Rest of log:
Run ${GITHUB_ACTION_PATH}/scripts/run-sonar-scanner-cli.sh -Dsonar.terraform.provider.aws.version=1.10.5 -Dsonar.organization=organization -Dsonar.projectKey=Organization_accelerate-infrastructure -Dsonar.sources=. -Dsonar.sarifReportPaths='tfsec.sarif,./checkov/results_sarif.sarif,trivy-results.sarif' -Dsonar.verbose=true
${GITHUB_ACTION_PATH}/scripts/run-sonar-scanner-cli.sh -Dsonar.terraform.provider.aws.version=1.10.5 -Dsonar.organization=organization -Dsonar.projectKey=Organization_accelerate-infrastructure -Dsonar.sources=. -Dsonar.sarifReportPaths='tfsec.sarif,./checkov/results_sarif.sarif,trivy-results.sarif' -Dsonar.verbose=true
shell: /usr/bin/bash --noprofile --norc -e -o pipefail {0}
env:
AWS_REGION: eu-north-1
terraform_version: 1.10.5
role_to_assume: arn:aws:iam::account_id:role/github-actions-oidc
SSH_AUTH_SOCK: agent
SSH_AGENT_PID: 2044
AWS_DEFAULT_REGION: eu-north-1
AWS_ACCESS_KEY_ID: ***
AWS_SECRET_ACCESS_KEY: ***
AWS_SESSION_TOKEN: ***
TERRAFORM_CLI_PATH: /home/runner/work/_temp/11cb6bb6-c8c1-49ab-a45c-58c425fa5b4d
CHECKOV_RESULTS:
_ _
___| |__ ___ ___| | _______ __
/ __| '_ \ / _ \/ __| |/ / _ \ \ / /
| (__| | | | __/ (__| < (_) \ V /
\___|_| |_|\___|\___|_|\_\___/ \_/
By Prisma Cloud | version: 3.2.394
terraform scan results:
Passed checks: 54, Failed checks: 27, Skipped checks: 0
Check: CKV_TF_1: "Ensure Terraform module sources use a commit hash"
FAILED for resource: acm_eu_north_1
File: /acm.tf:1-13
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/supply-chain-policies/terraform-policies/ensure-terraform-module-sources-use-git-url-with-commit-hash-revision
<CODE>
Check: CKV_TF_1: "Ensure Terraform module sources use a commit hash"
FAILED for resource: base_infra_consumer
File: /base-infra-consumer.tf:70-99
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/supply-chain-policies/terraform-policies/ensure-terraform-module-sources-use-git-url-with-commit-hash-revision
<CODE>
Check: CKV_TF_1: "Ensure Terraform module sources use a commit hash"
FAILED for resource: bastion
File: /bastion.tf:5-22
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/supply-chain-policies/terraform-policies/ensure-terraform-module-sources-use-git-url-with-commit-hash-revision
<CODE>
Check: CKV_TF_1: "Ensure Terraform module sources use a commit hash"
FAILED for resource: subnet_addrs
File: /main.tf:13-39
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/supply-chain-policies/terraform-policies/ensure-terraform-module-sources-use-git-url-with-commit-hash-revision
<CODE>
Check: CKV_AWS_65: "Ensure container insights are enabled on ECS cluster"
FAILED for resource: aws_ecs_cluster.main
File: /main.tf:88-95
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-logging-policies/bc-aws-logging-11
<CODE>
Check: CKV_AWS_382: "Ensure no security groups allow egress from 0.0.0.0:0 to port -1"
FAILED for resource: aws_security_group.ecs
File: /main.tf:98-142
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/bc-aws-382
<CODE>
Check: CKV_AWS_23: "Ensure every security group and rule has a description"
FAILED for resource: aws_security_group.ecs
File: /main.tf:98-142
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-31
<CODE>
Check: CKV_AWS_382: "Ensure no security groups allow egress from 0.0.0.0:0 to port -1"
FAILED for resource: aws_security_group.lb_sg
File: /main.tf:221-241
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/bc-aws-382
<CODE>
Check: CKV_AWS_23: "Ensure every security group and rule has a description"
FAILED for resource: aws_security_group.lb_sg
File: /main.tf:221-241
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-31
<CODE>
Check: CKV_AWS_51: "Ensure ECR Image Tags are immutable"
FAILED for resource: module.bootstrap.aws_ecr_repository.main
File: /modules/bootstrap/main.tf:2-8
Calling File: /bootstrap.tf:1-5
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/bc-aws-general-24
<CODE>
Check: CKV_AWS_136: "Ensure that ECR repositories are encrypted using KMS"
FAILED for resource: module.bootstrap.aws_ecr_repository.main
File: /modules/bootstrap/main.tf:2-8
Calling File: /bootstrap.tf:1-5
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/ensure-that-ecr-repositories-are-encrypted
<CODE>
Check: CKV_AWS_338: "Ensure CloudWatch log groups retains logs for at least 1 year"
FAILED for resource: module.ecs_fargate_service.aws_cloudwatch_log_group.ecs
File: /modules/fargate/main.tf:6-9
Calling File: /main.tf:145-201
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-logging-policies/bc-aws-338
<CODE>
Check: CKV_AWS_158: "Ensure that CloudWatch Log Group is encrypted by KMS"
FAILED for resource: module.ecs_fargate_service.aws_cloudwatch_log_group.ecs
File: /modules/fargate/main.tf:6-9
Calling File: /main.tf:145-201
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/ensure-that-cloudwatch-log-group-is-encrypted-by-kms
<CODE>
Check: CKV_AWS_249: "Ensure that the Execution Role ARN and the Task Role ARN are different in ECS Task definitions"
FAILED for resource: module.ecs_fargate_service.aws_ecs_task_definition.ecs
File: /modules/fargate/main.tf:12-57
Calling File: /main.tf:145-201
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/ensure-the-aws-execution-role-arn-and-task-role-arn-are-different-in-ecs-task-definitions
<CODE>
Check: CKV_AWS_290: "Ensure IAM policies does not allow write access without constraints"
FAILED for resource: module.ecs_fargate_service.aws_iam_policy.ecs_policy
File: /modules/fargate/main.tf:105-111
Calling File: /main.tf:145-201
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-290
<CODE>
Check: CKV_AWS_355: "Ensure no IAM policies documents allow "*" as a statement's resource for restrictable actions"
FAILED for resource: module.ecs_fargate_service.aws_iam_policy.ecs_policy
File: /modules/fargate/main.tf:105-111
Calling File: /main.tf:145-201
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-355
<CODE>
Check: CKV_AWS_288: "Ensure IAM policies does not allow data exfiltration"
FAILED for resource: module.ecs_fargate_service.aws_iam_policy.ecs_policy
File: /modules/fargate/main.tf:105-111
Calling File: /main.tf:145-201
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-288
<CODE>
Check: CKV_AWS_131: "Ensure that ALB drops HTTP headers"
FAILED for resource: module.load_balancer.aws_lb.fargate
File: /modules/loadbalancer/main.tf:5-19
Calling File: /main.tf:206-218
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-that-alb-drops-http-headers
<CODE>
Check: CKV_AWS_150: "Ensure that Load Balancer has deletion protection enabled"
FAILED for resource: module.load_balancer.aws_lb.fargate
File: /modules/loadbalancer/main.tf:5-19
Calling File: /main.tf:206-218
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/bc-aws-150
<CODE>
