Successfully imported checkov sarif not showing in SonarQube Cloud

  • ALM used: GitHub
  • CI system used: GitHub Actions
  • Scanner: bridgecrewio/checkov-action@v12
  • SonarCloud action: SonarSource/sonarqube-scan-action@v5
  • Languages of the repository: Terraform
  • Error observed: No error observed, but should report checkov findings in SQ
  • Steps to reproduce
      - name: Checkov - Infrastructure security check
        id: checkov
        uses: bridgecrewio/checkov-action@v12
        with:
          directory: .
          framework: terraform # optional: run only on a specific infrastructure {cloudformation,terraform,kubernetes,all}
          soft_fail: true # optional: do not return an error code if there are failed checks
          output_format: sarif  # Explicitly request SARIF format
          output_file_path: checkov  # Specify output directory for SARIF, the filename is results_sarif.sarif
#          skip_check: CKV_TF_1 # optional: skip a specific check_id. can be comma separated list
          quiet: true # optional: display only failed checks
        continue-on-error: true
        
        ...
        tsec and trivy omitted, but referenced in the sonarcloud step
        ...
        
      - name: Run SonarCloud scan  # save the sarif file in the Sonarcloud
        id: sonarcloud
        env:
          SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }}
        uses: SonarSource/sonarqube-scan-action@v5
        with:
          args: >
            -Dsonar.terraform.provider.aws.version=${{env.terraform_version}}
            -Dsonar.organization=<ORGANIZATION>
            -Dsonar.projectKey=<ORGANIZATION>_${{ github.event.repository.name }}
            -Dsonar.sources=.
            -Dsonar.sarifReportPaths='tfsec.sarif,./checkov/results_sarif.sarif,trivy-results.sarif'
            -Dsonar.verbose=true
  • Potential workaround: none

  • Additional Information:

    • The checkov action is working as expected and one “Critical” finding is reported in SQ. However, there are also multiple other findings in the sarif file not showing up in the console
    • We exported the checkov sarif file and imported it into SonarCloud in another project using the same sonarcloud GitHub action. Now the findings were reported in the console as expected.
    • We are confused why the exact same file is not reported in the console in the original project.

Hi,

Welcome to the community!

Can you share your analysis log?

The analysis / scanner log is what’s output from the analysis command. Hopefully, the log you provide - redacted as necessary - will include that command as well.

This guide will help you find them.

 
Thx,
Ann

Thank you for reaching out, Ann :slight_smile:

I have included the checkov sarif result file. I had to rename from results_sarif.sarif to checkov.json for the browser to allow me to upload
checkov.json (58.2 KB)

This is also output from sonarcloud scan, where the results_sarif.sarif file is successfully imported with 27 vulnerabilities.

In the SonarQube cloud console I can only see these two checkov-results:

We are greatful for your help in this matter :slight_smile:

Best regards
Vidar E. Seeberg

Hi Vidar,

I can’t move forward without it.

 
Ann

I cannot find a sonar-cloud -X command in the GitHub workflow log. The scan is run like this: SonarSource/sonarqube-scan-action@v5
with:
args: -Dsonar.terraform.provider.aws.version=1.10.5 -Dsonar.organization=norsk-tipping -Dsonar.projectKey=Norsk-Tipping_accelerate-infrastructure -Dsonar.sources=. -Dsonar.sarifReportPaths=‘tfsec.sarif,./checkov/results_sarif.sarif,trivy-results.sarif’ -Dsonar.verbose=true

and provides a big log. I can provide this log if it helps in debugging. Also; it seems that the two checkov findings I screenshot is from the sonar-cloud scan and not from the specific checkov scan further up in the workflow.

Regards
Vidar

Hi Vidar,

The log that starts with those args is what I’m looking for.

 
Thx,
Ann

Hell again Ann!

Sorry for the delay. Friday got messed up and then the weekend


Here is the log. My first impressions:

  • there seems to be alot of Checkov findings from the sonarqube scan itself. Also the log seem to show that the sonarqube-checkov-scan is run multiple times (I might misinterprete the log about this, though)
  • Although multiple findings from sonarqube-checkov only two findings are reported in the console (see screenshot in my first post).
  • I can also see in the log that the sarif file from file ./checkov/results_sarif.sarif is succesfully imported with 27 vulnerabilities. However no findings from this file is reported in the console.
Run SonarSource/sonarqube-scan-action@v5
  with:
    args: -Dsonar.terraform.provider.aws.version=1.10.5 -Dsonar.organization=organization -Dsonar.projectKey=Organization_accelerate-infrastructure -Dsonar.sources=. -Dsonar.sarifReportPaths='tfsec.sarif,./checkov/results_sarif.sarif,trivy-results.sarif' -Dsonar.verbose=true

    scannerVersion: 7.1.0.4889
    scannerBinariesUrl: https://binaries.sonarsource.com/Distribution/sonar-scanner-cli
  env:
    AWS_REGION: eu-north-1
    terraform_version: 1.10.5
    role_to_assume: arn:aws:iam::account_id:role/github-actions-oidc
    SSH_AUTH_SOCK: agent
    SSH_AGENT_PID: 2044
    AWS_DEFAULT_REGION: eu-north-1
    AWS_ACCESS_KEY_ID: ***
    AWS_SECRET_ACCESS_KEY: ***
    AWS_SESSION_TOKEN: ***
    TERRAFORM_CLI_PATH: /home/runner/work/_temp/11cb6bb6-c8c1-49ab-a45c-58c425fa5b4d
    CHECKOV_RESULTS:
         _               _
     ___| |__   ___  ___| | _______   __
    / __| '_ \ / _ \/ __| |/ / _ \ \ / /
   | (__| | | |  __/ (__|   < (_) \ V /
    \___|_| |_|\___|\___|_|\_\___/ \_/

  By Prisma Cloud | version: 3.2.394
  terraform scan results:

  Passed checks: 54, Failed checks: 27, Skipped checks: 0

  Check: CKV_TF_1: "Ensure Terraform module sources use a commit hash"
  	FAILED for resource: acm_eu_north_1
  	File: /acm.tf:1-13
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/supply-chain-policies/terraform-policies/ensure-terraform-module-sources-use-git-url-with-commit-hash-revision

<CODE>

  Check: CKV_TF_1: "Ensure Terraform module sources use a commit hash"
  	FAILED for resource: base_infra_consumer
  	File: /base-infra-consumer.tf:70-99
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/supply-chain-policies/terraform-policies/ensure-terraform-module-sources-use-git-url-with-commit-hash-revision

<CODE>

  Check: CKV_TF_1: "Ensure Terraform module sources use a commit hash"
  	FAILED for resource: bastion
  	File: /bastion.tf:5-22
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/supply-chain-policies/terraform-policies/ensure-terraform-module-sources-use-git-url-with-commit-hash-revision

<CODE>

  Check: CKV_TF_1: "Ensure Terraform module sources use a commit hash"
  	FAILED for resource: subnet_addrs
  	File: /main.tf:13-39
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/supply-chain-policies/terraform-policies/ensure-terraform-module-sources-use-git-url-with-commit-hash-revision

<CODE>

  Check: CKV_AWS_65: "Ensure container insights are enabled on ECS cluster"
  	FAILED for resource: aws_ecs_cluster.main
  	File: /main.tf:88-95
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-logging-policies/bc-aws-logging-11

<CODE>

  Check: CKV_AWS_382: "Ensure no security groups allow egress from 0.0.0.0:0 to port -1"
  	FAILED for resource: aws_security_group.ecs
  	File: /main.tf:98-142
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/bc-aws-382

<CODE>

  Check: CKV_AWS_23: "Ensure every security group and rule has a description"
  	FAILED for resource: aws_security_group.ecs
  	File: /main.tf:98-142
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-31

<CODE>

  Check: CKV_AWS_382: "Ensure no security groups allow egress from 0.0.0.0:0 to port -1"
  	FAILED for resource: aws_security_group.lb_sg
  	File: /main.tf:221-241
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/bc-aws-382

<CODE>

  Check: CKV_AWS_23: "Ensure every security group and rule has a description"
  	FAILED for resource: aws_security_group.lb_sg
  	File: /main.tf:221-241
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-31

<CODE>

  Check: CKV_AWS_51: "Ensure ECR Image Tags are immutable"
  	FAILED for resource: module.bootstrap.aws_ecr_repository.main
  	File: /modules/bootstrap/main.tf:2-8
  	Calling File: /bootstrap.tf:1-5
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/bc-aws-general-24

<CODE>

  Check: CKV_AWS_136: "Ensure that ECR repositories are encrypted using KMS"
  	FAILED for resource: module.bootstrap.aws_ecr_repository.main
  	File: /modules/bootstrap/main.tf:2-8
  	Calling File: /bootstrap.tf:1-5
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/ensure-that-ecr-repositories-are-encrypted

<CODE>

  Check: CKV_AWS_338: "Ensure CloudWatch log groups retains logs for at least 1 year"
  	FAILED for resource: module.ecs_fargate_service.aws_cloudwatch_log_group.ecs
  	File: /modules/fargate/main.tf:6-9
  	Calling File: /main.tf:145-201
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-logging-policies/bc-aws-338

<CODE>

  Check: CKV_AWS_158: "Ensure that CloudWatch Log Group is encrypted by KMS"
  	FAILED for resource: module.ecs_fargate_service.aws_cloudwatch_log_group.ecs
  	File: /modules/fargate/main.tf:6-9
  	Calling File: /main.tf:145-201
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/ensure-that-cloudwatch-log-group-is-encrypted-by-kms

<CODE>

  Check: CKV_AWS_249: "Ensure that the Execution Role ARN and the Task Role ARN are different in ECS Task definitions"
  	FAILED for resource: module.ecs_fargate_service.aws_ecs_task_definition.ecs
  	File: /modules/fargate/main.tf:12-57
  	Calling File: /main.tf:145-201
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/ensure-the-aws-execution-role-arn-and-task-role-arn-are-different-in-ecs-task-definitions

<CODE>

  Check: CKV_AWS_290: "Ensure IAM policies does not allow write access without constraints"
  	FAILED for resource: module.ecs_fargate_service.aws_iam_policy.ecs_policy
  	File: /modules/fargate/main.tf:105-111
  	Calling File: /main.tf:145-201
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-290

<CODE>

  Check: CKV_AWS_355: "Ensure no IAM policies documents allow "*" as a statement's resource for restrictable actions"
  	FAILED for resource: module.ecs_fargate_service.aws_iam_policy.ecs_policy
  	File: /modules/fargate/main.tf:105-111
  	Calling File: /main.tf:145-201
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-355

<CODE>

  Check: CKV_AWS_288: "Ensure IAM policies does not allow data exfiltration"
  	FAILED for resource: module.ecs_fargate_service.aws_iam_policy.ecs_policy
  	File: /modules/fargate/main.tf:105-111
  	Calling File: /main.tf:145-201
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-288

<CODE>

  Check: CKV_AWS_131: "Ensure that ALB drops HTTP headers"
  	FAILED for resource: module.load_balancer.aws_lb.fargate
  	File: /modules/loadbalancer/main.tf:5-19
  	Calling File: /main.tf:206-218
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-that-alb-drops-http-headers

<CODE>

  Check: CKV_AWS_150: "Ensure that Load Balancer has deletion protection enabled"
  	FAILED for resource: module.load_balancer.aws_lb.fargate
  	File: /modules/loadbalancer/main.tf:5-19
  	Calling File: /main.tf:206-218
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/bc-aws-150

<CODE>

  Check: CKV2_AWS_62: "Ensure S3 buckets should have event notifications enabled"
  	FAILED for resource: module.load_balancer.aws_s3_bucket.alb_access_logs[0]
  	File: /modules/loadbalancer/main.tf:22-25
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-logging-policies/bc-aws-2-62

<CODE>

  Check: CKV_AWS_145: "Ensure that S3 buckets are encrypted with KMS by default"
  	FAILED for resource: module.load_balancer.aws_s3_bucket.alb_access_logs[0]
  	File: /modules/loadbalancer/main.tf:22-25
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/ensure-that-s3-buckets-are-encrypted-with-kms-by-default

<CODE>

  Check: CKV2_AWS_6: "Ensure that S3 bucket has a Public Access block"
  	FAILED for resource: module.load_balancer.aws_s3_bucket.alb_access_logs[0]
  	File: /modules/loadbalancer/main.tf:22-25
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/s3-bucket-should-have-public-access-blocks-defaults-to-false-if-the-public-access-block-is-not-attached

