secret-detection ○ success

Duration: 13s
Queued: 4s
📁 Stage: test
🖥 Runner: linux-1
Average Duration
23s
This job: 13s
Failure Rate
1.4%
last 30 days

Job Execution Phases

💡 Tip: Click on any phase bar to jump to that section in the log below

Job Analysis

Job Status: Passed

Status: Job passed successfully

Full Job Log

162 lines
Match - of 0
1 22:38:26 Running with gitlab-runner 18.9.0 (07e534ba)
2 22:38:26 on gitlab-runner-linux-1-5b9cfd64ff-k5sg5 aP4tCsXyp, system ID: r_wQDtEh3nNZsL
3 22:38:26 feature flags: FF_USE_FASTZIP:true, FF_USE_NEW_BASH_EVAL_STRATEGY:true, FF_USE_DYNAMIC_TRACE_FORCE_SEND_INTERVAL:true, FF_SCRIPT_SECTIONS:true, FF_ENABLE_JOB_CLEANUP:true, FF_USE_ADVANCED_POD_SPEC_CONFIGURATION:true, FF_PRINT_POD_EVENTS:true, FF_USE_DUMB_INIT_WITH_KUBERNETES_EXECUTOR:true, FF_LOG_IMAGES_CONFIGURED_FOR_JOB:true, FF_CLEAN_UP_FAILED_CACHE_EXTRACT:true, FF_GIT_URLS_WITHOUT_TOKENS:true, FF_WAIT_FOR_POD_TO_BE_REACHABLE:true, FF_USE_FLEETING_ACQUIRE_HEARTBEATS:true, FF_USE_JOB_ROUTER:true
4 22:38:26 Resolving secrets
5 22:38:26 section_start:1778020706:prepare_executor
6 22:38:26 +Preparing the "kubernetes" executor
7 22:38:26 Using Kubernetes namespace: gitlab-runner
8 22:38:26 Using Kubernetes executor with image registry.scandit.com/dockerfiles/gitleaks:v8.29.0 ...
9 22:38:26 Using attach strategy to execute scripts...
10 22:38:26 Using effective pull policy of [Always] for container build
11 22:38:26 Using effective pull policy of [Always] for container helper
12 22:38:26 Using effective pull policy of [Always] for container init-permissions
13 22:38:26 section_end:1778020706:prepare_executor
14 22:38:26 +section_start:1778020706:prepare_script
15 22:38:26 +Preparing environment
16 22:38:26 Using FF_USE_POD_ACTIVE_DEADLINE_SECONDS, the Pod activeDeadlineSeconds will be set to the job timeout: 1h0m0s...
17 22:38:26 WARNING: Advanced Pod Spec configuration enabled, merging the provided PodSpec to the generated one. This is a beta feature and is subject to change. Feedback is collected in this issue: https://gitlab.com/gitlab-org/gitlab-runner/-/issues/29659 ...
18 22:38:26 Subscribing to Kubernetes Pod events...
19 22:38:26 Type Reason Message
20 22:38:26 Normal Scheduled Successfully assigned gitlab-runner/runner-ap4tcsxyp-project-621-concurrent-0-gjgtks9u to decimus
21 22:38:31 Normal Pulled Container image "registry.gitlab.com/gitlab-org/gitlab-runner/gitlab-runner-helper:x86_64-v18.9.0" already present on machine
22 22:38:31 Normal Created Created container: init-permissions
23 22:38:32 Normal Started Started container init-permissions
24 22:38:33 Normal Pulled Container image "registry.gitlab.com/gitlab-org/gitlab-runner/gitlab-runner-helper:x86_64-v18.9.0" already present on machine
25 22:38:33 Normal Created Created container: helper
26 22:38:33 Normal Started Started container helper
27 22:38:33 Normal Pulling Pulling image "registry.scandit.com/dockerfiles/gitleaks:v8.29.0"
28 22:38:34 Normal Pulled Successfully pulled image "registry.scandit.com/dockerfiles/gitleaks:v8.29.0" in 997ms (997ms including waiting). Image size: 24433236 bytes.
29 22:38:34 Normal Created Created container: build
30 22:38:34 Normal Started Started container build
31 22:38:36 Running on runner-ap4tcsxyp-project-621-concurrent-0-gjgtks9u via gitlab-runner-linux-1-5b9cfd64ff-k5sg5...
32 22:38:36
33 22:38:36 section_end:1778020716:prepare_script
34 22:38:36 +section_start:1778020716:get_sources
35 22:38:36 +Getting source from Git repository
36 22:38:36 Gitaly correlation ID: 01KQX4NS9G9Y1FWD2D19XB1QMQ
37 22:38:36 Fetching changes...
38 22:38:36 Initialized empty Git repository in /build/internal/gitlab-templates/.git/
39 22:38:36 Created fresh repository.
40 22:38:37 Checking out 22f5b5c3 as detached HEAD (ref is refs/merge-requests/639/merge)...
41 22:38:37
42 22:38:37 Skipping Git submodules setup
43 22:38:37
44 22:38:37 section_end:1778020717:get_sources
45 22:38:37 +section_start:1778020717:step_script
46 22:38:37 +Executing "step_script" stage of the job script
47 22:38:38 section_start:1778020717:section_pre_build_script_0[hide_duration=true,collapsed=true] $ function cleanup {
