secret-detection ○ success

Duration: 38s
Queued: 2s
📁 Stage: test
🖥 Runner: linux-aws-1
Average Duration
23s
This job: 38s
Failure Rate
1.4%
last 30 days

Job Execution Phases

💡 Tip: Click on any phase bar to jump to that section in the log below

Job Analysis

Job Status: Passed

Status: Job passed successfully

Full Job Log

159 lines
Match - of 0
1 11:09:36 Running with gitlab-runner 18.9.0 (07e534ba)
2 11:09:36 on gitlab-runner-linux-1-746bdd58fd-955d4 wRxjPbsJX, system ID: r_vWWkhVkeUyWi
3 11:09:36 feature flags: FF_USE_FASTZIP:true, FF_USE_NEW_BASH_EVAL_STRATEGY:true, FF_USE_DYNAMIC_TRACE_FORCE_SEND_INTERVAL:true, FF_SCRIPT_SECTIONS:true, FF_USE_ADVANCED_POD_SPEC_CONFIGURATION:true, FF_PRINT_POD_EVENTS:true, FF_USE_DUMB_INIT_WITH_KUBERNETES_EXECUTOR:true, FF_LOG_IMAGES_CONFIGURED_FOR_JOB:true, FF_CLEAN_UP_FAILED_CACHE_EXTRACT:true, FF_GIT_URLS_WITHOUT_TOKENS:true, FF_WAIT_FOR_POD_TO_BE_REACHABLE:true, FF_USE_FLEETING_ACQUIRE_HEARTBEATS:true, FF_USE_JOB_ROUTER:true
4 11:09:36 Resolving secrets
5 11:09:36 section_start:1778065776:prepare_executor
6 11:09:36 +Preparing the "kubernetes" executor
7 11:09:36 Using Kubernetes namespace: gitlab-runner
8 11:09:36 Using Kubernetes executor with image registry.scandit.com/dockerfiles/gitleaks:v8.29.0 ...
9 11:09:36 Using attach strategy to execute scripts...
10 11:09:36 Using effective pull policy of [Always] for container build
11 11:09:36 Using effective pull policy of [Always] for container helper
12 11:09:36 Using effective pull policy of [Always] for container init-permissions
13 11:09:36 section_end:1778065776:prepare_executor
14 11:09:36 +section_start:1778065776:prepare_script
15 11:09:36 +Preparing environment
16 11:09:36 Using FF_USE_POD_ACTIVE_DEADLINE_SECONDS, the Pod activeDeadlineSeconds will be set to the job timeout: 1h0m0s...
17 11:09:36 WARNING: Advanced Pod Spec configuration enabled, merging the provided PodSpec to the generated one. This is a beta feature and is subject to change. Feedback is collected in this issue: https://gitlab.com/gitlab-org/gitlab-runner/-/issues/29659 ...
18 11:09:37 Subscribing to Kubernetes Pod events...
19 11:09:37 Type Reason Message
20 11:09:37 Normal Scheduled Successfully assigned gitlab-runner/runner-wrxjpbsjx-project-621-concurrent-0-csasm212 to ip-10-0-26-238.eu-central-1.compute.internal
21 11:09:37 Normal Pulled Container image "gitlab/gitlab-runner-helper:x86_64-v18.8.0" already present on machine
22 11:09:37 Normal Created Created container: init-permissions
23 11:09:39 Normal Started Started container init-permissions
24 11:10:07 Normal Pulled Container image "498954711405.dkr.ecr.eu-central-1.amazonaws.com/dockerfiles/gitleaks@sha256:ff83fa5c807770ceb2174672e2bc2fc0ddf3a50f3089ca4106925d9013743b09" already present on machine
25 11:10:07 Normal Created Created container: build
26 11:10:07 Normal Started Started container build
27 11:10:07 Normal Pulled Container image "gitlab/gitlab-runner-helper:x86_64-v18.8.0" already present on machine
28 11:10:07 Normal Created Created container: helper
29 11:10:08 Normal Started Started container helper
30 11:10:10 Running on runner-wrxjpbsjx-project-621-concurrent-0-csasm212 via gitlab-runner-linux-1-746bdd58fd-955d4...
31 11:10:10
32 11:10:10 section_end:1778065810:prepare_script
33 11:10:10 +section_start:1778065810:get_sources
34 11:10:10 +Getting source from Git repository
35 11:10:11 Gitaly correlation ID: 01KQYFN75NGDRJWDYZMZ9442FS
36 11:10:11 Fetching changes with git depth set to 1...
37 11:10:11 Initialized empty Git repository in /build/internal/gitlab-templates/.git/
38 11:10:11 Created fresh repository.
39 11:10:11 Checking out 19a8ce14 as detached HEAD (ref is master)...
40 11:10:11
41 11:10:11 Skipping Git submodules setup
42 11:10:11
43 11:10:11 section_end:1778065811:get_sources
44 11:10:11 +section_start:1778065811:step_script
45 11:10:11 +Executing "step_script" stage of the job script
46 11:10:12 section_start:1778065812:section_pre_build_script_0[hide_duration=true,collapsed=true] $ function cleanup {