Check: CKV2_AWS_62: "Ensure S3 buckets should have event notifications enabled"
FAILED for resource: module.load_balancer.aws_s3_bucket.alb_access_logs[0]
File: /modules/loadbalancer/main.tf:22-25
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-logging-policies/bc-aws-2-62
<CODE>
Check: CKV_AWS_145: "Ensure that S3 buckets are encrypted with KMS by default"
FAILED for resource: module.load_balancer.aws_s3_bucket.alb_access_logs[0]
File: /modules/loadbalancer/main.tf:22-25
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/ensure-that-s3-buckets-are-encrypted-with-kms-by-default
<CODE>
Check: CKV2_AWS_6: "Ensure that S3 bucket has a Public Access block"
FAILED for resource: module.load_balancer.aws_s3_bucket.alb_access_logs[0]
File: /modules/loadbalancer/main.tf:22-25
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/s3-bucket-should-have-public-access-blocks-defaults-to-false-if-the-public-access-block-is-not-attached
<CODE>
Check: CKV2_AWS_28: "Ensure public facing ALB are protected by WAF"
FAILED for resource: module.load_balancer.aws_lb.fargate
File: /modules/loadbalancer/main.tf:5-19
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-public-facing-alb-are-protected-by-waf
<CODE>
Check: CKV_AWS_21: "Ensure all data stored in the S3 bucket have versioning enabled"
FAILED for resource: module.load_balancer.aws_s3_bucket.alb_access_logs[0]
File: /modules/loadbalancer/main.tf:22-25
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/s3-policies/s3-16-enable-versioning
<CODE>
Check: CKV_AWS_144: "Ensure that S3 bucket has cross-region replication enabled"
FAILED for resource: module.load_balancer.aws_s3_bucket.alb_access_logs[0]
File: /modules/loadbalancer/main.tf:22-25
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/ensure-that-s3-bucket-has-cross-region-replication-enabled
<CODE>
Check: CKV_AWS_18: "Ensure the S3 bucket has access logging enabled"
FAILED for resource: module.load_balancer.aws_s3_bucket.alb_access_logs[0]
File: /modules/loadbalancer/main.tf:22-25
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/s3-policies/s3-13-enable-logging
<CODE>
Check: CKV2_AWS_61: "Ensure that an S3 bucket has a lifecycle configuration"
FAILED for resource: module.load_balancer.aws_s3_bucket.alb_access_logs[0]
File: /modules/loadbalancer/main.tf:22-25
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-logging-policies/bc-aws-2-61
<CODE>
TRIVY_SEVERITY: CRITICAL,HIGH,MEDIUM
TRIVY_FORMAT: sarif
TRIVY_OUTPUT: trivy-results.sarif
TRIVY_QUIET: true
TRIVY_SCANNERS: vuln,misconfig,secret
SONAR_TOKEN: ***
INPUT_PROJECTBASEDIR:
SONAR_SCANNER_JRE: /home/runner/work/_temp/sonar-scanner-cli-7.1.0.4889-Linux-X64/jre
+ sonar-scanner -Dsonar.terraform.provider.aws.version=1.10.5 -Dsonar.organization=organization -Dsonar.projectKey=Organization_accelerate-infrastructure -Dsonar.sources=. -Dsonar.sarifReportPaths=tfsec.sarif,./checkov/results_sarif.sarif,trivy-results.sarif -Dsonar.verbose=true
08:38:57.395 INFO Scanner configuration file: /home/runner/work/_temp/sonar-scanner-cli-7.1.0.4889-Linux-X64/conf/sonar-scanner.properties
08:38:57.399 INFO Project root configuration file: NONE
08:38:57.418 INFO SonarScanner CLI 7.1.0.4889
08:38:57.419 INFO Java 17.0.13 Eclipse Adoptium (64-bit)
08:38:57.420 INFO Linux 6.8.0-1021-azure amd64
08:38:57.429 DEBUG Scanner max available memory: 1 GB
08:38:57.451 DEBUG uname -m returned 'x86_64'
08:38:57.454 DEBUG Using JVM default truststore: /home/runner/work/_temp/sonar-scanner-cli-7.1.0.4889-Linux-X64/jre/lib/security/cacerts
08:38:57.455 DEBUG Create: /home/runner/.sonar/cache
08:38:57.456 INFO User cache: /home/runner/.sonar/cache
08:38:57.456 DEBUG Create: /home/runner/.sonar/cache/_tmp
08:38:57.577 DEBUG Loading OS trusted SSL certificates...
08:38:57.578 DEBUG This operation might be slow or even get stuck. You can skip it by passing the scanner property 'sonar.scanner.skipSystemTruststore=true'
08:38:57.946 DEBUG Loaded [440] system trusted certificates
08:38:58.217 DEBUG Loaded truststore from '/home/runner/work/_temp/sonar-scanner-cli-7.1.0.4889-Linux-X64/jre/lib/security/cacerts' containing 152 certificates
08:38:58.393 INFO Communicating with SonarQube Cloud
08:38:58.394 INFO JRE provisioning: os[linux], arch[x86_64]
08:38:58.424 DEBUG --> GET https://api.sonarcloud.io/analysis/jres?os=linux&arch=x86_64
08:38:59.689 DEBUG <-- 200 https://api.sonarcloud.io/analysis/jres?os=linux&arch=x86_64 (1265ms, 471-byte body)
08:38:59.723 DEBUG Download https://scanner.sonarcloud.io/jres/OpenJDK17U-jre_x64_linux_hotspot_17.0.11_9.tar.gz to /home/runner/.sonar/cache/_tmp/fileCache3965011941708520474.tmp
08:38:59.723 DEBUG --> GET https://scanner.sonarcloud.io/jres/OpenJDK17U-jre_x64_linux_hotspot_17.0.11_9.tar.gz
08:39:00.026 DEBUG <-- 200 https://scanner.sonarcloud.io/jres/OpenJDK17U-jre_x64_linux_hotspot_17.0.11_9.tar.gz (302ms, 46382823-byte body)
08:39:02.014 DEBUG Executing: /home/runner/.sonar/cache/bcb1b7b8ad68c93093f09b591b7cb17161d39891f7d29d33a586f5a328603707/OpenJDK17U-jre_x64_linux_hotspot_17.0.11_9.tar.gz_extracted/jdk-17.0.11+9-jre/bin/java --version
08:39:02.044 DEBUG openjdk 17.0.11 2024-04-16
08:39:02.044 DEBUG OpenJDK Runtime Environment Temurin-17.0.11+9 (build 17.0.11+9)
08:39:02.045 DEBUG OpenJDK 64-Bit Server VM Temurin-17.0.11+9 (build 17.0.11+9, mixed mode, sharing)
08:39:02.048 DEBUG --> GET https://api.sonarcloud.io/analysis/engine
08:39:02.371 DEBUG <-- 200 https://api.sonarcloud.io/analysis/engine (322ms, 290-byte body)
08:39:02.372 DEBUG Download https://scanner.sonarcloud.io/engines/sonarcloud-scanner-engine-11.8.0.412.jar to /home/runner/.sonar/cache/_tmp/fileCache7596119282254272253.tmp
08:39:02.372 DEBUG --> GET https://scanner.sonarcloud.io/engines/sonarcloud-scanner-engine-11.8.0.412.jar
08:39:02.378 DEBUG <-- 200 https://scanner.sonarcloud.io/engines/sonarcloud-scanner-engine-11.8.0.412.jar (5ms, 32811094-byte body)
08:39:02.798 DEBUG Work directory: /home/runner/work/accelerate-infrastructure/accelerate-infrastructure/.scannerwork
08:39:02.807 DEBUG Executing: /home/runner/.sonar/cache/bcb1b7b8ad68c93093f09b591b7cb17161d39891f7d29d33a586f5a328603707/OpenJDK17U-jre_x64_linux_hotspot_17.0.11_9.tar.gz_extracted/jdk-17.0.11+9-jre/bin/java -Dorg.bouncycastle.pkcs12.ignore_useless_passwd=true -jar /home/runner/.sonar/cache/539579cab55d650abccf1be3741c8a836bb17da0a0b1198fae26caf5c7afe9a5/sonarcloud-scanner-engine-11.8.0.412.jar
08:39:03.194 INFO Starting SonarScanner Engine...
08:39:03.196 INFO Java 17.0.11 Eclipse Adoptium (64-bit)
08:39:03.245 DEBUG JVM max available memory: 1 GB
08:39:03.468 DEBUG Sonar User Home: /home/runner/.sonar
08:39:03.468 DEBUG Initialize DefaultScannerWsClient
08:39:03.585 DEBUG Loading OS trusted SSL certificates...
