sonarqube ○ success
⏱
Duration: 1m 7s
⏳
Queued: 0s
📁
Stage: test
🖥
Runner: linux-aws-1
Average Duration
39s
This job: 1m 7s
Failure Rate
3.0%
last 30 days
External Links
▶
Job Execution Phases
💡 Tip: Click on any phase bar to jump to that section in the log below
▶
Job Analysis
Job Status: Passed
Status: Job passed successfully
▶
Full Job Log
363 lines
Match - of 0
1
22:39:52
Running with gitlab-runner 18.9.0 (07e534ba)
2
22:39:52
on gitlab-runner-linux-1-746bdd58fd-cqwdq wRxjPbsJX, system ID: r_BbsT8E7thlM4
3
22:39:52
feature flags: FF_USE_FASTZIP:true, FF_USE_NEW_BASH_EVAL_STRATEGY:true, FF_USE_DYNAMIC_TRACE_FORCE_SEND_INTERVAL:true, FF_SCRIPT_SECTIONS:true, FF_USE_ADVANCED_POD_SPEC_CONFIGURATION:true, FF_PRINT_POD_EVENTS:true, FF_USE_DUMB_INIT_WITH_KUBERNETES_EXECUTOR:true, FF_LOG_IMAGES_CONFIGURED_FOR_JOB:true, FF_CLEAN_UP_FAILED_CACHE_EXTRACT:true, FF_GIT_URLS_WITHOUT_TOKENS:true, FF_WAIT_FOR_POD_TO_BE_REACHABLE:true, FF_USE_FLEETING_ACQUIRE_HEARTBEATS:true, FF_USE_JOB_ROUTER:true
4
22:39:52
Resolving secrets
5
22:39:52
section_start:1778107192:prepare_executor
6
22:39:52
+Preparing the "kubernetes" executor
7
22:39:52
Using Kubernetes namespace: gitlab-runner
8
22:39:52
Using Kubernetes executor with image registry.scandit.com/dockerfiles/sonar-scanner/sonar-scanner-cli:11.5 ...
9
22:39:52
Using attach strategy to execute scripts...
10
22:39:52
Using effective pull policy of [Always] for container build
11
22:39:52
Using effective pull policy of [Always] for container helper
12
22:39:52
Using effective pull policy of [Always] for container init-permissions
13
22:39:52
section_end:1778107192:prepare_executor
14
22:39:52
+section_start:1778107192:prepare_script
15
22:39:52
+Preparing environment
16
22:39:52
Using FF_USE_POD_ACTIVE_DEADLINE_SECONDS, the Pod activeDeadlineSeconds will be set to the job timeout: 1h0m0s...
17
22:39:52
WARNING: Advanced Pod Spec configuration enabled, merging the provided PodSpec to the generated one. This is a beta feature and is subject to change. Feedback is collected in this issue: https://gitlab.com/gitlab-org/gitlab-runner/-/issues/29659 ...
18
22:39:53
Subscribing to Kubernetes Pod events...
19
22:39:53
Type Reason Message
20
22:39:53
Normal Scheduled Successfully assigned gitlab-runner/runner-wrxjpbsjx-project-621-concurrent-3-1l4zm86b to ip-10-0-61-202.eu-central-1.compute.internal
21
22:39:56
Normal Pulled Container image "gitlab/gitlab-runner-helper:x86_64-v18.8.0" already present on machine
22
22:39:57
Normal Created Created container: init-permissions
23
22:40:00
Normal Started Started container init-permissions
24
22:40:15
Normal Pulling Pulling image "498954711405.dkr.ecr.eu-central-1.amazonaws.com/dockerfiles/sonar-scanner/sonar-scanner-cli@sha256:caef08fe135a00f1d849802a2a7036c4d023fed7c66d2260c5e1a3cfd2ae004c"
25
22:40:37
Normal Pulled Successfully pulled image "498954711405.dkr.ecr.eu-central-1.amazonaws.com/dockerfiles/sonar-scanner/sonar-scanner-cli@sha256:caef08fe135a00f1d849802a2a7036c4d023fed7c66d2260c5e1a3cfd2ae004c" in 22.178s (22.178s including waiting). Image size: 759369443 bytes.
26
22:40:37
Normal Created Created container: build
27
22:40:38
Normal Started Started container build
28
22:40:38
Normal Pulled Container image "gitlab/gitlab-runner-helper:x86_64-v18.8.0" already present on machine
29
22:40:38
Normal Created Created container: helper
30
22:40:38
Normal Started Started container helper
31
22:40:42
Running on runner-wrxjpbsjx-project-621-concurrent-3-1l4zm86b via gitlab-runner-linux-1-746bdd58fd-cqwdq...
