secret-detection ○ success
⏱
Duration: 10s
⏳
Queued: 1s
📁
Stage: test
🖥
Runner: linux-3
Average Duration
23s
This job: 10s
Failure Rate
1.4%
last 30 days
External Links
▶
Job Execution Phases
💡 Tip: Click on any phase bar to jump to that section in the log below
▶
Job Analysis
Job Status: Passed
Status: Job passed successfully
▶
Full Job Log
163 lines
Match - of 0
1
22:33:02
Running with gitlab-runner 18.9.0 (07e534ba)
2
22:33:02
on gitlab-runner-linux-3-59cc58cb8f-zhhfl m6BsGHXRX, system ID: r_cd3Y9Qk7x1y9
3
22:33:02
feature flags: FF_USE_FASTZIP:true, FF_USE_NEW_BASH_EVAL_STRATEGY:true, FF_USE_DYNAMIC_TRACE_FORCE_SEND_INTERVAL:true, FF_SCRIPT_SECTIONS:true, FF_ENABLE_JOB_CLEANUP:true, FF_USE_ADVANCED_POD_SPEC_CONFIGURATION:true, FF_PRINT_POD_EVENTS:true, FF_USE_DUMB_INIT_WITH_KUBERNETES_EXECUTOR:true, FF_LOG_IMAGES_CONFIGURED_FOR_JOB:true, FF_CLEAN_UP_FAILED_CACHE_EXTRACT:true, FF_GIT_URLS_WITHOUT_TOKENS:true, FF_WAIT_FOR_POD_TO_BE_REACHABLE:true, FF_USE_FLEETING_ACQUIRE_HEARTBEATS:true, FF_USE_JOB_ROUTER:true
4
22:33:02
Resolving secrets
5
22:33:02
section_start:1778279582:prepare_executor
6
22:33:02
+Preparing the "kubernetes" executor
7
22:33:02
Using Kubernetes namespace: gitlab-runner
8
22:33:02
Using Kubernetes executor with image registry.scandit.com/dockerfiles/gitleaks:v8.29.0 ...
9
22:33:02
Using attach strategy to execute scripts...
10
22:33:02
Using effective pull policy of [Always] for container build
11
22:33:02
Using effective pull policy of [Always] for container helper
12
22:33:02
Using effective pull policy of [Always] for container init-permissions
13
22:33:02
section_end:1778279582:prepare_executor
14
22:33:02
+section_start:1778279582:prepare_script
15
22:33:02
+Preparing environment
16
22:33:02
Using FF_USE_POD_ACTIVE_DEADLINE_SECONDS, the Pod activeDeadlineSeconds will be set to the job timeout: 1h0m0s...
17
22:33:02
WARNING: Advanced Pod Spec configuration enabled, merging the provided PodSpec to the generated one. This is a beta feature and is subject to change. Feedback is collected in this issue: https://gitlab.com/gitlab-org/gitlab-runner/-/issues/29659 ...
18
22:33:03
Subscribing to Kubernetes Pod events...
19
22:33:03
Type Reason Message
20
22:33:03
Normal Scheduled Successfully assigned gitlab-runner/runner-m6bsghxrx-project-621-concurrent-8-vomnua78 to gaius
21
22:33:03
Normal Pulling Pulling image "registry.gitlab.com/gitlab-org/gitlab-runner/gitlab-runner-helper:x86_64-v18.9.0"
22
22:33:05
Normal Pulled Successfully pulled image "registry.gitlab.com/gitlab-org/gitlab-runner/gitlab-runner-helper:x86_64-v18.9.0" in 1.767s (1.767s including waiting). Image size: 37521464 bytes.
23
22:33:05
Normal Created Created container: init-permissions
24
22:33:05
Normal Started Started container init-permissions
25
22:33:06
Normal Pulled Container image "registry.gitlab.com/gitlab-org/gitlab-runner/gitlab-runner-helper:x86_64-v18.9.0" already present on machine
26
22:33:06
Normal Created Created container: helper
27
22:33:06
Normal Started Started container helper
28
22:33:06
Normal Pulling Pulling image "registry.scandit.com/dockerfiles/gitleaks:v8.29.0"
29
22:33:07
Normal Pulled Successfully pulled image "registry.scandit.com/dockerfiles/gitleaks:v8.29.0" in 871ms (871ms including waiting). Image size: 24433236 bytes.