<CODE>

  Check: CKV2_AWS_28: "Ensure public facing ALB are protected by WAF"
  	FAILED for resource: module.load_balancer.aws_lb.fargate
  	File: /modules/loadbalancer/main.tf:5-19
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-public-facing-alb-are-protected-by-waf

<CODE>

  Check: CKV_AWS_21: "Ensure all data stored in the S3 bucket have versioning enabled"
  	FAILED for resource: module.load_balancer.aws_s3_bucket.alb_access_logs[0]
  	File: /modules/loadbalancer/main.tf:22-25
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/s3-policies/s3-16-enable-versioning

<CODE>

  Check: CKV_AWS_144: "Ensure that S3 bucket has cross-region replication enabled"
  	FAILED for resource: module.load_balancer.aws_s3_bucket.alb_access_logs[0]
  	File: /modules/loadbalancer/main.tf:22-25
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/ensure-that-s3-bucket-has-cross-region-replication-enabled

<CODE>

  Check: CKV_AWS_18: "Ensure the S3 bucket has access logging enabled"
  	FAILED for resource: module.load_balancer.aws_s3_bucket.alb_access_logs[0]
  	File: /modules/loadbalancer/main.tf:22-25
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/s3-policies/s3-13-enable-logging

<CODE>

  Check: CKV2_AWS_61: "Ensure that an S3 bucket has a lifecycle configuration"
  	FAILED for resource: module.load_balancer.aws_s3_bucket.alb_access_logs[0]
  	File: /modules/loadbalancer/main.tf:22-25
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-logging-policies/bc-aws-2-61

<CODE>

    TRIVY_SEVERITY: CRITICAL,HIGH,MEDIUM
    TRIVY_FORMAT: sarif
    TRIVY_OUTPUT: trivy-results.sarif
    TRIVY_QUIET: true
    TRIVY_SCANNERS: vuln,misconfig,secret
    SONAR_TOKEN: ***
Run ${GITHUB_ACTION_PATH}/scripts/sanity-checks.sh
Run actions/cache@v4
  with:
    path: /home/runner/work/_temp/sonar-scanner-cli-7.1.0.4889-Linux-X64
    key: sonar-scanner-cli-7.1.0.4889-Linux-X64
    enableCrossOsArchive: false
    fail-on-cache-miss: false
    lookup-only: false
    save-always: false
  env:
    AWS_REGION: eu-north-1
    terraform_version: 1.10.5
    role_to_assume: arn:aws:iam::account_id:role/github-actions-oidc
    SSH_AUTH_SOCK: agent
    SSH_AGENT_PID: 2044
    AWS_DEFAULT_REGION: eu-north-1
    AWS_ACCESS_KEY_ID: ***
    AWS_SECRET_ACCESS_KEY: ***
    AWS_SESSION_TOKEN: ***
    TERRAFORM_CLI_PATH: /home/runner/work/_temp/11cb6bb6-c8c1-49ab-a45c-58c425fa5b4d
    CHECKOV_RESULTS:
         _               _
     ___| |__   ___  ___| | _______   __
    / __| '_ \ / _ \/ __| |/ / _ \ \ / /
   | (__| | | |  __/ (__|   < (_) \ V /
    \___|_| |_|\___|\___|_|\_\___/ \_/

  By Prisma Cloud | version: 3.2.394
  terraform scan results:

  Passed checks: 54, Failed checks: 27, Skipped checks: 0

  Check: CKV_TF_1: "Ensure Terraform module sources use a commit hash"
  	FAILED for resource: acm_eu_north_1
  	File: /acm.tf:1-13
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/supply-chain-policies/terraform-policies/ensure-terraform-module-sources-use-git-url-with-commit-hash-revision

<CODE>

  Check: CKV_TF_1: "Ensure Terraform module sources use a commit hash"
  	FAILED for resource: base_infra_consumer
  	File: /base-infra-consumer.tf:70-99
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/supply-chain-policies/terraform-policies/ensure-terraform-module-sources-use-git-url-with-commit-hash-revision

<CODE>

  Check: CKV_TF_1: "Ensure Terraform module sources use a commit hash"
  	FAILED for resource: bastion
  	File: /bastion.tf:5-22
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/supply-chain-policies/terraform-policies/ensure-terraform-module-sources-use-git-url-with-commit-hash-revision

<CODE>

  Check: CKV_TF_1: "Ensure Terraform module sources use a commit hash"
  	FAILED for resource: subnet_addrs
  	File: /main.tf:13-39
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/supply-chain-policies/terraform-policies/ensure-terraform-module-sources-use-git-url-with-commit-hash-revision

<CODE>

  Check: CKV_AWS_65: "Ensure container insights are enabled on ECS cluster"
  	FAILED for resource: aws_ecs_cluster.main
  	File: /main.tf:88-95
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-logging-policies/bc-aws-logging-11

<CODE>

  Check: CKV_AWS_382: "Ensure no security groups allow egress from 0.0.0.0:0 to port -1"
  	FAILED for resource: aws_security_group.ecs
  	File: /main.tf:98-142
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/bc-aws-382

<CODE>

  Check: CKV_AWS_23: "Ensure every security group and rule has a description"
  	FAILED for resource: aws_security_group.ecs
  	File: /main.tf:98-142
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-31

<CODE>

  Check: CKV_AWS_382: "Ensure no security groups allow egress from 0.0.0.0:0 to port -1"
  	FAILED for resource: aws_security_group.lb_sg
  	File: /main.tf:221-241
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/bc-aws-382

<CODE>

  Check: CKV_AWS_23: "Ensure every security group and rule has a description"
  	FAILED for resource: aws_security_group.lb_sg
  	File: /main.tf:221-241
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-31

<CODE>

  Check: CKV_AWS_51: "Ensure ECR Image Tags are immutable"
  	FAILED for resource: module.bootstrap.aws_ecr_repository.main
  	File: /modules/bootstrap/main.tf:2-8
  	Calling File: /bootstrap.tf:1-5
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/bc-aws-general-24

<CODE>

  Check: CKV_AWS_136: "Ensure that ECR repositories are encrypted using KMS"
  	FAILED for resource: module.bootstrap.aws_ecr_repository.main
  	File: /modules/bootstrap/main.tf:2-8
  	Calling File: /bootstrap.tf:1-5
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/ensure-that-ecr-repositories-are-encrypted

<CODE>

  Check: CKV_AWS_338: "Ensure CloudWatch log groups retains logs for at least 1 year"
  	FAILED for resource: module.ecs_fargate_service.aws_cloudwatch_log_group.ecs
  	File: /modules/fargate/main.tf:6-9
  	Calling File: /main.tf:145-201
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-logging-policies/bc-aws-338

<CODE>

  Check: CKV_AWS_158: "Ensure that CloudWatch Log Group is encrypted by KMS"
  	FAILED for resource: module.ecs_fargate_service.aws_cloudwatch_log_group.ecs
  	File: /modules/fargate/main.tf:6-9
  	Calling File: /main.tf:145-201
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/ensure-that-cloudwatch-log-group-is-encrypted-by-kms

<CODE>

  Check: CKV_AWS_249: "Ensure that the Execution Role ARN and the Task Role ARN are different in ECS Task definitions"
  	FAILED for resource: module.ecs_fargate_service.aws_ecs_task_definition.ecs
  	File: /modules/fargate/main.tf:12-57
  	Calling File: /main.tf:145-201
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/ensure-the-aws-execution-role-arn-and-task-role-arn-are-different-in-ecs-task-definitions

<CODE>

  Check: CKV_AWS_290: "Ensure IAM policies does not allow write access without constraints"
  	FAILED for resource: module.ecs_fargate_service.aws_iam_policy.ecs_policy
  	File: /modules/fargate/main.tf:105-111
  	Calling File: /main.tf:145-201
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-290

<CODE>

  Check: CKV_AWS_355: "Ensure no IAM policies documents allow "*" as a statement's resource for restrictable actions"
  	FAILED for resource: module.ecs_fargate_service.aws_iam_policy.ecs_policy
  	File: /modules/fargate/main.tf:105-111
  	Calling File: /main.tf:145-201
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-355

<CODE>

  Check: CKV_AWS_288: "Ensure IAM policies does not allow data exfiltration"
  	FAILED for resource: module.ecs_fargate_service.aws_iam_policy.ecs_policy
  	File: /modules/fargate/main.tf:105-111
  	Calling File: /main.tf:145-201
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-288

<CODE>

  Check: CKV_AWS_131: "Ensure that ALB drops HTTP headers"
  	FAILED for resource: module.load_balancer.aws_lb.fargate
  	File: /modules/loadbalancer/main.tf:5-19
  	Calling File: /main.tf:206-218
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-that-alb-drops-http-headers

<CODE>

  Check: CKV_AWS_150: "Ensure that Load Balancer has deletion protection enabled"
  	FAILED for resource: module.load_balancer.aws_lb.fargate
  	File: /modules/loadbalancer/main.tf:5-19
  	Calling File: /main.tf:206-218
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/bc-aws-150

<CODE>

  Check: CKV2_AWS_62: "Ensure S3 buckets should have event notifications enabled"
  	FAILED for resource: module.load_balancer.aws_s3_bucket.alb_access_logs[0]
  	File: /modules/loadbalancer/main.tf:22-25
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-logging-policies/bc-aws-2-62

<CODE>

  Check: CKV_AWS_145: "Ensure that S3 buckets are encrypted with KMS by default"
  	FAILED for resource: module.load_balancer.aws_s3_bucket.alb_access_logs[0]
  	File: /modules/loadbalancer/main.tf:22-25
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/ensure-that-s3-buckets-are-encrypted-with-kms-by-default

<CODE>

  Check: CKV2_AWS_6: "Ensure that S3 bucket has a Public Access block"
  	FAILED for resource: module.load_balancer.aws_s3_bucket.alb_access_logs[0]
  	File: /modules/loadbalancer/main.tf:22-25
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/s3-bucket-should-have-public-access-blocks-defaults-to-false-if-the-public-access-block-is-not-attached

<CODE>

  Check: CKV2_AWS_28: "Ensure public facing ALB are protected by WAF"
  	FAILED for resource: module.load_balancer.aws_lb.fargate
  	File: /modules/loadbalancer/main.tf:5-19
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-public-facing-alb-are-protected-by-waf

<CODE>

  Check: CKV_AWS_21: "Ensure all data stored in the S3 bucket have versioning enabled"
  	FAILED for resource: module.load_balancer.aws_s3_bucket.alb_access_logs[0]
  	File: /modules/loadbalancer/main.tf:22-25
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/s3-policies/s3-16-enable-versioning

<CODE>

  Check: CKV_AWS_144: "Ensure that S3 bucket has cross-region replication enabled"
  	FAILED for resource: module.load_balancer.aws_s3_bucket.alb_access_logs[0]
  	File: /modules/loadbalancer/main.tf:22-25
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/ensure-that-s3-bucket-has-cross-region-replication-enabled

<CODE>

  Check: CKV_AWS_18: "Ensure the S3 bucket has access logging enabled"
  	FAILED for resource: module.load_balancer.aws_s3_bucket.alb_access_logs[0]
  	File: /modules/loadbalancer/main.tf:22-25
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/s3-policies/s3-13-enable-logging

<CODE>

  Check: CKV2_AWS_61: "Ensure that an S3 bucket has a lifecycle configuration"
  	FAILED for resource: module.load_balancer.aws_s3_bucket.alb_access_logs[0]
  	File: /modules/loadbalancer/main.tf:22-25
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-logging-policies/bc-aws-2-61