32
22:40:42
33
22:40:42
section_end:1778107242:prepare_script
34
22:40:42
+section_start:1778107242:get_sources
35
22:40:42
+Getting source from Git repository
36
22:40:42
Gitaly correlation ID: 01KQZQ54S0P5HSXPCJ9YSS6VH7
37
22:40:43
Fetching changes...
38
22:40:43
Initialized empty Git repository in /build/internal/gitlab-templates/.git/
39
22:40:43
Created fresh repository.
40
22:40:43
Checking out b527f653 as detached HEAD (ref is master)...
41
22:40:43
42
22:40:43
Skipping Git submodules setup
43
22:40:43
44
22:40:43
section_end:1778107243:get_sources
45
22:40:43
+section_start:1778107243:restore_cache
46
22:40:43
+Restoring cache
47
22:40:44
Checking cache for sonarqube-1-protected...
48
22:40:44
No URL provided, cache will not be downloaded from shared cache server. Instead a local version of cache will be extracted.
49
22:40:44
WARNING: Cache file does not exist
50
22:40:44
Failed to extract cache
51
22:40:44
Removing .sonar/cache
52
22:40:44
53
22:40:44
section_end:1778107244:restore_cache
54
22:40:44
+section_start:1778107244:step_script
55
22:40:44
+Executing "step_script" stage of the job script
56
22:40:44
section_start:1778107244:section_pre_build_script_0[hide_duration=true,collapsed=true]
$ function cleanup {
57
22:40:44
rv=$?
58
22:40:44
if [ $rv -ne 0 ]; then
59
22:40:44
echo ""
60
22:40:44
echo " Failure Cause Analysis might help, please open this link:"
61
22:40:44
echo " https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
62
22:40:44
echo ""
63
22:40:44
fi
64
22:40:44
echo ""
65
22:40:44
echo "Scout Analysis: https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
66
22:40:44
echo ""
67
22:40:44
echo ""
68
22:40:44
echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=${EPOCHSECONDS}000"
69
22:40:44
echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=${EPOCHSECONDS}000"
70
22:40:44
echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group|=|gitlab-runner&var-filters=source|=|${LOKI_LOGSOURCE}&var-filters=namespace|=|${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID|=|${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID|=|${CI_PIPELINE_ID}&var-filters=CI_JOB_ID|=|${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=${EPOCHSECONDS}000"
71
22:40:44
echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=$(date -d '-7 days' +%Y-%m-%d)~$(date -d '+7 days' +%Y-%m-%d)&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
72
22:40:44
echo ""
73
22:40:44
exit $rv
74
22:40:44
}
75
22:40:44
trap cleanup EXIT
76
22:40:44
echo "INFO: This is the CI job pre_build_script"
77
22:40:44
echo "INFO: It's defined in the backend/infra/aws repo."
78
22:40:44
echo "INFO: These additional Scandit variables are available to you:"
79
22:40:44
echo " SC_K8S_NODE_NAME: $SC_K8S_NODE_NAME"
80
22:40:44
echo " SC_K8S_IMAGE_ID: $SC_K8S_IMAGE_ID"
81
22:40:44
echo " SC_K8S_KYVERNO_PATCHES: |"
82
22:40:44
echo "$SC_K8S_KYVERNO_PATCHES" | sed 's/^/ /'
83
22:40:44
echo "cpu (r/l): ${SC_K8S_REQUESTS_CPU}/${SC_K8S_LIMITS_CPU}"
84
22:40:44
if command -v numfmt >/dev/null 2>&1; then
85
22:40:44
echo "memory (r/l): $(numfmt --to=iec --suffix=B $SC_K8S_REQUESTS_MEMORY)/$(numfmt --to=iec --suffix=B $SC_K8S_LIMITS_MEMORY)"
86
22:40:44
else
87
22:40:44
echo "memory (r/l): ${SC_K8S_REQUESTS_MEMORY}/${SC_K8S_LIMITS_MEMORY}"
88
22:40:44
fi
89
22:40:44
__start_time=${EPOCHSECONDS}
90
22:40:44
echo ""
91
22:40:44
echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=now"
92
22:40:44
echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=now"
93
22:40:44
echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group|=|gitlab-runner&var-filters=source|=|${LOKI_LOGSOURCE}&var-filters=namespace|=|${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID|=|${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID|=|${CI_PIPELINE_ID}&var-filters=CI_JOB_ID|=|${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=now"
94
22:40:44
echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=$(date -d '-7 days' +%Y-%m-%d)~$(date -d '+7 days' +%Y-%m-%d)&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
95
22:40:44
echo ""
96
22:40:44
echo "Setting up credentials for Gitlab Python registries"
97
22:40:44
mkdir -p ~
98
22:40:44
echo "machine gitlab.scandit.com" > ~/.netrc
99
22:40:44
echo "login gitlab-ci-token" >> ~/.netrc
100
22:40:44
echo "password ${CI_JOB_TOKEN}" >> ~/.netrc
101
22:40:44
chmod 600 ~/.netrc
102
22:40:44
if command -v git &> /dev/null && [ "$(id -u)" -ne 0 ]; then
103
22:40:44
git config --global --add safe.directory $CI_PROJECT_DIR
104
22:40:44
fi
105
22:40:44
# Sonarqube server is running on the same cluster. Use internal address
106
22:40:44
export SONAR_HOST_URL="http://sonarqube.sonarqube.svc.cluster.local:9000"
107
22:40:44
section_end:1778107244:section_pre_build_script_0
108
22:40:44
INFO: This is the CI job pre_build_script
109
22:40:44
INFO: It's defined in the backend/infra/aws repo.
