secret-detection ○ success
⏱
Duration: 11s
⏳
Queued: 5s
📁
Stage: test
🖥
Runner: linux-1
Average Duration
23s
This job: 11s
Failure Rate
1.4%
last 30 days
External Links
▶
Job Execution Phases
💡 Tip: Click on any phase bar to jump to that section in the log below
▶
Job Analysis
Job Status: Passed
Status: Job passed successfully
▶
Full Job Log
162 lines
Match - of 0
1
23:36:15
Running with gitlab-runner 18.9.0 (07e534ba)
2
23:36:15
on gitlab-runner-linux-1-5b9cfd64ff-k5sg5 aP4tCsXyp, system ID: r_wQDtEh3nNZsL
3
23:36:15
feature flags: FF_USE_FASTZIP:true, FF_USE_NEW_BASH_EVAL_STRATEGY:true, FF_USE_DYNAMIC_TRACE_FORCE_SEND_INTERVAL:true, FF_SCRIPT_SECTIONS:true, FF_ENABLE_JOB_CLEANUP:true, FF_USE_ADVANCED_POD_SPEC_CONFIGURATION:true, FF_PRINT_POD_EVENTS:true, FF_USE_DUMB_INIT_WITH_KUBERNETES_EXECUTOR:true, FF_LOG_IMAGES_CONFIGURED_FOR_JOB:true, FF_CLEAN_UP_FAILED_CACHE_EXTRACT:true, FF_GIT_URLS_WITHOUT_TOKENS:true, FF_WAIT_FOR_POD_TO_BE_REACHABLE:true, FF_USE_FLEETING_ACQUIRE_HEARTBEATS:true, FF_USE_JOB_ROUTER:true
4
23:36:15
Resolving secrets
5
23:36:15
section_start:1777678575:prepare_executor
6
23:36:15
+Preparing the "kubernetes" executor
7
23:36:15
Using Kubernetes namespace: gitlab-runner
8
23:36:15
Using Kubernetes executor with image registry.scandit.com/dockerfiles/gitleaks:v8.29.0 ...
9
23:36:15
Using attach strategy to execute scripts...
10
23:36:15
Using effective pull policy of [Always] for container helper
11
23:36:15
Using effective pull policy of [Always] for container init-permissions
12
23:36:15
Using effective pull policy of [Always] for container build
13
23:36:15
section_end:1777678575:prepare_executor
14
23:36:15
+section_start:1777678575:prepare_script
15
23:36:15
+Preparing environment
16
23:36:15
Using FF_USE_POD_ACTIVE_DEADLINE_SECONDS, the Pod activeDeadlineSeconds will be set to the job timeout: 1h0m0s...
17
23:36:15
WARNING: Advanced Pod Spec configuration enabled, merging the provided PodSpec to the generated one. This is a beta feature and is subject to change. Feedback is collected in this issue: https://gitlab.com/gitlab-org/gitlab-runner/-/issues/29659 ...
18
23:36:15
Subscribing to Kubernetes Pod events...
19
23:36:15
Type Reason Message
20
23:36:15
Normal Scheduled Successfully assigned gitlab-runner/runner-ap4tcsxyp-project-621-concurrent-12-mfv4uo3g to ci4
21
23:36:16
Normal Pulled Container image "registry.gitlab.com/gitlab-org/gitlab-runner/gitlab-runner-helper:x86_64-v18.9.0" already present on machine
22
23:36:16
Normal Created Created container: init-permissions
23
23:36:16
Normal Started Started container init-permissions
24
23:36:18
Normal Pulled Container image "registry.gitlab.com/gitlab-org/gitlab-runner/gitlab-runner-helper:x86_64-v18.9.0" already present on machine
25
23:36:18
Normal Created Created container: helper
26
23:36:18
Normal Started Started container helper
27
23:36:18
Normal Pulling Pulling image "registry.scandit.com/dockerfiles/gitleaks:v8.29.0"
28
23:36:18
Normal Pulled Successfully pulled image "registry.scandit.com/dockerfiles/gitleaks:v8.29.0" in 255ms (255ms including waiting). Image size: 24433236 bytes.
29
23:36:18
Normal Created Created container: build
30
23:36:19
Normal Started Started container build
31
23:36:22
Running on runner-ap4tcsxyp-project-621-concurrent-12-mfv4uo3g via gitlab-runner-linux-1-5b9cfd64ff-k5sg5...
32
23:36:22
33
23:36:22
section_end:1777678582:prepare_script
34
23:36:22
+section_start:1777678582:get_sources
35
23:36:22
+Getting source from Git repository
36
23:36:23
Gitaly correlation ID: 01KQJYCSHWC361MAQ50T2AE7RM
37
23:36:23
Fetching changes...
38
23:36:23
Initialized empty Git repository in /build/internal/gitlab-templates/.git/
39
23:36:23
Created fresh repository.
40
23:36:24
Checking out 50468f6f as detached HEAD (ref is refs/merge-requests/636/merge)...