<CODE>

    TRIVY_SEVERITY: CRITICAL,HIGH,MEDIUM
    TRIVY_FORMAT: sarif
    TRIVY_OUTPUT: trivy-results.sarif
    TRIVY_QUIET: true
    TRIVY_SCANNERS: vuln,misconfig,secret
    SONAR_TOKEN: ***
    SEGMENT_DOWNLOAD_TIMEOUT_MINS: 1
Cache hit for: sonar-scanner-cli-7.1.0.4889-Linux-X64
Received 4194304 of 51935011 (8.1%), 4.0 MBs/sec
Received 51935011 of 51935011 (100.0%), 32.2 MBs/sec
Cache Size: ~50 MB (51935011 B)
/usr/bin/tar -xf /home/runner/work/_temp/43ea987b-3ca0-42c1-ba7b-43807f5d9af1/cache.tzst -P -C /home/runner/work/accelerate-infrastructure/accelerate-infrastructure --use-compress-program unzstd
Cache restored successfully
Cache restored from key: sonar-scanner-cli-7.1.0.4889-Linux-X64
Run echo "${RUNNER_TEMP}/sonar-scanner-cli-7.1.0.4889-Linux-X64/bin" >> $GITHUB_PATH
  echo "${RUNNER_TEMP}/sonar-scanner-cli-7.1.0.4889-Linux-X64/bin" >> $GITHUB_PATH
  shell: /usr/bin/bash --noprofile --norc -e -o pipefail {0}
  env:
    AWS_REGION: eu-north-1
    terraform_version: 1.10.5
    role_to_assume: arn:aws:iam::account_id:role/github-actions-oidc
    SSH_AUTH_SOCK: agent
    SSH_AGENT_PID: 2044
    AWS_DEFAULT_REGION: eu-north-1
    AWS_ACCESS_KEY_ID: ***
    AWS_SECRET_ACCESS_KEY: ***
    AWS_SESSION_TOKEN: ***
    TERRAFORM_CLI_PATH: /home/runner/work/_temp/11cb6bb6-c8c1-49ab-a45c-58c425fa5b4d
    CHECKOV_RESULTS:
         _               _
     ___| |__   ___  ___| | _______   __
    / __| '_ \ / _ \/ __| |/ / _ \ \ / /
   | (__| | | |  __/ (__|   < (_) \ V /
    \___|_| |_|\___|\___|_|\_\___/ \_/

  By Prisma Cloud | version: 3.2.394
  terraform scan results:

  Passed checks: 54, Failed checks: 27, Skipped checks: 0

  Check: CKV_TF_1: "Ensure Terraform module sources use a commit hash"
  	FAILED for resource: acm_eu_north_1
  	File: /acm.tf:1-13
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/supply-chain-policies/terraform-policies/ensure-terraform-module-sources-use-git-url-with-commit-hash-revision

<CODE>

  Check: CKV_TF_1: "Ensure Terraform module sources use a commit hash"
  	FAILED for resource: base_infra_consumer
  	File: /base-infra-consumer.tf:70-99
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/supply-chain-policies/terraform-policies/ensure-terraform-module-sources-use-git-url-with-commit-hash-revision

<CODE>

  Check: CKV_TF_1: "Ensure Terraform module sources use a commit hash"
  	FAILED for resource: bastion
  	File: /bastion.tf:5-22
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/supply-chain-policies/terraform-policies/ensure-terraform-module-sources-use-git-url-with-commit-hash-revision

<CODE>

  Check: CKV_TF_1: "Ensure Terraform module sources use a commit hash"
  	FAILED for resource: subnet_addrs
  	File: /main.tf:13-39
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/supply-chain-policies/terraform-policies/ensure-terraform-module-sources-use-git-url-with-commit-hash-revision

<CODE>

  Check: CKV_AWS_65: "Ensure container insights are enabled on ECS cluster"
  	FAILED for resource: aws_ecs_cluster.main
  	File: /main.tf:88-95
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-logging-policies/bc-aws-logging-11

<CODE>

  Check: CKV_AWS_382: "Ensure no security groups allow egress from 0.0.0.0:0 to port -1"
  	FAILED for resource: aws_security_group.ecs
  	File: /main.tf:98-142
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/bc-aws-382

<CODE>

  Check: CKV_AWS_23: "Ensure every security group and rule has a description"
  	FAILED for resource: aws_security_group.ecs
  	File: /main.tf:98-142
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-31

<CODE>

  Check: CKV_AWS_382: "Ensure no security groups allow egress from 0.0.0.0:0 to port -1"
  	FAILED for resource: aws_security_group.lb_sg
  	File: /main.tf:221-241
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/bc-aws-382

<CODE>

  Check: CKV_AWS_23: "Ensure every security group and rule has a description"
  	FAILED for resource: aws_security_group.lb_sg
  	File: /main.tf:221-241
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-31

<CODE>

  Check: CKV_AWS_51: "Ensure ECR Image Tags are immutable"
  	FAILED for resource: module.bootstrap.aws_ecr_repository.main
  	File: /modules/bootstrap/main.tf:2-8
  	Calling File: /bootstrap.tf:1-5
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/bc-aws-general-24

<CODE>

  Check: CKV_AWS_136: "Ensure that ECR repositories are encrypted using KMS"
  	FAILED for resource: module.bootstrap.aws_ecr_repository.main
  	File: /modules/bootstrap/main.tf:2-8
  	Calling File: /bootstrap.tf:1-5
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/ensure-that-ecr-repositories-are-encrypted

<CODE>

  Check: CKV_AWS_338: "Ensure CloudWatch log groups retains logs for at least 1 year"
  	FAILED for resource: module.ecs_fargate_service.aws_cloudwatch_log_group.ecs
  	File: /modules/fargate/main.tf:6-9
  	Calling File: /main.tf:145-201
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-logging-policies/bc-aws-338

<CODE>

  Check: CKV_AWS_158: "Ensure that CloudWatch Log Group is encrypted by KMS"
  	FAILED for resource: module.ecs_fargate_service.aws_cloudwatch_log_group.ecs
  	File: /modules/fargate/main.tf:6-9
  	Calling File: /main.tf:145-201
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/ensure-that-cloudwatch-log-group-is-encrypted-by-kms

<CODE>

  Check: CKV_AWS_249: "Ensure that the Execution Role ARN and the Task Role ARN are different in ECS Task definitions"
  	FAILED for resource: module.ecs_fargate_service.aws_ecs_task_definition.ecs
  	File: /modules/fargate/main.tf:12-57
  	Calling File: /main.tf:145-201
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/ensure-the-aws-execution-role-arn-and-task-role-arn-are-different-in-ecs-task-definitions

<CODE>

  Check: CKV_AWS_290: "Ensure IAM policies does not allow write access without constraints"
  	FAILED for resource: module.ecs_fargate_service.aws_iam_policy.ecs_policy
  	File: /modules/fargate/main.tf:105-111
  	Calling File: /main.tf:145-201
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-290

<CODE>

  Check: CKV_AWS_355: "Ensure no IAM policies documents allow "*" as a statement's resource for restrictable actions"
  	FAILED for resource: module.ecs_fargate_service.aws_iam_policy.ecs_policy
  	File: /modules/fargate/main.tf:105-111
  	Calling File: /main.tf:145-201
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-355

<CODE>

  Check: CKV_AWS_288: "Ensure IAM policies does not allow data exfiltration"
  	FAILED for resource: module.ecs_fargate_service.aws_iam_policy.ecs_policy
  	File: /modules/fargate/main.tf:105-111
  	Calling File: /main.tf:145-201
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-288

<CODE>

  Check: CKV_AWS_131: "Ensure that ALB drops HTTP headers"
  	FAILED for resource: module.load_balancer.aws_lb.fargate
  	File: /modules/loadbalancer/main.tf:5-19
  	Calling File: /main.tf:206-218
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-that-alb-drops-http-headers

<CODE>

  Check: CKV_AWS_150: "Ensure that Load Balancer has deletion protection enabled"
  	FAILED for resource: module.load_balancer.aws_lb.fargate
  	File: /modules/loadbalancer/main.tf:5-19
  	Calling File: /main.tf:206-218
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/bc-aws-150

<CODE>

  Check: CKV2_AWS_62: "Ensure S3 buckets should have event notifications enabled"
  	FAILED for resource: module.load_balancer.aws_s3_bucket.alb_access_logs[0]
  	File: /modules/loadbalancer/main.tf:22-25
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-logging-policies/bc-aws-2-62

<CODE>

  Check: CKV_AWS_145: "Ensure that S3 buckets are encrypted with KMS by default"
  	FAILED for resource: module.load_balancer.aws_s3_bucket.alb_access_logs[0]
  	File: /modules/loadbalancer/main.tf:22-25
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/ensure-that-s3-buckets-are-encrypted-with-kms-by-default

<CODE>

  Check: CKV2_AWS_6: "Ensure that S3 bucket has a Public Access block"
  	FAILED for resource: module.load_balancer.aws_s3_bucket.alb_access_logs[0]
  	File: /modules/loadbalancer/main.tf:22-25
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/s3-bucket-should-have-public-access-blocks-defaults-to-false-if-the-public-access-block-is-not-attached

<CODE>

  Check: CKV2_AWS_28: "Ensure public facing ALB are protected by WAF"
  	FAILED for resource: module.load_balancer.aws_lb.fargate
  	File: /modules/loadbalancer/main.tf:5-19
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-public-facing-alb-are-protected-by-waf

<CODE>

  Check: CKV_AWS_21: "Ensure all data stored in the S3 bucket have versioning enabled"
  	FAILED for resource: module.load_balancer.aws_s3_bucket.alb_access_logs[0]
  	File: /modules/loadbalancer/main.tf:22-25
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/s3-policies/s3-16-enable-versioning

<CODE>

  Check: CKV_AWS_144: "Ensure that S3 bucket has cross-region replication enabled"
  	FAILED for resource: module.load_balancer.aws_s3_bucket.alb_access_logs[0]
  	File: /modules/loadbalancer/main.tf:22-25
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/ensure-that-s3-bucket-has-cross-region-replication-enabled

<CODE>

  Check: CKV_AWS_18: "Ensure the S3 bucket has access logging enabled"
  	FAILED for resource: module.load_balancer.aws_s3_bucket.alb_access_logs[0]
  	File: /modules/loadbalancer/main.tf:22-25
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/s3-policies/s3-13-enable-logging

<CODE>

  Check: CKV2_AWS_61: "Ensure that an S3 bucket has a lifecycle configuration"
  	FAILED for resource: module.load_balancer.aws_s3_bucket.alb_access_logs[0]
  	File: /modules/loadbalancer/main.tf:22-25
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-logging-policies/bc-aws-2-61

<CODE>

    TRIVY_SEVERITY: CRITICAL,HIGH,MEDIUM
    TRIVY_FORMAT: sarif
    TRIVY_OUTPUT: trivy-results.sarif
    TRIVY_QUIET: true
    TRIVY_SCANNERS: vuln,misconfig,secret
    SONAR_TOKEN: ***

Rest of log in another post

Regards
Vidar

Rest of log:

Run ${GITHUB_ACTION_PATH}/scripts/run-sonar-scanner-cli.sh -Dsonar.terraform.provider.aws.version=1.10.5 -Dsonar.organization=organization -Dsonar.projectKey=Organization_accelerate-infrastructure -Dsonar.sources=. -Dsonar.sarifReportPaths='tfsec.sarif,./checkov/results_sarif.sarif,trivy-results.sarif' -Dsonar.verbose=true
  ${GITHUB_ACTION_PATH}/scripts/run-sonar-scanner-cli.sh -Dsonar.terraform.provider.aws.version=1.10.5 -Dsonar.organization=organization -Dsonar.projectKey=Organization_accelerate-infrastructure -Dsonar.sources=. -Dsonar.sarifReportPaths='tfsec.sarif,./checkov/results_sarif.sarif,trivy-results.sarif' -Dsonar.verbose=true
  shell: /usr/bin/bash --noprofile --norc -e -o pipefail {0}
  env:
    AWS_REGION: eu-north-1
    terraform_version: 1.10.5
    role_to_assume: arn:aws:iam::account_id:role/github-actions-oidc
    SSH_AUTH_SOCK: agent
    SSH_AGENT_PID: 2044
    AWS_DEFAULT_REGION: eu-north-1
    AWS_ACCESS_KEY_ID: ***
    AWS_SECRET_ACCESS_KEY: ***
    AWS_SESSION_TOKEN: ***
    TERRAFORM_CLI_PATH: /home/runner/work/_temp/11cb6bb6-c8c1-49ab-a45c-58c425fa5b4d
    CHECKOV_RESULTS:
         _               _
     ___| |__   ___  ___| | _______   __
    / __| '_ \ / _ \/ __| |/ / _ \ \ / /
   | (__| | | |  __/ (__|   < (_) \ V /
    \___|_| |_|\___|\___|_|\_\___/ \_/

  By Prisma Cloud | version: 3.2.394
  terraform scan results:

  Passed checks: 54, Failed checks: 27, Skipped checks: 0

  Check: CKV_TF_1: "Ensure Terraform module sources use a commit hash"
  	FAILED for resource: acm_eu_north_1
  	File: /acm.tf:1-13
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/supply-chain-policies/terraform-policies/ensure-terraform-module-sources-use-git-url-with-commit-hash-revision

<CODE>

  Check: CKV_TF_1: "Ensure Terraform module sources use a commit hash"
  	FAILED for resource: base_infra_consumer
  	File: /base-infra-consumer.tf:70-99
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/supply-chain-policies/terraform-policies/ensure-terraform-module-sources-use-git-url-with-commit-hash-revision

