secret-detection ○ success
⏱
Duration: 7s
⏳
Queued: 3s
📁
Stage: test
🖥
Runner: linux-aws-1
Average Duration
23s
This job: 7s
Failure Rate
1.4%
last 30 days
External Links
▶
Job Execution Phases
💡 Tip: Click on any phase bar to jump to that section in the log below
▶
Job Analysis
Job Status: Passed
Status: Job passed successfully
▶
Full Job Log
137 lines
Match - of 0
1
14:27:24
Running with gitlab-runner 18.5.0 (bda84871)
2
14:27:24
on gitlab-runner-linux-1-86d76d468c-d4585 wRxjPbsJX, system ID: r_J8j67beySAjl
3
14:27:24
feature flags: FF_USE_FASTZIP:true, FF_USE_NEW_BASH_EVAL_STRATEGY:true, FF_SCRIPT_SECTIONS:true, FF_USE_ADVANCED_POD_SPEC_CONFIGURATION:true, FF_PRINT_POD_EVENTS:true, FF_USE_DUMB_INIT_WITH_KUBERNETES_EXECUTOR:true, FF_LOG_IMAGES_CONFIGURED_FOR_JOB:true, FF_CLEAN_UP_FAILED_CACHE_EXTRACT:true, FF_TIMESTAMPS:true, FF_GIT_URLS_WITHOUT_TOKENS:true
4
14:27:24
Resolving secrets
5
14:27:24
section_start:1765290444:prepare_executor
6
14:27:24
+Preparing the "kubernetes" executor
7
14:27:24
Using Kubernetes namespace: gitlab-runner
8
14:27:24
Using Kubernetes executor with image registry.scandit.com/dockerfiles/gitleaks:v8.29.0 ...
9
14:27:24
Using attach strategy to execute scripts...
10
14:27:24
Using effective pull policy of [Always] for container helper
11
14:27:24
Using effective pull policy of [Always] for container init-permissions
12
14:27:24
Using effective pull policy of [Always] for container build
13
14:27:24
section_end:1765290444:prepare_executor
14
14:27:24
+section_start:1765290444:prepare_script
15
14:27:24
+Preparing environment
16
14:27:24
Using FF_USE_POD_ACTIVE_DEADLINE_SECONDS, the Pod activeDeadlineSeconds will be set to the job timeout: 1h0m0s...
17
14:27:24
WARNING: Advanced Pod Spec configuration enabled, merging the provided PodSpec to the generated one. This is a beta feature and is subject to change. Feedback is collected in this issue: https://gitlab.com/gitlab-org/gitlab-runner/-/issues/29659 ...
18
14:27:25
Subscribing to Kubernetes Pod events...
19
14:27:25
Type Reason Message
20
14:27:25
Normal Scheduled Successfully assigned gitlab-runner/runner-wrxjpbsjx-project-621-concurrent-3-bpt0jyjf to ip-10-0-38-72.eu-central-1.compute.internal
21
14:27:25
Normal Pulled Container image "gitlab/gitlab-runner-helper:x86_64-v18.5.0" already present on machine
22
14:27:25
Normal Created Created container: init-permissions
23
14:27:25
Normal Started Started container init-permissions
24
14:27:26
Normal Pulled Container image "498954711405.dkr.ecr.eu-central-1.amazonaws.com/dockerfiles/gitleaks@sha256:652043c1ae468537e910646ec9ebe42c6646230c009fd0c89988391e9d1bee53" already present on machine
25
14:27:26
Normal Created Created container: build
26
14:27:26
Normal Started Started container build
27
14:27:26
Normal Pulled Container image "gitlab/gitlab-runner-helper:x86_64-v18.5.0" already present on machine
28
14:27:26
Normal Created Created container: helper
29
14:27:26
Normal Started Started container helper
30
14:27:29
Running on runner-wrxjpbsjx-project-621-concurrent-3-bpt0jyjf via gitlab-runner-linux-1-86d76d468c-d4585...
