secret-detection ○ success
⏱
Duration: 23s
⏳
Queued: 1s
📁
Stage: test
🖥
Runner: linux-aws-1
Average Duration
23s
This job: 23s
Failure Rate
1.4%
last 30 days
External Links
▶
Job Execution Phases
💡 Tip: Click on any phase bar to jump to that section in the log below
▶
Job Analysis
Job Status: Passed
Status: Job passed successfully
▶
Full Job Log
159 lines
Match - of 0
1
09:35:15
Running with gitlab-runner 18.9.0 (07e534ba)
2
09:35:15
on gitlab-runner-linux-1-5fd7c4d488-2p5ws wRxjPbsJX, system ID: r_ApPziMY2hZUA
3
09:35:15
feature flags: FF_USE_FASTZIP:true, FF_USE_NEW_BASH_EVAL_STRATEGY:true, FF_USE_DYNAMIC_TRACE_FORCE_SEND_INTERVAL:true, FF_SCRIPT_SECTIONS:true, FF_USE_ADVANCED_POD_SPEC_CONFIGURATION:true, FF_PRINT_POD_EVENTS:true, FF_USE_DUMB_INIT_WITH_KUBERNETES_EXECUTOR:true, FF_LOG_IMAGES_CONFIGURED_FOR_JOB:true, FF_CLEAN_UP_FAILED_CACHE_EXTRACT:true, FF_GIT_URLS_WITHOUT_TOKENS:true, FF_WAIT_FOR_POD_TO_BE_REACHABLE:true, FF_USE_FLEETING_ACQUIRE_HEARTBEATS:true, FF_USE_JOB_ROUTER:true
4
09:35:15
Resolving secrets
5
09:35:15
section_start:1777973715:prepare_executor
6
09:35:15
+Preparing the "kubernetes" executor
7
09:35:15
Using Kubernetes namespace: gitlab-runner
8
09:35:15
Using Kubernetes executor with image registry.scandit.com/dockerfiles/gitleaks:v8.29.0 ...
9
09:35:15
Using attach strategy to execute scripts...
10
09:35:15
Using effective pull policy of [Always] for container init-permissions
11
09:35:15
Using effective pull policy of [Always] for container build
12
09:35:15
Using effective pull policy of [Always] for container helper
13
09:35:15
section_end:1777973715:prepare_executor
14
09:35:15
+section_start:1777973715:prepare_script
15
09:35:15
+Preparing environment
16
09:35:15
Using FF_USE_POD_ACTIVE_DEADLINE_SECONDS, the Pod activeDeadlineSeconds will be set to the job timeout: 1h0m0s...
17
09:35:15
WARNING: Advanced Pod Spec configuration enabled, merging the provided PodSpec to the generated one. This is a beta feature and is subject to change. Feedback is collected in this issue: https://gitlab.com/gitlab-org/gitlab-runner/-/issues/29659 ...
18
09:35:16
Subscribing to Kubernetes Pod events...
19
09:35:17
Type Reason Message
20
09:35:17
Normal Scheduled Successfully assigned gitlab-runner/runner-wrxjpbsjx-project-621-concurrent-2-mvudrzfs to ip-10-0-32-194.eu-central-1.compute.internal
21
09:35:17
Normal Pulled Container image "gitlab/gitlab-runner-helper:x86_64-v18.8.0" already present on machine
22
09:35:17
Normal Created Created container: init-permissions
23
09:35:17
Normal Started Started container init-permissions
24
09:35:31
Normal Pulled Container image "498954711405.dkr.ecr.eu-central-1.amazonaws.com/dockerfiles/gitleaks@sha256:ff83fa5c807770ceb2174672e2bc2fc0ddf3a50f3089ca4106925d9013743b09" already present on machine
25
09:35:31
Normal Created Created container: build
26
09:35:31
Normal Started Started container build
27
09:35:31
Normal Pulled Container image "gitlab/gitlab-runner-helper:x86_64-v18.8.0" already present on machine
28
09:35:31
Normal Created Created container: helper
29
09:35:31
Normal Started Started container helper
30
09:35:35
Running on runner-wrxjpbsjx-project-621-concurrent-2-mvudrzfs via gitlab-runner-linux-1-5fd7c4d488-2p5ws...
31
09:35:35
32
09:35:35
section_end:1777973735:prepare_script
33
09:35:35
+section_start:1777973735:get_sources
34
09:35:35
+Getting source from Git repository
35
09:35:35
Gitaly correlation ID: 01KQVQVQVEVZY5QBGW7GPZ2HZF
36
09:35:35
Fetching changes...
37
09:35:35
Initialized empty Git repository in /build/internal/gitlab-templates/.git/
38
09:35:35
Created fresh repository.
39
09:35:36
Checking out eea928ac as detached HEAD (ref is refs/merge-requests/637/merge)...