110
22:40:44
INFO: These additional Scandit variables are available to you:
111
22:40:44
SC_K8S_NODE_NAME: ip-10-0-61-202.eu-central-1.compute.internal
112
22:40:44
SC_K8S_IMAGE_ID:
113
22:40:44
SC_K8S_KYVERNO_PATCHES: |
114
22:40:44
115
22:40:44
cpu (r/l): 1/4
116
22:40:44
memory (r/l): 1.0GB/16GB
117
22:40:44
118
22:40:44
Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-host=ip-10-0-61-202.eu-central-1.compute.internal&var-namespace=gitlab-runner&var-pod=runner-wrxjpbsjx-project-621-concurrent-3-1l4zm86b&var-resolution=15&from=1778107244000&to=now
119
22:40:44
Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-node=ip-10-0-61-202.eu-central-1.compute.internal&var-resolution=15s&from=1778107244000&to=now
120
22:40:44
Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group|=|gitlab-runner&var-filters=source|=|k8s-ci.aws.scandit.io&var-filters=namespace|=|gitlab-runner&var-filters=CI_PROJECT_ID|=|621&var-filters=CI_PIPELINE_ID|=|1582489&var-filters=CI_JOB_ID|=|54539366&sortOrder=Ascending&from=1778107244000&to=now
121
22:40:44
Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=2026-04-29~2026-05-13&job_name=sonarqube&project=internal/gitlab-templates
122
22:40:44
123
22:40:44
Setting up credentials for Gitlab Python registries
124
22:40:44
$ echo "SonarQube token configured via $SONAR_TOKEN_SOURCE"
125
22:40:44
SonarQube token configured via CI/CD Variables
126
22:40:44
$ test -n "$SONAR_TOKEN" || (echo "No SONAR_TOKEN defined. You have to provide a valid token for accessing SonarQube."; false)
127
22:40:44
$ sonar-scanner -Dsonar.token=$SONAR_TOKEN ${SONAR_PROJECT_KEY:+-Dsonar.projectKey=$SONAR_PROJECT_KEY} ${SONAR_PROJECT_NAME:+-Dsonar.projectName=$SONAR_PROJECT_NAME} ${SONAR_PROJECT_BASE_DIR:+-Dsonar.projectBaseDir=$SONAR_PROJECT_BASE_DIR} ${SONAR_QUALITY_GATE_ENABLED:+-Dsonar.qualitygate.wait=$SONAR_QUALITY_GATE_ENABLED} ${SONAR_QUALITY_GATE_TIMEOUT:+-Dsonar.qualitygate.timeout=$SONAR_QUALITY_GATE_TIMEOUT} -Dsonar.links.homepage=${CI_PROJECT_URL} -Dsonar.links.ci=${CI_PROJECT_URL}/-/pipelines $SONAR_EXTRA_ARGUMENTS
128
22:40:45
22:40:44.996 INFO Scanner configuration file: /opt/sonar-scanner/conf/sonar-scanner.properties
129
22:40:45
22:40:45.001 INFO Project root configuration file: NONE
130
22:40:45
22:40:45.021 INFO SonarScanner CLI 7.3.0.5189
131
22:40:45
22:40:45.023 INFO Linux 6.12.73 amd64
132
22:40:46
22:40:46.046 INFO Communicating with SonarQube Server 2026.1.2.121356
133
22:40:46
22:40:46.047 INFO JRE provisioning: os[linux], arch[x86_64]
134
22:40:48
22:40:47.911 INFO Starting SonarScanner Engine...