<CODE>

  Check: CKV_TF_1: "Ensure Terraform module sources use a commit hash"
  	FAILED for resource: bastion
  	File: /bastion.tf:5-22
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/supply-chain-policies/terraform-policies/ensure-terraform-module-sources-use-git-url-with-commit-hash-revision

<CODE>

  Check: CKV_TF_1: "Ensure Terraform module sources use a commit hash"
  	FAILED for resource: subnet_addrs
  	File: /main.tf:13-39
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/supply-chain-policies/terraform-policies/ensure-terraform-module-sources-use-git-url-with-commit-hash-revision

<CODE>

  Check: CKV_AWS_65: "Ensure container insights are enabled on ECS cluster"
  	FAILED for resource: aws_ecs_cluster.main
  	File: /main.tf:88-95
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-logging-policies/bc-aws-logging-11

<CODE>

  Check: CKV_AWS_382: "Ensure no security groups allow egress from 0.0.0.0:0 to port -1"
  	FAILED for resource: aws_security_group.ecs
  	File: /main.tf:98-142
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/bc-aws-382

<CODE>

  Check: CKV_AWS_23: "Ensure every security group and rule has a description"
  	FAILED for resource: aws_security_group.ecs
  	File: /main.tf:98-142
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-31

<CODE>

  Check: CKV_AWS_382: "Ensure no security groups allow egress from 0.0.0.0:0 to port -1"
  	FAILED for resource: aws_security_group.lb_sg
  	File: /main.tf:221-241
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/bc-aws-382

<CODE>

  Check: CKV_AWS_23: "Ensure every security group and rule has a description"
  	FAILED for resource: aws_security_group.lb_sg
  	File: /main.tf:221-241
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-31

<CODE>

  Check: CKV_AWS_51: "Ensure ECR Image Tags are immutable"
  	FAILED for resource: module.bootstrap.aws_ecr_repository.main
  	File: /modules/bootstrap/main.tf:2-8
  	Calling File: /bootstrap.tf:1-5
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/bc-aws-general-24

<CODE>

  Check: CKV_AWS_136: "Ensure that ECR repositories are encrypted using KMS"
  	FAILED for resource: module.bootstrap.aws_ecr_repository.main
  	File: /modules/bootstrap/main.tf:2-8
  	Calling File: /bootstrap.tf:1-5
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/ensure-that-ecr-repositories-are-encrypted

<CODE>

  Check: CKV_AWS_338: "Ensure CloudWatch log groups retains logs for at least 1 year"
  	FAILED for resource: module.ecs_fargate_service.aws_cloudwatch_log_group.ecs
  	File: /modules/fargate/main.tf:6-9
  	Calling File: /main.tf:145-201
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-logging-policies/bc-aws-338

<CODE>

  Check: CKV_AWS_158: "Ensure that CloudWatch Log Group is encrypted by KMS"
  	FAILED for resource: module.ecs_fargate_service.aws_cloudwatch_log_group.ecs
  	File: /modules/fargate/main.tf:6-9
  	Calling File: /main.tf:145-201
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/ensure-that-cloudwatch-log-group-is-encrypted-by-kms

<CODE>

  Check: CKV_AWS_249: "Ensure that the Execution Role ARN and the Task Role ARN are different in ECS Task definitions"
  	FAILED for resource: module.ecs_fargate_service.aws_ecs_task_definition.ecs
  	File: /modules/fargate/main.tf:12-57
  	Calling File: /main.tf:145-201
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/ensure-the-aws-execution-role-arn-and-task-role-arn-are-different-in-ecs-task-definitions

<CODE>

  Check: CKV_AWS_290: "Ensure IAM policies does not allow write access without constraints"
  	FAILED for resource: module.ecs_fargate_service.aws_iam_policy.ecs_policy
  	File: /modules/fargate/main.tf:105-111
  	Calling File: /main.tf:145-201
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-290

<CODE>
  Check: CKV_AWS_355: "Ensure no IAM policies documents allow "*" as a statement's resource for restrictable actions"
  	FAILED for resource: module.ecs_fargate_service.aws_iam_policy.ecs_policy
  	File: /modules/fargate/main.tf:105-111
  	Calling File: /main.tf:145-201
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-355

<CODE>

  Check: CKV_AWS_288: "Ensure IAM policies does not allow data exfiltration"
  	FAILED for resource: module.ecs_fargate_service.aws_iam_policy.ecs_policy
  	File: /modules/fargate/main.tf:105-111
  	Calling File: /main.tf:145-201
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-288

<CODE>

  Check: CKV_AWS_131: "Ensure that ALB drops HTTP headers"
  	FAILED for resource: module.load_balancer.aws_lb.fargate
  	File: /modules/loadbalancer/main.tf:5-19
  	Calling File: /main.tf:206-218
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-that-alb-drops-http-headers

<CODE>

  Check: CKV_AWS_150: "Ensure that Load Balancer has deletion protection enabled"
  	FAILED for resource: module.load_balancer.aws_lb.fargate
  	File: /modules/loadbalancer/main.tf:5-19
  	Calling File: /main.tf:206-218
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/bc-aws-150

<CODE>

  Check: CKV2_AWS_62: "Ensure S3 buckets should have event notifications enabled"
  	FAILED for resource: module.load_balancer.aws_s3_bucket.alb_access_logs[0]
  	File: /modules/loadbalancer/main.tf:22-25
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-logging-policies/bc-aws-2-62

<CODE>

  Check: CKV_AWS_145: "Ensure that S3 buckets are encrypted with KMS by default"
  	FAILED for resource: module.load_balancer.aws_s3_bucket.alb_access_logs[0]
  	File: /modules/loadbalancer/main.tf:22-25
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/ensure-that-s3-buckets-are-encrypted-with-kms-by-default

<CODE>

  Check: CKV2_AWS_6: "Ensure that S3 bucket has a Public Access block"
  	FAILED for resource: module.load_balancer.aws_s3_bucket.alb_access_logs[0]
  	File: /modules/loadbalancer/main.tf:22-25
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/s3-bucket-should-have-public-access-blocks-defaults-to-false-if-the-public-access-block-is-not-attached

<CODE>

  Check: CKV2_AWS_28: "Ensure public facing ALB are protected by WAF"
  	FAILED for resource: module.load_balancer.aws_lb.fargate
  	File: /modules/loadbalancer/main.tf:5-19
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-public-facing-alb-are-protected-by-waf

<CODE>

  Check: CKV_AWS_21: "Ensure all data stored in the S3 bucket have versioning enabled"
  	FAILED for resource: module.load_balancer.aws_s3_bucket.alb_access_logs[0]
  	File: /modules/loadbalancer/main.tf:22-25
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/s3-policies/s3-16-enable-versioning

<CODE>

  Check: CKV_AWS_144: "Ensure that S3 bucket has cross-region replication enabled"
  	FAILED for resource: module.load_balancer.aws_s3_bucket.alb_access_logs[0]
  	File: /modules/loadbalancer/main.tf:22-25
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/ensure-that-s3-bucket-has-cross-region-replication-enabled

<CODE>

  Check: CKV_AWS_18: "Ensure the S3 bucket has access logging enabled"
  	FAILED for resource: module.load_balancer.aws_s3_bucket.alb_access_logs[0]
  	File: /modules/loadbalancer/main.tf:22-25
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/s3-policies/s3-13-enable-logging

<CODE>

  Check: CKV2_AWS_61: "Ensure that an S3 bucket has a lifecycle configuration"
  	FAILED for resource: module.load_balancer.aws_s3_bucket.alb_access_logs[0]
  	File: /modules/loadbalancer/main.tf:22-25
  	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-logging-policies/bc-aws-2-61

