secret-detection ○ success
⏱
Duration: 23s
⏳
Queued: 4s
📁
Stage: test
🖥
Runner: linux-aws-1
Average Duration
23s
This job: 23s
Failure Rate
1.4%
last 30 days
External Links
▶
Job Execution Phases
💡 Tip: Click on any phase bar to jump to that section in the log below
▶
Job Analysis
Job Status: Passed
Status: Job passed successfully
▶
Full Job Log
161 lines
Match - of 0
1
22:37:31
Running with gitlab-runner 18.9.0 (07e534ba)
2
22:37:31
on gitlab-runner-linux-1-746bdd58fd-4cqkw wRxjPbsJX, system ID: r_f0gJVPIyznax
3
22:37:31
feature flags: FF_USE_FASTZIP:true, FF_USE_NEW_BASH_EVAL_STRATEGY:true, FF_USE_DYNAMIC_TRACE_FORCE_SEND_INTERVAL:true, FF_SCRIPT_SECTIONS:true, FF_USE_ADVANCED_POD_SPEC_CONFIGURATION:true, FF_PRINT_POD_EVENTS:true, FF_USE_DUMB_INIT_WITH_KUBERNETES_EXECUTOR:true, FF_LOG_IMAGES_CONFIGURED_FOR_JOB:true, FF_CLEAN_UP_FAILED_CACHE_EXTRACT:true, FF_GIT_URLS_WITHOUT_TOKENS:true, FF_WAIT_FOR_POD_TO_BE_REACHABLE:true, FF_USE_FLEETING_ACQUIRE_HEARTBEATS:true, FF_USE_JOB_ROUTER:true
4
22:37:31
Resolving secrets
5
22:37:31
section_start:1778020651:prepare_executor
6
22:37:31
+Preparing the "kubernetes" executor
7
22:37:31
Using Kubernetes namespace: gitlab-runner
8
22:37:31
Using Kubernetes executor with image registry.scandit.com/dockerfiles/gitleaks:v8.29.0 ...
9
22:37:31
Using attach strategy to execute scripts...
10
22:37:31
Using effective pull policy of [Always] for container build
11
22:37:31
Using effective pull policy of [Always] for container helper
12
22:37:31
Using effective pull policy of [Always] for container init-permissions
13
22:37:31
section_end:1778020651:prepare_executor
14
22:37:31
+section_start:1778020651:prepare_script
15
22:37:31
+Preparing environment
16
22:37:31
Using FF_USE_POD_ACTIVE_DEADLINE_SECONDS, the Pod activeDeadlineSeconds will be set to the job timeout: 1h0m0s...
17
22:37:31
WARNING: Advanced Pod Spec configuration enabled, merging the provided PodSpec to the generated one. This is a beta feature and is subject to change. Feedback is collected in this issue: https://gitlab.com/gitlab-org/gitlab-runner/-/issues/29659 ...
18
22:37:32
Subscribing to Kubernetes Pod events...
19
22:37:32
Type Reason Message
20
22:37:32
Normal Scheduled Successfully assigned gitlab-runner/runner-wrxjpbsjx-project-621-concurrent-4-1r28pq61 to ip-10-0-36-227.eu-central-1.compute.internal
21
22:37:34
Normal TaintManagerEviction Cancelling deletion of Pod gitlab-runner/runner-wrxjpbsjx-project-621-concurrent-4-1r28pq61
22
22:37:37
Normal Pulled Container image "gitlab/gitlab-runner-helper:x86_64-v18.8.0" already present on machine
23
22:37:40
Normal Created Created container: init-permissions
24
22:37:41
Normal Started Started container init-permissions
25
22:37:41
Normal Pulling Pulling image "498954711405.dkr.ecr.eu-central-1.amazonaws.com/dockerfiles/gitleaks@sha256:ff83fa5c807770ceb2174672e2bc2fc0ddf3a50f3089ca4106925d9013743b09"
26
22:37:48
Normal Pulled Successfully pulled image "498954711405.dkr.ecr.eu-central-1.amazonaws.com/dockerfiles/gitleaks@sha256:ff83fa5c807770ceb2174672e2bc2fc0ddf3a50f3089ca4106925d9013743b09" in 6.756s (6.756s including waiting). Image size: 24433236 bytes.
27
22:37:48
Normal Created Created container: build
28
22:37:48
Normal Started Started container build
29
22:37:48
Normal Pulled Container image "gitlab/gitlab-runner-helper:x86_64-v18.8.0" already present on machine
30
22:37:48
Normal Created Created container: helper
31
22:37:48
Normal Started Started container helper
32
22:37:51
Running on runner-wrxjpbsjx-project-621-concurrent-4-1r28pq61 via gitlab-runner-linux-1-746bdd58fd-4cqkw...
33
22:37:51
34
22:37:51
section_end:1778020671:prepare_script
35
22:37:51
+section_start:1778020671:get_sources
36
22:37:51
+Getting source from Git repository
37
22:37:52
Gitaly correlation ID: 01KQX4M4EKB9QTK40GWJ2WQVQX
38
22:37:52
Fetching changes...