135
22:40:48
22:40:47.911 INFO Java 21.0.9 Eclipse Adoptium (64-bit)
136
22:40:49
22:40:49.181 INFO Load global settings
137
22:40:49
22:40:49.277 INFO Load global settings (done) | time=96ms
138
22:40:49
22:40:49.279 INFO Server id: 67D56224-AWvmRCRfNOyX3d9aiYr-
139
22:40:49
22:40:49.303 INFO Loading required plugins
140
22:40:49
22:40:49.306 INFO Load plugins index
141
22:40:49
22:40:49.321 INFO Load plugins index (done) | time=16ms
142
22:40:49
22:40:49.321 INFO Load/download plugins
143
22:40:49
22:40:49.658 INFO Load/download plugins (done) | time=337ms
144
22:40:49
22:40:49.751 INFO Loaded core extensions: developer-scanner, server-common
145
22:40:50
22:40:50.014 INFO Process project properties
146
22:40:50
22:40:50.014 INFO Process project properties (done) | time=1ms
147
22:40:50
22:40:50.022 INFO Project key: internal-gitlab-templates
148
22:40:50
22:40:50.023 INFO Base dir: /build/internal/gitlab-templates
149
22:40:50
22:40:50.023 INFO Working dir: /build/internal/gitlab-templates/.scannerwork
150
22:40:50
22:40:50.029 INFO Load project settings for component key: 'internal-gitlab-templates'
151
22:40:50
22:40:50.050 INFO Load project settings for component key: 'internal-gitlab-templates' (done) | time=22ms
152
22:40:50
22:40:50.069 INFO Load project branches
153
22:40:50
22:40:50.103 INFO Load project branches (done) | time=28ms
154
22:40:50
22:40:50.112 INFO Load branch configuration
155
22:40:50
22:40:50.115 INFO Detected branch/PR in 'GitLab'
156
22:40:50
22:40:50.115 INFO Auto-configuring branch 'master'
157
22:40:50
22:40:50.115 INFO Load branch configuration (done) | time=3ms
158
22:40:50
22:40:50.124 INFO Load quality profiles
159
22:40:50
22:40:50.176 INFO Load quality profiles (done) | time=52ms
160
22:40:50
22:40:50.182 INFO Auto-configuring with CI 'Gitlab CI'
161
22:40:50
22:40:50.219 INFO Load active rules
162
22:40:50
22:40:50.554 INFO Load active rules (done) | time=335ms
163
22:40:50
22:40:50.559 INFO Load analysis cache
164
22:40:50
22:40:50.574 INFO Load analysis cache (3.3 kB) | time=15ms
165
22:40:50
22:40:50.777 INFO Branch name: master
166
22:40:50
22:40:50.809 INFO Preprocessing files...
167
22:40:51
22:40:50.918 INFO 3 languages detected in 70 preprocessed files (done) | time=109ms
168
22:40:51
22:40:50.919 INFO 214 files ignored because of scm ignore settings
169
22:40:51
22:40:50.920 INFO Loading plugins for detected languages
170
22:40:51
22:40:50.920 INFO Load/download plugins
171
22:40:52
22:40:51.957 INFO Load/download plugins (done) | time=1037ms
172
22:40:52
22:40:52.247 INFO Load project repositories
173
22:40:52
22:40:52.358 INFO Load project repositories (done) | time=111ms
174
22:40:52
22:40:52.376 INFO Indexing files...
175
22:40:52
22:40:52.376 INFO Project configuration:
176
22:40:52
22:40:52.420 INFO 70 files indexed (done) | time=44ms
177
22:40:52
22:40:52.422 INFO Quality profile for json: Sonar way
178
22:40:52
22:40:52.422 INFO Quality profile for py: Scandit way
179
22:40:52
22:40:52.422 INFO Quality profile for yaml: Sonar way
180
22:40:52
22:40:52.422 INFO ------------- Run sensors on module internal/gitlab-templates
181
22:40:52
22:40:52.469 INFO Load metrics repository
182
22:40:52
22:40:52.514 INFO Load metrics repository (done) | time=45ms
183
22:40:53
22:40:53.184 WARN Failed to initialize bash parser. This may happen on unsupported platforms or when the user home directory does not exist.