08:39:03.586 DEBUG This operation might be slow or even get stuck. You can skip it by passing the scanner property 'sonar.scanner.skipSystemTruststore=true'
08:39:03.933 DEBUG Loaded [440] system trusted certificates
08:39:04.183 DEBUG Loaded truststore from '/home/runner/work/_temp/sonar-scanner-cli-7.1.0.4889-Linux-X64/jre/lib/security/cacerts' containing 152 certificates
08:39:04.385 INFO Load global settings
08:39:04.396 DEBUG --> GET https://sonarcloud.io/api/settings/values.protobuf
08:39:05.447 DEBUG <-- 200 https://sonarcloud.io/api/settings/values.protobuf (1050ms, unknown-length body)
08:39:05.462 INFO Load global settings (done) | time=1080ms
08:39:05.473 INFO Server id: 1BD809FA-AWHW8ct9-T_TB3XqouNu
08:39:05.476 DEBUG Initialize DownloadPluginsScannerWsClient
08:39:05.484 DEBUG Loading OS trusted SSL certificates...
08:39:05.484 DEBUG This operation might be slow or even get stuck. You can skip it by passing the scanner property 'sonar.scanner.skipSystemTruststore=true'
08:39:05.717 DEBUG Loaded [440] system trusted certificates
08:39:05.773 DEBUG Loaded truststore from '/home/runner/work/_temp/sonar-scanner-cli-7.1.0.4889-Linux-X64/jre/lib/security/cacerts' containing 152 certificates
08:39:05.786 DEBUG Create : /home/runner/.sonar/_tmp
08:39:05.787 DEBUG User cache: /home/runner/.sonar/cache
08:39:05.795 INFO Loading required plugins
08:39:05.796 INFO Load plugins index
08:39:05.798 DEBUG --> GET https://sonarcloud.io/api/plugins/installed
08:39:06.028 DEBUG <-- 200 https://sonarcloud.io/api/plugins/installed (230ms, unknown-length body)
08:39:06.035 INFO Load plugins index (done) | time=239ms
08:39:06.038 INFO Load/download plugins
08:39:06.038 DEBUG Download plugin 'iac' to '/home/runner/.sonar/_tmp/fileCache2321786597533829767.tmp'
08:39:06.039 DEBUG --> GET https://scanner.sonarcloud.io/plugins/iac/versions/4ffc86e53f0c860498ec4b3076e30d36.jar
08:39:06.089 DEBUG <-- 200 https://scanner.sonarcloud.io/plugins/iac/versions/4ffc86e53f0c860498ec4b3076e30d36.jar (50ms, 18373911-byte body)
08:39:06.856 DEBUG Download plugin 'iacenterprise' to '/home/runner/.sonar/_tmp/fileCache17128185469155744139.tmp'
08:39:06.858 DEBUG --> GET https://scanner.sonarcloud.io/plugins/iacenterprise/versions/19f5a4aafe538f4bce4c2b82f0d27882.jar
08:39:06.866 DEBUG <-- 200 https://scanner.sonarcloud.io/plugins/iacenterprise/versions/19f5a4aafe538f4bce4c2b82f0d27882.jar (6ms, 1473039-byte body)
08:39:06.942 DEBUG Download plugin 'jacoco' to '/home/runner/.sonar/_tmp/fileCache16668474704419605771.tmp'
08:39:06.942 DEBUG --> GET https://scanner.sonarcloud.io/plugins/jacoco/versions/04bba36a445c3713a632aa358be2f99c.jar
08:39:06.947 DEBUG <-- 200 https://scanner.sonarcloud.io/plugins/jacoco/versions/04bba36a445c3713a632aa358be2f99c.jar (5ms, 23258-byte body)
08:39:06.956 DEBUG Download plugin 'textenterprise' to '/home/runner/.sonar/_tmp/fileCache8750004148896767646.tmp'
08:39:06.959 DEBUG --> GET https://scanner.sonarcloud.io/plugins/textenterprise/versions/4b084f2e68d5b750ffa1c3f58ef118d2.jar
08:39:06.966 DEBUG <-- 200 https://scanner.sonarcloud.io/plugins/textenterprise/versions/4b084f2e68d5b750ffa1c3f58ef118d2.jar (5ms, 6295336-byte body)
08:39:07.205 INFO Load/download plugins (done) | time=1168ms
08:39:07.205 DEBUG Plugins not loaded because they are optional: [abap, sonarapex, architecture, architecturejavascriptfrontend, architecturejavafrontend, csharpenterprise, cpp, cobol, dart, dbd, dbdjavafrontend, dbdpythonfrontend, flex, goenterprise, web, jcl, javasymbolicexecution, java, javascript, kotlin, php, pli, plsql, python, rpg, ruby, sonarscala, swift, tsql, vbnetenterprise, vb, security, securitycsharpfrontend, securityjsfrontend, securityjavafrontend, securityphpfrontend, securitypythonfrontend, xml]
08:39:07.271 DEBUG Plugins loaded:
08:39:07.273 DEBUG * Text Code Quality and Security 2.21.0.5225 (textenterprise)
08:39:07.273 DEBUG * JaCoCo 1.3.0.1538 (jacoco)
08:39:07.273 DEBUG * IaC Code Quality and Security 1.44.0.14670 (iacenterprise)
08:39:07.276 DEBUG * IaC Code Quality and Security 1.44.0.14670 (iac)
08:39:07.277 DEBUG --> GET https://sonarcloud.io/api/server/version
08:39:07.471 DEBUG <-- 200 https://sonarcloud.io/api/server/version (194ms, 11-byte body)
08:39:07.472 DEBUG Updated analysis started with a difference of -99 milliseconds
08:39:07.480 DEBUG Started at Fri Mar 28 08:39:05 UTC 2025
08:39:07.687 DEBUG register org.eclipse.jgit.util.FS$FileStoreAttributes$$Lambda$281/0x00007fed142edca0@736048ed with shutdown hook
08:39:07.729 INFO Found an active CI vendor: 'Github Actions'
08:39:07.743 INFO Load project settings for component key: 'Organization_accelerate-infrastructure'
08:39:07.745 DEBUG --> GET https://sonarcloud.io/api/settings/values.protobuf?component=Organization_accelerate-infrastructure
08:39:08.053 DEBUG <-- 200 https://sonarcloud.io/api/settings/values.protobuf?component=Organization_accelerate-infrastructure (307ms, unknown-length body)
08:39:08.058 INFO Load project settings for component key: 'Organization_accelerate-infrastructure' (done) | time=315ms
08:39:08.063 INFO Process project properties
08:39:08.069 DEBUG Process project properties (done) | time=5ms
08:39:08.072 INFO Project key: Organization_accelerate-infrastructure
08:39:08.073 INFO Base dir: /home/runner/work/accelerate-infrastructure/accelerate-infrastructure
08:39:08.073 INFO Working dir: /home/runner/work/accelerate-infrastructure/accelerate-infrastructure/.scannerwork
08:39:08.073 DEBUG Project global encoding: UTF-8, default locale: en
08:39:08.073 DEBUG Creating module hierarchy
08:39:08.073 DEBUG Init module 'Organization_accelerate-infrastructure'
08:39:08.074 DEBUG Base dir: /home/runner/work/accelerate-infrastructure/accelerate-infrastructure
08:39:08.074 DEBUG Working dir: /home/runner/work/accelerate-infrastructure/accelerate-infrastructure/.scannerwork
08:39:08.074 DEBUG Module global encoding: UTF-8, default locale: en
08:39:08.077 INFO Load project branches
08:39:08.080 DEBUG --> GET https://sonarcloud.io/api/project_branches/list?project=Organization_accelerate-infrastructure
08:39:08.442 DEBUG <-- 200 https://sonarcloud.io/api/project_branches/list?project=Organization_accelerate-infrastructure (360ms, unknown-length body)
08:39:08.446 INFO Load project branches (done) | time=371ms
08:39:08.451 INFO Check ALM binding of project 'Organization_accelerate-infrastructure'
08:39:08.452 DEBUG --> GET https://sonarcloud.io/api/alm_integration/is_project_bound?project=Organization_accelerate-infrastructure
08:39:08.651 DEBUG <-- 200 https://sonarcloud.io/api/alm_integration/is_project_bound?project=Organization_accelerate-infrastructure (200ms, unknown-length body)
08:39:08.655 INFO Detected project binding: BOUND
08:39:08.655 INFO Check ALM binding of project 'Organization_accelerate-infrastructure' (done) | time=203ms
08:39:08.655 INFO Load project pull requests
08:39:08.655 DEBUG --> GET https://sonarcloud.io/api/project_pull_requests/list?project=Organization_accelerate-infrastructure
08:39:09.013 DEBUG <-- 200 https://sonarcloud.io/api/project_pull_requests/list?project=Organization_accelerate-infrastructure (357ms, unknown-length body)
08:39:09.018 INFO Load project pull requests (done) | time=364ms
08:39:09.023 INFO Load branch configuration
08:39:09.024 INFO Github event: pull_request
08:39:09.030 INFO Auto-configuring pull request 75