<CODE>

    TRIVY_SEVERITY: CRITICAL,HIGH,MEDIUM
    TRIVY_FORMAT: sarif
    TRIVY_OUTPUT: trivy-results.sarif
    TRIVY_QUIET: true
    TRIVY_SCANNERS: vuln,misconfig,secret
    SONAR_TOKEN: ***
    INPUT_PROJECTBASEDIR:
    SONAR_SCANNER_JRE: /home/runner/work/_temp/sonar-scanner-cli-7.1.0.4889-Linux-X64/jre
+ sonar-scanner -Dsonar.terraform.provider.aws.version=1.10.5 -Dsonar.organization=organization -Dsonar.projectKey=Organization_accelerate-infrastructure -Dsonar.sources=. -Dsonar.sarifReportPaths=tfsec.sarif,./checkov/results_sarif.sarif,trivy-results.sarif -Dsonar.verbose=true
08:38:57.395 INFO  Scanner configuration file: /home/runner/work/_temp/sonar-scanner-cli-7.1.0.4889-Linux-X64/conf/sonar-scanner.properties
08:38:57.399 INFO  Project root configuration file: NONE
08:38:57.418 INFO  SonarScanner CLI 7.1.0.4889
08:38:57.419 INFO  Java 17.0.13 Eclipse Adoptium (64-bit)
08:38:57.420 INFO  Linux 6.8.0-1021-azure amd64
08:38:57.429 DEBUG Scanner max available memory: 1 GB
08:38:57.451 DEBUG uname -m returned 'x86_64'
08:38:57.454 DEBUG Using JVM default truststore: /home/runner/work/_temp/sonar-scanner-cli-7.1.0.4889-Linux-X64/jre/lib/security/cacerts
08:38:57.455 DEBUG Create: /home/runner/.sonar/cache
08:38:57.456 INFO  User cache: /home/runner/.sonar/cache
08:38:57.456 DEBUG Create: /home/runner/.sonar/cache/_tmp
08:38:57.577 DEBUG Loading OS trusted SSL certificates...
08:38:57.578 DEBUG This operation might be slow or even get stuck. You can skip it by passing the scanner property 'sonar.scanner.skipSystemTruststore=true'
08:38:57.946 DEBUG Loaded [440] system trusted certificates
08:38:58.217 DEBUG Loaded truststore from '/home/runner/work/_temp/sonar-scanner-cli-7.1.0.4889-Linux-X64/jre/lib/security/cacerts' containing 152 certificates
08:38:58.393 INFO  Communicating with SonarQube Cloud
08:38:58.394 INFO  JRE provisioning: os[linux], arch[x86_64]
08:38:58.424 DEBUG --> GET https://api.sonarcloud.io/analysis/jres?os=linux&arch=x86_64
08:38:59.689 DEBUG <-- 200 https://api.sonarcloud.io/analysis/jres?os=linux&arch=x86_64 (1265ms, 471-byte body)
08:38:59.723 DEBUG Download https://scanner.sonarcloud.io/jres/OpenJDK17U-jre_x64_linux_hotspot_17.0.11_9.tar.gz to /home/runner/.sonar/cache/_tmp/fileCache3965011941708520474.tmp
08:38:59.723 DEBUG --> GET https://scanner.sonarcloud.io/jres/OpenJDK17U-jre_x64_linux_hotspot_17.0.11_9.tar.gz
08:39:00.026 DEBUG <-- 200 https://scanner.sonarcloud.io/jres/OpenJDK17U-jre_x64_linux_hotspot_17.0.11_9.tar.gz (302ms, 46382823-byte body)
08:39:02.014 DEBUG Executing: /home/runner/.sonar/cache/bcb1b7b8ad68c93093f09b591b7cb17161d39891f7d29d33a586f5a328603707/OpenJDK17U-jre_x64_linux_hotspot_17.0.11_9.tar.gz_extracted/jdk-17.0.11+9-jre/bin/java --version
08:39:02.044 DEBUG openjdk 17.0.11 2024-04-16
08:39:02.044 DEBUG OpenJDK Runtime Environment Temurin-17.0.11+9 (build 17.0.11+9)
08:39:02.045 DEBUG OpenJDK 64-Bit Server VM Temurin-17.0.11+9 (build 17.0.11+9, mixed mode, sharing)
08:39:02.048 DEBUG --> GET https://api.sonarcloud.io/analysis/engine
08:39:02.371 DEBUG <-- 200 https://api.sonarcloud.io/analysis/engine (322ms, 290-byte body)
08:39:02.372 DEBUG Download https://scanner.sonarcloud.io/engines/sonarcloud-scanner-engine-11.8.0.412.jar to /home/runner/.sonar/cache/_tmp/fileCache7596119282254272253.tmp
08:39:02.372 DEBUG --> GET https://scanner.sonarcloud.io/engines/sonarcloud-scanner-engine-11.8.0.412.jar
08:39:02.378 DEBUG <-- 200 https://scanner.sonarcloud.io/engines/sonarcloud-scanner-engine-11.8.0.412.jar (5ms, 32811094-byte body)
08:39:02.798 DEBUG Work directory: /home/runner/work/accelerate-infrastructure/accelerate-infrastructure/.scannerwork
08:39:02.807 DEBUG Executing: /home/runner/.sonar/cache/bcb1b7b8ad68c93093f09b591b7cb17161d39891f7d29d33a586f5a328603707/OpenJDK17U-jre_x64_linux_hotspot_17.0.11_9.tar.gz_extracted/jdk-17.0.11+9-jre/bin/java -Dorg.bouncycastle.pkcs12.ignore_useless_passwd=true -jar /home/runner/.sonar/cache/539579cab55d650abccf1be3741c8a836bb17da0a0b1198fae26caf5c7afe9a5/sonarcloud-scanner-engine-11.8.0.412.jar
08:39:03.194 INFO  Starting SonarScanner Engine...
08:39:03.196 INFO  Java 17.0.11 Eclipse Adoptium (64-bit)
08:39:03.245 DEBUG JVM max available memory: 1 GB
08:39:03.468 DEBUG Sonar User Home: /home/runner/.sonar
08:39:03.468 DEBUG Initialize DefaultScannerWsClient
08:39:03.585 DEBUG Loading OS trusted SSL certificates...
08:39:03.586 DEBUG This operation might be slow or even get stuck. You can skip it by passing the scanner property 'sonar.scanner.skipSystemTruststore=true'
08:39:03.933 DEBUG Loaded [440] system trusted certificates
08:39:04.183 DEBUG Loaded truststore from '/home/runner/work/_temp/sonar-scanner-cli-7.1.0.4889-Linux-X64/jre/lib/security/cacerts' containing 152 certificates
08:39:04.385 INFO  Load global settings
08:39:04.396 DEBUG --> GET https://sonarcloud.io/api/settings/values.protobuf
08:39:05.447 DEBUG <-- 200 https://sonarcloud.io/api/settings/values.protobuf (1050ms, unknown-length body)
08:39:05.462 INFO  Load global settings (done) | time=1080ms
08:39:05.473 INFO  Server id: 1BD809FA-AWHW8ct9-T_TB3XqouNu
08:39:05.476 DEBUG Initialize DownloadPluginsScannerWsClient
08:39:05.484 DEBUG Loading OS trusted SSL certificates...
08:39:05.484 DEBUG This operation might be slow or even get stuck. You can skip it by passing the scanner property 'sonar.scanner.skipSystemTruststore=true'
08:39:05.717 DEBUG Loaded [440] system trusted certificates
08:39:05.773 DEBUG Loaded truststore from '/home/runner/work/_temp/sonar-scanner-cli-7.1.0.4889-Linux-X64/jre/lib/security/cacerts' containing 152 certificates
08:39:05.786 DEBUG Create : /home/runner/.sonar/_tmp
08:39:05.787 DEBUG User cache: /home/runner/.sonar/cache
08:39:05.795 INFO  Loading required plugins
08:39:05.796 INFO  Load plugins index
08:39:05.798 DEBUG --> GET https://sonarcloud.io/api/plugins/installed
08:39:06.028 DEBUG <-- 200 https://sonarcloud.io/api/plugins/installed (230ms, unknown-length body)
08:39:06.035 INFO  Load plugins index (done) | time=239ms
08:39:06.038 INFO  Load/download plugins
08:39:06.038 DEBUG Download plugin 'iac' to '/home/runner/.sonar/_tmp/fileCache2321786597533829767.tmp'
08:39:06.039 DEBUG --> GET https://scanner.sonarcloud.io/plugins/iac/versions/4ffc86e53f0c860498ec4b3076e30d36.jar
08:39:06.089 DEBUG <-- 200 https://scanner.sonarcloud.io/plugins/iac/versions/4ffc86e53f0c860498ec4b3076e30d36.jar (50ms, 18373911-byte body)
08:39:06.856 DEBUG Download plugin 'iacenterprise' to '/home/runner/.sonar/_tmp/fileCache17128185469155744139.tmp'
08:39:06.858 DEBUG --> GET https://scanner.sonarcloud.io/plugins/iacenterprise/versions/19f5a4aafe538f4bce4c2b82f0d27882.jar
08:39:06.866 DEBUG <-- 200 https://scanner.sonarcloud.io/plugins/iacenterprise/versions/19f5a4aafe538f4bce4c2b82f0d27882.jar (6ms, 1473039-byte body)
08:39:06.942 DEBUG Download plugin 'jacoco' to '/home/runner/.sonar/_tmp/fileCache16668474704419605771.tmp'
08:39:06.942 DEBUG --> GET https://scanner.sonarcloud.io/plugins/jacoco/versions/04bba36a445c3713a632aa358be2f99c.jar
08:39:06.947 DEBUG <-- 200 https://scanner.sonarcloud.io/plugins/jacoco/versions/04bba36a445c3713a632aa358be2f99c.jar (5ms, 23258-byte body)
08:39:06.956 DEBUG Download plugin 'textenterprise' to '/home/runner/.sonar/_tmp/fileCache8750004148896767646.tmp'
08:39:06.959 DEBUG --> GET https://scanner.sonarcloud.io/plugins/textenterprise/versions/4b084f2e68d5b750ffa1c3f58ef118d2.jar
08:39:06.966 DEBUG <-- 200 https://scanner.sonarcloud.io/plugins/textenterprise/versions/4b084f2e68d5b750ffa1c3f58ef118d2.jar (5ms, 6295336-byte body)
08:39:07.205 INFO  Load/download plugins (done) | time=1168ms
08:39:07.205 DEBUG Plugins not loaded because they are optional: [abap, sonarapex, architecture, architecturejavascriptfrontend, architecturejavafrontend, csharpenterprise, cpp, cobol, dart, dbd, dbdjavafrontend, dbdpythonfrontend, flex, goenterprise, web, jcl, javasymbolicexecution, java, javascript, kotlin, php, pli, plsql, python, rpg, ruby, sonarscala, swift, tsql, vbnetenterprise, vb, security, securitycsharpfrontend, securityjsfrontend, securityjavafrontend, securityphpfrontend, securitypythonfrontend, xml]
08:39:07.271 DEBUG Plugins loaded:
08:39:07.273 DEBUG   * Text Code Quality and Security 2.21.0.5225 (textenterprise)
08:39:07.273 DEBUG   * JaCoCo 1.3.0.1538 (jacoco)
08:39:07.273 DEBUG   * IaC Code Quality and Security 1.44.0.14670 (iacenterprise)
08:39:07.276 DEBUG   * IaC Code Quality and Security 1.44.0.14670 (iac)
08:39:07.277 DEBUG --> GET https://sonarcloud.io/api/server/version
08:39:07.471 DEBUG <-- 200 https://sonarcloud.io/api/server/version (194ms, 11-byte body)
08:39:07.472 DEBUG Updated analysis started with a difference of -99 milliseconds
08:39:07.480 DEBUG Started at Fri Mar 28 08:39:05 UTC 2025
08:39:07.687 DEBUG register org.eclipse.jgit.util.FS$FileStoreAttributes$$Lambda$281/0x00007fed142edca0@736048ed with shutdown hook
08:39:07.729 INFO  Found an active CI vendor: 'Github Actions'
08:39:07.743 INFO  Load project settings for component key: 'Organization_accelerate-infrastructure'
08:39:07.745 DEBUG --> GET https://sonarcloud.io/api/settings/values.protobuf?component=Organization_accelerate-infrastructure
08:39:08.053 DEBUG <-- 200 https://sonarcloud.io/api/settings/values.protobuf?component=Organization_accelerate-infrastructure (307ms, unknown-length body)
08:39:08.058 INFO  Load project settings for component key: 'Organization_accelerate-infrastructure' (done) | time=315ms
08:39:08.063 INFO  Process project properties
08:39:08.069 DEBUG Process project properties (done) | time=5ms
08:39:08.072 INFO  Project key: Organization_accelerate-infrastructure
08:39:08.073 INFO  Base dir: /home/runner/work/accelerate-infrastructure/accelerate-infrastructure
08:39:08.073 INFO  Working dir: /home/runner/work/accelerate-infrastructure/accelerate-infrastructure/.scannerwork
08:39:08.073 DEBUG Project global encoding: UTF-8, default locale: en
08:39:08.073 DEBUG Creating module hierarchy
08:39:08.073 DEBUG   Init module 'Organization_accelerate-infrastructure'
08:39:08.074 DEBUG     Base dir: /home/runner/work/accelerate-infrastructure/accelerate-infrastructure
08:39:08.074 DEBUG     Working dir: /home/runner/work/accelerate-infrastructure/accelerate-infrastructure/.scannerwork
08:39:08.074 DEBUG     Module global encoding: UTF-8, default locale: en
08:39:08.077 INFO  Load project branches
08:39:08.080 DEBUG --> GET https://sonarcloud.io/api/project_branches/list?project=Organization_accelerate-infrastructure
08:39:08.442 DEBUG <-- 200 https://sonarcloud.io/api/project_branches/list?project=Organization_accelerate-infrastructure (360ms, unknown-length body)
08:39:08.446 INFO  Load project branches (done) | time=371ms
08:39:08.451 INFO  Check ALM binding of project 'Organization_accelerate-infrastructure'
08:39:08.452 DEBUG --> GET https://sonarcloud.io/api/alm_integration/is_project_bound?project=Organization_accelerate-infrastructure
08:39:08.651 DEBUG <-- 200 https://sonarcloud.io/api/alm_integration/is_project_bound?project=Organization_accelerate-infrastructure (200ms, unknown-length body)
08:39:08.655 INFO  Detected project binding: BOUND
08:39:08.655 INFO  Check ALM binding of project 'Organization_accelerate-infrastructure' (done) | time=203ms
08:39:08.655 INFO  Load project pull requests
08:39:08.655 DEBUG --> GET https://sonarcloud.io/api/project_pull_requests/list?project=Organization_accelerate-infrastructure
08:39:09.013 DEBUG <-- 200 https://sonarcloud.io/api/project_pull_requests/list?project=Organization_accelerate-infrastructure (357ms, unknown-length body)
08:39:09.018 INFO  Load project pull requests (done) | time=364ms
08:39:09.023 INFO  Load branch configuration
08:39:09.024 INFO  Github event: pull_request
08:39:09.030 INFO  Auto-configuring pull request 75
08:39:09.036 DEBUG --> GET https://sonarcloud.io/api/alm_integration/show_pullrequest?project=Organization_accelerate-infrastructure&pullrequestKey=75
08:39:09.981 DEBUG <-- 200 https://sonarcloud.io/api/alm_integration/show_pullrequest?project=Organization_accelerate-infrastructure&pullrequestKey=75 (947ms, unknown-length body)
08:39:09.984 INFO  Load branch configuration (done) | time=964ms
08:39:09.994 INFO  Load quality profiles
08:39:09.995 DEBUG --> GET https://sonarcloud.io/api/qualityprofiles/search.protobuf?projectKey=Organization_accelerate-infrastructure&organization=organization
08:39:10.355 DEBUG <-- 200 https://sonarcloud.io/api/qualityprofiles/search.protobuf?projectKey=Organization_accelerate-infrastructure&organization=organization (360ms, 5288-byte body)
08:39:10.370 INFO  Load quality profiles (done) | time=375ms
08:39:10.374 INFO  Load active rules
08:39:10.376 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYI5iBwFYiWOCbm_Y8ze&ps=500&p=1
08:39:10.605 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYI5iBwFYiWOCbm_Y8ze&ps=500&p=1 (228ms, 5710-byte body)
08:39:10.626 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPor&ps=500&p=1
08:39:10.846 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPor&ps=500&p=1 (220ms, 7272-byte body)
08:39:10.856 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo9&ps=500&p=1
08:39:11.083 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo9&ps=500&p=1 (227ms, 8119-byte body)
08:39:11.090 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPoo&ps=500&p=1