31
14:27:29
32
14:27:29
section_end:1765290449:prepare_script
33
14:27:29
+section_start:1765290449:get_sources
34
14:27:29
+Getting source from Git repository
35
14:27:29
Gitaly correlation ID: 01KC1R51B39PK94Z947EAM3T02
36
14:27:29
Fetching changes...
37
14:27:29
Initialized empty Git repository in /build/internal/gitlab-templates/.git/
38
14:27:29
Created fresh repository.
39
14:27:30
Checking out 940006cc as detached HEAD (ref is refs/merge-requests/507/merge)...
40
14:27:30
41
14:27:30
Skipping Git submodules setup
42
14:27:30
43
14:27:30
section_end:1765290450:get_sources
44
14:27:30
+section_start:1765290450:step_script
45
14:27:30
+Executing "step_script" stage of the job script
46
14:27:30
section_start:1765290450:section_pre_build_script_0[hide_duration=true,collapsed=true]
$ function cleanup {
47
14:27:30
rv=$?
48
14:27:30
if [ $rv -ne 0 ]; then
49
14:27:30
echo ""
50
14:27:30
echo " Failure Cause Analysis might help, please open this link:"
51
14:27:30
echo " https://failure-cause-analysis.zrh.int.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
52
14:27:30
echo ""
53
14:27:30
fi
54
14:27:30
echo ""
55
14:27:30
echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=${EPOCHSECONDS}000"
56
14:27:30
echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=${EPOCHSECONDS}000"
57
14:27:30
echo ""
58
14:27:30
exit $rv
59
14:27:30
}
60
14:27:30
trap cleanup EXIT
61
14:27:30
echo "INFO: This is the CI job pre_build_script"
62
14:27:30
echo "INFO: It's defined in the backend/infra/aws repo."
63
14:27:30
echo "INFO: These additional Scandit variables are available to you:"
64
14:27:30
echo " SC_K8S_NODE_NAME: $SC_K8S_NODE_NAME"
65
14:27:30
echo " SC_K8S_IMAGE_ID: $SC_K8S_IMAGE_ID"
66
14:27:30
echo "cpu (r/l): ${SC_K8S_REQUESTS_CPU}/${SC_K8S_LIMITS_CPU}"
67
14:27:30
if command -v numfmt >/dev/null 2>&1; then
68
14:27:30
echo "memory (r/l): $(numfmt --to=iec --suffix=B $SC_K8S_REQUESTS_MEMORY)/$(numfmt --to=iec --suffix=B $SC_K8S_LIMITS_MEMORY)"
69
14:27:30
else
70
14:27:30
echo "memory (r/l): ${SC_K8S_REQUESTS_MEMORY}/${SC_K8S_LIMITS_MEMORY}"
71
14:27:30
fi
72
14:27:30
__start_time=${EPOCHSECONDS}
73
14:27:30
echo ""
74
14:27:30
echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=now"
75
14:27:30
echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=now"
76
14:27:30
echo ""
77
14:27:30
echo "Setting up credentials for Gitlab Python registries"
78
14:27:30
mkdir -p ~
79
14:27:30
echo "machine gitlab.scandit.com" > ~/.netrc
80
14:27:30
echo "login gitlab-ci-token" >> ~/.netrc
81
14:27:30
echo "password ${CI_JOB_TOKEN}" >> ~/.netrc
82
14:27:30
chmod 600 ~/.netrc
83
14:27:30
if command -v git &> /dev/null && [ "$(id -u)" -ne 0 ]; then
84
14:27:30
git config --global --add safe.directory $CI_PROJECT_DIR
85
14:27:30
fi
86
14:27:30
# Sonarqube server is running on the same cluster. Use internal address
87
14:27:30
export SONAR_HOST_URL="http://sonarqube.sonarqube.svc.cluster.local:9000"
88
14:27:30
section_end:1765290450:section_pre_build_script_0
89
14:27:30
INFO: This is the CI job pre_build_script
90
14:27:30
INFO: It's defined in the backend/infra/aws repo.