184
22:40:53
22:40:53.318 INFO Sensor Python Sensor [python]
185
22:40:53
22:40:53.321 WARN Your code is analyzed as compatible with all Python 3 versions by default. You can get a more precise analysis by setting the exact Python version in your configuration via the parameter "sonar.python.version"
186
22:40:53
22:40:53.517 INFO Starting global symbols computation
187
22:40:53
22:40:53.520 INFO 8 source files to be analyzed
188
22:40:53
22:40:53.650 INFO 8/8 source files have been analyzed
189
22:40:53
22:40:53.651 INFO Finished step global symbols computation in 132ms
190
22:40:53
22:40:53.667 INFO Starting rules execution
191
22:40:53
22:40:53.668 INFO 8 source files to be analyzed
192
22:40:54
22:40:54.428 INFO 8/8 source files have been analyzed
193
22:40:54
22:40:54.428 INFO Finished step rules execution in 761ms
194
22:40:54
22:40:54.428 INFO The Python analyzer was able to leverage cached data from previous analyses for 0 out of 8 files. These files were not parsed.
195
22:40:54
22:40:54.430 INFO Sensor Python Sensor [python] (done) | time=1112ms
196
22:40:54
22:40:54.430 INFO Sensor Cobertura Sensor for Python coverage [python]
197
22:40:54
22:40:54.444 INFO Sensor Cobertura Sensor for Python coverage [python] (done) | time=15ms
198
22:40:54
22:40:54.445 INFO Sensor PythonXUnitSensor [python]
199
22:40:54
22:40:54.458 INFO Sensor PythonXUnitSensor [python] (done) | time=13ms
200
22:40:54
22:40:54.458 INFO Sensor Python Dependency Sensor [python]
201
22:40:54
22:40:54.643 INFO Sensor Python Dependency Sensor [python] (done) | time=185ms
202
22:40:54
22:40:54.644 INFO Sensor Python HTML templates processing [securitypythonfrontend]
203
22:40:54
22:40:54.652 INFO Sensor Python HTML templates processing [securitypythonfrontend] (done) | time=8ms
204
22:40:54
22:40:54.652 INFO Sensor IaC CloudFormation Sensor [iac]
205
22:40:54
22:40:54.656 INFO There are no files to be analyzed for the CloudFormation language
206
22:40:54
22:40:54.656 INFO Sensor IaC CloudFormation Sensor [iac] (done) | time=4ms
207
22:40:54
22:40:54.656 INFO Sensor IaC cfn-lint report Sensor [iac]
208
22:40:54
22:40:54.656 INFO Sensor IaC cfn-lint report Sensor [iac] (done) | time=1ms
209
22:40:54
22:40:54.656 INFO Sensor IaC Kubernetes Sensor [iac]
210
22:40:54
22:40:54.727 INFO There are no files to be analyzed for the Kubernetes language
211
22:40:54
22:40:54.728 INFO Sensor IaC Kubernetes Sensor [iac] (done) | time=71ms
212
22:40:54
22:40:54.728 INFO Sensor IaC hadolint report Sensor [iac]
213
22:40:54
22:40:54.728 INFO Sensor IaC hadolint report Sensor [iac] (done) | time=0ms
214
22:40:54
22:40:54.728 INFO Sensor Java Config Sensor [iac]
215
22:40:54
22:40:54.729 INFO There are no files to be analyzed for the Java language
216
22:40:54
22:40:54.729 INFO Sensor Java Config Sensor [iac] (done) | time=2ms
217
22:40:54
22:40:54.729 INFO Sensor IaC Docker Sensor [iac]
218
22:40:54
22:40:54.785 INFO 9 source files to be analyzed
219
22:40:55
22:40:54.956 INFO 9/9 source files have been analyzed
220
22:40:55
22:40:54.956 INFO Sensor IaC Docker Sensor [iac] (done) | time=227ms
221
22:40:55
22:40:54.956 INFO Sensor IaC Ansible Sensor [iac]
222
22:40:55
22:40:54.959 INFO There are no files to be analyzed for the Ansible language
223
22:40:55
22:40:54.960 INFO Sensor IaC Ansible Sensor [iac] (done) | time=3ms
224
22:40:55
22:40:54.960 INFO Sensor IaC ansible-lint report Sensor [iac]
225
22:40:55
22:40:54.962 INFO Sensor IaC ansible-lint report Sensor [iac] (done) | time=3ms
226
22:40:55
22:40:54.963 INFO Sensor IaC GitHub Actions Sensor [iac]
227
22:40:55
22:40:54.963 INFO There are no files to be analyzed for the GitHub Actions language
228
22:40:55
22:40:54.963 INFO Sensor IaC GitHub Actions Sensor [iac] (done) | time=1ms
229
22:40:55
22:40:54.963 INFO Sensor IaC Shell Sensor [iac]
230
22:40:55
22:40:54.963 INFO Shell analysis will be skipped because the parser could not be initialized.