08:39:11.303 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPoo&ps=500&p=1 (212ms, 11-byte body)
08:39:11.306 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPos&ps=500&p=1
08:39:11.573 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPos&ps=500&p=1 (267ms, unknown-length body)
08:39:11.845 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPov&ps=500&p=1
08:39:12.109 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPov&ps=500&p=1 (261ms, unknown-length body)
08:39:12.200 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AZL2jAs7Lbd728s6uoZe&ps=500&p=1
08:39:12.451 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AZL2jAs7Lbd728s6uoZe&ps=500&p=1 (250ms, 4130-byte body)
08:39:12.455 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPon&ps=500&p=1
08:39:12.679 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPon&ps=500&p=1 (224ms, unknown-length body)
08:39:12.689 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYXoQrEu9Ao2yLWbMTfI&ps=500&p=1
08:39:12.911 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYXoQrEu9Ao2yLWbMTfI&ps=500&p=1 (222ms, unknown-length body)
08:39:12.919 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPop&ps=500&p=1
08:39:13.147 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPop&ps=500&p=1 (227ms, unknown-length body)
08:39:13.190 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AZHgMmmnZ_un-6v83pyT&ps=500&p=1
08:39:13.533 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AZHgMmmnZ_un-6v83pyT&ps=500&p=1 (343ms, unknown-length body)
08:39:13.557 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AZFU5xa34M0h262745gU&ps=500&p=1
08:39:13.799 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AZFU5xa34M0h262745gU&ps=500&p=1 (240ms, 2811-byte body)
08:39:13.801 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPpA&ps=500&p=1
08:39:14.085 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPpA&ps=500&p=1 (283ms, unknown-length body)
08:39:14.241 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPpA&ps=500&p=2
08:39:14.487 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPpA&ps=500&p=2 (246ms, unknown-length body)
08:39:14.496 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPow&ps=500&p=1
08:39:14.758 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPow&ps=500&p=1 (262ms, unknown-length body)
08:39:14.766 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPom&ps=500&p=1
08:39:14.987 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPom&ps=500&p=1 (218ms, unknown-length body)
08:39:14.994 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPoq&ps=500&p=1
08:39:15.220 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPoq&ps=500&p=1 (225ms, 5821-byte body)
08:39:15.223 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPog&ps=500&p=1
08:39:15.431 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPog&ps=500&p=1 (208ms, 11-byte body)
08:39:15.433 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AZFvm8tEcUjvLIw7idZB&ps=500&p=1
08:39:15.674 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AZFvm8tEcUjvLIw7idZB&ps=500&p=1 (242ms, unknown-length body)
08:39:15.728 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AX6LfYclEtnFPnYRcUCd&ps=500&p=1
08:39:15.951 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AX6LfYclEtnFPnYRcUCd&ps=500&p=1 (222ms, 288-byte body)
08:39:15.951 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPoz&ps=500&p=1
08:39:16.185 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPoz&ps=500&p=1 (233ms, unknown-length body)
08:39:16.216 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXriBDJFr7WCwZj2asW8&ps=500&p=1
08:39:16.434 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXriBDJFr7WCwZj2asW8&ps=500&p=1 (217ms, 7589-byte body)
08:39:16.436 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPoy&ps=500&p=1
08:39:16.653 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPoy&ps=500&p=1 (217ms, unknown-length body)
08:39:16.674 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXriBx7Fr7WCwZj2bID1&ps=500&p=1
08:39:16.881 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXriBx7Fr7WCwZj2bID1&ps=500&p=1 (206ms, 11-byte body)
08:39:16.883 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo8&ps=500&p=1
08:39:17.140 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo8&ps=500&p=1 (258ms, unknown-length body)
08:39:17.239 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo_&ps=500&p=1
08:39:17.477 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo_&ps=500&p=1 (237ms, unknown-length body)
08:39:17.517 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo-&ps=500&p=1
08:39:17.740 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo-&ps=500&p=1 (223ms, unknown-length body)
08:39:17.744 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo4&ps=500&p=1
08:39:18.010 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo4&ps=500&p=1 (266ms, unknown-length body)
08:39:18.044 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPoi&ps=500&p=1
08:39:18.426 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPoi&ps=500&p=1 (382ms, 7367-byte body)
08:39:18.428 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPpB&ps=500&p=1
08:39:18.648 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPpB&ps=500&p=1 (218ms, 4412-byte body)
08:39:18.649 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPox&ps=500&p=1
08:39:18.869 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPox&ps=500&p=1 (220ms, unknown-length body)
08:39:18.879 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPoh&ps=500&p=1
08:39:19.095 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPoh&ps=500&p=1 (216ms, 6770-byte body)
08:39:19.098 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYXoTKk19Ao2yLWbNIPb&ps=500&p=1
08:39:19.320 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYXoTKk19Ao2yLWbNIPb&ps=500&p=1 (221ms, unknown-length body)
08:39:19.343 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo1&ps=500&p=1
08:39:19.563 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo1&ps=500&p=1 (219ms, 8036-byte body)
08:39:19.566 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPot&ps=500&p=1
08:39:19.822 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPot&ps=500&p=1 (255ms, unknown-length body)
08:39:19.900 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPol&ps=500&p=1
08:39:20.125 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPol&ps=500&p=1 (225ms, unknown-length body)
08:39:20.140 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo5&ps=500&p=1
08:39:20.373 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo5&ps=500&p=1 (233ms, unknown-length body)
08:39:20.416 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXriCm9mr7WCwZj2bjwt&ps=500&p=1
08:39:20.707 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXriCm9mr7WCwZj2bjwt&ps=500&p=1 (290ms, unknown-length body)
08:39:20.727 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYk_-kmyEjuu3U2UB-ih&ps=500&p=1
08:39:20.982 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYk_-kmyEjuu3U2UB-ih&ps=500&p=1 (254ms, unknown-length body)
08:39:20.986 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo2&ps=500&p=1
08:39:21.206 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo2&ps=500&p=1 (219ms, unknown-length body)
08:39:21.217 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo3&ps=500&p=1
08:39:21.509 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo3&ps=500&p=1 (292ms, unknown-length body)
08:39:21.560 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo0&ps=500&p=1
08:39:21.810 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo0&ps=500&p=1 (249ms, unknown-length body)
08:39:21.915 INFO  Load active rules (done) | time=11540ms
08:39:21.950 DEBUG --> GET https://sonarcloud.io/api/languages/list
08:39:22.148 DEBUG <-- 200 https://sonarcloud.io/api/languages/list (197ms, unknown-length body)
08:39:22.162 INFO  Organization key: organization
08:39:22.163 INFO  Pull request 75 for merge into main from LOS-334_TestActionsSjekker
08:39:22.175 DEBUG Declared patterns of language Kubernetes were converted to sonar.lang.patterns.kubernetes :
08:39:22.176 DEBUG Declared patterns of language CSS were converted to sonar.lang.patterns.css : **/*.css,**/*.less,**/*.scss,**/*.sass
08:39:22.176 DEBUG Declared patterns of language Scala were converted to sonar.lang.patterns.scala : **/*.scala
08:39:22.176 DEBUG Declared patterns of language JSP were converted to sonar.lang.patterns.jsp : **/*.jsp,**/*.jspf,**/*.jspx
08:39:22.176 DEBUG Declared patterns of language JavaScript were converted to sonar.lang.patterns.js : **/*.js,**/*.jsx,**/*.cjs,**/*.mjs,**/*.vue
08:39:22.176 DEBUG Declared patterns of language Python were converted to sonar.lang.patterns.py : **/*.py
08:39:22.176 DEBUG Declared patterns of language Ansible were converted to sonar.lang.patterns.ansible :
08:39:22.176 DEBUG Declared patterns of language Apex were converted to sonar.lang.patterns.apex : **/*.cls,**/*.trigger
08:39:22.177 DEBUG Declared patterns of language Docker were converted to sonar.lang.patterns.docker : **/Dockerfile,**/*.dockerfile
08:39:22.177 DEBUG Declared patterns of language PL/SQL were converted to sonar.lang.patterns.plsql : **/*.sql,**/*.tab,**/*.pkb
08:39:22.177 DEBUG Declared patterns of language Dart were converted to sonar.lang.patterns.dart : **/*.dart
08:39:22.177 DEBUG Declared patterns of language JCL were converted to sonar.lang.patterns.jcl : **/*.jcl
08:39:22.177 DEBUG Declared patterns of language Java were converted to sonar.lang.patterns.java : **/*.java,**/*.jav
08:39:22.183 DEBUG Declared patterns of language HTML were converted to sonar.lang.patterns.web : **/*.html,**/*.xhtml,**/*.cshtml,**/*.vbhtml,**/*.aspx,**/*.ascx,**/*.rhtml,**/*.erb,**/*.shtm,**/*.shtml,**/*.cmp,**/*.twig
08:39:22.183 DEBUG Declared patterns of language Flex were converted to sonar.lang.patterns.flex : **/*.as
08:39:22.183 DEBUG Declared patterns of language XML were converted to sonar.lang.patterns.xml : **/*.xml,**/*.xsd,**/*.xsl,**/*.config
08:39:22.184 DEBUG Declared patterns of language JSON were converted to sonar.lang.patterns.json : **/*.json
08:39:22.184 DEBUG Declared patterns of language IPython Notebooks were converted to sonar.lang.patterns.ipynb : **/*.ipynb
08:39:22.184 DEBUG Declared patterns of language Text were converted to sonar.lang.patterns.text :
08:39:22.184 DEBUG Declared patterns of language VB.NET were converted to sonar.lang.patterns.vbnet : **/*.vb
08:39:22.184 DEBUG Declared patterns of language CloudFormation were converted to sonar.lang.patterns.cloudformation :
08:39:22.184 DEBUG Declared patterns of language Swift were converted to sonar.lang.patterns.swift : **/*.swift
08:39:22.184 DEBUG Declared patterns of language YAML were converted to sonar.lang.patterns.yaml : **/*.yaml,**/*.yml
08:39:22.184 DEBUG Declared patterns of language C++ were converted to sonar.lang.patterns.cpp : **/*.cc,**/*.cpp,**/*.cxx,**/*.c++,**/*.hh,**/*.hpp,**/*.hxx,**/*.h++,**/*.ipp,**/*.ixx,**/*.mxx,**/*.cppm,**/*.ccm,**/*.cxxm,**/*.c++m
08:39:22.184 DEBUG Declared patterns of language C were converted to sonar.lang.patterns.c : **/*.c,**/*.h
08:39:22.186 DEBUG Declared patterns of language Go were converted to sonar.lang.patterns.go : **/*.go
08:39:22.186 DEBUG Declared patterns of language Kotlin were converted to sonar.lang.patterns.kotlin : **/*.kt,**/*.kts
08:39:22.186 DEBUG Declared patterns of language RPG were converted to sonar.lang.patterns.rpg : **/*.rpg,**/*.rpgle,**/*.sqlrpgle,**/*.rpg,**/*.rpgle,**/*.sqlrpgle
08:39:22.187 DEBUG Declared patterns of language PL/I were converted to sonar.lang.patterns.pli : **/*.pli
08:39:22.187 DEBUG Declared patterns of language T-SQL were converted to sonar.lang.patterns.tsql : **/*.tsql
08:39:22.187 DEBUG Declared patterns of language Vb were converted to sonar.lang.patterns.vb : **/*.bas,**/*.frm,**/*.ctl
08:39:22.187 DEBUG Declared patterns of language Secrets were converted to sonar.lang.patterns.secrets :
08:39:22.187 DEBUG Declared patterns of language Ruby were converted to sonar.lang.patterns.ruby : **/*.rb
08:39:22.187 DEBUG Declared patterns of language C# were converted to sonar.lang.patterns.cs : **/*.cs,**/*.razor
08:39:22.187 DEBUG Declared patterns of language COBOL were converted to sonar.lang.patterns.cobol :
08:39:22.187 DEBUG Declared patterns of language PHP were converted to sonar.lang.patterns.php : **/*.php,**/*.php3,**/*.php4,**/*.php5,**/*.phtml,**/*.inc
08:39:22.188 DEBUG Declared patterns of language Terraform were converted to sonar.lang.patterns.terraform : **/*.tf
08:39:22.188 DEBUG Declared patterns of language AzureResourceManager were converted to sonar.lang.patterns.azureresourcemanager : **/*.bicep
08:39:22.188 DEBUG Declared patterns of language ABAP were converted to sonar.lang.patterns.abap : **/*.abap,**/*.ab4,**/*.flow,**/*.asprog
08:39:22.188 DEBUG Declared patterns of language Objective-C were converted to sonar.lang.patterns.objc : **/*.m
08:39:22.188 DEBUG Declared patterns of language TypeScript were converted to sonar.lang.patterns.ts : **/*.ts,**/*.tsx,**/*.cts,**/*.mts
08:39:22.188 INFO  Preprocessing files...
08:39:22.207 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:22.208 DEBUG readpipe [/usr/bin/git, --version],/usr/bin
08:39:22.217 DEBUG readpipe may return 'git version 2.49.0'
08:39:22.220 DEBUG remaining output:

08:39:22.221 DEBUG readpipe [/usr/bin/git, config, --system, --show-origin, --list, -z],/usr/bin
08:39:22.221 DEBUG readpipe may return 'file:/etc/gitconfigsafe.directory'
08:39:22.221 DEBUG remaining output:

08:39:22.221 DEBUG *file:/etc/gitconfigfilter.lfs.clean
08:39:22.222 DEBUG git-lfs clean -- %ffile:/etc/gitconfigfilter.lfs.smudge
08:39:22.222 DEBUG git-lfs smudge -- %ffile:/etc/gitconfigfilter.lfs.process
08:39:22.222 DEBUG git-lfs filter-processfile:/etc/gitconfigfilter.lfs.required
08:39:22.226 DEBUG true
08:39:22.226 DEBUG loading config FileBasedConfig[/etc/gitconfig]
08:39:22.230 DEBUG loading config FileBasedConfig[/home/runner/.config/git/config]
08:39:22.231 DEBUG loading config UserConfigFile[/home/runner/.gitconfig]
08:39:22.377 DEBUG 641 non excluded files in this Git repository
08:39:22.457 INFO  2 languages detected in 34 preprocessed files
08:39:22.458 INFO  0 files ignored because of inclusion/exclusion patterns
08:39:22.459 INFO  0 files ignored because of scm ignore settings
08:39:22.479 INFO  Loading plugins for detected languages
08:39:22.479 DEBUG Detected languages: [json, terraform]
08:39:22.480 INFO  Load/download plugins
08:39:22.480 INFO  Load/download plugins (done) | time=0ms
08:39:22.480 DEBUG Optional language-specific plugins not loaded: [abap, sonarapex, architecture, architecturejavascriptfrontend, architecturejavafrontend, csharpenterprise, cpp, cobol, dart, dbd, dbdjavafrontend, dbdpythonfrontend, flex, goenterprise, web, jcl, javasymbolicexecution, java, javascript, kotlin, php, pli, plsql, python, rpg, ruby, sonarscala, swift, tsql, vbnetenterprise, vb, security, securitycsharpfrontend, securityjsfrontend, securityjavafrontend, securityphpfrontend, securitypythonfrontend, xml]
08:39:22.482 DEBUG No plugins loaded
08:39:22.516 INFO  Load project repositories
08:39:22.518 DEBUG --> GET https://sonarcloud.io/batch/project.protobuf?key=Organization_accelerate-infrastructure&branch=main
08:39:22.735 DEBUG <-- 200 https://sonarcloud.io/batch/project.protobuf?key=Organization_accelerate-infrastructure&branch=main (216ms, 1994-byte body)
08:39:22.740 INFO  Load project repositories (done) | time=224ms
08:39:22.743 INFO  SCM collecting changed files in the branch
08:39:22.770 DEBUG Merge base sha1: 41f0cd5a879725c496a6848f6114fe6cad87dc0c
08:39:22.778 DEBUG Thread[JGit-FileStoreAttributeReader-1,5,main]: start measure timestamp resolution / (/dev/root) in /home/runner/work/accelerate-infrastructure/accelerate-infrastructure/.git
08:39:22.778 DEBUG Thread[JGit-FileStoreAttributeReader-1,5,main]: end measure timestamp resolution / (/dev/root) in /home/runner/work/accelerate-infrastructure/accelerate-infrastructure/.git; got PT0.000003755S
08:39:22.781 DEBUG Thread[JGit-FileStoreAttributeReader-1,5,main]: start measure minimal racy interval in /home/runner/work/accelerate-infrastructure/accelerate-infrastructure/.git
08:39:22.877 DEBUG Thread[main,5,main]: use fallback timestamp resolution for directory /home/runner/work/accelerate-infrastructure/accelerate-infrastructure/.git
08:39:22.891 INFO  SCM collecting changed files in the branch (done) | time=149ms
08:39:22.892 DEBUG SCM reported 5 files changed in the branch
08:39:22.896 INFO  Indexing files...
08:39:22.896 INFO  Project configuration:
08:39:22.897 INFO    Excluded sources: **/build-wrapper-dump.json
08:39:22.903 DEBUG 'ec2.tf' indexed with language 'terraform'
08:39:22.906 DEBUG 'checkov-accel.sarif' indexed with language 'null'
08:39:22.909 DEBUG 'providers.tf' indexed with language 'terraform'
08:39:22.909 DEBUG 'checkov/results_sarif.sarif' indexed with language 'null'
08:39:22.909 DEBUG 'dev.tfvars' indexed with language 'null'
08:39:22.911 DEBUG 'checkov-problem-matcher-softfail.json' indexed with language 'json'
08:39:22.915 DEBUG 'dev_backend.conf' indexed with language 'null'
08:39:22.915 DEBUG 'trivy-results.sarif' indexed with language 'null'
08:39:22.916 DEBUG 'README.md' indexed with language 'null'
08:39:22.916 DEBUG 'data.tf' indexed with language 'terraform'
08:39:22.917 DEBUG 'checkov-problem-matcher.json' indexed with language 'json'
08:39:22.920 DEBUG 'variables.tf' indexed with language 'terraform'
08:39:22.920 DEBUG 'stage.tfvars' indexed with language 'null'
08:39:22.921 DEBUG 'stage_backend.conf' indexed with language 'null'
08:39:22.922 DEBUG 'base-infra-consumer.tf' indexed with language 'terraform'
08:39:22.924 DEBUG 'tfsec.sarif' indexed with language 'null'
08:39:22.925 DEBUG 'backend.tf' indexed with language 'terraform'
08:39:22.926 DEBUG 'prod.tfvars' indexed with language 'null'
08:39:22.928 DEBUG 'main.tf' indexed with language 'terraform'
08:39:22.928 DEBUG 'locals.tf' indexed with language 'terraform'
08:39:22.929 DEBUG 'prod_backend.conf' indexed with language 'null'
08:39:22.929 DEBUG 'bootstrap.tf' indexed with language 'terraform'
08:39:22.929 DEBUG 'acm.tf' indexed with language 'terraform'
08:39:22.929 DEBUG 'vpc-endpoint.tf' indexed with language 'terraform'
08:39:22.929 DEBUG 'modules/bootstrap/variables.tf' indexed with language 'terraform'
08:39:22.929 DEBUG 'modules/bootstrap/main.tf' indexed with language 'terraform'
08:39:22.932 DEBUG 'modules/bootstrap/outputs.tf' indexed with language 'terraform'
08:39:22.933 DEBUG 'modules/fargate/variables.tf' indexed with language 'terraform'
08:39:22.935 DEBUG 'modules/fargate/template/container_definition.tpl' indexed with language 'null'
08:39:22.938 DEBUG 'modules/fargate/main.tf' indexed with language 'terraform'
08:39:22.938 DEBUG 'modules/loadbalancer/variables.tf' indexed with language 'terraform'
08:39:22.938 DEBUG 'modules/loadbalancer/main.tf' indexed with language 'terraform'
08:39:22.938 DEBUG 'modules/loadbalancer/outputs.tf' indexed with language 'terraform'
08:39:22.938 DEBUG 'bastion.tf' indexed with language 'terraform'
08:39:22.938 INFO  34 files indexed
08:39:22.947 DEBUG Available languages:
08:39:22.947 DEBUG   * Secrets => "secrets"
08:39:22.947 DEBUG   * Text => "text"
08:39:22.948 DEBUG   * Ansible => "ansible"
08:39:22.948 DEBUG   * Terraform => "terraform"
08:39:22.948 DEBUG   * CloudFormation => "cloudformation"
08:39:22.948 DEBUG   * Kubernetes => "kubernetes"
08:39:22.948 DEBUG   * Docker => "docker"
08:39:22.948 DEBUG   * AzureResourceManager => "azureresourcemanager"
08:39:22.948 DEBUG   * YAML => "yaml"
08:39:22.948 DEBUG   * JSON => "json"
08:39:22.948 INFO  Quality profile for json: SonarQube Way
08:39:22.948 INFO  Quality profile for terraform: Sonar way
08:39:22.948 INFO  ------------- Run sensors on module Organization_accelerate-infrastructure
08:39:22.987 INFO  Load metrics repository
08:39:22.988 DEBUG --> GET https://sonarcloud.io/api/metrics/search?f=name,description,direction,qualitative&ps=500&p=1
08:39:23.182 DEBUG <-- 200 https://sonarcloud.io/api/metrics/search?f=name,description,direction,qualitative&ps=500&p=1 (195ms, unknown-length body)
08:39:23.192 INFO  Load metrics repository (done) | time=203ms
08:39:23.201 INFO  Sensor cache enabled
08:39:23.202 DEBUG Initialize GenericWsClient
08:39:23.206 DEBUG Loading OS trusted SSL certificates...
08:39:23.207 DEBUG This operation might be slow or even get stuck. You can skip it by passing the scanner property 'sonar.scanner.skipSystemTruststore=true'
08:39:23.381 DEBUG Loaded [440] system trusted certificates
08:39:23.434 DEBUG Loaded truststore from '/home/runner/work/_temp/sonar-scanner-cli-7.1.0.4889-Linux-X64/jre/lib/security/cacerts' containing 152 certificates
08:39:23.461 INFO  Load sensor cache
08:39:23.462 DEBUG --> GET https://api.sonarcloud.io/analysis/sensor-cache/prepare-read?organization=organization&project=Organization_accelerate-infrastructure&branch=main
08:39:24.619 DEBUG <-- 200 https://api.sonarcloud.io/analysis/sensor-cache/prepare-read?organization=organization&project=Organization_accelerate-infrastructure&branch=main (1156ms, 16-byte body)
08:39:24.645 INFO  Load sensor cache (404) | time=1184ms
08:39:25.071 DEBUG 'Import external issues report' skipped because of missing configuration requirements.
Accessed configuration:
- sonar.externalIssuesReportPaths: <empty>
08:39:25.075 DEBUG 'IaC Ansible Sensor' skipped because there is no related file in current project
08:39:25.078 DEBUG 'IaC Kubernetes Sensor' skipped because there is no related file in current project
08:39:25.080 DEBUG 'Generic Coverage Report' skipped because of missing configuration requirements.
Accessed configuration:
- sonar.genericcoverage.reportPath: <empty>
- sonar.genericcoverage.itReportPaths: <empty>
- sonar.coverageReportPaths: <empty>
- sonar.genericcoverage.reportPaths: <empty>
- sonar.genericcoverage.overallReportPaths: <empty>
- sonar.externalIssuesReportPaths: <empty>
08:39:25.081 DEBUG 'Generic Test Executions Report' skipped because of missing configuration requirements.
Accessed configuration:
- sonar.genericcoverage.reportPath: <empty>
- sonar.genericcoverage.itReportPaths: <empty>
- sonar.coverageReportPaths: <empty>
- sonar.genericcoverage.reportPaths: <empty>
- sonar.testExecutionReportPaths: <empty>
- sonar.genericcoverage.overallReportPaths: <empty>
- sonar.externalIssuesReportPaths: <empty>
08:39:25.083 DEBUG Sensors : JaCoCo XML Report Importer -> IaC Terraform Sensor -> IaC CloudFormation Sensor -> IaC AzureResourceManager Sensor -> Java Config Sensor -> IaC Docker Sensor -> EnterpriseTextAndSecretsSensor
08:39:25.085 INFO  Sensor JaCoCo XML Report Importer [jacoco]
08:39:25.087 INFO  'sonar.coverage.jacoco.xmlReportPaths' is not defined. Using default locations: target/site/jacoco/jacoco.xml,target/site/jacoco-it/jacoco.xml,build/reports/jacoco/test/jacocoTestReport.xml
08:39:25.089 INFO  No report imported, no coverage information will be imported by JaCoCo XML Report Importer
08:39:25.090 INFO  Sensor JaCoCo XML Report Importer [jacoco] (done) | time=5ms
08:39:25.090 INFO  Sensor IaC Terraform Sensor [iac]
08:39:25.091 INFO  Sensor IaC Terraform Sensor is restricted to changed files only
08:39:25.107 DEBUG 'main.tf' generated metadata with charset 'UTF-8'
08:39:25.107 DEBUG 'modules/bootstrap/variables.tf' generated metadata with charset 'UTF-8'
08:39:25.111 DEBUG 'base-infra-consumer.tf' generated metadata with charset 'UTF-8'
08:39:25.113 DEBUG 'locals.tf' generated metadata with charset 'UTF-8'
08:39:25.115 DEBUG 'modules/loadbalancer/outputs.tf' generated metadata with charset 'UTF-8'
08:39:25.116 DEBUG 'vpc-endpoint.tf' generated metadata with charset 'UTF-8'
08:39:25.119 DEBUG 'variables.tf' generated metadata with charset 'UTF-8'
08:39:25.120 DEBUG 'acm.tf' generated metadata with charset 'UTF-8'
08:39:25.120 DEBUG 'bootstrap.tf' generated metadata with charset 'UTF-8'
08:39:25.125 DEBUG 'modules/loadbalancer/variables.tf' generated metadata with charset 'UTF-8'
08:39:25.129 DEBUG 'ec2.tf' generated metadata with charset 'UTF-8'
08:39:25.129 DEBUG 'modules/bootstrap/outputs.tf' generated metadata with charset 'UTF-8'
08:39:25.129 DEBUG 'providers.tf' generated metadata with charset 'UTF-8'
08:39:25.132 DEBUG 'modules/loadbalancer/main.tf' generated metadata with charset 'UTF-8'
08:39:25.135 DEBUG 'data.tf' generated metadata with charset 'UTF-8'
08:39:25.137 DEBUG 'modules/bootstrap/main.tf' generated metadata with charset 'UTF-8'
08:39:25.140 DEBUG 'modules/fargate/variables.tf' generated metadata with charset 'UTF-8'
08:39:25.141 DEBUG 'bastion.tf' generated metadata with charset 'UTF-8'
08:39:25.141 DEBUG 'backend.tf' generated metadata with charset 'UTF-8'
08:39:25.144 DEBUG 'modules/fargate/main.tf' generated metadata with charset 'UTF-8'
08:39:25.317 INFO  2 source files to be analyzed
08:39:25.429 INFO  2/2 source files have been analyzed
08:39:25.431 INFO  Sensor IaC Terraform Sensor [iac] (done) | time=341ms
08:39:25.431 INFO  Sensor IaC CloudFormation Sensor [iac]
08:39:25.434 DEBUG 'checkov-problem-matcher-softfail.json' generated metadata with charset 'UTF-8'
08:39:25.435 DEBUG File without identifier 'AWSTemplateFormatVersion': checkov-problem-matcher-softfail.json
08:39:25.435 DEBUG 'checkov-problem-matcher.json' generated metadata with charset 'UTF-8'
08:39:25.435 DEBUG File without identifier 'AWSTemplateFormatVersion': checkov-problem-matcher.json
08:39:25.446 INFO  0 source files to be analyzed
08:39:25.446 INFO  0/0 source files have been analyzed
08:39:25.446 INFO  Sensor IaC CloudFormation Sensor [iac] (done) | time=14ms
08:39:25.447 INFO  Sensor IaC AzureResourceManager Sensor [iac]
08:39:25.447 INFO  Sensor IaC AzureResourceManager Sensor is restricted to changed files only
08:39:25.447 DEBUG File without any identifiers '[https://schema.management.azure.com/schemas/, http://schema.management.azure.com/schemas/]': checkov-problem-matcher-softfail.json
08:39:25.447 DEBUG File without any identifiers '[https://schema.management.azure.com/schemas/, http://schema.management.azure.com/schemas/]': checkov-problem-matcher.json
08:39:25.513 INFO  0 source files to be analyzed
08:39:25.515 INFO  0/0 source files have been analyzed
08:39:25.515 INFO  Sensor IaC AzureResourceManager Sensor [iac] (done) | time=68ms
08:39:25.515 INFO  Sensor Java Config Sensor [iac]
08:39:25.528 INFO  0 source files to be analyzed
08:39:25.530 INFO  0/0 source files have been analyzed
08:39:25.530 INFO  Sensor Java Config Sensor [iac] (done) | time=15ms
08:39:25.530 INFO  Sensor IaC Docker Sensor [iac]
08:39:25.531 INFO  Sensor IaC Docker Sensor is restricted to changed files only
08:39:25.628 INFO  0 source files to be analyzed
08:39:25.629 INFO  0/0 source files have been analyzed
08:39:25.629 INFO  Sensor IaC Docker Sensor [iac] (done) | time=99ms
08:39:25.629 INFO  Sensor EnterpriseTextAndSecretsSensor [textenterprise]
08:39:25.629 INFO  Sensor EnterpriseTextAndSecretsSensor is restricted to changed files only
08:39:25.629 INFO  Available processors: 2
08:39:25.629 INFO  Using 2 threads for analysis.
08:39:25.781 DEBUG delta [ns] since modification FileSnapshot failed to detect
count, failures, racy limit [ns], delta min [ns], delta max [ns], delta avg [ns], delta stddev [ns]
4588, 125, 9387, 140531.0, 879862.0, 488959.68, 212768.79679594366
08:39:25.784 DEBUG FileStoreAttributes[fsTimestampResolution=3 ”s, minimalRacyInterval=879 ”s]
08:39:25.785 DEBUG register org.eclipse.jgit.internal.storage.file.LockFile$$Lambda$995/0x00007fed14528220@68cfa037 with shutdown hook
08:39:25.785 DEBUG unregister org.eclipse.jgit.internal.storage.file.LockFile$$Lambda$995/0x00007fed14528220@68cfa037 from shutdown hook
08:39:25.786 DEBUG unregister org.eclipse.jgit.internal.storage.file.LockFile$$Lambda$995/0x00007fed14528220@68cfa037 from shutdown hook
08:39:26.274 INFO  The property "sonar.tests" is not set. To improve the analysis accuracy, we categorize a file as a test file if any of the following is true:
  * The filename starts with "test"
  * The filename contains "test." or "tests."
  * Any directory in the file path is named: "doc", "docs", "test" or "tests"
  * Any directory in the file path has a name ending in "test" or "tests"