08:39:09.036 DEBUG --> GET https://sonarcloud.io/api/alm_integration/show_pullrequest?project=Organization_accelerate-infrastructure&pullrequestKey=75
08:39:09.981 DEBUG <-- 200 https://sonarcloud.io/api/alm_integration/show_pullrequest?project=Organization_accelerate-infrastructure&pullrequestKey=75 (947ms, unknown-length body)
08:39:09.984 INFO Load branch configuration (done) | time=964ms
08:39:09.994 INFO Load quality profiles
08:39:09.995 DEBUG --> GET https://sonarcloud.io/api/qualityprofiles/search.protobuf?projectKey=Organization_accelerate-infrastructure&organization=organization
08:39:10.355 DEBUG <-- 200 https://sonarcloud.io/api/qualityprofiles/search.protobuf?projectKey=Organization_accelerate-infrastructure&organization=organization (360ms, 5288-byte body)
08:39:10.370 INFO Load quality profiles (done) | time=375ms
08:39:10.374 INFO Load active rules
08:39:10.376 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYI5iBwFYiWOCbm_Y8ze&ps=500&p=1
08:39:10.605 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYI5iBwFYiWOCbm_Y8ze&ps=500&p=1 (228ms, 5710-byte body)
08:39:10.626 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPor&ps=500&p=1
08:39:10.846 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPor&ps=500&p=1 (220ms, 7272-byte body)
08:39:10.856 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo9&ps=500&p=1
08:39:11.083 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo9&ps=500&p=1 (227ms, 8119-byte body)
08:39:11.090 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPoo&ps=500&p=1
08:39:11.303 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPoo&ps=500&p=1 (212ms, 11-byte body)
08:39:11.306 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPos&ps=500&p=1
08:39:11.573 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPos&ps=500&p=1 (267ms, unknown-length body)
08:39:11.845 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPov&ps=500&p=1
08:39:12.109 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPov&ps=500&p=1 (261ms, unknown-length body)
08:39:12.200 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AZL2jAs7Lbd728s6uoZe&ps=500&p=1
08:39:12.451 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AZL2jAs7Lbd728s6uoZe&ps=500&p=1 (250ms, 4130-byte body)
08:39:12.455 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPon&ps=500&p=1
08:39:12.679 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPon&ps=500&p=1 (224ms, unknown-length body)
08:39:12.689 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYXoQrEu9Ao2yLWbMTfI&ps=500&p=1
08:39:12.911 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYXoQrEu9Ao2yLWbMTfI&ps=500&p=1 (222ms, unknown-length body)
08:39:12.919 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPop&ps=500&p=1
08:39:13.147 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPop&ps=500&p=1 (227ms, unknown-length body)
08:39:13.190 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AZHgMmmnZ_un-6v83pyT&ps=500&p=1
08:39:13.533 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AZHgMmmnZ_un-6v83pyT&ps=500&p=1 (343ms, unknown-length body)
08:39:13.557 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AZFU5xa34M0h262745gU&ps=500&p=1
08:39:13.799 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AZFU5xa34M0h262745gU&ps=500&p=1 (240ms, 2811-byte body)
08:39:13.801 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPpA&ps=500&p=1
08:39:14.085 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPpA&ps=500&p=1 (283ms, unknown-length body)
08:39:14.241 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPpA&ps=500&p=2
08:39:14.487 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPpA&ps=500&p=2 (246ms, unknown-length body)
08:39:14.496 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPow&ps=500&p=1
08:39:14.758 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPow&ps=500&p=1 (262ms, unknown-length body)
08:39:14.766 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPom&ps=500&p=1
08:39:14.987 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPom&ps=500&p=1 (218ms, unknown-length body)
08:39:14.994 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPoq&ps=500&p=1
08:39:15.220 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPoq&ps=500&p=1 (225ms, 5821-byte body)
08:39:15.223 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPog&ps=500&p=1
08:39:15.431 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPog&ps=500&p=1 (208ms, 11-byte body)
08:39:15.433 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AZFvm8tEcUjvLIw7idZB&ps=500&p=1
08:39:15.674 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AZFvm8tEcUjvLIw7idZB&ps=500&p=1 (242ms, unknown-length body)
08:39:15.728 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AX6LfYclEtnFPnYRcUCd&ps=500&p=1
08:39:15.951 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AX6LfYclEtnFPnYRcUCd&ps=500&p=1 (222ms, 288-byte body)
08:39:15.951 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPoz&ps=500&p=1
08:39:16.185 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPoz&ps=500&p=1 (233ms, unknown-length body)
08:39:16.216 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXriBDJFr7WCwZj2asW8&ps=500&p=1
08:39:16.434 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXriBDJFr7WCwZj2asW8&ps=500&p=1 (217ms, 7589-byte body)
08:39:16.436 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPoy&ps=500&p=1
08:39:16.653 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPoy&ps=500&p=1 (217ms, unknown-length body)
08:39:16.674 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXriBx7Fr7WCwZj2bID1&ps=500&p=1
08:39:16.881 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXriBx7Fr7WCwZj2bID1&ps=500&p=1 (206ms, 11-byte body)
08:39:16.883 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo8&ps=500&p=1
08:39:17.140 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo8&ps=500&p=1 (258ms, unknown-length body)
08:39:17.239 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo_&ps=500&p=1
08:39:17.477 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo_&ps=500&p=1 (237ms, unknown-length body)
08:39:17.517 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo-&ps=500&p=1
08:39:17.740 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo-&ps=500&p=1 (223ms, unknown-length body)
08:39:17.744 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo4&ps=500&p=1
08:39:18.010 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo4&ps=500&p=1 (266ms, unknown-length body)
08:39:18.044 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPoi&ps=500&p=1
08:39:18.426 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPoi&ps=500&p=1 (382ms, 7367-byte body)
08:39:18.428 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPpB&ps=500&p=1
08:39:18.648 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPpB&ps=500&p=1 (218ms, 4412-byte body)
08:39:18.649 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPox&ps=500&p=1
08:39:18.869 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPox&ps=500&p=1 (220ms, unknown-length body)
08:39:18.879 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPoh&ps=500&p=1
08:39:19.095 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPoh&ps=500&p=1 (216ms, 6770-byte body)
08:39:19.098 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYXoTKk19Ao2yLWbNIPb&ps=500&p=1
08:39:19.320 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYXoTKk19Ao2yLWbNIPb&ps=500&p=1 (221ms, unknown-length body)
