sonarqube ○ success
⏱
Duration: 26s
⏳
Queued: 1s
📁
Stage: test
🖥
Runner: linux-1
Average Duration
39s
This job: 26s
Failure Rate
3.0%
last 30 days
External Links
▶
Job Execution Phases
💡 Tip: Click on any phase bar to jump to that section in the log below
▶
Job Analysis
Job Status: Passed
Status: Job passed successfully
▶
Full Job Log
369 lines
Match - of 0
1
22:33:02
Running with gitlab-runner 18.9.0 (07e534ba)
2
22:33:02
on gitlab-runner-linux-1-5b9cfd64ff-k5sg5 aP4tCsXyp, system ID: r_wQDtEh3nNZsL
3
22:33:02
feature flags: FF_USE_FASTZIP:true, FF_USE_NEW_BASH_EVAL_STRATEGY:true, FF_USE_DYNAMIC_TRACE_FORCE_SEND_INTERVAL:true, FF_SCRIPT_SECTIONS:true, FF_ENABLE_JOB_CLEANUP:true, FF_USE_ADVANCED_POD_SPEC_CONFIGURATION:true, FF_PRINT_POD_EVENTS:true, FF_USE_DUMB_INIT_WITH_KUBERNETES_EXECUTOR:true, FF_LOG_IMAGES_CONFIGURED_FOR_JOB:true, FF_CLEAN_UP_FAILED_CACHE_EXTRACT:true, FF_GIT_URLS_WITHOUT_TOKENS:true, FF_WAIT_FOR_POD_TO_BE_REACHABLE:true, FF_USE_FLEETING_ACQUIRE_HEARTBEATS:true, FF_USE_JOB_ROUTER:true
4
22:33:02
Resolving secrets
5
22:33:02
section_start:1778279582:prepare_executor
6
22:33:02
+Preparing the "kubernetes" executor
7
22:33:02
Using Kubernetes namespace: gitlab-runner
8
22:33:02
Using Kubernetes executor with image registry.scandit.com/dockerfiles/sonar-scanner/sonar-scanner-cli:11.5 ...
9
22:33:02
Using attach strategy to execute scripts...
10
22:33:02
Using effective pull policy of [Always] for container helper
11
22:33:02
Using effective pull policy of [Always] for container init-permissions
12
22:33:02
Using effective pull policy of [Always] for container build
13
22:33:02
section_end:1778279582:prepare_executor
14
22:33:02
+section_start:1778279582:prepare_script
15
22:33:02
+Preparing environment
16
22:33:02
Using FF_USE_POD_ACTIVE_DEADLINE_SECONDS, the Pod activeDeadlineSeconds will be set to the job timeout: 1h0m0s...
17
22:33:02
WARNING: Advanced Pod Spec configuration enabled, merging the provided PodSpec to the generated one. This is a beta feature and is subject to change. Feedback is collected in this issue: https://gitlab.com/gitlab-org/gitlab-runner/-/issues/29659 ...
18
22:33:03
Subscribing to Kubernetes Pod events...
19
22:33:03
Type Reason Message
20
22:33:03
Normal Scheduled Successfully assigned gitlab-runner/runner-ap4tcsxyp-project-621-concurrent-4-23190vnf to ci4
21
22:33:03
Normal Pulled Container image "registry.gitlab.com/gitlab-org/gitlab-runner/gitlab-runner-helper:x86_64-v18.9.0" already present on machine
22
22:33:03
Normal Created Created container: init-permissions
23
22:33:03
Normal Started Started container init-permissions
24
22:33:04
Normal Pulled Container image "registry.gitlab.com/gitlab-org/gitlab-runner/gitlab-runner-helper:x86_64-v18.9.0" already present on machine
25
22:33:04
Normal Created Created container: helper
26
22:33:04
Normal Started Started container helper
27
22:33:04
Normal Pulling Pulling image "registry.scandit.com/dockerfiles/sonar-scanner/sonar-scanner-cli:11.5"
28
22:33:05
Normal Pulled Successfully pulled image "registry.scandit.com/dockerfiles/sonar-scanner/sonar-scanner-cli:11.5" in 258ms (258ms including waiting). Image size: 759369443 bytes.
29
22:33:05
Normal Created Created container: build
30
22:33:05
Normal Started Started container build
31
22:33:06
Running on runner-ap4tcsxyp-project-621-concurrent-4-23190vnf via gitlab-runner-linux-1-5b9cfd64ff-k5sg5...
32
22:33:06
33
22:33:06
section_end:1778279586:prepare_script
34
22:33:06
+section_start:1778279586:get_sources
35
22:33:06
+Getting source from Git repository
36
22:33:06
Gitaly correlation ID: 01KR4VJ2RMR36W8RHATXYEVS1Q
37
22:33:06
Fetching changes...