48 22:38:38 rv=$?
49 22:38:38 if [ $rv -ne 0 ]; then
50 22:38:38 echo ""
51 22:38:38 echo " Failure Cause Analysis might help, please open this link:"
52 22:38:38 echo " https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
53 22:38:38 echo ""
54 22:38:38 fi
55 22:38:38 echo ""
56 22:38:38 echo "Scout Analysis: https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
57 22:38:38 echo ""
58 22:38:38 echo ""
59 22:38:38 echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=${EPOCHSECONDS}000"
60 22:38:38 echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=${EPOCHSECONDS}000"
61 22:38:38 echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group%7C=%7Cgitlab-runner&var-filters=source%7C%3D%7C${LOKI_LOGSOURCE}&var-filters=namespace%7C%3D%7C${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID%7C%3D%7C${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID%7C%3D%7C${CI_PIPELINE_ID}&var-filters=CI_JOB_ID%7C%3D%7C${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=${EPOCHSECONDS}000"
62 22:38:38 __date_from=$(date -d "@$(( EPOCHSECONDS - 604800 ))" +%Y-%m-%d)
63 22:38:38 __date_to=$(date -d "@$(( EPOCHSECONDS + 604800 ))" +%Y-%m-%d)
64 22:38:38 echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=${__date_from}~${__date_to}&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
65 22:38:38 echo ""
66 22:38:38 exit $rv
67 22:38:38 }
68 22:38:38 trap cleanup EXIT
69 22:38:38 echo "INFO: This is the CI job pre_build_script"
70 22:38:38 echo "INFO: It's defined in the backend/infra/onprem/k8s repo."
71 22:38:38 echo "INFO: These additional Scandit variables are available to you:"
72 22:38:38 echo " SC_K8S_NODE_NAME: $SC_K8S_NODE_NAME"
73 22:38:38 echo " SC_K8S_IMAGE_ID: $SC_K8S_IMAGE_ID"
74 22:38:38 echo " SC_K8S_KYVERNO_PATCHES: |"
75 22:38:38 echo "$SC_K8S_KYVERNO_PATCHES" | sed 's/^/ /'
76 22:38:38 echo "cpu (r/l): ${SC_K8S_REQUESTS_CPU}/${SC_K8S_LIMITS_CPU}"
77 22:38:38 if command -v numfmt >/dev/null 2>&1; then
78 22:38:38 echo "memory (r/l): $(numfmt --to=iec --suffix=B $SC_K8S_REQUESTS_MEMORY)/$(numfmt --to=iec --suffix=B $SC_K8S_LIMITS_MEMORY)"
79 22:38:38 else
80 22:38:38 echo "memory (r/l): ${SC_K8S_REQUESTS_MEMORY}/${SC_K8S_LIMITS_MEMORY}"
81 22:38:38 fi
82 22:38:38 __start_time=${EPOCHSECONDS}
83 22:38:38 echo ""
84 22:38:38 echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=now"
85 22:38:38 echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=now"
86 22:38:38 echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group%7C%3D%7Cgitlab-runner&var-filters=source%7C%3D%7C${LOKI_LOGSOURCE}&var-filters=namespace%7C%3D%7C${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID%7C%3D%7C${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID%7C%3D%7C${CI_PIPELINE_ID}&var-filters=CI_JOB_ID%7C%3D%7C${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=now"
87 22:38:38 __date_from=$(date -d "@$(( EPOCHSECONDS - 604800 ))" +%Y-%m-%d)
88 22:38:38 __date_to=$(date -d "@$(( EPOCHSECONDS + 604800 ))" +%Y-%m-%d)
89 22:38:38 echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=${__date_from}~${__date_to}&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
90 22:38:38 echo ""
91 22:38:38 echo "Setting up credentials for Gitlab Python registries"
92 22:38:38 mkdir -p ~
93 22:38:38 echo "machine gitlab.scandit.com" > ~/.netrc
94 22:38:38 echo "login gitlab-ci-token" >> ~/.netrc
95 22:38:38 echo "password ${CI_JOB_TOKEN}" >> ~/.netrc
96 22:38:38 chmod 600 ~/.netrc
97 22:38:38 if command -v git &> /dev/null && [ "$(id -u)" -ne 0 ]; then
98 22:38:38 git config --global --add safe.directory $CI_PROJECT_DIR
99 22:38:38 fi
100 22:38:38 sleep infinity &
101 22:38:38 echo $! > ~/.bg_pid
102 22:38:38 section_end:1778020717:section_pre_build_script_0
103 22:38:38 INFO: This is the CI job pre_build_script
104 22:38:38 INFO: It's defined in the backend/infra/onprem/k8s repo.
105 22:38:38 INFO: These additional Scandit variables are available to you:
106 22:38:38 SC_K8S_NODE_NAME: decimus
107 22:38:38 SC_K8S_IMAGE_ID:
108 22:38:38 SC_K8S_KYVERNO_PATCHES: |
109 22:38:38
110 22:38:38 cpu (r/l): 1/8