08:39:19.343 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo1&ps=500&p=1
08:39:19.563 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo1&ps=500&p=1 (219ms, 8036-byte body)
08:39:19.566 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPot&ps=500&p=1
08:39:19.822 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPot&ps=500&p=1 (255ms, unknown-length body)
08:39:19.900 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPol&ps=500&p=1
08:39:20.125 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPol&ps=500&p=1 (225ms, unknown-length body)
08:39:20.140 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo5&ps=500&p=1
08:39:20.373 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo5&ps=500&p=1 (233ms, unknown-length body)
08:39:20.416 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXriCm9mr7WCwZj2bjwt&ps=500&p=1
08:39:20.707 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXriCm9mr7WCwZj2bjwt&ps=500&p=1 (290ms, unknown-length body)
08:39:20.727 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYk_-kmyEjuu3U2UB-ih&ps=500&p=1
08:39:20.982 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYk_-kmyEjuu3U2UB-ih&ps=500&p=1 (254ms, unknown-length body)
08:39:20.986 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo2&ps=500&p=1
08:39:21.206 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo2&ps=500&p=1 (219ms, unknown-length body)
08:39:21.217 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo3&ps=500&p=1
08:39:21.509 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo3&ps=500&p=1 (292ms, unknown-length body)
08:39:21.560 DEBUG --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo0&ps=500&p=1
08:39:21.810 DEBUG <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXYoMKNTt0jGAry8yPo0&ps=500&p=1 (249ms, unknown-length body)
08:39:21.915 INFO Load active rules (done) | time=11540ms
08:39:21.950 DEBUG --> GET https://sonarcloud.io/api/languages/list
08:39:22.148 DEBUG <-- 200 https://sonarcloud.io/api/languages/list (197ms, unknown-length body)
08:39:22.162 INFO Organization key: organization
08:39:22.163 INFO Pull request 75 for merge into main from LOS-334_TestActionsSjekker
08:39:22.175 DEBUG Declared patterns of language Kubernetes were converted to sonar.lang.patterns.kubernetes :
08:39:22.176 DEBUG Declared patterns of language CSS were converted to sonar.lang.patterns.css : **/*.css,**/*.less,**/*.scss,**/*.sass
08:39:22.176 DEBUG Declared patterns of language Scala were converted to sonar.lang.patterns.scala : **/*.scala
08:39:22.176 DEBUG Declared patterns of language JSP were converted to sonar.lang.patterns.jsp : **/*.jsp,**/*.jspf,**/*.jspx
08:39:22.176 DEBUG Declared patterns of language JavaScript were converted to sonar.lang.patterns.js : **/*.js,**/*.jsx,**/*.cjs,**/*.mjs,**/*.vue
08:39:22.176 DEBUG Declared patterns of language Python were converted to sonar.lang.patterns.py : **/*.py
08:39:22.176 DEBUG Declared patterns of language Ansible were converted to sonar.lang.patterns.ansible :
08:39:22.176 DEBUG Declared patterns of language Apex were converted to sonar.lang.patterns.apex : **/*.cls,**/*.trigger
08:39:22.177 DEBUG Declared patterns of language Docker were converted to sonar.lang.patterns.docker : **/Dockerfile,**/*.dockerfile
08:39:22.177 DEBUG Declared patterns of language PL/SQL were converted to sonar.lang.patterns.plsql : **/*.sql,**/*.tab,**/*.pkb
08:39:22.177 DEBUG Declared patterns of language Dart were converted to sonar.lang.patterns.dart : **/*.dart
08:39:22.177 DEBUG Declared patterns of language JCL were converted to sonar.lang.patterns.jcl : **/*.jcl
08:39:22.177 DEBUG Declared patterns of language Java were converted to sonar.lang.patterns.java : **/*.java,**/*.jav
08:39:22.183 DEBUG Declared patterns of language HTML were converted to sonar.lang.patterns.web : **/*.html,**/*.xhtml,**/*.cshtml,**/*.vbhtml,**/*.aspx,**/*.ascx,**/*.rhtml,**/*.erb,**/*.shtm,**/*.shtml,**/*.cmp,**/*.twig
08:39:22.183 DEBUG Declared patterns of language Flex were converted to sonar.lang.patterns.flex : **/*.as
08:39:22.183 DEBUG Declared patterns of language XML were converted to sonar.lang.patterns.xml : **/*.xml,**/*.xsd,**/*.xsl,**/*.config
08:39:22.184 DEBUG Declared patterns of language JSON were converted to sonar.lang.patterns.json : **/*.json
08:39:22.184 DEBUG Declared patterns of language IPython Notebooks were converted to sonar.lang.patterns.ipynb : **/*.ipynb
08:39:22.184 DEBUG Declared patterns of language Text were converted to sonar.lang.patterns.text :
08:39:22.184 DEBUG Declared patterns of language VB.NET were converted to sonar.lang.patterns.vbnet : **/*.vb
08:39:22.184 DEBUG Declared patterns of language CloudFormation were converted to sonar.lang.patterns.cloudformation :
08:39:22.184 DEBUG Declared patterns of language Swift were converted to sonar.lang.patterns.swift : **/*.swift
08:39:22.184 DEBUG Declared patterns of language YAML were converted to sonar.lang.patterns.yaml : **/*.yaml,**/*.yml
08:39:22.184 DEBUG Declared patterns of language C++ were converted to sonar.lang.patterns.cpp : **/*.cc,**/*.cpp,**/*.cxx,**/*.c++,**/*.hh,**/*.hpp,**/*.hxx,**/*.h++,**/*.ipp,**/*.ixx,**/*.mxx,**/*.cppm,**/*.ccm,**/*.cxxm,**/*.c++m
08:39:22.184 DEBUG Declared patterns of language C were converted to sonar.lang.patterns.c : **/*.c,**/*.h
08:39:22.186 DEBUG Declared patterns of language Go were converted to sonar.lang.patterns.go : **/*.go
08:39:22.186 DEBUG Declared patterns of language Kotlin were converted to sonar.lang.patterns.kotlin : **/*.kt,**/*.kts
08:39:22.186 DEBUG Declared patterns of language RPG were converted to sonar.lang.patterns.rpg : **/*.rpg,**/*.rpgle,**/*.sqlrpgle,**/*.rpg,**/*.rpgle,**/*.sqlrpgle
08:39:22.187 DEBUG Declared patterns of language PL/I were converted to sonar.lang.patterns.pli : **/*.pli
08:39:22.187 DEBUG Declared patterns of language T-SQL were converted to sonar.lang.patterns.tsql : **/*.tsql
08:39:22.187 DEBUG Declared patterns of language Vb were converted to sonar.lang.patterns.vb : **/*.bas,**/*.frm,**/*.ctl
08:39:22.187 DEBUG Declared patterns of language Secrets were converted to sonar.lang.patterns.secrets :
08:39:22.187 DEBUG Declared patterns of language Ruby were converted to sonar.lang.patterns.ruby : **/*.rb
08:39:22.187 DEBUG Declared patterns of language C# were converted to sonar.lang.patterns.cs : **/*.cs,**/*.razor
08:39:22.187 DEBUG Declared patterns of language COBOL were converted to sonar.lang.patterns.cobol :
08:39:22.187 DEBUG Declared patterns of language PHP were converted to sonar.lang.patterns.php : **/*.php,**/*.php3,**/*.php4,**/*.php5,**/*.phtml,**/*.inc
08:39:22.188 DEBUG Declared patterns of language Terraform were converted to sonar.lang.patterns.terraform : **/*.tf
08:39:22.188 DEBUG Declared patterns of language AzureResourceManager were converted to sonar.lang.patterns.azureresourcemanager : **/*.bicep
08:39:22.188 DEBUG Declared patterns of language ABAP were converted to sonar.lang.patterns.abap : **/*.abap,**/*.ab4,**/*.flow,**/*.asprog
08:39:22.188 DEBUG Declared patterns of language Objective-C were converted to sonar.lang.patterns.objc : **/*.m
08:39:22.188 DEBUG Declared patterns of language TypeScript were converted to sonar.lang.patterns.ts : **/*.ts,**/*.tsx,**/*.cts,**/*.mts
08:39:22.188 INFO Preprocessing files...