38
22:33:06
Initialized empty Git repository in /build/internal/gitlab-templates/.git/
39
22:33:06
Created fresh repository.
40
22:33:07
Checking out a6e804dd as detached HEAD (ref is master)...
41
22:33:07
42
22:33:07
Skipping Git submodules setup
43
22:33:07
44
22:33:07
section_end:1778279587:get_sources
45
22:33:07
+section_start:1778279587:restore_cache
46
22:33:07
+Restoring cache
47
22:33:08
Checking cache for sonarqube-1-protected...
48
22:33:08
No URL provided, cache will not be downloaded from shared cache server. Instead a local version of cache will be extracted.
49
22:33:08
WARNING: Cache file does not exist
50
22:33:08
Failed to extract cache
51
22:33:08
Removing .sonar/cache
52
22:33:08
53
22:33:08
section_end:1778279588:restore_cache
54
22:33:08
+section_start:1778279588:step_script
55
22:33:08
+Executing "step_script" stage of the job script
56
22:33:08
section_start:1778279588:section_pre_build_script_0[hide_duration=true,collapsed=true]
$ function cleanup {
57
22:33:08
rv=$?
58
22:33:08
if [ $rv -ne 0 ]; then
59
22:33:08
echo ""
60
22:33:08
echo " Failure Cause Analysis might help, please open this link:"
61
22:33:08
echo " https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
62
22:33:08
echo ""
63
22:33:08
fi
64
22:33:08
echo ""
65
22:33:08
echo "Scout Analysis: https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
66
22:33:08
echo ""
67
22:33:08
echo ""
68
22:33:08
echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=${EPOCHSECONDS}000"
69
22:33:08
echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=${EPOCHSECONDS}000"
70
22:33:08
echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group%7C=%7Cgitlab-runner&var-filters=source%7C%3D%7C${LOKI_LOGSOURCE}&var-filters=namespace%7C%3D%7C${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID%7C%3D%7C${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID%7C%3D%7C${CI_PIPELINE_ID}&var-filters=CI_JOB_ID%7C%3D%7C${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=${EPOCHSECONDS}000"
71
22:33:08
__date_from=$(date -d "@$(( EPOCHSECONDS - 604800 ))" +%Y-%m-%d)
72
22:33:08
__date_to=$(date -d "@$(( EPOCHSECONDS + 604800 ))" +%Y-%m-%d)
73
22:33:08
echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=${__date_from}~${__date_to}&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
74
22:33:08
echo ""
75
22:33:08
exit $rv
76
22:33:08
}
77
22:33:08
trap cleanup EXIT
78
22:33:08
echo "INFO: This is the CI job pre_build_script"
79
22:33:08
echo "INFO: It's defined in the backend/infra/onprem/k8s repo."
80
22:33:08
echo "INFO: These additional Scandit variables are available to you:"
81
22:33:08
echo " SC_K8S_NODE_NAME: $SC_K8S_NODE_NAME"
82
22:33:08
echo " SC_K8S_IMAGE_ID: $SC_K8S_IMAGE_ID"
83
22:33:08
echo " SC_K8S_KYVERNO_PATCHES: |"
84
22:33:08
echo "$SC_K8S_KYVERNO_PATCHES" | sed 's/^/ /'
85
22:33:08
echo "cpu (r/l): ${SC_K8S_REQUESTS_CPU}/${SC_K8S_LIMITS_CPU}"
86
22:33:08
if command -v numfmt >/dev/null 2>&1; then
87
22:33:08
echo "memory (r/l): $(numfmt --to=iec --suffix=B $SC_K8S_REQUESTS_MEMORY)/$(numfmt --to=iec --suffix=B $SC_K8S_LIMITS_MEMORY)"
88
22:33:08
else
89
22:33:08
echo "memory (r/l): ${SC_K8S_REQUESTS_MEMORY}/${SC_K8S_LIMITS_MEMORY}"
90
22:33:08
fi
91
22:33:08
__start_time=${EPOCHSECONDS}
92
22:33:08
echo ""
93
22:33:08
echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=now"
94
22:33:08
echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=now"
95
22:33:08
echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group%7C%3D%7Cgitlab-runner&var-filters=source%7C%3D%7C${LOKI_LOGSOURCE}&var-filters=namespace%7C%3D%7C${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID%7C%3D%7C${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID%7C%3D%7C${CI_PIPELINE_ID}&var-filters=CI_JOB_ID%7C%3D%7C${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=now"
96
22:33:08
__date_from=$(date -d "@$(( EPOCHSECONDS - 604800 ))" +%Y-%m-%d)
97
22:33:08
__date_to=$(date -d "@$(( EPOCHSECONDS + 604800 ))" +%Y-%m-%d)
98
22:33:08
echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=${__date_from}~${__date_to}&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
99
22:33:08
echo ""
100
22:33:08
echo "Setting up credentials for Gitlab Python registries"
101
22:33:08
mkdir -p ~
102
22:33:08
echo "machine gitlab.scandit.com" > ~/.netrc
103
22:33:08
echo "login gitlab-ci-token" >> ~/.netrc
104
22:33:08
echo "password ${CI_JOB_TOKEN}" >> ~/.netrc
105
22:33:08
chmod 600 ~/.netrc
106
22:33:08
if command -v git &> /dev/null && [ "$(id -u)" -ne 0 ]; then
107
22:33:08
git config --global --add safe.directory $CI_PROJECT_DIR
108
22:33:08
fi
109
22:33:08
sleep infinity &
110
22:33:08
echo $! > ~/.bg_pid
111
22:33:08
section_end:1778279588:section_pre_build_script_0
112
22:33:08
INFO: This is the CI job pre_build_script
113
22:33:08
INFO: It's defined in the backend/infra/onprem/k8s repo.
