secret-detection ○ success

Duration: 11s
Queued: 2s
📁 Stage: test
🖥 Runner: linux-aws-1
Average Duration
23s
This job: 11s
Failure Rate
1.4%
last 30 days

Job Execution Phases

💡 Tip: Click on any phase bar to jump to that section in the log below

Job Analysis

Job Status: Passed

Status: Job passed successfully

Full Job Log

160 lines
Match - of 0
1 22:29:25 Running with gitlab-runner 18.9.0 (07e534ba)
2 22:29:25 on gitlab-runner-linux-1-746bdd58fd-jb69w wRxjPbsJX, system ID: r_1Ff6mPEZuEtQ
3 22:29:25 feature flags: FF_USE_FASTZIP:true, FF_USE_NEW_BASH_EVAL_STRATEGY:true, FF_USE_DYNAMIC_TRACE_FORCE_SEND_INTERVAL:true, FF_SCRIPT_SECTIONS:true, FF_USE_ADVANCED_POD_SPEC_CONFIGURATION:true, FF_PRINT_POD_EVENTS:true, FF_USE_DUMB_INIT_WITH_KUBERNETES_EXECUTOR:true, FF_LOG_IMAGES_CONFIGURED_FOR_JOB:true, FF_CLEAN_UP_FAILED_CACHE_EXTRACT:true, FF_GIT_URLS_WITHOUT_TOKENS:true, FF_WAIT_FOR_POD_TO_BE_REACHABLE:true, FF_USE_FLEETING_ACQUIRE_HEARTBEATS:true, FF_USE_JOB_ROUTER:true
4 22:29:25 Resolving secrets
5 22:29:25 section_start:1778279365:prepare_executor
6 22:29:25 +Preparing the "kubernetes" executor
7 22:29:25 Using Kubernetes namespace: gitlab-runner
8 22:29:25 Using Kubernetes executor with image registry.scandit.com/dockerfiles/gitleaks:v8.29.0 ...
9 22:29:25 Using attach strategy to execute scripts...
10 22:29:25 Using effective pull policy of [Always] for container build
11 22:29:25 Using effective pull policy of [Always] for container helper
12 22:29:25 Using effective pull policy of [Always] for container init-permissions
13 22:29:25 section_end:1778279365:prepare_executor
14 22:29:25 +section_start:1778279365:prepare_script
15 22:29:25 +Preparing environment
16 22:29:25 Using FF_USE_POD_ACTIVE_DEADLINE_SECONDS, the Pod activeDeadlineSeconds will be set to the job timeout: 1h0m0s...
17 22:29:25 WARNING: Advanced Pod Spec configuration enabled, merging the provided PodSpec to the generated one. This is a beta feature and is subject to change. Feedback is collected in this issue: https://gitlab.com/gitlab-org/gitlab-runner/-/issues/29659 ...
18 22:29:25 Subscribing to Kubernetes Pod events...
19 22:29:25 Type Reason Message
20 22:29:25 Normal Scheduled Successfully assigned gitlab-runner/runner-wrxjpbsjx-project-621-concurrent-1-o3nwow2w to ip-10-0-49-168.eu-central-1.compute.internal
21 22:29:26 Normal Pulled Container image "gitlab/gitlab-runner-helper:x86_64-v18.8.0" already present on machine
22 22:29:26 Normal Created Created container: init-permissions
23 22:29:26 Normal Started Started container init-permissions
24 22:29:27 Normal Pulling Pulling image "498954711405.dkr.ecr.eu-central-1.amazonaws.com/dockerfiles/gitleaks@sha256:ff83fa5c807770ceb2174672e2bc2fc0ddf3a50f3089ca4106925d9013743b09"
25 22:29:28 Normal Pulled Successfully pulled image "498954711405.dkr.ecr.eu-central-1.amazonaws.com/dockerfiles/gitleaks@sha256:ff83fa5c807770ceb2174672e2bc2fc0ddf3a50f3089ca4106925d9013743b09" in 814ms (814ms including waiting). Image size: 24433236 bytes.
26 22:29:28 Normal Created Created container: build
27 22:29:28 Normal Started Started container build
28 22:29:28 Normal Pulled Container image "gitlab/gitlab-runner-helper:x86_64-v18.8.0" already present on machine
29 22:29:28 Normal Created Created container: helper
30 22:29:28 Normal Started Started container helper
31 22:29:32 Running on runner-wrxjpbsjx-project-621-concurrent-1-o3nwow2w via gitlab-runner-linux-1-746bdd58fd-jb69w...
32 22:29:32
33 22:29:32 section_end:1778279372:prepare_script
34 22:29:32 +section_start:1778279372:get_sources
35 22:29:32 +Getting source from Git repository
36 22:29:33 Gitaly correlation ID: 01KR4VBDZXCG0QCF4QK0PH6DWJ
37 22:29:33 Fetching changes...
38 22:29:33 Initialized empty Git repository in /build/internal/gitlab-templates/.git/
39 22:29:33 Created fresh repository.
40 22:29:33 Checking out d5797a8b as detached HEAD (ref is refs/merge-requests/642/merge)...
41 22:29:33
42 22:29:33 Skipping Git submodules setup
43 22:29:33
44 22:29:33 section_end:1778279373:get_sources
45 22:29:33 +section_start:1778279373:step_script