231
22:40:55
22:40:54.964 INFO Sensor IaC Shell Sensor [iac] (done) | time=0ms
232
22:40:55
22:40:54.964 INFO Sensor JavaScript inside YAML analysis [javascript]
233
22:40:55
22:40:54.968 INFO No input files found for analysis
234
22:40:55
22:40:54.968 INFO Hit the cache for 0 out of 0
235
22:40:55
22:40:54.969 INFO Miss the cache for 0 out of 0
236
22:40:55
22:40:54.969 INFO Sensor JavaScript inside YAML analysis [javascript] (done) | time=5ms
237
22:40:55
22:40:54.969 INFO Sensor CSS Rules [javascript]
238
22:40:55
22:40:54.969 INFO No CSS, PHP, HTML or VueJS files are found in the project. CSS analysis is skipped.
239
22:40:55
22:40:54.969 INFO Sensor CSS Rules [javascript] (done) | time=1ms
240
22:40:55
22:40:54.969 INFO Sensor IaC YAML Sensor [iac]
241
22:40:55
22:40:54.970 INFO Sensor IaC YAML Sensor [iac] (done) | time=0ms
242
22:40:55
22:40:54.970 INFO Sensor Serverless configuration file sensor [security]
243
22:40:55
22:40:54.970 INFO 0 Serverless function entries were found in the project
244
22:40:55
22:40:54.972 INFO 0 Serverless function handlers were kept as entrypoints
245
22:40:55
22:40:54.972 INFO Sensor Serverless configuration file sensor [security] (done) | time=2ms
246
22:40:55
22:40:54.972 INFO Sensor AWS SAM template file sensor [security]
247
22:40:55
22:40:54.973 INFO Sensor AWS SAM template file sensor [security] (done) | time=1ms
248
22:40:55
22:40:54.974 INFO Sensor EnterpriseTextAndSecretsSensor [textenterprise]
249
22:40:55
22:40:54.981 INFO Available processors: 4
250
22:40:55
22:40:54.981 INFO Using 4 threads for analysis.
251
22:40:55
22:40:55.380 INFO The property "sonar.tests" is not set. To improve the analysis accuracy, we categorize a file as a test file if any of the following is true:
252
22:40:55
* The filename starts with "test"
253
22:40:55
* The filename contains "test." or "tests."
254
22:40:55
* Any directory in the file path is named: "doc", "docs", "test", "tests", "mock" or "mocks"
255
22:40:55
* Any directory in the file path has a name ending in "test" or "tests"
256
22:40:55
257
22:40:55
22:40:55.450 INFO Start fetching files for the text and secrets analysis
258
22:40:55
22:40:55.455 INFO Using Git CLI to retrieve dirty files
259
22:40:55
22:40:55.468 INFO Retrieving language associated files and files included via "sonar.text.inclusions" that are tracked by git
260
22:40:55
22:40:55.470 INFO Starting the text and secrets analysis
261
22:40:55
22:40:55.471 INFO 43 source files to be analyzed for the text and secrets analysis
262
22:40:55
22:40:55.576 INFO 43/43 source files have been analyzed for the text and secrets analysis
263
22:40:55
22:40:55.578 INFO Start fetching files for the binary file analysis
264
22:40:55
22:40:55.578 INFO There are no files to be analyzed for the binary file analysis
265
22:40:55
22:40:55.578 INFO Sensor EnterpriseTextAndSecretsSensor [textenterprise] (done) | time=605ms
266
22:40:55
22:40:55.579 INFO Sensor javabugs [dbd]
267
22:40:55
22:40:55.583 INFO No IR files have been included for analysis.
268
22:40:55
22:40:55.584 INFO Sensor javabugs [dbd] (done) | time=6ms
269
22:40:55
22:40:55.584 INFO Sensor pythonbugs [dbd]
270
22:40:55
22:40:55.584 INFO No IR files have been included for analysis.
271
22:40:55
22:40:55.584 INFO Sensor pythonbugs [dbd] (done) | time=0ms
272
22:40:55
22:40:55.584 INFO Sensor PythonSecuritySensor [security]
273
22:40:55
22:40:55.603 INFO 15 taint analysis rules enabled.
274
22:40:56
22:40:55.880 INFO Analyzing 1207 UCFGs to detect vulnerabilities.
275
22:40:56
22:40:56.184 INFO No entry points found.