114
22:33:08
INFO: These additional Scandit variables are available to you:
115
22:33:08
SC_K8S_NODE_NAME: ci4
116
22:33:08
SC_K8S_IMAGE_ID:
117
22:33:08
SC_K8S_KYVERNO_PATCHES: |
118
22:33:08
119
22:33:08
cpu (r/l): 1/8
120
22:33:08
memory (r/l): 1.0GB/16GB
121
22:33:08
122
22:33:08
Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=KpIiby5Vz&var-host=ci4&var-namespace=gitlab-runner&var-pod=runner-ap4tcsxyp-project-621-concurrent-4-23190vnf&var-resolution=15&from=1778279588000&to=now
123
22:33:08
Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=KpIiby5Vz&var-node=ci4&var-resolution=15s&from=1778279588000&to=now
124
22:33:08
Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group%7C%3D%7Cgitlab-runner&var-filters=source%7C%3D%7Czrh.int.scandit.io&var-filters=namespace%7C%3D%7Cgitlab-runner&var-filters=CI_PROJECT_ID%7C%3D%7C621&var-filters=CI_PIPELINE_ID%7C%3D%7C1586755&var-filters=CI_JOB_ID%7C%3D%7C54740925&sortOrder=Ascending&from=1778279588000&to=now
125
22:33:08
Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=2026-05-01~2026-05-15&job_name=sonarqube&project=internal/gitlab-templates
126
22:33:08
127
22:33:08
Setting up credentials for Gitlab Python registries
128
22:33:08
$ echo "SonarQube token configured via $SONAR_TOKEN_SOURCE"
129
22:33:08
SonarQube token configured via CI/CD Variables
130
22:33:08
$ test -n "$SONAR_TOKEN" || (echo "No SONAR_TOKEN defined. You have to provide a valid token for accessing SonarQube."; false)
131
22:33:08
$ sonar-scanner -Dsonar.token=$SONAR_TOKEN ${SONAR_PROJECT_KEY:+-Dsonar.projectKey=$SONAR_PROJECT_KEY} ${SONAR_PROJECT_NAME:+-Dsonar.projectName=$SONAR_PROJECT_NAME} ${SONAR_PROJECT_BASE_DIR:+-Dsonar.projectBaseDir=$SONAR_PROJECT_BASE_DIR} ${SONAR_QUALITY_GATE_ENABLED:+-Dsonar.qualitygate.wait=$SONAR_QUALITY_GATE_ENABLED} ${SONAR_QUALITY_GATE_TIMEOUT:+-Dsonar.qualitygate.timeout=$SONAR_QUALITY_GATE_TIMEOUT} -Dsonar.links.homepage=${CI_PROJECT_URL} -Dsonar.links.ci=${CI_PROJECT_URL}/-/pipelines $SONAR_EXTRA_ARGUMENTS
132
22:33:09
22:33:09.287 INFO Scanner configuration file: /opt/sonar-scanner/conf/sonar-scanner.properties
133
22:33:09
22:33:09.292 INFO Project root configuration file: NONE
134
22:33:09
22:33:09.308 INFO SonarScanner CLI 7.3.0.5189
135
22:33:09
22:33:09.310 INFO Linux 6.12.85+deb13-amd64 amd64
136
22:33:10
22:33:10.684 INFO Communicating with SonarQube Server 2026.1.2.121356
137
22:33:10
22:33:10.685 INFO JRE provisioning: os[linux], arch[x86_64]
138
22:33:14
22:33:14.120 INFO Starting SonarScanner Engine...