39
22:37:52
Initialized empty Git repository in /build/internal/gitlab-templates/.git/
40
22:37:52
Created fresh repository.
41
22:37:52
Checking out 13881c4b as detached HEAD (ref is refs/merge-requests/638/merge)...
42
22:37:52
43
22:37:52
Skipping Git submodules setup
44
22:37:52
45
22:37:52
section_end:1778020672:get_sources
46
22:37:52
+section_start:1778020672:step_script
47
22:37:52
+Executing "step_script" stage of the job script
48
22:37:53
section_start:1778020672:section_pre_build_script_0[hide_duration=true,collapsed=true]
$ function cleanup {
49
22:37:53
rv=$?
50
22:37:53
if [ $rv -ne 0 ]; then
51
22:37:53
echo ""
52
22:37:53
echo " Failure Cause Analysis might help, please open this link:"
53
22:37:53
echo " https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
54
22:37:53
echo ""
55
22:37:53
fi
56
22:37:53
echo ""
57
22:37:53
echo "Scout Analysis: https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
58
22:37:53
echo ""
59
22:37:53
echo ""
60
22:37:53
echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=${EPOCHSECONDS}000"
61
22:37:53
echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=${EPOCHSECONDS}000"
62
22:37:53
echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group|=|gitlab-runner&var-filters=source|=|${LOKI_LOGSOURCE}&var-filters=namespace|=|${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID|=|${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID|=|${CI_PIPELINE_ID}&var-filters=CI_JOB_ID|=|${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=${EPOCHSECONDS}000"
63
22:37:53
echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=$(date -d '-7 days' +%Y-%m-%d)~$(date -d '+7 days' +%Y-%m-%d)&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
64
22:37:53
echo ""
65
22:37:53
exit $rv
66
22:37:53
}
67
22:37:53
trap cleanup EXIT
68
22:37:53
echo "INFO: This is the CI job pre_build_script"
69
22:37:53
echo "INFO: It's defined in the backend/infra/aws repo."
70
22:37:53
echo "INFO: These additional Scandit variables are available to you:"
71
22:37:53
echo " SC_K8S_NODE_NAME: $SC_K8S_NODE_NAME"
72
22:37:53
echo " SC_K8S_IMAGE_ID: $SC_K8S_IMAGE_ID"
73
22:37:53
echo " SC_K8S_KYVERNO_PATCHES: |"
74
22:37:53
echo "$SC_K8S_KYVERNO_PATCHES" | sed 's/^/ /'
75
22:37:53
echo "cpu (r/l): ${SC_K8S_REQUESTS_CPU}/${SC_K8S_LIMITS_CPU}"
76
22:37:53
if command -v numfmt >/dev/null 2>&1; then
77
22:37:53
echo "memory (r/l): $(numfmt --to=iec --suffix=B $SC_K8S_REQUESTS_MEMORY)/$(numfmt --to=iec --suffix=B $SC_K8S_LIMITS_MEMORY)"
78
22:37:53
else
79
22:37:53
echo "memory (r/l): ${SC_K8S_REQUESTS_MEMORY}/${SC_K8S_LIMITS_MEMORY}"
80
22:37:53
fi
81
22:37:53
__start_time=${EPOCHSECONDS}
82
22:37:53
echo ""
83
22:37:53
echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=now"
84
22:37:53
echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=now"
85
22:37:53
echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group|=|gitlab-runner&var-filters=source|=|${LOKI_LOGSOURCE}&var-filters=namespace|=|${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID|=|${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID|=|${CI_PIPELINE_ID}&var-filters=CI_JOB_ID|=|${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=now"
86
22:37:53
echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=$(date -d '-7 days' +%Y-%m-%d)~$(date -d '+7 days' +%Y-%m-%d)&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
87
22:37:53
echo ""
88
22:37:53
echo "Setting up credentials for Gitlab Python registries"
89
22:37:53
mkdir -p ~
90
22:37:53
echo "machine gitlab.scandit.com" > ~/.netrc
91
22:37:53
echo "login gitlab-ci-token" >> ~/.netrc
92
22:37:53
echo "password ${CI_JOB_TOKEN}" >> ~/.netrc
93
22:37:53
chmod 600 ~/.netrc
94
22:37:53
if command -v git &> /dev/null && [ "$(id -u)" -ne 0 ]; then
95
22:37:53
git config --global --add safe.directory $CI_PROJECT_DIR
96
22:37:53
fi
97
22:37:53
# Sonarqube server is running on the same cluster. Use internal address
98
22:37:53
export SONAR_HOST_URL="http://sonarqube.sonarqube.svc.cluster.local:9000"
99
22:37:53
section_end:1778020672:section_pre_build_script_0
100
22:37:53
INFO: This is the CI job pre_build_script
101
22:37:53
INFO: It's defined in the backend/infra/aws repo.