46 22:29:33 +Executing "step_script" stage of the job script
47 22:29:34 section_start:1778279373:section_pre_build_script_0[hide_duration=true,collapsed=true] $ function cleanup {
48 22:29:34 rv=$?
49 22:29:34 if [ $rv -ne 0 ]; then
50 22:29:34 echo ""
51 22:29:34 echo " Failure Cause Analysis might help, please open this link:"
52 22:29:34 echo " https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
53 22:29:34 echo ""
54 22:29:34 fi
55 22:29:34 echo ""
56 22:29:34 echo "Scout Analysis: https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
57 22:29:34 echo ""
58 22:29:34 echo ""
59 22:29:34 echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=${EPOCHSECONDS}000"
60 22:29:34 echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=${EPOCHSECONDS}000"
61 22:29:34 echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group|=|gitlab-runner&var-filters=source|=|${LOKI_LOGSOURCE}&var-filters=namespace|=|${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID|=|${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID|=|${CI_PIPELINE_ID}&var-filters=CI_JOB_ID|=|${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=${EPOCHSECONDS}000"
62 22:29:34 echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=$(date -d '-7 days' +%Y-%m-%d)~$(date -d '+7 days' +%Y-%m-%d)&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
63 22:29:34 echo ""
64 22:29:34 exit $rv
65 22:29:34 }
66 22:29:34 trap cleanup EXIT
67 22:29:34 echo "INFO: This is the CI job pre_build_script"
68 22:29:34 echo "INFO: It's defined in the backend/infra/aws repo."
69 22:29:34 echo "INFO: These additional Scandit variables are available to you:"
70 22:29:34 echo " SC_K8S_NODE_NAME: $SC_K8S_NODE_NAME"
71 22:29:34 echo " SC_K8S_IMAGE_ID: $SC_K8S_IMAGE_ID"
72 22:29:34 echo " SC_K8S_KYVERNO_PATCHES: |"
73 22:29:34 echo "$SC_K8S_KYVERNO_PATCHES" | sed 's/^/ /'
74 22:29:34 echo "cpu (r/l): ${SC_K8S_REQUESTS_CPU}/${SC_K8S_LIMITS_CPU}"
75 22:29:34 if command -v numfmt >/dev/null 2>&1; then
76 22:29:34 echo "memory (r/l): $(numfmt --to=iec --suffix=B $SC_K8S_REQUESTS_MEMORY)/$(numfmt --to=iec --suffix=B $SC_K8S_LIMITS_MEMORY)"
77 22:29:34 else
78 22:29:34 echo "memory (r/l): ${SC_K8S_REQUESTS_MEMORY}/${SC_K8S_LIMITS_MEMORY}"
79 22:29:34 fi
80 22:29:34 __start_time=${EPOCHSECONDS}
81 22:29:34 echo ""
82 22:29:34 echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=now"
83 22:29:34 echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=now"
84 22:29:34 echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group|=|gitlab-runner&var-filters=source|=|${LOKI_LOGSOURCE}&var-filters=namespace|=|${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID|=|${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID|=|${CI_PIPELINE_ID}&var-filters=CI_JOB_ID|=|${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=now"
85 22:29:34 echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=$(date -d '-7 days' +%Y-%m-%d)~$(date -d '+7 days' +%Y-%m-%d)&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
86 22:29:34 echo ""
87 22:29:34 echo "Setting up credentials for Gitlab Python registries"
88 22:29:34 mkdir -p ~
89 22:29:34 echo "machine gitlab.scandit.com" > ~/.netrc
90 22:29:34 echo "login gitlab-ci-token" >> ~/.netrc
91 22:29:34 echo "password ${CI_JOB_TOKEN}" >> ~/.netrc
92 22:29:34 chmod 600 ~/.netrc
93 22:29:34 if command -v git &> /dev/null && [ "$(id -u)" -ne 0 ]; then
94 22:29:34 git config --global --add safe.directory $CI_PROJECT_DIR
95 22:29:34 fi
96 22:29:34 # Sonarqube server is running on the same cluster. Use internal address
97 22:29:34 export SONAR_HOST_URL="http://sonarqube.sonarqube.svc.cluster.local:9000"
98 22:29:34 section_end:1778279373:section_pre_build_script_0
99 22:29:34 INFO: This is the CI job pre_build_script
100 22:29:34 INFO: It's defined in the backend/infra/aws repo.
101 22:29:34 INFO: These additional Scandit variables are available to you:
102 22:29:34 SC_K8S_NODE_NAME: ip-10-0-49-168.eu-central-1.compute.internal
103 22:29:34 SC_K8S_IMAGE_ID:
104 22:29:34 SC_K8S_KYVERNO_PATCHES: |
105 22:29:34
106 22:29:34 cpu (r/l): 1/4