139
22:33:14
22:33:14.122 INFO Java 21.0.9 Eclipse Adoptium (64-bit)
140
22:33:15
22:33:15.571 INFO Load global settings
141
22:33:15
22:33:15.871 INFO Load global settings (done) | time=300ms
142
22:33:15
22:33:15.874 INFO Server id: 67D56224-AWvmRCRfNOyX3d9aiYr-
143
22:33:15
22:33:15.884 INFO Loading required plugins
144
22:33:15
22:33:15.885 INFO Load plugins index
145
22:33:15
22:33:15.913 INFO Load plugins index (done) | time=29ms
146
22:33:15
22:33:15.914 INFO Load/download plugins
147
22:33:17
22:33:17.178 INFO Load/download plugins (done) | time=1265ms
148
22:33:17
22:33:17.299 INFO Loaded core extensions: developer-scanner, server-common
149
22:33:17
22:33:17.637 INFO Process project properties
150
22:33:17
22:33:17.637 INFO Process project properties (done) | time=1ms
151
22:33:17
22:33:17.648 INFO Project key: internal-gitlab-templates
152
22:33:17
22:33:17.649 INFO Base dir: /build/internal/gitlab-templates
153
22:33:17
22:33:17.650 INFO Working dir: /build/internal/gitlab-templates/.scannerwork
154
22:33:17
22:33:17.658 INFO Load project settings for component key: 'internal-gitlab-templates'
155
22:33:17
22:33:17.689 INFO Load project settings for component key: 'internal-gitlab-templates' (done) | time=31ms
156
22:33:17
22:33:17.721 INFO Load project branches
157
22:33:17
22:33:17.762 INFO Load project branches (done) | time=42ms
158
22:33:17
22:33:17.764 INFO Load branch configuration
159
22:33:17
22:33:17.765 INFO Detected branch/PR in 'GitLab'
160
22:33:17
22:33:17.766 INFO Auto-configuring branch 'master'
161
22:33:17
22:33:17.766 INFO Load branch configuration (done) | time=3ms
162
22:33:17
22:33:17.779 INFO Load quality profiles
163
22:33:17
22:33:17.845 INFO Load quality profiles (done) | time=67ms
164
22:33:17
22:33:17.855 INFO Auto-configuring with CI 'Gitlab CI'
165
22:33:17
22:33:17.889 INFO Load active rules
166
22:33:18
22:33:18.375 INFO Load active rules (done) | time=486ms
167
22:33:18
22:33:18.382 INFO Load analysis cache
168
22:33:18
22:33:18.410 INFO Load analysis cache (3.3 kB) | time=28ms
169
22:33:18
22:33:18.691 INFO Branch name: master
170
22:33:18
22:33:18.723 INFO Preprocessing files...
171
22:33:18
22:33:18.924 INFO 3 languages detected in 70 preprocessed files (done) | time=200ms
172
22:33:18
22:33:18.925 INFO 216 files ignored because of scm ignore settings
173
22:33:18
22:33:18.927 INFO Loading plugins for detected languages
174
22:33:18
22:33:18.928 INFO Load/download plugins
175
22:33:20
22:33:20.751 INFO Load/download plugins (done) | time=1823ms
176
22:33:21
22:33:21.084 INFO Load project repositories
177
22:33:21
22:33:21.223 INFO Load project repositories (done) | time=139ms
178
22:33:21
22:33:21.248 INFO Indexing files...
179
22:33:21
22:33:21.249 INFO Project configuration:
180
22:33:21
22:33:21.303 INFO 70 files indexed (done) | time=55ms
181
22:33:21
22:33:21.305 INFO Quality profile for json: Sonar way
182
22:33:21
22:33:21.305 INFO Quality profile for py: Scandit way
183
22:33:21
22:33:21.306 INFO Quality profile for yaml: Sonar way
184
22:33:21
22:33:21.307 INFO ------------- Run sensors on module internal/gitlab-templates
185
22:33:21
22:33:21.365 INFO Load metrics repository
186
22:33:21
22:33:21.394 INFO Load metrics repository (done) | time=29ms
187
22:33:22
22:33:22.132 WARN Failed to initialize bash parser. This may happen on unsupported platforms or when the user home directory does not exist.