30
22:33:07
Normal Created Created container: build
31
22:33:07
Normal Started Started container build
32
22:33:10
Running on runner-m6bsghxrx-project-621-concurrent-8-vomnua78 via gitlab-runner-linux-3-59cc58cb8f-zhhfl...
33
22:33:10
34
22:33:10
section_end:1778279590:prepare_script
35
22:33:10
+section_start:1778279590:get_sources
36
22:33:10
+Getting source from Git repository
37
22:33:10
Gitaly correlation ID: 01KR4VJ2TEGXG6BMRDN1G7T6Q9
38
22:33:10
Fetching changes with git depth set to 1...
39
22:33:10
Initialized empty Git repository in /build/internal/gitlab-templates/.git/
40
22:33:10
Created fresh repository.
41
22:33:11
Checking out a6e804dd as detached HEAD (ref is master)...
42
22:33:11
43
22:33:11
Skipping Git submodules setup
44
22:33:11
45
22:33:11
section_end:1778279591:get_sources
46
22:33:11
+section_start:1778279591:step_script
47
22:33:11
+Executing "step_script" stage of the job script
48
22:33:11
section_start:1778279591:section_pre_build_script_0[hide_duration=true,collapsed=true]
$ function cleanup {
49
22:33:11
rv=$?
50
22:33:11
if [ $rv -ne 0 ]; then
51
22:33:11
echo ""
52
22:33:11
echo " Failure Cause Analysis might help, please open this link:"
53
22:33:11
echo " https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
54
22:33:11
echo ""
55
22:33:11
fi
56
22:33:11
echo ""
57
22:33:11
echo "Scout Analysis: https://scout.scandit.io/analysis/projects/${CI_PROJECT_ID}/jobs/${CI_JOB_ID}"
58
22:33:11
echo ""
59
22:33:11
echo ""
60
22:33:11
echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=${EPOCHSECONDS}000"
61
22:33:11
echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=${EPOCHSECONDS}000"
62
22:33:11
echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group%7C=%7Cgitlab-runner&var-filters=source%7C%3D%7C${LOKI_LOGSOURCE}&var-filters=namespace%7C%3D%7C${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID%7C%3D%7C${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID%7C%3D%7C${CI_PIPELINE_ID}&var-filters=CI_JOB_ID%7C%3D%7C${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=${EPOCHSECONDS}000"
63
22:33:11
__date_from=$(date -d "@$(( EPOCHSECONDS - 604800 ))" +%Y-%m-%d)
64
22:33:11
__date_to=$(date -d "@$(( EPOCHSECONDS + 604800 ))" +%Y-%m-%d)
65
22:33:11
echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=${__date_from}~${__date_to}&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
66
22:33:11
echo ""
67
22:33:11
exit $rv
68
22:33:11
}
69
22:33:11
trap cleanup EXIT
70
22:33:11
echo "INFO: This is the CI job pre_build_script"
71
22:33:11
echo "INFO: It's defined in the backend/infra/onprem/k8s repo."