102
22:37:53
INFO: These additional Scandit variables are available to you:
103
22:37:53
SC_K8S_NODE_NAME: ip-10-0-36-227.eu-central-1.compute.internal
104
22:37:53
SC_K8S_IMAGE_ID:
105
22:37:53
SC_K8S_KYVERNO_PATCHES: |
106
22:37:53
107
22:37:53
cpu (r/l): 1/4
108
22:37:53
memory (r/l): 1073741824/17179869184
109
22:37:53
110
22:37:53
Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-host=ip-10-0-36-227.eu-central-1.compute.internal&var-namespace=gitlab-runner&var-pod=runner-wrxjpbsjx-project-621-concurrent-4-1r28pq61&var-resolution=15&from=1778020672000&to=now
111
22:37:53
Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-node=ip-10-0-36-227.eu-central-1.compute.internal&var-resolution=15s&from=1778020672000&to=now
112
22:37:53
Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group|=|gitlab-runner&var-filters=source|=|k8s-ci.aws.scandit.io&var-filters=namespace|=|gitlab-runner&var-filters=CI_PROJECT_ID|=|621&var-filters=CI_PIPELINE_ID|=|1580353&var-filters=CI_JOB_ID|=|54442841&sortOrder=Ascending&from=1778020672000&to=now
113
22:37:53
date: invalid date '-7 days'
114
22:37:53
date: invalid date '+7 days'
115
22:37:53
Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=~&job_name=secret-detection&project=internal/gitlab-templates
116
22:37:53
117
22:37:53
Setting up credentials for Gitlab Python registries
118
22:37:53
$ set -x
119
22:37:53
++ echo '$ gitleaks git ./ --platform gitlab ${SECRET_DETECTION_LOG_OPTIONS} --report-format json --report-path ${SECRET_DETECTION_OUTPUT_FILE} --log-level ${SECRET_DETECTION_LOG_LEVEL} --verbose --redact ${SECRET_DETECTION_EXTRA_FLAGS}'
120
22:37:53
$ gitleaks git ./ --platform gitlab ${SECRET_DETECTION_LOG_OPTIONS} --report-format json --report-path ${SECRET_DETECTION_OUTPUT_FILE} --log-level ${SECRET_DETECTION_LOG_LEVEL} --verbose --redact ${SECRET_DETECTION_EXTRA_FLAGS}
121
22:37:53
++ gitleaks git ./ --platform gitlab --log-opts 3284003440e09877917148c203626f055079d1b3..13881c4b6fdf20bab880fa112f8539ca3626235b --report-format json --report-path gl-secret-detection-report.json --log-level info --verbose --redact
122
22:37:53
123
22:37:53
○
124
22:37:53
│╲
125
22:37:53
│ ○
126
22:37:53
○ ░
127
22:37:53
░ gitleaks
128
22:37:53
129
22:37:53
10:37PM INF 1 commits scanned.
130
22:37:53
10:37PM INF scanned ~402 bytes (402 bytes) in 20.6ms
131
22:37:53
10:37PM INF no leaks found
132
22:37:53
++ echo '$ set +x'
133
22:37:53
$ set +x
134
22:37:53
++ set +x
135
22:37:53
136
22:37:53
Scout Analysis: https://scout.scandit.io/analysis/projects/621/jobs/54442841
137
22:37:53
138
22:37:53
139
22:37:53
Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-host=ip-10-0-36-227.eu-central-1.compute.internal&var-namespace=gitlab-runner&var-pod=runner-wrxjpbsjx-project-621-concurrent-4-1r28pq61&var-resolution=15&from=1778020672000&to=1778020672000
140
22:37:53
Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-node=ip-10-0-36-227.eu-central-1.compute.internal&var-resolution=15s&from=1778020672000&to=1778020672000
141
22:37:53
Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group|=|gitlab-runner&var-filters=source|=|k8s-ci.aws.scandit.io&var-filters=namespace|=|gitlab-runner&var-filters=CI_PROJECT_ID|=|621&var-filters=CI_PIPELINE_ID|=|1580353&var-filters=CI_JOB_ID|=|54442841&sortOrder=Ascending&from=1778020672000&to=1778020672000
142
22:37:53
date: invalid date '-7 days'
143
22:37:53
date: invalid date '+7 days'
144
22:37:53
Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=~&job_name=secret-detection&project=internal/gitlab-templates
145
22:37:53
146
22:37:53
147
22:37:53
section_end:1778020673:step_script
148
22:37:53
+section_start:1778020673:upload_artifacts_on_success
149
22:37:53
+Uploading artifacts for successful job
150
22:37:53
Uploading artifacts...
151
22:37:53
gl-secret-detection-report.json: found 1 matching artifact files and directories
152
22:37:54
Uploading artifacts as "secret_detection" to coordinator... 201 Created correlation_id=01KQX4MSV44XMW97YWSBD0DWAC id=54442841 responseStatus=201 Created token=64_NKi6sx
153
22:37:54
154
22:37:54
section_end:1778020674:upload_artifacts_on_success
155
22:37:54
+section_start:1778020674:cleanup_file_variables
156
22:37:54
+Cleaning up project directory and file based variables
157
22:37:54
158
22:37:54
section_end:1778020674:cleanup_file_variables
159
22:37:54
+
160
22:37:54
Job succeeded
161