08:39:22.207 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:22.208 DEBUG readpipe [/usr/bin/git, --version],/usr/bin
08:39:22.217 DEBUG readpipe may return 'git version 2.49.0'
08:39:22.220 DEBUG remaining output:
08:39:22.221 DEBUG readpipe [/usr/bin/git, config, --system, --show-origin, --list, -z],/usr/bin
08:39:22.221 DEBUG readpipe may return 'file:/etc/gitconfigsafe.directory'
08:39:22.221 DEBUG remaining output:
08:39:22.221 DEBUG *file:/etc/gitconfigfilter.lfs.clean
08:39:22.222 DEBUG git-lfs clean -- %ffile:/etc/gitconfigfilter.lfs.smudge
08:39:22.222 DEBUG git-lfs smudge -- %ffile:/etc/gitconfigfilter.lfs.process
08:39:22.222 DEBUG git-lfs filter-processfile:/etc/gitconfigfilter.lfs.required
08:39:22.226 DEBUG true
08:39:22.226 DEBUG loading config FileBasedConfig[/etc/gitconfig]
08:39:22.230 DEBUG loading config FileBasedConfig[/home/runner/.config/git/config]
08:39:22.231 DEBUG loading config UserConfigFile[/home/runner/.gitconfig]
08:39:22.377 DEBUG 641 non excluded files in this Git repository
08:39:22.457 INFO 2 languages detected in 34 preprocessed files
08:39:22.458 INFO 0 files ignored because of inclusion/exclusion patterns
08:39:22.459 INFO 0 files ignored because of scm ignore settings
08:39:22.479 INFO Loading plugins for detected languages
08:39:22.479 DEBUG Detected languages: [json, terraform]
08:39:22.480 INFO Load/download plugins
08:39:22.480 INFO Load/download plugins (done) | time=0ms
08:39:22.480 DEBUG Optional language-specific plugins not loaded: [abap, sonarapex, architecture, architecturejavascriptfrontend, architecturejavafrontend, csharpenterprise, cpp, cobol, dart, dbd, dbdjavafrontend, dbdpythonfrontend, flex, goenterprise, web, jcl, javasymbolicexecution, java, javascript, kotlin, php, pli, plsql, python, rpg, ruby, sonarscala, swift, tsql, vbnetenterprise, vb, security, securitycsharpfrontend, securityjsfrontend, securityjavafrontend, securityphpfrontend, securitypythonfrontend, xml]
08:39:22.482 DEBUG No plugins loaded
08:39:22.516 INFO Load project repositories
08:39:22.518 DEBUG --> GET https://sonarcloud.io/batch/project.protobuf?key=Organization_accelerate-infrastructure&branch=main
08:39:22.735 DEBUG <-- 200 https://sonarcloud.io/batch/project.protobuf?key=Organization_accelerate-infrastructure&branch=main (216ms, 1994-byte body)
08:39:22.740 INFO Load project repositories (done) | time=224ms
08:39:22.743 INFO SCM collecting changed files in the branch
08:39:22.770 DEBUG Merge base sha1: 41f0cd5a879725c496a6848f6114fe6cad87dc0c
08:39:22.778 DEBUG Thread[JGit-FileStoreAttributeReader-1,5,main]: start measure timestamp resolution / (/dev/root) in /home/runner/work/accelerate-infrastructure/accelerate-infrastructure/.git
08:39:22.778 DEBUG Thread[JGit-FileStoreAttributeReader-1,5,main]: end measure timestamp resolution / (/dev/root) in /home/runner/work/accelerate-infrastructure/accelerate-infrastructure/.git; got PT0.000003755S
08:39:22.781 DEBUG Thread[JGit-FileStoreAttributeReader-1,5,main]: start measure minimal racy interval in /home/runner/work/accelerate-infrastructure/accelerate-infrastructure/.git
08:39:22.877 DEBUG Thread[main,5,main]: use fallback timestamp resolution for directory /home/runner/work/accelerate-infrastructure/accelerate-infrastructure/.git
08:39:22.891 INFO SCM collecting changed files in the branch (done) | time=149ms
08:39:22.892 DEBUG SCM reported 5 files changed in the branch
08:39:22.896 INFO Indexing files...
08:39:22.896 INFO Project configuration:
08:39:22.897 INFO Excluded sources: **/build-wrapper-dump.json
08:39:22.903 DEBUG 'ec2.tf' indexed with language 'terraform'
08:39:22.906 DEBUG 'checkov-accel.sarif' indexed with language 'null'
08:39:22.909 DEBUG 'providers.tf' indexed with language 'terraform'
08:39:22.909 DEBUG 'checkov/results_sarif.sarif' indexed with language 'null'
08:39:22.909 DEBUG 'dev.tfvars' indexed with language 'null'
08:39:22.911 DEBUG 'checkov-problem-matcher-softfail.json' indexed with language 'json'
08:39:22.915 DEBUG 'dev_backend.conf' indexed with language 'null'
08:39:22.915 DEBUG 'trivy-results.sarif' indexed with language 'null'
08:39:22.916 DEBUG 'README.md' indexed with language 'null'
08:39:22.916 DEBUG 'data.tf' indexed with language 'terraform'
08:39:22.917 DEBUG 'checkov-problem-matcher.json' indexed with language 'json'
08:39:22.920 DEBUG 'variables.tf' indexed with language 'terraform'
08:39:22.920 DEBUG 'stage.tfvars' indexed with language 'null'
08:39:22.921 DEBUG 'stage_backend.conf' indexed with language 'null'
08:39:22.922 DEBUG 'base-infra-consumer.tf' indexed with language 'terraform'
08:39:22.924 DEBUG 'tfsec.sarif' indexed with language 'null'
08:39:22.925 DEBUG 'backend.tf' indexed with language 'terraform'
08:39:22.926 DEBUG 'prod.tfvars' indexed with language 'null'
08:39:22.928 DEBUG 'main.tf' indexed with language 'terraform'
08:39:22.928 DEBUG 'locals.tf' indexed with language 'terraform'
08:39:22.929 DEBUG 'prod_backend.conf' indexed with language 'null'
08:39:22.929 DEBUG 'bootstrap.tf' indexed with language 'terraform'
08:39:22.929 DEBUG 'acm.tf' indexed with language 'terraform'
08:39:22.929 DEBUG 'vpc-endpoint.tf' indexed with language 'terraform'
08:39:22.929 DEBUG 'modules/bootstrap/variables.tf' indexed with language 'terraform'
08:39:22.929 DEBUG 'modules/bootstrap/main.tf' indexed with language 'terraform'
08:39:22.932 DEBUG 'modules/bootstrap/outputs.tf' indexed with language 'terraform'
08:39:22.933 DEBUG 'modules/fargate/variables.tf' indexed with language 'terraform'
08:39:22.935 DEBUG 'modules/fargate/template/container_definition.tpl' indexed with language 'null'
08:39:22.938 DEBUG 'modules/fargate/main.tf' indexed with language 'terraform'
08:39:22.938 DEBUG 'modules/loadbalancer/variables.tf' indexed with language 'terraform'
08:39:22.938 DEBUG 'modules/loadbalancer/main.tf' indexed with language 'terraform'
08:39:22.938 DEBUG 'modules/loadbalancer/outputs.tf' indexed with language 'terraform'
08:39:22.938 DEBUG 'bastion.tf' indexed with language 'terraform'
08:39:22.938 INFO 34 files indexed
08:39:22.947 DEBUG Available languages:
08:39:22.947 DEBUG * Secrets => "secrets"
08:39:22.947 DEBUG * Text => "text"
08:39:22.948 DEBUG * Ansible => "ansible"
08:39:22.948 DEBUG * Terraform => "terraform"
08:39:22.948 DEBUG * CloudFormation => "cloudformation"
08:39:22.948 DEBUG * Kubernetes => "kubernetes"
08:39:22.948 DEBUG * Docker => "docker"
08:39:22.948 DEBUG * AzureResourceManager => "azureresourcemanager"
08:39:22.948 DEBUG * YAML => "yaml"
08:39:22.948 DEBUG * JSON => "json"
08:39:22.948 INFO Quality profile for json: SonarQube Way
08:39:22.948 INFO Quality profile for terraform: Sonar way
08:39:22.948 INFO ------------- Run sensors on module Organization_accelerate-infrastructure
08:39:22.987 INFO Load metrics repository
08:39:22.988 DEBUG --> GET https://sonarcloud.io/api/metrics/search?f=name,description,direction,qualitative&ps=500&p=1
08:39:23.182 DEBUG <-- 200 https://sonarcloud.io/api/metrics/search?f=name,description,direction,qualitative&ps=500&p=1 (195ms, unknown-length body)
08:39:23.192 INFO Load metrics repository (done) | time=203ms
08:39:23.201 INFO Sensor cache enabled
08:39:23.202 DEBUG Initialize GenericWsClient
08:39:23.206 DEBUG Loading OS trusted SSL certificates...