276
22:40:56
22:40:56.186 INFO python security sensor: Begin: 2026-05-06T22:40:55.586289312Z, End: 2026-05-06T22:40:56.184621784Z, Duration: 00:00:00.598
277
22:40:56
Load type hierarchy and UCFGs: Begin: 2026-05-06T22:40:55.604288450Z, End: 2026-05-06T22:40:55.880356962Z, Duration: 00:00:00.276
278
22:40:56
Load type hierarchy: Begin: 2026-05-06T22:40:55.604325591Z, End: 2026-05-06T22:40:55.658330240Z, Duration: 00:00:00.054
279
22:40:56
Load UCFGs: Begin: 2026-05-06T22:40:55.658461043Z, End: 2026-05-06T22:40:55.880304831Z, Duration: 00:00:00.221
280
22:40:56
Check cache: Begin: 2026-05-06T22:40:55.880466095Z, End: 2026-05-06T22:40:55.880878653Z, Duration: 00:00:00.000
281
22:40:56
Load cache: Begin: 2026-05-06T22:40:55.880657719Z, End: 2026-05-06T22:40:55.880682199Z, Duration: 00:00:00.000
282
22:40:56
Create runtime call graph: Begin: 2026-05-06T22:40:55.880907804Z, End: 2026-05-06T22:40:55.941281801Z, Duration: 00:00:00.060
283
22:40:56
Variable Type Analysis #1: Begin: 2026-05-06T22:40:55.881276962Z, End: 2026-05-06T22:40:55.926275396Z, Duration: 00:00:00.044
284
22:40:56
Create runtime type propagation graph: Begin: 2026-05-06T22:40:55.881755452Z, End: 2026-05-06T22:40:55.913282285Z, Duration: 00:00:00.031
285
22:40:56
Run SCC (Tarjan) on 2567 nodes: Begin: 2026-05-06T22:40:55.913696294Z, End: 2026-05-06T22:40:55.918592170Z, Duration: 00:00:00.004
286
22:40:56
Propagate runtime types to strongly connected components: Begin: 2026-05-06T22:40:55.918671522Z, End: 2026-05-06T22:40:55.926234806Z, Duration: 00:00:00.007
287
22:40:56
Variable Type Analysis #2: Begin: 2026-05-06T22:40:55.927873661Z, End: 2026-05-06T22:40:55.940439063Z, Duration: 00:00:00.012
288
22:40:56
Create runtime type propagation graph: Begin: 2026-05-06T22:40:55.927878561Z, End: 2026-05-06T22:40:55.933143845Z, Duration: 00:00:00.005
289
22:40:56
Run SCC (Tarjan) on 2558 nodes: Begin: 2026-05-06T22:40:55.933190466Z, End: 2026-05-06T22:40:55.935111288Z, Duration: 00:00:00.001
290
22:40:56
Propagate runtime types to strongly connected components: Begin: 2026-05-06T22:40:55.935137868Z, End: 2026-05-06T22:40:55.940413742Z, Duration: 00:00:00.005
291
22:40:56
Load config: Begin: 2026-05-06T22:40:55.941317842Z, End: 2026-05-06T22:40:56.174826422Z, Duration: 00:00:00.233
292
22:40:56
Compute entry points: Begin: 2026-05-06T22:40:56.174885853Z, End: 2026-05-06T22:40:56.183548511Z, Duration: 00:00:00.008
293
22:40:56
22:40:56.186 INFO python security sensor peak memory: 292 MB
294
22:40:56
22:40:56.186 INFO Sensor PythonSecuritySensor [security] (done) | time=601ms
295
22:40:56
22:40:56.191 INFO ------------- Run sensors on project
296
22:40:56
22:40:56.321 INFO Sensor PythonArchitectureSensor [architecture]
297
22:40:56
22:40:56.330 INFO Architecture analysis is enabled with the following features: legacy
298
22:40:56
22:40:56.334 INFO * Protobuf reading starting | memory total=296 | free=142 | used=153 (MB)
299
22:40:56
22:40:56.334 INFO * Reading SonarArchitecture UDG data from directory "/build/internal/gitlab-templates/.scannerwork/architecture/py"
300
22:40:56
22:40:56.335 INFO * Directory does not exist: "/build/internal/gitlab-templates/.scannerwork/architecture/py"
301
22:40:56
22:40:56.335 INFO * Protobuf reading complete | memory total=296 | free=142 | used=153 (MB)
302
22:40:56
22:40:56.444 INFO * Build architecture.graph.py.file_graph.default_perspective hierarchy graph complete (filtered=false) | memory total=296 | free=132 | used=163 (MB)
303
22:40:56
22:40:56.451 INFO Sensor PythonArchitectureSensor [architecture] (done) | time=131ms
304
22:40:56
22:40:56.451 INFO Sensor Zero Coverage Sensor
305
22:40:56
22:40:56.457 INFO Sensor Zero Coverage Sensor (done) | time=5ms
306
22:40:56
22:40:56.457 INFO ------------- Gather SCA dependencies on project
307
22:40:56
22:40:56.460 INFO Dependency analysis skipped
308
22:40:56
22:40:56.467 INFO CPD Executor 7 files had no CPD blocks
309
22:40:56
22:40:56.467 INFO CPD Executor Calculating CPD for 1 file
310
22:40:56