188
22:33:22
22:33:22.239 INFO Sensor Python Sensor [python]
189
22:33:22
22:33:22.243 WARN Your code is analyzed as compatible with all Python 3 versions by default. You can get a more precise analysis by setting the exact Python version in your configuration via the parameter "sonar.python.version"
190
22:33:22
22:33:22.413 INFO Starting global symbols computation
191
22:33:22
22:33:22.417 INFO 8 source files to be analyzed
192
22:33:22
22:33:22.596 INFO 8/8 source files have been analyzed
193
22:33:22
22:33:22.598 INFO Finished step global symbols computation in 182ms
194
22:33:22
22:33:22.627 INFO Starting rules execution
195
22:33:22
22:33:22.628 INFO 8 source files to be analyzed
196
22:33:23
22:33:23.381 INFO 8/8 source files have been analyzed
197
22:33:23
22:33:23.382 INFO Finished step rules execution in 753ms
198
22:33:23
22:33:23.383 INFO The Python analyzer was able to leverage cached data from previous analyses for 0 out of 8 files. These files were not parsed.
199
22:33:23
22:33:23.384 INFO Sensor Python Sensor [python] (done) | time=1145ms
200
22:33:23
22:33:23.385 INFO Sensor Cobertura Sensor for Python coverage [python]
201
22:33:23
22:33:23.415 INFO Sensor Cobertura Sensor for Python coverage [python] (done) | time=31ms
202
22:33:23
22:33:23.415 INFO Sensor PythonXUnitSensor [python]
203
22:33:23
22:33:23.442 INFO Sensor PythonXUnitSensor [python] (done) | time=28ms
204
22:33:23
22:33:23.443 INFO Sensor Python Dependency Sensor [python]
205
22:33:23
22:33:23.677 INFO Sensor Python Dependency Sensor [python] (done) | time=235ms
206
22:33:23
22:33:23.678 INFO Sensor Python HTML templates processing [securitypythonfrontend]
207
22:33:23
22:33:23.707 INFO Sensor Python HTML templates processing [securitypythonfrontend] (done) | time=30ms
208
22:33:23
22:33:23.708 INFO Sensor IaC CloudFormation Sensor [iac]
209
22:33:23
22:33:23.714 INFO There are no files to be analyzed for the CloudFormation language
210
22:33:23
22:33:23.715 INFO Sensor IaC CloudFormation Sensor [iac] (done) | time=7ms
211
22:33:23
22:33:23.716 INFO Sensor IaC cfn-lint report Sensor [iac]
212
22:33:23
22:33:23.716 INFO Sensor IaC cfn-lint report Sensor [iac] (done) | time=1ms
213
22:33:23
22:33:23.716 INFO Sensor IaC Kubernetes Sensor [iac]
214
22:33:23
22:33:23.797 INFO There are no files to be analyzed for the Kubernetes language
215
22:33:23
22:33:23.799 INFO Sensor IaC Kubernetes Sensor [iac] (done) | time=81ms
216
22:33:23
22:33:23.799 INFO Sensor IaC hadolint report Sensor [iac]
217
22:33:23
22:33:23.799 INFO Sensor IaC hadolint report Sensor [iac] (done) | time=0ms
218
22:33:23
22:33:23.800 INFO Sensor Java Config Sensor [iac]
219
22:33:23
22:33:23.800 INFO There are no files to be analyzed for the Java language
220
22:33:23
22:33:23.800 INFO Sensor Java Config Sensor [iac] (done) | time=2ms
221
22:33:23
22:33:23.801 INFO Sensor IaC Docker Sensor [iac]
222
22:33:23
22:33:23.883 INFO 9 source files to be analyzed
223
22:33:24
22:33:24.011 INFO 9/9 source files have been analyzed
224
22:33:24
22:33:24.012 INFO Sensor IaC Docker Sensor [iac] (done) | time=213ms
225
22:33:24
22:33:24.012 INFO Sensor IaC Ansible Sensor [iac]
226
22:33:24
22:33:24.016 INFO There are no files to be analyzed for the Ansible language
227
22:33:24
22:33:24.017 INFO Sensor IaC Ansible Sensor [iac] (done) | time=4ms
228
22:33:24
22:33:24.017 INFO Sensor IaC ansible-lint report Sensor [iac]
229
22:33:24
22:33:24.024 INFO Sensor IaC ansible-lint report Sensor [iac] (done) | time=8ms
230
22:33:24
22:33:24.025 INFO Sensor IaC GitHub Actions Sensor [iac]
231
22:33:24
22:33:24.025 INFO There are no files to be analyzed for the GitHub Actions language
232
22:33:24
22:33:24.025 INFO Sensor IaC GitHub Actions Sensor [iac] (done) | time=0ms
233
22:33:24
22:33:24.026 INFO Sensor IaC Shell Sensor [iac]
234
22:33:24
22:33:24.026 INFO Shell analysis will be skipped because the parser could not be initialized.