08:39:23.207 DEBUG This operation might be slow or even get stuck. You can skip it by passing the scanner property 'sonar.scanner.skipSystemTruststore=true'
08:39:23.381 DEBUG Loaded [440] system trusted certificates
08:39:23.434 DEBUG Loaded truststore from '/home/runner/work/_temp/sonar-scanner-cli-7.1.0.4889-Linux-X64/jre/lib/security/cacerts' containing 152 certificates
08:39:23.461 INFO Load sensor cache
08:39:23.462 DEBUG --> GET https://api.sonarcloud.io/analysis/sensor-cache/prepare-read?organization=organization&project=Organization_accelerate-infrastructure&branch=main
08:39:24.619 DEBUG <-- 200 https://api.sonarcloud.io/analysis/sensor-cache/prepare-read?organization=organization&project=Organization_accelerate-infrastructure&branch=main (1156ms, 16-byte body)
08:39:24.645 INFO Load sensor cache (404) | time=1184ms
08:39:25.071 DEBUG 'Import external issues report' skipped because of missing configuration requirements.
Accessed configuration:
- sonar.externalIssuesReportPaths: <empty>
08:39:25.075 DEBUG 'IaC Ansible Sensor' skipped because there is no related file in current project
08:39:25.078 DEBUG 'IaC Kubernetes Sensor' skipped because there is no related file in current project
08:39:25.080 DEBUG 'Generic Coverage Report' skipped because of missing configuration requirements.
Accessed configuration:
- sonar.genericcoverage.reportPath: <empty>
- sonar.genericcoverage.itReportPaths: <empty>
- sonar.coverageReportPaths: <empty>
- sonar.genericcoverage.reportPaths: <empty>
- sonar.genericcoverage.overallReportPaths: <empty>
- sonar.externalIssuesReportPaths: <empty>
08:39:25.081 DEBUG 'Generic Test Executions Report' skipped because of missing configuration requirements.
Accessed configuration:
- sonar.genericcoverage.reportPath: <empty>
- sonar.genericcoverage.itReportPaths: <empty>
- sonar.coverageReportPaths: <empty>
- sonar.genericcoverage.reportPaths: <empty>
- sonar.testExecutionReportPaths: <empty>
- sonar.genericcoverage.overallReportPaths: <empty>
- sonar.externalIssuesReportPaths: <empty>
08:39:25.083 DEBUG Sensors : JaCoCo XML Report Importer -> IaC Terraform Sensor -> IaC CloudFormation Sensor -> IaC AzureResourceManager Sensor -> Java Config Sensor -> IaC Docker Sensor -> EnterpriseTextAndSecretsSensor
08:39:25.085 INFO Sensor JaCoCo XML Report Importer [jacoco]
08:39:25.087 INFO 'sonar.coverage.jacoco.xmlReportPaths' is not defined. Using default locations: target/site/jacoco/jacoco.xml,target/site/jacoco-it/jacoco.xml,build/reports/jacoco/test/jacocoTestReport.xml
08:39:25.089 INFO No report imported, no coverage information will be imported by JaCoCo XML Report Importer
08:39:25.090 INFO Sensor JaCoCo XML Report Importer [jacoco] (done) | time=5ms
08:39:25.090 INFO Sensor IaC Terraform Sensor [iac]
08:39:25.091 INFO Sensor IaC Terraform Sensor is restricted to changed files only
08:39:25.107 DEBUG 'main.tf' generated metadata with charset 'UTF-8'
08:39:25.107 DEBUG 'modules/bootstrap/variables.tf' generated metadata with charset 'UTF-8'
08:39:25.111 DEBUG 'base-infra-consumer.tf' generated metadata with charset 'UTF-8'
08:39:25.113 DEBUG 'locals.tf' generated metadata with charset 'UTF-8'
08:39:25.115 DEBUG 'modules/loadbalancer/outputs.tf' generated metadata with charset 'UTF-8'
08:39:25.116 DEBUG 'vpc-endpoint.tf' generated metadata with charset 'UTF-8'
08:39:25.119 DEBUG 'variables.tf' generated metadata with charset 'UTF-8'
08:39:25.120 DEBUG 'acm.tf' generated metadata with charset 'UTF-8'
08:39:25.120 DEBUG 'bootstrap.tf' generated metadata with charset 'UTF-8'
08:39:25.125 DEBUG 'modules/loadbalancer/variables.tf' generated metadata with charset 'UTF-8'
08:39:25.129 DEBUG 'ec2.tf' generated metadata with charset 'UTF-8'
08:39:25.129 DEBUG 'modules/bootstrap/outputs.tf' generated metadata with charset 'UTF-8'
08:39:25.129 DEBUG 'providers.tf' generated metadata with charset 'UTF-8'
08:39:25.132 DEBUG 'modules/loadbalancer/main.tf' generated metadata with charset 'UTF-8'
08:39:25.135 DEBUG 'data.tf' generated metadata with charset 'UTF-8'
08:39:25.137 DEBUG 'modules/bootstrap/main.tf' generated metadata with charset 'UTF-8'
08:39:25.140 DEBUG 'modules/fargate/variables.tf' generated metadata with charset 'UTF-8'
08:39:25.141 DEBUG 'bastion.tf' generated metadata with charset 'UTF-8'
08:39:25.141 DEBUG 'backend.tf' generated metadata with charset 'UTF-8'
08:39:25.144 DEBUG 'modules/fargate/main.tf' generated metadata with charset 'UTF-8'
08:39:25.317 INFO 2 source files to be analyzed
08:39:25.429 INFO 2/2 source files have been analyzed
08:39:25.431 INFO Sensor IaC Terraform Sensor [iac] (done) | time=341ms
08:39:25.431 INFO Sensor IaC CloudFormation Sensor [iac]
08:39:25.434 DEBUG 'checkov-problem-matcher-softfail.json' generated metadata with charset 'UTF-8'
08:39:25.435 DEBUG File without identifier 'AWSTemplateFormatVersion': checkov-problem-matcher-softfail.json
08:39:25.435 DEBUG 'checkov-problem-matcher.json' generated metadata with charset 'UTF-8'
08:39:25.435 DEBUG File without identifier 'AWSTemplateFormatVersion': checkov-problem-matcher.json
08:39:25.446 INFO 0 source files to be analyzed
08:39:25.446 INFO 0/0 source files have been analyzed
08:39:25.446 INFO Sensor IaC CloudFormation Sensor [iac] (done) | time=14ms
08:39:25.447 INFO Sensor IaC AzureResourceManager Sensor [iac]
08:39:25.447 INFO Sensor IaC AzureResourceManager Sensor is restricted to changed files only
08:39:25.447 DEBUG File without any identifiers '[https://schema.management.azure.com/schemas/, http://schema.management.azure.com/schemas/]': checkov-problem-matcher-softfail.json
08:39:25.447 DEBUG File without any identifiers '[https://schema.management.azure.com/schemas/, http://schema.management.azure.com/schemas/]': checkov-problem-matcher.json
08:39:25.513 INFO 0 source files to be analyzed
08:39:25.515 INFO 0/0 source files have been analyzed
08:39:25.515 INFO Sensor IaC AzureResourceManager Sensor [iac] (done) | time=68ms
08:39:25.515 INFO Sensor Java Config Sensor [iac]
08:39:25.528 INFO 0 source files to be analyzed
08:39:25.530 INFO 0/0 source files have been analyzed
08:39:25.530 INFO Sensor Java Config Sensor [iac] (done) | time=15ms
08:39:25.530 INFO Sensor IaC Docker Sensor [iac]
08:39:25.531 INFO Sensor IaC Docker Sensor is restricted to changed files only
08:39:25.628 INFO 0 source files to be analyzed
08:39:25.629 INFO 0/0 source files have been analyzed
08:39:25.629 INFO Sensor IaC Docker Sensor [iac] (done) | time=99ms
08:39:25.629 INFO Sensor EnterpriseTextAndSecretsSensor [textenterprise]
08:39:25.629 INFO Sensor EnterpriseTextAndSecretsSensor is restricted to changed files only
08:39:25.629 INFO Available processors: 2
08:39:25.629 INFO Using 2 threads for analysis.