22:40:56.471 INFO CPD Executor CPD calculation finished (done) | time=3ms
311
22:40:56
22:40:56.474 INFO SCM revision ID 'b527f65394afd88252445570c85d4e7b02266e1b'
312
22:40:56
22:40:56.566 INFO Load New Code definition
313
22:40:56
22:40:56.580 INFO Load New Code definition (done) | time=15ms
314
22:40:56
22:40:56.592 INFO Analysis report generated in 110ms, dir size=318.9 kB
315
22:40:56
22:40:56.641 INFO Analysis report compressed in 55ms, zip size=65.2 kB
316
22:40:56
22:40:56.679 INFO Analysis report uploaded in 38ms
317
22:40:56
22:40:56.680 INFO ANALYSIS SUCCESSFUL, you can find the results at: https://sonarqube.scandit.com/dashboard?id=internal-gitlab-templates&branch=master
318
22:40:56
22:40:56.680 INFO Note that you will be able to access the updated dashboard once the server has processed the submitted analysis report
319
22:40:56
22:40:56.680 INFO More about the report processing at https://sonarqube.scandit.com/api/ce/task?id=de44064e-1724-4910-95e1-a6db19098442
320
22:40:56
22:40:56.716 INFO Analysis total time: 6.965 s
321
22:40:56
22:40:56.716 INFO SonarScanner Engine completed successfully
322
22:40:57
22:40:57.106 INFO EXECUTION SUCCESS
323
22:40:57
22:40:57.107 INFO Total time: 12.122s
324
22:40:57
325
22:40:57
Scout Analysis: https://scout.scandit.io/analysis/projects/621/jobs/54539366
326
22:40:57
327
22:40:57
328
22:40:57
Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-host=ip-10-0-61-202.eu-central-1.compute.internal&var-namespace=gitlab-runner&var-pod=runner-wrxjpbsjx-project-621-concurrent-3-1l4zm86b&var-resolution=15&from=1778107244000&to=1778107257000
329
22:40:57
Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-node=ip-10-0-61-202.eu-central-1.compute.internal&var-resolution=15s&from=1778107244000&to=1778107257000
330
22:40:57
Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group|=|gitlab-runner&var-filters=source|=|k8s-ci.aws.scandit.io&var-filters=namespace|=|gitlab-runner&var-filters=CI_PROJECT_ID|=|621&var-filters=CI_PIPELINE_ID|=|1582489&var-filters=CI_JOB_ID|=|54539366&sortOrder=Ascending&from=1778107244000&to=1778107257000
331
22:40:57
Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=2026-04-29~2026-05-13&job_name=sonarqube&project=internal/gitlab-templates
332
22:40:57
333
22:40:57
334
22:40:57
section_end:1778107257:step_script
335
22:40:57
+section_start:1778107257:after_script
336
22:40:57
+Running after_script
337
22:40:57
Running after script...
338
22:40:57
section_start:1778107257:section_after_script_step_0[hide_duration=true,collapsed=true]
$ cat <<-EOD
339
22:40:57
----------------------------------------------------------
340
22:40:57
Need help? Documentation on the SonarQube CI/CD component can be found at:
341
22:40:57
https://gitlab.scandit.com/internal/ci-components/sonarqube/-/blob/main/templates/sonarqube.yml
342
22:40:57
EOD
343
22:40:57
section_end:1778107257:section_after_script_step_0
344
22:40:57
----------------------------------------------------------
345
22:40:57
Need help? Documentation on the SonarQube CI/CD component can be found at:
346
22:40:57
https://gitlab.scandit.com/internal/ci-components/sonarqube/-/blob/main/templates/sonarqube.yml
347
22:40:57
348
22:40:57
section_end:1778107257:after_script
349
22:40:57
+section_start:1778107257:archive_cache
350
22:40:57
+Saving cache for successful job
351
22:40:58
Creating cache sonarqube-1-protected...
352
22:40:58
WARNING: .sonar/cache: no matching files. Ensure that the artifact path is relative to the working directory (/build/internal/gitlab-templates)
353
22:40:59
No URL provided, cache will not be uploaded to shared cache server. Cache will be stored only locally.
354
22:40:59
Created cache
355
22:40:59
356
22:40:59
section_end:1778107259:archive_cache
357
22:40:59
+section_start:1778107259:cleanup_file_variables
358
22:40:59
+Cleaning up project directory and file based variables
359
22:40:59
360
22:40:59
section_end:1778107259:cleanup_file_variables
361
22:40:59
+
362
22:40:59
Job succeeded
363