_end:1778020717:upload_artifacts_on_success
161 22:38:37 +section_start:1778020717:cleanup_file_variables
162 22:38:37 +Cleaning up project directory and file based variables
163 22:38:37
164 22:38:37 section_end:1778020717:cleanup_file_variables
165 22:38:37 +
166 22:38:37 Job succeeded
167