41
23:36:24
42
23:36:24
Skipping Git submodules setup
43
23:36:24
44
23:36:24
section_end:1777678584:get_sources
45
23:36:24
+section_start:1777678584:step_script
46
23:36:24
+Executing "step_script" stage of the job script
47
23:36:24
section_start:1777678584:section_pre_build_script_0[hide_duration=true,collapsed=true]
$ function cleanup {
48
23:36:24
rv=$?
49
23:36:24
if [ $rv -ne 0 ]; then
50
23:36:24
echo ""
51
23:36:24
echo " Failure Cause Analysis might help, please open this link:"
52
23:36:24
echo " https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
53
23:36:24
echo ""
54
23:36:24
fi
55
23:36:24
echo ""
56
23:36:24
echo "Scout Analysis: https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
57
23:36:24
echo ""
58
23:36:24
echo ""
59
23:36:24
echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=${EPOCHSECONDS}000"
60
23:36:24
echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=${EPOCHSECONDS}000"
61
23:36:24
echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group%7C=%7Cgitlab-runner&var-filters=source%7C%3D%7C${LOKI_LOGSOURCE}&var-filters=namespace%7C%3D%7C${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID%7C%3D%7C${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID%7C%3D%7C${CI_PIPELINE_ID}&var-filters=CI_JOB_ID%7C%3D%7C${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=${EPOCHSECONDS}000"
62
23:36:24
__date_from=$(date -d "@$(( EPOCHSECONDS - 604800 ))" +%Y-%m-%d)
63
23:36:24
__date_to=$(date -d "@$(( EPOCHSECONDS + 604800 ))" +%Y-%m-%d)
64
23:36:24
echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=${__date_from}~${__date_to}&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
65
23:36:24
echo ""
66
23:36:24
exit $rv
67
23:36:24
}
68
23:36:24
trap cleanup EXIT
69
23:36:24
echo "INFO: This is the CI job pre_build_script"
70
23:36:24
echo "INFO: It's defined in the backend/infra/onprem/k8s repo."
71
23:36:24
echo "INFO: These additional Scandit variables are available to you:"
72
23:36:24
echo " SC_K8S_NODE_NAME: $SC_K8S_NODE_NAME"
73
23:36:24
echo " SC_K8S_IMAGE_ID: $SC_K8S_IMAGE_ID"
74
23:36:24
echo " SC_K8S_KYVERNO_PATCHES: |"
75
23:36:24
echo "$SC_K8S_KYVERNO_PATCHES" | sed 's/^/ /'
76
23:36:24
echo "cpu (r/l): ${SC_K8S_REQUESTS_CPU}/${SC_K8S_LIMITS_CPU}"
77
23:36:24
if command -v numfmt >/dev/null 2>&1; then
78
23:36:24
echo "memory (r/l): $(numfmt --to=iec --suffix=B $SC_K8S_REQUESTS_MEMORY)/$(numfmt --to=iec --suffix=B $SC_K8S_LIMITS_MEMORY)"
79
23:36:24
else
80
23:36:24
echo "memory (r/l): ${SC_K8S_REQUESTS_MEMORY}/${SC_K8S_LIMITS_MEMORY}"
81
23:36:24
fi
82
23:36:24
__start_time=${EPOCHSECONDS}
83
23:36:24
echo ""
84
23:36:24
echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=now"
85
23:36:24
echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=now"
86
23:36:24
echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group%7C%3D%7Cgitlab-runner&var-filters=source%7C%3D%7C${LOKI_LOGSOURCE}&var-filters=namespace%7C%3D%7C${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID%7C%3D%7C${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID%7C%3D%7C${CI_PIPELINE_ID}&var-filters=CI_JOB_ID%7C%3D%7C${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=now"
87
23:36:24
__date_from=$(date -d "@$(( EPOCHSECONDS - 604800 ))" +%Y-%m-%d)
88
23:36:24
__date_to=$(date -d "@$(( EPOCHSECONDS + 604800 ))" +%Y-%m-%d)
89
23:36:24
echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=${__date_from}~${__date_to}&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
90
23:36:24
echo ""
91
23:36:24
echo "Setting up credentials for Gitlab Python registries"
92
23:36:24
mkdir -p ~
93
23:36:24
echo "machine gitlab.scandit.com" > ~/.netrc
94
23:36:24
echo "login gitlab-ci-token" >> ~/.netrc
95
23:36:24
echo "password ${CI_JOB_TOKEN}" >> ~/.netrc
96
23:36:24
chmod 600 ~/.netrc
97
23:36:24
if command -v git &> /dev/null && [ "$(id -u)" -ne 0 ]; then
98
23:36:24
git config --global --add safe.directory $CI_PROJECT_DIR
99
23:36:24
fi
100
23:36:24
sleep infinity &
101
23:36:24
echo $! > ~/.bg_pid
102
23:36:24
section_end:1777678584:section_pre_build_script_0
103
23:36:24
INFO: This is the CI job pre_build_script
104
23:36:24
INFO: It's defined in the backend/infra/onprem/k8s repo.