111 22:38:38 memory (r/l): 1073741824/17179869184
112 22:38:38
113 22:38:38 Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=KpIiby5Vz&var-host=decimus&var-namespace=gitlab-runner&var-pod=runner-ap4tcsxyp-project-621-concurrent-0-gjgtks9u&var-resolution=15&from=1778020717000&to=now
114 22:38:38 Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=KpIiby5Vz&var-node=decimus&var-resolution=15s&from=1778020717000&to=now
115 22:38:38 Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group%7C%3D%7Cgitlab-runner&var-filters=source%7C%3D%7Czrh.int.scandit.io&var-filters=namespace%7C%3D%7Cgitlab-runner&var-filters=CI_PROJECT_ID%7C%3D%7C621&var-filters=CI_PIPELINE_ID%7C%3D%7C1580356&var-filters=CI_JOB_ID%7C%3D%7C54442916&sortOrder=Ascending&from=1778020717000&to=now
116 22:38:38 Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=2026-04-28~2026-05-12&job_name=secret-detection&project=internal/gitlab-templates
117 22:38:38
118 22:38:38 Setting up credentials for Gitlab Python registries
119 22:38:38 $ set -x
120 22:38:38 ++ echo '$ gitleaks git ./ --platform gitlab ${SECRET_DETECTION_LOG_OPTIONS} --report-format json --report-path ${SECRET_DETECTION_OUTPUT_FILE} --log-level ${SECRET_DETECTION_LOG_LEVEL} --verbose --redact ${SECRET_DETECTION_EXTRA_FLAGS}'
121 22:38:38 $ gitleaks git ./ --platform gitlab ${SECRET_DETECTION_LOG_OPTIONS} --report-format json --report-path ${SECRET_DETECTION_OUTPUT_FILE} --log-level ${SECRET_DETECTION_LOG_LEVEL} --verbose --redact ${SECRET_DETECTION_EXTRA_FLAGS}
122 22:38:38 ++ gitleaks git ./ --platform gitlab --log-opts 3284003440e09877917148c203626f055079d1b3..22f5b5c32e4d267c3494a360c3cf287d060f8b90 --report-format json --report-path gl-secret-detection-report.json --log-level info --verbose --redact
123 22:38:38
124 22:38:38
125 22:38:38 │╲
126 22:38:38 │ ○
127 22:38:38 ○ ░
128 22:38:38 ░ gitleaks
129 22:38:38
130 22:38:38 10:38PM INF 1 commits scanned.
131 22:38:38 10:38PM INF scanned ~136 bytes (136 bytes) in 28.6ms
132 22:38:38 10:38PM INF no leaks found
133 22:38:38 ++ echo '$ set +x'
134 22:38:38 $ set +x
135 22:38:38 ++ set +x
136 22:38:38
137 22:38:38 Scout Analysis: https://scout.scandit.io/analysis/projects/621/jobs/54442916
138 22:38:38
139 22:38:38
140 22:38:38 Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=KpIiby5Vz&var-host=decimus&var-namespace=gitlab-runner&var-pod=runner-ap4tcsxyp-project-621-concurrent-0-gjgtks9u&var-resolution=15&from=1778020717000&to=1778020717000
141 22:38:38 Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=KpIiby5Vz&var-node=decimus&var-resolution=15s&from=1778020717000&to=1778020717000
142 22:38:38 Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group%7C=%7Cgitlab-runner&var-filters=source%7C%3D%7Czrh.int.scandit.io&var-filters=namespace%7C%3D%7Cgitlab-runner&var-filters=CI_PROJECT_ID%7C%3D%7C621&var-filters=CI_PIPELINE_ID%7C%3D%7C1580356&var-filters=CI_JOB_ID%7C%3D%7C54442916&sortOrder=Ascending&from=1778020717000&to=1778020717000
143 22:38:38 Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=2026-04-28~2026-05-12&job_name=secret-detection&project=internal/gitlab-templates
144 22:38:38
145 22:38:38
146 22:38:38 section_end:1778020718:step_script
147 22:38:38 +section_start:1778020718:upload_artifacts_on_success
148 22:38:38 +Uploading artifacts for successful job
149 22:38:38 Uploading artifacts...
150 22:38:38 gl-secret-detection-report.json: found 1 matching artifact files and directories
151 22:38:38 Uploading artifacts as "secret_detection" to coordinator... 201 Created correlation_id=01KQX4P5WCBNBJX442SPTJCHFK id=54442916 responseStatus=201 Created token=64_k4QMgg
152 22:38:38
153 22:38:38 section_end:1778020718:upload_artifacts_on_success
154 22:38:38 +section_start:1778020718:cleanup_file_variables
155 22:38:38 +Cleaning up project directory and file based variables
156 22:38:39 Removing gl-secret-detection-report.json
157 22:38:39 HEAD is now at 22f5b5c Merge branch 'renovate/registry.scandit.com-dockerfiles-kaniko-1.x' into 'master'
158 22:38:39
159 22:38:39 section_end:1778020719:cleanup_file_variables
160 22:38:39 +
161 22:38:39 Job succeeded
162