40
09:35:36
41
09:35:36
Skipping Git submodules setup
42
09:35:36
43
09:35:36
section_end:1777973736:get_sources
44
09:35:36
+section_start:1777973736:step_script
45
09:35:36
+Executing "step_script" stage of the job script
46
09:35:37
section_start:1777973737:section_pre_build_script_0[hide_duration=true,collapsed=true]
$ function cleanup {
47
09:35:37
rv=$?
48
09:35:37
if [ $rv -ne 0 ]; then
49
09:35:37
echo ""
50
09:35:37
echo " Failure Cause Analysis might help, please open this link:"
51
09:35:37
echo " https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
52
09:35:37
echo ""
53
09:35:37
fi
54
09:35:37
echo ""
55
09:35:37
echo "Scout Analysis: https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
56
09:35:37
echo ""
57
09:35:37
echo ""
58
09:35:37
echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=${EPOCHSECONDS}000"
59
09:35:37
echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=${EPOCHSECONDS}000"
60
09:35:37
echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group|=|gitlab-runner&var-filters=source|=|${LOKI_LOGSOURCE}&var-filters=namespace|=|${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID|=|${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID|=|${CI_PIPELINE_ID}&var-filters=CI_JOB_ID|=|${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=${EPOCHSECONDS}000"
61
09:35:37
echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=$(date -d '-7 days' +%Y-%m-%d)~$(date -d '+7 days' +%Y-%m-%d)&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
62
09:35:37
echo ""
63
09:35:37
exit $rv
64
09:35:37
}
65
09:35:37
trap cleanup EXIT
66
09:35:37
echo "INFO: This is the CI job pre_build_script"
67
09:35:37
echo "INFO: It's defined in the backend/infra/aws repo."
68
09:35:37
echo "INFO: These additional Scandit variables are available to you:"
69
09:35:37
echo " SC_K8S_NODE_NAME: $SC_K8S_NODE_NAME"
70
09:35:37
echo " SC_K8S_IMAGE_ID: $SC_K8S_IMAGE_ID"
71
09:35:37
echo " SC_K8S_KYVERNO_PATCHES: |"
72
09:35:37
echo "$SC_K8S_KYVERNO_PATCHES" | sed 's/^/ /'
73
09:35:37
echo "cpu (r/l): ${SC_K8S_REQUESTS_CPU}/${SC_K8S_LIMITS_CPU}"
74
09:35:37
if command -v numfmt >/dev/null 2>&1; then
75
09:35:37
echo "memory (r/l): $(numfmt --to=iec --suffix=B $SC_K8S_REQUESTS_MEMORY)/$(numfmt --to=iec --suffix=B $SC_K8S_LIMITS_MEMORY)"
76
09:35:37
else
77
09:35:37
echo "memory (r/l): ${SC_K8S_REQUESTS_MEMORY}/${SC_K8S_LIMITS_MEMORY}"
78
09:35:37
fi
79
09:35:37
__start_time=${EPOCHSECONDS}
80
09:35:37
echo ""
81
09:35:37
echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=now"
82
09:35:37
echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=now"
83
09:35:37
echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group|=|gitlab-runner&var-filters=source|=|${LOKI_LOGSOURCE}&var-filters=namespace|=|${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID|=|${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID|=|${CI_PIPELINE_ID}&var-filters=CI_JOB_ID|=|${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=now"
84
09:35:37
echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=$(date -d '-7 days' +%Y-%m-%d)~$(date -d '+7 days' +%Y-%m-%d)&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
85
09:35:37
echo ""
86
09:35:37
echo "Setting up credentials for Gitlab Python registries"
87
09:35:37
mkdir -p ~
88
09:35:37
echo "machine gitlab.scandit.com" > ~/.netrc
89
09:35:37
echo "login gitlab-ci-token" >> ~/.netrc
90
09:35:37
echo "password ${CI_JOB_TOKEN}" >> ~/.netrc
91
09:35:37
chmod 600 ~/.netrc
92
09:35:37
if command -v git &> /dev/null && [ "$(id -u)" -ne 0 ]; then
93
09:35:37
git config --global --add safe.directory $CI_PROJECT_DIR
94
09:35:37
fi
95
09:35:37
# Sonarqube server is running on the same cluster. Use internal address
96
09:35:37
export SONAR_HOST_URL="http://sonarqube.sonarqube.svc.cluster.local:9000"
97
09:35:37
section_end:1777973737:section_pre_build_script_0
98
09:35:37
INFO: This is the CI job pre_build_script
99
09:35:37
INFO: It's defined in the backend/infra/aws repo.