235
22:33:24
22:33:24.026 INFO Sensor IaC Shell Sensor [iac] (done) | time=0ms
236
22:33:24
22:33:24.026 INFO Sensor JavaScript inside YAML analysis [javascript]
237
22:33:24
22:33:24.034 INFO No input files found for analysis
238
22:33:24
22:33:24.034 INFO Hit the cache for 0 out of 0
239
22:33:24
22:33:24.035 INFO Miss the cache for 0 out of 0
240
22:33:24
22:33:24.035 INFO Sensor JavaScript inside YAML analysis [javascript] (done) | time=9ms
241
22:33:24
22:33:24.035 INFO Sensor CSS Rules [javascript]
242
22:33:24
22:33:24.036 INFO No CSS, PHP, HTML or VueJS files are found in the project. CSS analysis is skipped.
243
22:33:24
22:33:24.036 INFO Sensor CSS Rules [javascript] (done) | time=0ms
244
22:33:24
22:33:24.036 INFO Sensor IaC YAML Sensor [iac]
245
22:33:24
22:33:24.036 INFO Sensor IaC YAML Sensor [iac] (done) | time=0ms
246
22:33:24
22:33:24.036 INFO Sensor Serverless configuration file sensor [security]
247
22:33:24
22:33:24.037 INFO 0 Serverless function entries were found in the project
248
22:33:24
22:33:24.039 INFO 0 Serverless function handlers were kept as entrypoints
249
22:33:24
22:33:24.039 INFO Sensor Serverless configuration file sensor [security] (done) | time=3ms
250
22:33:24
22:33:24.040 INFO Sensor AWS SAM template file sensor [security]
251
22:33:24
22:33:24.041 INFO Sensor AWS SAM template file sensor [security] (done) | time=2ms
252
22:33:24
22:33:24.041 INFO Sensor EnterpriseTextAndSecretsSensor [textenterprise]
253
22:33:24
22:33:24.051 INFO Available processors: 8
254
22:33:24
22:33:24.052 INFO Using 8 threads for analysis.
255
22:33:24
22:33:24.390 INFO The property "sonar.tests" is not set. To improve the analysis accuracy, we categorize a file as a test file if any of the following is true:
256
22:33:24
* The filename starts with "test"
257
22:33:24
* The filename contains "test." or "tests."
258
22:33:24
* Any directory in the file path is named: "doc", "docs", "test", "tests", "mock" or "mocks"
259
22:33:24
* Any directory in the file path has a name ending in "test" or "tests"
260
22:33:24
261
22:33:24
22:33:24.464 INFO Start fetching files for the text and secrets analysis
262
22:33:24
22:33:24.471 INFO Using Git CLI to retrieve dirty files
263
22:33:24
22:33:24.494 INFO Retrieving language associated files and files included via "sonar.text.inclusions" that are tracked by git
264
22:33:24
22:33:24.496 INFO Starting the text and secrets analysis
265
22:33:24
22:33:24.498 INFO 43 source files to be analyzed for the text and secrets analysis
266
22:33:24
22:33:24.697 INFO 43/43 source files have been analyzed for the text and secrets analysis
267
22:33:24
22:33:24.700 INFO Start fetching files for the binary file analysis
268
22:33:24
22:33:24.701 INFO There are no files to be analyzed for the binary file analysis
269
22:33:24
22:33:24.702 INFO Sensor EnterpriseTextAndSecretsSensor [textenterprise] (done) | time=662ms
270
22:33:24
22:33:24.703 INFO Sensor javabugs [dbd]
271
22:33:24
22:33:24.710 INFO No IR files have been included for analysis.
272
22:33:24
22:33:24.710 INFO Sensor javabugs [dbd] (done) | time=8ms
273
22:33:24
22:33:24.710 INFO Sensor pythonbugs [dbd]
274
22:33:24
22:33:24.710 INFO No IR files have been included for analysis.
275
22:33:24
22:33:24.711 INFO Sensor pythonbugs [dbd] (done) | time=0ms
276
22:33:24
22:33:24.711 INFO Sensor PythonSecuritySensor [security]
277
22:33:24
22:33:24.716 INFO 15 taint analysis rules enabled.
278
22:33:25
22:33:25.086 INFO Analyzing 1207 UCFGs to detect vulnerabilities.
279
22:33:25
22:33:25.452 INFO No entry points found.