08:39:25.781 DEBUG delta [ns] since modification FileSnapshot failed to detect
count, failures, racy limit [ns], delta min [ns], delta max [ns], delta avg [ns], delta stddev [ns]
4588, 125, 9387, 140531.0, 879862.0, 488959.68, 212768.79679594366
08:39:25.784 DEBUG FileStoreAttributes[fsTimestampResolution=3 ”s, minimalRacyInterval=879 ”s]
08:39:25.785 DEBUG register org.eclipse.jgit.internal.storage.file.LockFile$$Lambda$995/0x00007fed14528220@68cfa037 with shutdown hook
08:39:25.785 DEBUG unregister org.eclipse.jgit.internal.storage.file.LockFile$$Lambda$995/0x00007fed14528220@68cfa037 from shutdown hook
08:39:25.786 DEBUG unregister org.eclipse.jgit.internal.storage.file.LockFile$$Lambda$995/0x00007fed14528220@68cfa037 from shutdown hook
08:39:26.274 INFO The property "sonar.tests" is not set. To improve the analysis accuracy, we categorize a file as a test file if any of the following is true:
* The filename starts with "test"
* The filename contains "test." or "tests."
* Any directory in the file path is named: "doc", "docs", "test" or "tests"
* Any directory in the file path has a name ending in "test" or "tests"
08:39:26.302 DEBUG git --version returned: git version 2.49.0
08:39:26.303 INFO Using git CLI to retrieve untracked files
08:39:26.327 INFO Analyzing language associated files and files included via "sonar.text.inclusions" that are tracked by git
08:39:26.328 DEBUG 'dev_backend.conf' generated metadata with charset 'UTF-8'
08:39:26.329 DEBUG 'prod_backend.conf' generated metadata with charset 'UTF-8'
08:39:26.331 DEBUG 'stage_backend.conf' generated metadata with charset 'UTF-8'
08:39:26.340 INFO 2 source files to be analyzed
08:39:26.417 INFO 2/2 source files have been analyzed
08:39:26.418 INFO Sensor EnterpriseTextAndSecretsSensor [textenterprise] (done) | time=791ms
08:39:26.422 INFO ------------- Run sensors on project
08:39:26.544 DEBUG 'Java CPD Block Indexer' skipped because there is no related file in current project
08:39:26.544 DEBUG Sensors : Import external issues report from SARIF file. -> Zero Coverage Sensor
08:39:26.547 INFO Sensor Import external issues report from SARIF file.
08:39:26.547 DEBUG Importing SARIF issues from 'tfsec.sarif'
08:39:26.847 WARN Unable to detect rules severity for issue detected by tool defsec, falling back to default rule severity: MEDIUM
08:39:26.877 DEBUG Importing SARIF issues from 'trivy-results.sarif'
08:39:26.909 DEBUG Importing SARIF issues from './checkov/results_sarif.sarif'
08:39:26.927 INFO File tfsec.sarif: 1 run(s) successfully imported (28 vulnerabilities in total).
08:39:26.927 INFO File trivy-results.sarif: 1 run(s) successfully imported (26 vulnerabilities in total).
08:39:26.927 INFO File ./checkov/results_sarif.sarif: 1 run(s) successfully imported (27 vulnerabilities in total).
08:39:26.928 INFO Sensor Import external issues report from SARIF file. (done) | time=383ms
08:39:26.928 INFO Sensor Zero Coverage Sensor
08:39:26.929 INFO Sensor Zero Coverage Sensor (done) | time=1ms
08:39:26.933 INFO SCM Publisher SCM provider for this project is: git
08:39:26.934 INFO SCM Publisher 2 source files to be analyzed
08:39:26.935 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:26.937 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:26.938 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:26.940 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:26.940 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:26.940 DEBUG Collecting committed files
08:39:26.944 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:26.946 DEBUG Collecting committed files (done) | time=7ms
08:39:26.947 DEBUG Using GIT_NATIVE_BLAME strategy to blame files
08:39:26.955 DEBUG Found GIT version: 2.49.0
08:39:26.958 DEBUG Blame file (native) bastion.tf
08:39:26.960 DEBUG Blame file (native) acm.tf
08:39:26.985 INFO SCM Publisher 2/2 source files have been analyzed (done) | time=49ms
08:39:26.989 INFO CPD Executor Calculating CPD for 0 files
08:39:26.990 INFO CPD Executor CPD calculation finished (done) | time=0ms
08:39:27.100 INFO SCM writing changed lines
08:39:27.102 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.104 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.104 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.104 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.104 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.106 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.107 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.112 DEBUG Merge base sha1: 41f0cd5a879725c496a6848f6114fe6cad87dc0c
08:39:27.113 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.113 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.115 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.115 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.116 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.118 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.122 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.124 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.132 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.134 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.134 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.134 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.134 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.134 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.137 DEBUG loading config FileBasedConfig[/home/runner/.config/jgit/config]
08:39:27.142 DEBUG SCM reported changed lines for 2 files in the branch
08:39:27.142 INFO SCM writing changed lines (done) | time=42ms
08:39:29.827 DEBUG MSBuild version found: 17.8.19.7104
08:39:29.902 INFO Analysis report generated in 2911ms, dir size=299 KB
08:39:29.928 INFO Analysis report compressed in 26ms, zip size=68 KB
08:39:29.930 INFO Analysis report generated in /home/runner/work/accelerate-infrastructure/accelerate-infrastructure/.scannerwork/scanner-report
08:39:29.931 DEBUG Upload report
08:39:29.934 DEBUG --> POST https://sonarcloud.io/api/ce/submit?organization=organization&projectKey=Organization_accelerate-infrastructure&characteristic=pullRequest%3D75 (70538-byte body)
08:39:30.606 DEBUG <-- 200 https://sonarcloud.io/api/ce/submit?organization=organization&projectKey=Organization_accelerate-infrastructure&characteristic=pullRequest%3D75 (671ms, 44-byte body)
08:39:30.608 INFO Analysis report uploaded in 679ms
08:39:30.609 DEBUG Report metadata written to /home/runner/work/accelerate-infrastructure/accelerate-infrastructure/.scannerwork/report-task.txt
08:39:30.610 INFO ANALYSIS SUCCESSFUL, you can find the results at: https://sonarcloud.io/dashboard?id=Organization_accelerate-infrastructure&pullRequest=75
08:39:30.612 INFO Note that you will be able to access the updated dashboard once the server has processed the submitted analysis report
08:39:30.612 INFO More about the report processing at https://sonarcloud.io/api/ce/task?id=AZXb6ANHzkIV1yJ8AZGu
08:39:30.612 DEBUG Post-jobs :
08:39:30.614 INFO Analysis total time: 23.131 s
08:39:30.614 INFO SonarScanner Engine completed successfully
08:39:30.616 DEBUG Cleanup org.eclipse.jgit.util.FS$FileStoreAttributes$$Lambda$281/0x00007fed142edca0@736048ed during JVM shutdown
08:39:30.942 INFO EXECUTION SUCCESS
08:39:30.943 INFO Total time: 33.552s