100
09:35:37
INFO: These additional Scandit variables are available to you:
101
09:35:37
SC_K8S_NODE_NAME: ip-10-0-32-194.eu-central-1.compute.internal
102
09:35:37
SC_K8S_IMAGE_ID:
103
09:35:37
SC_K8S_KYVERNO_PATCHES: |
104
09:35:37
105
09:35:37
cpu (r/l): 1/4
106
09:35:37
memory (r/l): 1073741824/17179869184
107
09:35:37
108
09:35:37
Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-host=ip-10-0-32-194.eu-central-1.compute.internal&var-namespace=gitlab-runner&var-pod=runner-wrxjpbsjx-project-621-concurrent-2-mvudrzfs&var-resolution=15&from=1777973737000&to=now
109
09:35:37
Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-node=ip-10-0-32-194.eu-central-1.compute.internal&var-resolution=15s&from=1777973737000&to=now
110
09:35:37
Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group|=|gitlab-runner&var-filters=source|=|k8s-ci.aws.scandit.io&var-filters=namespace|=|gitlab-runner&var-filters=CI_PROJECT_ID|=|621&var-filters=CI_PIPELINE_ID|=|1578751&var-filters=CI_JOB_ID|=|54380616&sortOrder=Ascending&from=1777973737000&to=now
111
09:35:37
date: invalid date '-7 days'
112
09:35:37
date: invalid date '+7 days'
113
09:35:37
Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=~&job_name=secret-detection&project=internal/gitlab-templates
114
09:35:37
115
09:35:37
Setting up credentials for Gitlab Python registries
116
09:35:37
$ set -x
117
09:35:37
++ echo '$ gitleaks git ./ --platform gitlab ${SECRET_DETECTION_LOG_OPTIONS} --report-format json --report-path ${SECRET_DETECTION_OUTPUT_FILE} --log-level ${SECRET_DETECTION_LOG_LEVEL} --verbose --redact ${SECRET_DETECTION_EXTRA_FLAGS}'
118
09:35:37
$ gitleaks git ./ --platform gitlab ${SECRET_DETECTION_LOG_OPTIONS} --report-format json --report-path ${SECRET_DETECTION_OUTPUT_FILE} --log-level ${SECRET_DETECTION_LOG_LEVEL} --verbose --redact ${SECRET_DETECTION_EXTRA_FLAGS}
119
09:35:37
++ gitleaks git ./ --platform gitlab --log-opts 3284003440e09877917148c203626f055079d1b3..eea928ac2e0f8fd4e0d4af1460ab757f5bb85ab5 --report-format json --report-path gl-secret-detection-report.json --log-level info --verbose --redact
120
09:35:37
121
09:35:37
○
122
09:35:37
│╲
123
09:35:37
│ ○
124
09:35:37
○ ░
125
09:35:37
░ gitleaks
126
09:35:37
127
09:35:37
9:35AM INF 8 commits scanned.
128
09:35:37
9:35AM INF scanned ~4380 bytes (4.38 KB) in 38.6ms
129
09:35:37
9:35AM INF no leaks found
130
09:35:37
++ echo '$ set +x'
131
09:35:37
$ set +x
132
09:35:37
++ set +x
133
09:35:37
134
09:35:37
Scout Analysis: https://scout.scandit.io/analysis/projects/621/jobs/54380616
135
09:35:37
136
09:35:37
137
09:35:37
Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-host=ip-10-0-32-194.eu-central-1.compute.internal&var-namespace=gitlab-runner&var-pod=runner-wrxjpbsjx-project-621-concurrent-2-mvudrzfs&var-resolution=15&from=1777973737000&to=1777973737000
138
09:35:37
Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-node=ip-10-0-32-194.eu-central-1.compute.internal&var-resolution=15s&from=1777973737000&to=1777973737000
139
09:35:37
Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group|=|gitlab-runner&var-filters=source|=|k8s-ci.aws.scandit.io&var-filters=namespace|=|gitlab-runner&var-filters=CI_PROJECT_ID|=|621&var-filters=CI_PIPELINE_ID|=|1578751&var-filters=CI_JOB_ID|=|54380616&sortOrder=Ascending&from=1777973737000&to=1777973737000
140
09:35:37
date: invalid date '-7 days'
141
09:35:37
date: invalid date '+7 days'
142
09:35:37
Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=~&job_name=secret-detection&project=internal/gitlab-templates
143
09:35:37
144
09:35:37
145
09:35:37
section_end:1777973737:step_script
146
09:35:37
+section_start:1777973737:upload_artifacts_on_success
147
09:35:37
+Uploading artifacts for successful job
148
09:35:37
Uploading artifacts...
149
09:35:37
gl-secret-detection-report.json: found 1 matching artifact files and directories
150
09:35:37
Uploading artifacts as "secret_detection" to coordinator... 201 Created correlation_id=01KQVQWE4Y0JC6T2P2GRK9Q51X id=54380616 responseStatus=201 Created token=64_FoQ4n2
151
09:35:37
152
09:35:37
section_end:1777973737:upload_artifacts_on_success
153
09:35:37
+section_start:1777973737:cleanup_file_variables
154
09:35:37
+Cleaning up project directory and file based variables
155
09:35:38
156
09:35:38
section_end:1777973738:cleanup_file_variables
157
09:35:38
+
158
09:35:38
Job succeeded
159