280
22:33:25
22:33:25.455 INFO python security sensor: Begin: 2026-05-08T22:33:24.713194465Z, End: 2026-05-08T22:33:25.453253384Z, Duration: 00:00:00.740
281
22:33:25
Load type hierarchy and UCFGs: Begin: 2026-05-08T22:33:24.716804039Z, End: 2026-05-08T22:33:25.085657136Z, Duration: 00:00:00.368
282
22:33:25
Load type hierarchy: Begin: 2026-05-08T22:33:24.716834297Z, End: 2026-05-08T22:33:24.789906287Z, Duration: 00:00:00.073
283
22:33:25
Load UCFGs: Begin: 2026-05-08T22:33:24.790070556Z, End: 2026-05-08T22:33:25.085501055Z, Duration: 00:00:00.295
284
22:33:25
Check cache: Begin: 2026-05-08T22:33:25.085833361Z, End: 2026-05-08T22:33:25.086545184Z, Duration: 00:00:00.000
285
22:33:25
Load cache: Begin: 2026-05-08T22:33:25.086196735Z, End: 2026-05-08T22:33:25.086239437Z, Duration: 00:00:00.000
286
22:33:25
Create runtime call graph: Begin: 2026-05-08T22:33:25.086629944Z, End: 2026-05-08T22:33:25.151118842Z, Duration: 00:00:00.064
287
22:33:25
Variable Type Analysis #1: Begin: 2026-05-08T22:33:25.087321919Z, End: 2026-05-08T22:33:25.130405884Z, Duration: 00:00:00.043
288
22:33:25
Create runtime type propagation graph: Begin: 2026-05-08T22:33:25.088097350Z, End: 2026-05-08T22:33:25.113120182Z, Duration: 00:00:00.025
289
22:33:25
Run SCC (Tarjan) on 2567 nodes: Begin: 2026-05-08T22:33:25.113818138Z, End: 2026-05-08T22:33:25.120128337Z, Duration: 00:00:00.006
290
22:33:25
Propagate runtime types to strongly connected components: Begin: 2026-05-08T22:33:25.120240033Z, End: 2026-05-08T22:33:25.130322532Z, Duration: 00:00:00.010
291
22:33:25
Variable Type Analysis #2: Begin: 2026-05-08T22:33:25.132191623Z, End: 2026-05-08T22:33:25.149678925Z, Duration: 00:00:00.017
292
22:33:25
Create runtime type propagation graph: Begin: 2026-05-08T22:33:25.132199244Z, End: 2026-05-08T22:33:25.138811080Z, Duration: 00:00:00.006
293
22:33:25
Run SCC (Tarjan) on 2558 nodes: Begin: 2026-05-08T22:33:25.138905555Z, End: 2026-05-08T22:33:25.141248661Z, Duration: 00:00:00.002
294
22:33:25
Propagate runtime types to strongly connected components: Begin: 2026-05-08T22:33:25.141296957Z, End: 2026-05-08T22:33:25.149618460Z, Duration: 00:00:00.008
295
22:33:25
Load config: Begin: 2026-05-08T22:33:25.151179885Z, End: 2026-05-08T22:33:25.435488249Z, Duration: 00:00:00.284
296
22:33:25
Compute entry points: Begin: 2026-05-08T22:33:25.435571617Z, End: 2026-05-08T22:33:25.451463174Z, Duration: 00:00:00.015
297
22:33:25
22:33:25.455 INFO python security sensor peak memory: 167 MB
298
22:33:25
22:33:25.456 INFO Sensor PythonSecuritySensor [security] (done) | time=745ms
299
22:33:25
22:33:25.459 INFO ------------- Run sensors on project
300
22:33:25
22:33:25.593 INFO Sensor PythonArchitectureSensor [architecture]
301
22:33:25
22:33:25.606 INFO Architecture analysis is enabled with the following features: legacy
302
22:33:25
22:33:25.610 INFO * Protobuf reading starting | memory total=312 | free=132 | used=179 (MB)
303
22:33:25
22:33:25.611 INFO * Reading SonarArchitecture UDG data from directory "/build/internal/gitlab-templates/.scannerwork/architecture/py"
304
22:33:25
22:33:25.612 INFO * Directory does not exist: "/build/internal/gitlab-templates/.scannerwork/architecture/py"
305
22:33:25
22:33:25.612 INFO * Protobuf reading complete | memory total=312 | free=131 | used=180 (MB)
306
22:33:25
22:33:25.741 INFO * Build architecture.graph.py.file_graph.default_perspective hierarchy graph complete (filtered=false) | memory total=312 | free=121 | used=190 (MB)
307
22:33:25
22:33:25.750 INFO Sensor PythonArchitectureSensor [architecture] (done) | time=157ms
308
22:33:25
22:33:25.751 INFO Sensor Zero Coverage Sensor
309
22:33:25
22:33:25.757 INFO Sensor Zero Coverage Sensor (done) | time=6ms
310
22:33:25
22:33:25.758 INFO ------------- Gather SCA dependencies on project
311
22:33:25
22:33:25.761 INFO Dependency analysis skipped
312
22:33:25
22:33:25.771 INFO CPD Executor 7 files had no CPD blocks
313
22:33:25
22:33:25.772 INFO CPD Executor Calculating CPD for 1 file
314
22:33:25
22:33:25.777 INFO CPD Executor CPD calculation finished (done) | time=5ms