72
22:33:11
echo "INFO: These additional Scandit variables are available to you:"
73
22:33:11
echo " SC_K8S_NODE_NAME: $SC_K8S_NODE_NAME"
74
22:33:11
echo " SC_K8S_IMAGE_ID: $SC_K8S_IMAGE_ID"
75
22:33:11
echo " SC_K8S_KYVERNO_PATCHES: |"
76
22:33:11
echo "$SC_K8S_KYVERNO_PATCHES" | sed 's/^/ /'
77
22:33:11
echo "cpu (r/l): ${SC_K8S_REQUESTS_CPU}/${SC_K8S_LIMITS_CPU}"
78
22:33:11
if command -v numfmt >/dev/null 2>&1; then
79
22:33:11
echo "memory (r/l): $(numfmt --to=iec --suffix=B $SC_K8S_REQUESTS_MEMORY)/$(numfmt --to=iec --suffix=B $SC_K8S_LIMITS_MEMORY)"
80
22:33:11
else
81
22:33:11
echo "memory (r/l): ${SC_K8S_REQUESTS_MEMORY}/${SC_K8S_LIMITS_MEMORY}"
82
22:33:11
fi
83
22:33:11
__start_time=${EPOCHSECONDS}
84
22:33:11
echo ""
85
22:33:11
echo "Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-host=${SC_K8S_NODE_NAME}&var-namespace=${SC_K8S_NAMESPACE}&var-pod=${HOSTNAME}&var-resolution=15&from=${__start_time}000&to=now"
86
22:33:11
echo "Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=${GRAFANA_DATASOURCE}&var-node=${SC_K8S_NODE_NAME}&var-resolution=15s&from=${__start_time}000&to=now"
87
22:33:11
echo "Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=${LOKI_DATASOURCE}&var-filters=log_group%7C%3D%7Cgitlab-runner&var-filters=source%7C%3D%7C${LOKI_LOGSOURCE}&var-filters=namespace%7C%3D%7C${SC_K8S_NAMESPACE}&var-filters=CI_PROJECT_ID%7C%3D%7C${CI_PROJECT_ID}&var-filters=CI_PIPELINE_ID%7C%3D%7C${CI_PIPELINE_ID}&var-filters=CI_JOB_ID%7C%3D%7C${CI_JOB_ID}&sortOrder=Ascending&from=${__start_time}000&to=now"
88
22:33:11
__date_from=$(date -d "@$(( EPOCHSECONDS - 604800 ))" +%Y-%m-%d)
89
22:33:11
__date_to=$(date -d "@$(( EPOCHSECONDS + 604800 ))" +%Y-%m-%d)
90
22:33:11
echo "Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=${__date_from}~${__date_to}&job_name=${CI_JOB_NAME}&project=${CI_PROJECT_PATH}"
91
22:33:11
echo ""
92
22:33:11
echo "Setting up credentials for Gitlab Python registries"
93
22:33:11
mkdir -p ~
94
22:33:11
echo "machine gitlab.scandit.com" > ~/.netrc
95
22:33:11
echo "login gitlab-ci-token" >> ~/.netrc
96
22:33:11
echo "password ${CI_JOB_TOKEN}" >> ~/.netrc
97
22:33:11
chmod 600 ~/.netrc
98
22:33:11
if command -v git &> /dev/null && [ "$(id -u)" -ne 0 ]; then
99
22:33:11
git config --global --add safe.directory $CI_PROJECT_DIR
100
22:33:11
fi
101
22:33:11
sleep infinity &
102
22:33:11
echo $! > ~/.bg_pid
103
22:33:11
section_end:1778279591:section_pre_build_script_0
104
22:33:11
INFO: This is the CI job pre_build_script
105
22:33:11
INFO: It's defined in the backend/infra/onprem/k8s repo.
106
22:33:11
INFO: These additional Scandit variables are available to you:
107
22:33:11
SC_K8S_NODE_NAME: gaius
108
22:33:11
SC_K8S_IMAGE_ID:
109
22:33:11
SC_K8S_KYVERNO_PATCHES: |
110
22:33:11
111
22:33:11
cpu (r/l): 1/8
112
22:33:11
memory (r/l): 1073741824/17179869184
113
22:33:11
114
22:33:11
Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=KpIiby5Vz&var-host=gaius&var-namespace=gitlab-runner&var-pod=runner-m6bsghxrx-project-621-concurrent-8-vomnua78&var-resolution=15&from=1778279591000&to=now
115
22:33:11
Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=KpIiby5Vz&var-node=gaius&var-resolution=15s&from=1778279591000&to=now
116
22:33:11
Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group%7C%3D%7Cgitlab-runner&var-filters=source%7C%3D%7Czrh.int.scandit.io&var-filters=namespace%7C%3D%7Cgitlab-runner&var-filters=CI_PROJECT_ID%7C%3D%7C621&var-filters=CI_PIPELINE_ID%7C%3D%7C1586755&var-filters=CI_JOB_ID%7C%3D%7C54740926&sortOrder=Ascending&from=1778279591000&to=now
117
22:33:11
Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=2026-05-01~2026-05-15&job_name=secret-detection&project=internal/gitlab-templates
118
22:33:11
119
22:33:11
Setting up credentials for Gitlab Python registries
120
22:33:11
$ set -x
121
22:33:11
++ echo '$ gitleaks git ./ --platform gitlab ${SECRET_DETECTION_LOG_OPTIONS} --report-format json --report-path ${SECRET_DETECTION_OUTPUT_FILE} --log-level ${SECRET_DETECTION_LOG_LEVEL} --verbose --redact ${SECRET_DETECTION_EXTRA_FLAGS}'
122
22:33:11
$ gitleaks git ./ --platform gitlab ${SECRET_DETECTION_LOG_OPTIONS} --report-format json --report-path ${SECRET_DETECTION_OUTPUT_FILE} --log-level ${SECRET_DETECTION_LOG_LEVEL} --verbose --redact ${SECRET_DETECTION_EXTRA_FLAGS}
123
22:33:11
++ gitleaks git ./ --platform gitlab --report-format json --report-path gl-secret-detection-report.json --log-level info --verbose --redact
124
22:33:11
125
22:33:11
○
126
22:33:11
│╲
127
22:33:11
│ ○
128
22:33:11
○ ░
129
22:33:11
░ gitleaks
130
22:33:11
131
22:33:11
10:33PM INF 1 commits scanned.