47 11:10:12 rv=$?
48 11:10:12 if [ $rv -ne 0 ]; then
49 11:10:12 echo ""
50 11:10:12 echo " Failure Cause Analysis might help, please open this link:"
51 11:10:12 echo " https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
52 11:10:12 echo ""
53 11:10:12 fi
54 11:10:12 echo ""
55 11:10:12 echo "Scout Analysis: https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
56 11:10:12 echo ""
57 11:10:12 echo ""
58 11:10:12 echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=${EPOCHSECONDS}000"
59 11:10:12 echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=${EPOCHSECONDS}000"
60 11:10:12 echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group|=|gitlab-runner&var-filters=source|=|${LOKI_LOGSOURCE}&var-filters=namespace|=|${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID|=|${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID|=|${CI_PIPELINE_ID}&var-filters=CI_JOB_ID|=|${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=${EPOCHSECONDS}000"
61 11:10:12 echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=$(date -d '-7 days' +%Y-%m-%d)~$(date -d '+7 days' +%Y-%m-%d)&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
62 11:10:12 echo ""
63 11:10:12 exit $rv
64 11:10:12 }
65 11:10:12 trap cleanup EXIT
66 11:10:12 echo "INFO: This is the CI job pre_build_script"
67 11:10:12 echo "INFO: It's defined in the backend/infra/aws repo."
68 11:10:12 echo "INFO: These additional Scandit variables are available to you:"
69 11:10:12 echo " SC_K8S_NODE_NAME: $SC_K8S_NODE_NAME"
70 11:10:12 echo " SC_K8S_IMAGE_ID: $SC_K8S_IMAGE_ID"
71 11:10:12 echo " SC_K8S_KYVERNO_PATCHES: |"
72 11:10:12 echo "$SC_K8S_KYVERNO_PATCHES" | sed 's/^/ /'
73 11:10:12 echo "cpu (r/l): ${SC_K8S_REQUESTS_CPU}/${SC_K8S_LIMITS_CPU}"
74 11:10:12 if command -v numfmt >/dev/null 2>&1; then
75 11:10:12 echo "memory (r/l): $(numfmt --to=iec --suffix=B $SC_K8S_REQUESTS_MEMORY)/$(numfmt --to=iec --suffix=B $SC_K8S_LIMITS_MEMORY)"
76 11:10:12 else
77 11:10:12 echo "memory (r/l): ${SC_K8S_REQUESTS_MEMORY}/${SC_K8S_LIMITS_MEMORY}"
78 11:10:12 fi
79 11:10:12 __start_time=${EPOCHSECONDS}
80 11:10:12 echo ""
81 11:10:12 echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=now"
82 11:10:12 echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=now"
83 11:10:12 echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group|=|gitlab-runner&var-filters=source|=|${LOKI_LOGSOURCE}&var-filters=namespace|=|${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID|=|${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID|=|${CI_PIPELINE_ID}&var-filters=CI_JOB_ID|=|${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=now"
84 11:10:12 echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=$(date -d '-7 days' +%Y-%m-%d)~$(date -d '+7 days' +%Y-%m-%d)&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
85 11:10:12 echo ""
86 11:10:12 echo "Setting up credentials for Gitlab Python registries"
87 11:10:12 mkdir -p ~
88 11:10:12 echo "machine gitlab.scandit.com" > ~/.netrc
89 11:10:12 echo "login gitlab-ci-token" >> ~/.netrc
90 11:10:12 echo "password ${CI_JOB_TOKEN}" >> ~/.netrc
91 11:10:12 chmod 600 ~/.netrc
92 11:10:12 if command -v git &> /dev/null && [ "$(id -u)" -ne 0 ]; then
93 11:10:12 git config --global --add safe.directory $CI_PROJECT_DIR
94 11:10:12 fi
95 11:10:12 # Sonarqube server is running on the same cluster. Use internal address
96 11:10:12 export SONAR_HOST_URL="http://sonarqube.sonarqube.svc.cluster.local:9000"
97 11:10:12 section_end:1778065812:section_pre_build_script_0
98 11:10:12 INFO: This is the CI job pre_build_script
99 11:10:12 INFO: It's defined in the backend/infra/aws repo.
100 11:10:12 INFO: These additional Scandit variables are available to you:
101 11:10:12 SC_K8S_NODE_NAME: ip-10-0-26-238.eu-central-1.compute.internal
102 11:10:12 SC_K8S_IMAGE_ID:
103 11:10:12 SC_K8S_KYVERNO_PATCHES: |
104 11:10:12
105 11:10:12 cpu (r/l): 1/4
106 11:10:12 memory (r/l): 1073741824/17179869184