315
22:33:25
22:33:25.781 INFO SCM revision ID 'a6e804dd9b5402c79c43d522c187961cf99e11ea'
316
22:33:25
22:33:25.884 INFO Load New Code definition
317
22:33:25
22:33:25.907 INFO Load New Code definition (done) | time=23ms
318
22:33:25
22:33:25.914 INFO Analysis report generated in 131ms, dir size=318.9 kB
319
22:33:25
22:33:25.949 INFO Analysis report compressed in 35ms, zip size=65.2 kB
320
22:33:26
22:33:26.009 INFO Analysis report uploaded in 59ms
321
22:33:26
22:33:26.009 INFO ANALYSIS SUCCESSFUL, you can find the results at: https://sonarqube.scandit.com/dashboard?id=internal-gitlab-templates&branch=master
322
22:33:26
22:33:26.009 INFO Note that you will be able to access the updated dashboard once the server has processed the submitted analysis report
323
22:33:26
22:33:26.010 INFO More about the report processing at https://sonarqube.scandit.com/api/ce/task?id=693c413a-1ce2-4c06-9c91-7f9c57775171
324
22:33:26
22:33:26.022 INFO Analysis total time: 8.724 s
325
22:33:26
22:33:26.023 INFO SonarScanner Engine completed successfully
326
22:33:26
22:33:26.379 INFO EXECUTION SUCCESS
327
22:33:26
22:33:26.382 INFO Total time: 17.098s
328
22:33:26
329
22:33:27
Scout Analysis: https://scout.scandit.io/analysis/projects/621/jobs/54740925
330
22:33:27
331
22:33:27
332
22:33:27
Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=KpIiby5Vz&var-host=ci4&var-namespace=gitlab-runner&var-pod=runner-ap4tcsxyp-project-621-concurrent-4-23190vnf&var-resolution=15&from=1778279588000&to=1778279606000
333
22:33:27
Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=KpIiby5Vz&var-node=ci4&var-resolution=15s&from=1778279588000&to=1778279606000
334
22:33:27
Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group%7C=%7Cgitlab-runner&var-filters=source%7C%3D%7Czrh.int.scandit.io&var-filters=namespace%7C%3D%7Cgitlab-runner&var-filters=CI_PROJECT_ID%7C%3D%7C621&var-filters=CI_PIPELINE_ID%7C%3D%7C1586755&var-filters=CI_JOB_ID%7C%3D%7C54740925&sortOrder=Ascending&from=1778279588000&to=1778279606000
335
22:33:27
Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=2026-05-01~2026-05-15&job_name=sonarqube&project=internal/gitlab-templates
336
22:33:27
337
22:33:27
338
22:33:27
section_end:1778279607:step_script
339
22:33:27
+section_start:1778279607:after_script
340
22:33:27
+Running after_script
341
22:33:27
Running after script...
342
22:33:27
section_start:1778279607:section_after_script_step_0[hide_duration=true,collapsed=true]
$ cat <<-EOD
343
22:33:27
----------------------------------------------------------
344
22:33:27
Need help? Documentation on the SonarQube CI/CD component can be found at:
345
22:33:27
https://gitlab.scandit.com/internal/ci-components/sonarqube/-/blob/main/templates/sonarqube.yml
346
22:33:27
EOD
347
22:33:27
section_end:1778279607:section_after_script_step_0
348
22:33:27
----------------------------------------------------------
349
22:33:27
Need help? Documentation on the SonarQube CI/CD component can be found at:
350
22:33:27
https://gitlab.scandit.com/internal/ci-components/sonarqube/-/blob/main/templates/sonarqube.yml
351
22:33:27
352
22:33:27
section_end:1778279607:after_script
353
22:33:27
+section_start:1778279607:archive_cache
354
22:33:27
+Saving cache for successful job
355
22:33:28
Creating cache sonarqube-1-protected...
356
22:33:28
WARNING: .sonar/cache: no matching files. Ensure that the artifact path is relative to the working directory (/build/internal/gitlab-templates)
357
22:33:28
No URL provided, cache will not be uploaded to shared cache server. Cache will be stored only locally.
358
22:33:28
Created cache
359
22:33:28
360
22:33:28
section_end:1778279608:archive_cache
361
22:33:28
+section_start:1778279608:cleanup_file_variables
362
22:33:28
+Cleaning up project directory and file based variables
363
22:33:28
Removing .scannerwork/
364
22:33:28
HEAD is now at a6e804d Merge branch 'renovate/docker-digests' into 'master'
365
22:33:28
366
22:33:28
section_end:1778279608:cleanup_file_variables
367
22:33:28
+
368
22:33:28
Job succeeded
369