107 22:29:34 memory (r/l): 1073741824/17179869184
108 22:29:34
109 22:29:34 Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-host=ip-10-0-49-168.eu-central-1.compute.internal&var-namespace=gitlab-runner&var-pod=runner-wrxjpbsjx-project-621-concurrent-1-o3nwow2w&var-resolution=15&from=1778279373000&to=now
110 22:29:34 Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-node=ip-10-0-49-168.eu-central-1.compute.internal&var-resolution=15s&from=1778279373000&to=now
111 22:29:34 Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group|=|gitlab-runner&var-filters=source|=|k8s-ci.aws.scandit.io&var-filters=namespace|=|gitlab-runner&var-filters=CI_PROJECT_ID|=|621&var-filters=CI_PIPELINE_ID|=|1586734&var-filters=CI_JOB_ID|=|54740770&sortOrder=Ascending&from=1778279373000&to=now
112 22:29:34 date: invalid date '-7 days'
113 22:29:34 date: invalid date '+7 days'
114 22:29:34 Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=~&job_name=secret-detection&project=internal/gitlab-templates
115 22:29:34
116 22:29:34 Setting up credentials for Gitlab Python registries
117 22:29:34 $ set -x
118 22:29:34 ++ echo '$ gitleaks git ./ --platform gitlab ${SECRET_DETECTION_LOG_OPTIONS} --report-format json --report-path ${SECRET_DETECTION_OUTPUT_FILE} --log-level ${SECRET_DETECTION_LOG_LEVEL} --verbose --redact ${SECRET_DETECTION_EXTRA_FLAGS}'
119 22:29:34 $ gitleaks git ./ --platform gitlab ${SECRET_DETECTION_LOG_OPTIONS} --report-format json --report-path ${SECRET_DETECTION_OUTPUT_FILE} --log-level ${SECRET_DETECTION_LOG_LEVEL} --verbose --redact ${SECRET_DETECTION_EXTRA_FLAGS}
120 22:29:34 ++ gitleaks git ./ --platform gitlab --log-opts b527f65394afd88252445570c85d4e7b02266e1b..d5797a8b5e04b552f7668652d1d91c113bb5aa74 --report-format json --report-path gl-secret-detection-report.json --log-level info --verbose --redact
121 22:29:34
122 22:29:34
123 22:29:34 │╲
124 22:29:34 │ ○
125 22:29:34 ○ ░
126 22:29:34 ░ gitleaks
127 22:29:34
128 22:29:34 10:29PM INF 1 commits scanned.
129 22:29:34 10:29PM INF scanned ~1057 bytes (1.06 KB) in 37.7ms
130 22:29:34 10:29PM INF no leaks found
131 22:29:34 ++ echo '$ set +x'
132 22:29:34 $ set +x
133 22:29:34 ++ set +x
134 22:29:34
135 22:29:34 Scout Analysis: https://scout.scandit.io/analysis/projects/621/jobs/54740770
136 22:29:34
137 22:29:34
138 22:29:34 Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-host=ip-10-0-49-168.eu-central-1.compute.internal&var-namespace=gitlab-runner&var-pod=runner-wrxjpbsjx-project-621-concurrent-1-o3nwow2w&var-resolution=15&from=1778279373000&to=1778279374000
139 22:29:34 Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=lu1rmx27z&var-node=ip-10-0-49-168.eu-central-1.compute.internal&var-resolution=15s&from=1778279373000&to=1778279374000
140 22:29:34 Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group|=|gitlab-runner&var-filters=source|=|k8s-ci.aws.scandit.io&var-filters=namespace|=|gitlab-runner&var-filters=CI_PROJECT_ID|=|621&var-filters=CI_PIPELINE_ID|=|1586734&var-filters=CI_JOB_ID|=|54740770&sortOrder=Ascending&from=1778279373000&to=1778279374000
141 22:29:34 date: invalid date '-7 days'
142 22:29:34 date: invalid date '+7 days'
143 22:29:34 Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=~&job_name=secret-detection&project=internal/gitlab-templates
144 22:29:34
145 22:29:34
146 22:29:34 section_end:1778279374:step_script
147 22:29:34 +section_start:1778279374:upload_artifacts_on_success
148 22:29:34 +Uploading artifacts for successful job
149 22:29:34 Uploading artifacts...
150 22:29:34 gl-secret-detection-report.json: found 1 matching artifact files and directories
151 22:29:35 Uploading artifacts as "secret_detection" to coordinator... 201 Created correlation_id=01KR4VBQTDNVRTP6HYN6Q5KPCE id=54740770 responseStatus=201 Created token=64_tMKNTx
152 22:29:35
153 22:29:35 section_end:1778279375:upload_artifacts_on_success
154 22:29:35 +section_start:1778279375:cleanup_file_variables
155 22:29:35 +Cleaning up project directory and file based variables
156 22:29:35
157 22:29:35 section_end:1778279375:cleanup_file_variables
158 22:29:35 +
159 22:29:35 Job succeeded
160