105
23:36:24
INFO: These additional Scandit variables are available to you:
106
23:36:24
SC_K8S_NODE_NAME: ci4
107
23:36:24
SC_K8S_IMAGE_ID:
108
23:36:24
SC_K8S_KYVERNO_PATCHES: |
109
23:36:24
110
23:36:24
cpu (r/l): 1/8
111
23:36:24
memory (r/l): 1073741824/17179869184
112
23:36:24
113
23:36:24
Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=KpIiby5Vz&var-host=ci4&var-namespace=gitlab-runner&var-pod=runner-ap4tcsxyp-project-621-concurrent-12-mfv4uo3g&var-resolution=15&from=1777678584000&to=now
114
23:36:24
Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=KpIiby5Vz&var-node=ci4&var-resolution=15s&from=1777678584000&to=now
115
23:36:24
Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group%7C%3D%7Cgitlab-runner&var-filters=source%7C%3D%7Czrh.int.scandit.io&var-filters=namespace%7C%3D%7Cgitlab-runner&var-filters=CI_PROJECT_ID%7C%3D%7C621&var-filters=CI_PIPELINE_ID%7C%3D%7C1575288&var-filters=CI_JOB_ID%7C%3D%7C54243457&sortOrder=Ascending&from=1777678584000&to=now
116
23:36:24
Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=2026-04-24~2026-05-08&job_name=secret-detection&project=internal/gitlab-templates
117
23:36:24
118
23:36:24
Setting up credentials for Gitlab Python registries
119
23:36:24
$ set -x
120
23:36:24
++ echo '$ gitleaks git ./ --platform gitlab ${SECRET_DETECTION_LOG_OPTIONS} --report-format json --report-path ${SECRET_DETECTION_OUTPUT_FILE} --log-level ${SECRET_DETECTION_LOG_LEVEL} --verbose --redact ${SECRET_DETECTION_EXTRA_FLAGS}'
121
23:36:24
$ gitleaks git ./ --platform gitlab ${SECRET_DETECTION_LOG_OPTIONS} --report-format json --report-path ${SECRET_DETECTION_OUTPUT_FILE} --log-level ${SECRET_DETECTION_LOG_LEVEL} --verbose --redact ${SECRET_DETECTION_EXTRA_FLAGS}
122
23:36:24
++ gitleaks git ./ --platform gitlab --log-opts 3284003440e09877917148c203626f055079d1b3..50468f6f2468dfc2204ca6e162113f80d494530f --report-format json --report-path gl-secret-detection-report.json --log-level info --verbose --redact
123
23:36:24
124
23:36:24
○
125
23:36:24
│╲
126
23:36:24
│ ○
127
23:36:24
○ ░
128
23:36:24
░ gitleaks
129
23:36:24
130
23:36:24
11:36PM INF 1 commits scanned.
131
23:36:24
11:36PM INF scanned ~40 bytes (40 bytes) in 49ms
132
23:36:24
11:36PM INF no leaks found
133
23:36:24
++ echo '$ set +x'
134
23:36:24
$ set +x
135
23:36:24
++ set +x
136
23:36:24
137
23:36:24
Scout Analysis: https://scout.scandit.io/analysis/projects/621/jobs/54243457
138
23:36:24
139
23:36:24
140
23:36:24
Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=KpIiby5Vz&var-host=ci4&var-namespace=gitlab-runner&var-pod=runner-ap4tcsxyp-project-621-concurrent-12-mfv4uo3g&var-resolution=15&from=1777678584000&to=1777678584000
141
23:36:24
Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=KpIiby5Vz&var-node=ci4&var-resolution=15s&from=1777678584000&to=1777678584000
142
23:36:24
Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group%7C=%7Cgitlab-runner&var-filters=source%7C%3D%7Czrh.int.scandit.io&var-filters=namespace%7C%3D%7Cgitlab-runner&var-filters=CI_PROJECT_ID%7C%3D%7C621&var-filters=CI_PIPELINE_ID%7C%3D%7C1575288&var-filters=CI_JOB_ID%7C%3D%7C54243457&sortOrder=Ascending&from=1777678584000&to=1777678584000
143
23:36:24
Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=2026-04-24~2026-05-08&job_name=secret-detection&project=internal/gitlab-templates
144
23:36:24
145
23:36:24
146
23:36:24
section_end:1777678584:step_script
147
23:36:24
+section_start:1777678584:upload_artifacts_on_success
148
23:36:24
+Uploading artifacts for successful job
149
23:36:25
Uploading artifacts...
150
23:36:25
gl-secret-detection-report.json: found 1 matching artifact files and directories
151
23:36:25
Uploading artifacts as "secret_detection" to coordinator... 201 Created correlation_id=01KQJYD3CY4SSDA8PH4S7B16M6 id=54243457 responseStatus=201 Created token=64_3bTSMK
152
23:36:25
153
23:36:25
section_end:1777678585:upload_artifacts_on_success
154
23:36:25
+section_start:1777678585:cleanup_file_variables
155
23:36:25
+Cleaning up project directory and file based variables
156
23:36:26
Removing gl-secret-detection-report.json
157
23:36:26
HEAD is now at 50468f6 Merge branch 'renovate/martizih-kaniko-1.x' into 'master'
158
23:36:26
159
23:36:26
section_end:1777678586:cleanup_file_variables
160
23:36:26
+
161
23:36:26
Job succeeded
162