08:39:26.302 DEBUG git --version returned: git version 2.49.0
08:39:26.303 INFO  Using git CLI to retrieve untracked files
08:39:26.327 INFO  Analyzing language associated files and files included via "sonar.text.inclusions" that are tracked by git
08:39:26.328 DEBUG 'dev_backend.conf' generated metadata with charset 'UTF-8'
08:39:26.329 DEBUG 'prod_backend.conf' generated metadata with charset 'UTF-8'
08:39:26.331 DEBUG 'stage_backend.conf' generated metadata with charset 'UTF-8'
08:39:26.340 INFO  2 source files to be analyzed
08:39:26.417 INFO  2/2 source files have been analyzed
08:39:26.418 INFO  Sensor EnterpriseTextAndSecretsSensor [textenterprise] (done) | time=791ms
08:39:26.422 INFO  ------------- Run sensors on project
08:39:26.544 DEBUG 'Java CPD Block Indexer' skipped because there is no related file in current project
08:39:26.544 DEBUG Sensors : Import external issues report from SARIF file. -> Zero Coverage Sensor
08:39:26.547 INFO  Sensor Import external issues report from SARIF file.
08:39:26.547 DEBUG Importing SARIF issues from 'tfsec.sarif'
08:39:26.847 WARN  Unable to detect rules severity for issue detected by tool defsec, falling back to default rule severity: MEDIUM
08:39:26.877 DEBUG Importing SARIF issues from 'trivy-results.sarif'
08:39:26.909 DEBUG Importing SARIF issues from './checkov/results_sarif.sarif'
08:39:26.927 INFO  File tfsec.sarif: 1 run(s) successfully imported (28 vulnerabilities in total).
08:39:26.927 INFO  File trivy-results.sarif: 1 run(s) successfully imported (26 vulnerabilities in total).
08:39:26.927 INFO  File ./checkov/results_sarif.sarif: 1 run(s) successfully imported (27 vulnerabilities in total).
08:39:26.928 INFO  Sensor Import external issues report from SARIF file. (done) | time=383ms
08:39:26.928 INFO  Sensor Zero Coverage Sensor
08:39:26.929 INFO  Sensor Zero Coverage Sensor (done) | time=1ms
08:39:26.933 INFO  SCM Publisher SCM provider for this project is: git
08:39:26.934 INFO  SCM Publisher 2 source files to be analyzed
08:39:26.935 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:26.937 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:26.938 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:26.940 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:26.940 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:26.940 DEBUG Collecting committed files
08:39:26.944 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:26.946 DEBUG Collecting committed files (done) | time=7ms
08:39:26.947 DEBUG Using GIT_NATIVE_BLAME strategy to blame files
08:39:26.955 DEBUG Found GIT version: 2.49.0
08:39:26.958 DEBUG Blame file (native) bastion.tf
08:39:26.960 DEBUG Blame file (native) acm.tf
08:39:26.985 INFO  SCM Publisher 2/2 source files have been analyzed (done) | time=49ms
08:39:26.989 INFO  CPD Executor Calculating CPD for 0 files
08:39:26.990 INFO  CPD Executor CPD calculation finished (done) | time=0ms
08:39:27.100 INFO  SCM writing changed lines
08:39:27.102 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.104 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.104 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.104 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.104 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.106 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.107 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.112 DEBUG Merge base sha1: 41f0cd5a879725c496a6848f6114fe6cad87dc0c
08:39:27.113 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.113 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.115 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.115 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.116 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.118 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.122 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.124 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.132 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.134 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.134 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.134 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.134 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.134 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.137 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.142 DEBUG SCM reported changed lines for 2 files in the branch
08:39:27.142 INFO  SCM writing changed lines (done) | time=42ms
08:39:29.827 DEBUG MSBuild version found: 17.8.19.7104
08:39:29.902 INFO  Analysis report generated in 2911ms, dir size=299 KB
08:39:29.928 INFO  Analysis report compressed in 26ms, zip size=68 KB
08:39:29.930 INFO  Analysis report generated in /home/runner/work/accelerate-infrastructure/accelerate-infrastructure/.scannerwork/scanner-report
08:39:29.931 DEBUG Upload report
08:39:29.934 DEBUG --> POST https://sonarcloud.io/api/ce/submit?organization=organization&projectKey=Organization_accelerate-infrastructure&characteristic=pullRequest%3D75 (70538-byte body)
08:39:30.606 DEBUG <-- 200 https://sonarcloud.io/api/ce/submit?organization=organization&projectKey=Organization_accelerate-infrastructure&characteristic=pullRequest%3D75 (671ms, 44-byte body)
08:39:30.608 INFO  Analysis report uploaded in 679ms
08:39:30.609 DEBUG Report metadata written to /home/runner/work/accelerate-infrastructure/accelerate-infrastructure/.scannerwork/report-task.txt
08:39:30.610 INFO  ANALYSIS SUCCESSFUL, you can find the results at: https://sonarcloud.io/dashboard?id=Organization_accelerate-infrastructure&pullRequest=75
08:39:30.612 INFO  Note that you will be able to access the updated dashboard once the server has processed the submitted analysis report
08:39:30.612 INFO  More about the report processing at https://sonarcloud.io/api/ce/task?id=AZXb6ANHzkIV1yJ8AZGu
08:39:30.612 DEBUG Post-jobs :
08:39:30.614 INFO  Analysis total time: 23.131 s
08:39:30.614 INFO  SonarScanner Engine completed successfully
08:39:30.616 DEBUG Cleanup org.eclipse.jgit.util.FS$FileStoreAttributes$$Lambda$281/0x00007fed142edca0@736048ed during JVM shutdown
08:39:30.942 INFO  EXECUTION SUCCESS
08:39:30.943 INFO  Total time: 33.552s

Hello again Ann!

I must correct myself. I just disabled all actions before the sonarqube action, and now I see that there are no findings at all in the log. This leads me to think that there are no internal sonarqube-checkov scans, and the checkov-results in the log i provided are from the .checkov/result_sarif.sarif file provided by the earlier step in the workflow.

But still the same question prevail; we do not see all the checkov findings reported in the checkov sarif file, and seemingly imported (based on the logs) in the SonarQube console.

Regards
Vidar

Hi,

You’re analyzing a pull request. For pull request analysis, we only report on the lines changed in the underlying branch.

You say only one expected Checkov issue was reported. Were the “missing” issues raised on files/lines that weren’t changed in the PR?

 
Ann

Hi Ann!

Aha, that makes sense :).

Yes, the findings reported are related to the files in the pull request.

Regarding the missing issue, I think it was just me looking into the sarif file from the checkov scan, misunderstanding the content.

I have to have a small chat with my colleague (who has left the building for today) to see if he agrees, but I think you have cleared it up for us :).

Thank you for all help! I wish you a nice week!

Best regards
Vidar

1 Like

This topic was automatically closed 7 days after the last reply. New replies are no longer allowed.