107 11:10:12
108 11:10:12 Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-host=ip-10-0-26-238.eu-central-1.compute.internal&var-namespace=gitlab-runner&var-pod=runner-wrxjpbsjx-project-621-concurrent-0-csasm212&var-resolution=15&from=1778065812000&to=now
109 11:10:12 Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-node=ip-10-0-26-238.eu-central-1.compute.internal&var-resolution=15s&from=1778065812000&to=now
110 11:10:12 Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group|=|gitlab-runner&var-filters=source|=|k8s-ci.aws.scandit.io&var-filters=namespace|=|gitlab-runner&var-filters=CI_PROJECT_ID|=|621&var-filters=CI_PIPELINE_ID|=|1581320&var-filters=CI_JOB_ID|=|54484711&sortOrder=Ascending&from=1778065812000&to=now
111 11:10:12 date: invalid date '-7 days'
112 11:10:12 date: invalid date '+7 days'
113 11:10:12 Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=~&job_name=secret-detection&project=internal/gitlab-templates
114 11:10:12
115 11:10:12 Setting up credentials for Gitlab Python registries
116 11:10:12 $ set -x
117 11:10:12 ++ echo '$ gitleaks git ./ --platform gitlab ${SECRET_DETECTION_LOG_OPTIONS} --report-format json --report-path ${SECRET_DETECTION_OUTPUT_FILE} --log-level ${SECRET_DETECTION_LOG_LEVEL} --verbose --redact ${SECRET_DETECTION_EXTRA_FLAGS}'
118 11:10:12 $ gitleaks git ./ --platform gitlab ${SECRET_DETECTION_LOG_OPTIONS} --report-format json --report-path ${SECRET_DETECTION_OUTPUT_FILE} --log-level ${SECRET_DETECTION_LOG_LEVEL} --verbose --redact ${SECRET_DETECTION_EXTRA_FLAGS}
119 11:10:12 ++ gitleaks git ./ --platform gitlab --report-format json --report-path gl-secret-detection-report.json --log-level info --verbose --redact
120 11:10:12
121 11:10:12
122 11:10:12 │╲
123 11:10:12 │ ○
124 11:10:12 ○ ░
125 11:10:12 ░ gitleaks
126 11:10:12
127 11:10:12 11:10AM INF 1 commits scanned.
128 11:10:12 11:10AM INF scanned ~216897 bytes (216.90 KB) in 91.7ms
129 11:10:12 11:10AM INF no leaks found
130 11:10:12 ++ echo '$ set +x'
131 11:10:12 $ set +x
132 11:10:12 ++ set +x
133 11:10:12
134 11:10:12 Scout Analysis: https://scout.scandit.io/analysis/projects/621/jobs/54484711
135 11:10:12
136 11:10:12
137 11:10:12 Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-host=ip-10-0-26-238.eu-central-1.compute.internal&var-namespace=gitlab-runner&var-pod=runner-wrxjpbsjx-project-621-concurrent-0-csasm212&var-resolution=15&from=1778065812000&to=1778065812000
138 11:10:12 Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-node=ip-10-0-26-238.eu-central-1.compute.internal&var-resolution=15s&from=1778065812000&to=1778065812000
139 11:10:12 Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group|=|gitlab-runner&var-filters=source|=|k8s-ci.aws.scandit.io&var-filters=namespace|=|gitlab-runner&var-filters=CI_PROJECT_ID|=|621&var-filters=CI_PIPELINE_ID|=|1581320&var-filters=CI_JOB_ID|=|54484711&sortOrder=Ascending&from=1778065812000&to=1778065812000
140 11:10:12 date: invalid date '-7 days'
141 11:10:12 date: invalid date '+7 days'
142 11:10:12 Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=~&job_name=secret-detection&project=internal/gitlab-templates
143 11:10:12
144 11:10:12
145 11:10:12 section_end:1778065812:step_script
146 11:10:12 +section_start:1778065812:upload_artifacts_on_success
147 11:10:12 +Uploading artifacts for successful job
148 11:10:12 Uploading artifacts...
149 11:10:12 gl-secret-detection-report.json: found 1 matching artifact files and directories
150 11:10:13 Uploading artifacts as "secret_detection" to coordinator... 201 Created correlation_id=01KQYFPBCY7KHEDT5XM0BT8TDD id=54484711 responseStatus=201 Created token=64_TkV1zD
151 11:10:13
152 11:10:13 section_end:1778065813:upload_artifacts_on_success
153 11:10:13 +section_start:1778065813:cleanup_file_variables
154 11:10:13 +Cleaning up project directory and file based variables
155 11:10:13
156 11:10:13 section_end:1778065813:cleanup_file_variables
157 11:10:13 +
158 11:10:14 Job succeeded
159