91
14:27:30
INFO: These additional Scandit variables are available to you:
92
14:27:30
SC_K8S_NODE_NAME: ip-10-0-38-72.eu-central-1.compute.internal
93
14:27:30
SC_K8S_IMAGE_ID:
94
14:27:30
cpu (r/l): 1/4
95
14:27:30
memory (r/l): 1073741824/17179869184
96
14:27:30
97
14:27:30
Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-host=ip-10-0-38-72.eu-central-1.compute.internal&var-namespace=gitlab-runner&var-pod=runner-wrxjpbsjx-project-621-concurrent-3-bpt0jyjf&var-resolution=15&from=1765290450000&to=now
98
14:27:30
Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-node=ip-10-0-38-72.eu-central-1.compute.internal&var-resolution=15s&from=1765290450000&to=now
99
14:27:30
100
14:27:30
Setting up credentials for Gitlab Python registries
101
14:27:30
$ set -x
102
14:27:30
++ echo '$ gitleaks git ./ --platform gitlab ${SECRET_DETECTION_LOG_OPTIONS} --report-format json --report-path ${SECRET_DETECTION_OUTPUT_FILE} --log-level ${SECRET_DETECTION_LOG_LEVEL} --verbose --redact ${SECRET_DETECTION_EXTRA_FLAGS}'
103
14:27:30
$ gitleaks git ./ --platform gitlab ${SECRET_DETECTION_LOG_OPTIONS} --report-format json --report-path ${SECRET_DETECTION_OUTPUT_FILE} --log-level ${SECRET_DETECTION_LOG_LEVEL} --verbose --redact ${SECRET_DETECTION_EXTRA_FLAGS}
104
14:27:30
++ gitleaks git ./ --platform gitlab --log-opts a2d549ab2a6c5ab28b487514420ad35225ee49f5..940006ccdb5cae9f992061bdd618ea8cc79c4306 --report-format json --report-path gl-secret-detection-report.json --log-level info --verbose --redact
105
14:27:30
106
14:27:30
○
107
14:27:30
│╲
108
14:27:30
│ ○
109
14:27:30
○ ░
110
14:27:30
░ gitleaks
111
14:27:30
112
14:27:30
2:27PM INF 7 commits scanned.
113
14:27:30
2:27PM INF scanned ~1306 bytes (1.31 KB) in 37.8ms
114
14:27:30
2:27PM INF no leaks found
115
14:27:30
++ echo '$ set +x'
116
14:27:30
$ set +x
117
14:27:30
++ set +x
118
14:27:30
119
14:27:30
Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-host=ip-10-0-38-72.eu-central-1.compute.internal&var-namespace=gitlab-runner&var-pod=runner-wrxjpbsjx-project-621-concurrent-3-bpt0jyjf&var-resolution=15&from=1765290450000&to=1765290450000
120
14:27:30
Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-node=ip-10-0-38-72.eu-central-1.compute.internal&var-resolution=15s&from=1765290450000&to=1765290450000
121
14:27:30
122
14:27:30
123
14:27:30
section_end:1765290450:step_script
124
14:27:30
+section_start:1765290450:upload_artifacts_on_success
125
14:27:30
+Uploading artifacts for successful job
126
14:27:31
Uploading artifacts...
127
14:27:31
gl-secret-detection-report.json: found 1 matching artifact files and directories
128
14:27:31
Uploading artifacts as "secret_detection" to coordinator... 201 Created correlation_id=01KC1R5804K48W1WWS4K7203N3 id=46308194 responseStatus=201 Created token=64_jNdxam
129
14:27:31
130
14:27:31
section_end:1765290451:upload_artifacts_on_success
131
14:27:31
+section_start:1765290451:cleanup_file_variables
132
14:27:31
+Cleaning up project directory and file based variables
133
14:27:31
134
14:27:31
section_end:1765290451:cleanup_file_variables
135
14:27:31
+
136
14:27:31
Job succeeded
137