132
22:33:11
10:33PM INF scanned ~216897 bytes (216.90 KB) in 81.3ms
133
22:33:11
10:33PM INF no leaks found
134
22:33:11
++ echo '$ set +x'
135
22:33:11
$ set +x
136
22:33:11
++ set +x
137
22:33:11
138
22:33:11
Scout Analysis: https://scout.scandit.io/analysis/projects/621/jobs/54740926
139
22:33:11
140
22:33:11
141
22:33:11
Grafana Pod-View: https://grafana.scandit.com/d/k8s_views_pods/kubernetes-views-pods?orgId=1&refresh=1m&var-datasource=KpIiby5Vz&var-host=gaius&var-namespace=gitlab-runner&var-pod=runner-m6bsghxrx-project-621-concurrent-8-vomnua78&var-resolution=15&from=1778279591000&to=1778279591000
142
22:33:11
Grafana Node-View: https://grafana.scandit.com/d/k8s_views_nodes/kubernetes-views-nodes?orgId=1&refresh=1m&var-datasource=KpIiby5Vz&var-node=gaius&var-resolution=15s&from=1778279591000&to=1778279591000
143
22:33:11
Loki Logs: https://grafana.scandit.com/a/grafana-lokiexplore-app/explore/log_group/gitlab-runner/logs?var-ds=nVsAo7UVk&var-filters=log_group%7C=%7Cgitlab-runner&var-filters=source%7C%3D%7Czrh.int.scandit.io&var-filters=namespace%7C%3D%7Cgitlab-runner&var-filters=CI_PROJECT_ID%7C%3D%7C621&var-filters=CI_PIPELINE_ID%7C%3D%7C1586755&var-filters=CI_JOB_ID%7C%3D%7C54740926&sortOrder=Ascending&from=1778279591000&to=1778279591000
144
22:33:11
Lilibet Statistics: https://lilibet.scandit.io/dashboard/204-job-drill-down?date_range=2026-05-01~2026-05-15&job_name=secret-detection&project=internal/gitlab-templates
145
22:33:11
146
22:33:11
147
22:33:11
section_end:1778279591:step_script
148
22:33:11
+section_start:1778279591:upload_artifacts_on_success
149
22:33:11
+Uploading artifacts for successful job
150
22:33:12
Uploading artifacts...
151
22:33:12
gl-secret-detection-report.json: found 1 matching artifact files and directories
152
22:33:12
Uploading artifacts as "secret_detection" to coordinator... 201 Created correlation_id=01KR4VJCA4JCCAC0HD6MGWT73E id=54740926 responseStatus=201 Created token=64_xesEP1
153
22:33:12
154
22:33:12
section_end:1778279592:upload_artifacts_on_success
155
22:33:12
+section_start:1778279592:cleanup_file_variables
156
22:33:12
+Cleaning up project directory and file based variables
157
22:33:12
Removing gl-secret-detection-report.json
158
22:33:12
HEAD is now at a6e804d Merge branch 'renovate/docker-digests' into 'master'
159
22:33:12
160
22:33:12
section_end:1778279592:cleanup_file_variables
161
22:33:12
+
162
22:33:12
Job succeeded
163