secret_detection
Passed Started
by
@pks-gitlab
Patrick Steinhardt
1Running with gitlab-runner 14.4.0-rc1 (bc99a056)2 on blue-4.shared.runners-manager.gitlab.com/default J2nyww-s5Using Docker executor with image registry.gitlab.com/gitlab-org/security-products/analyzers/secrets:3 ...6Authenticating with credentials from job payload (GitLab Registry)7Pulling docker image registry.gitlab.com/gitlab-org/security-products/analyzers/secrets:3 ...8Using docker image sha256:038b908750b7584a9978a05a7910cf77b4d62db7345fc0b14e76a5f4da8f881d for registry.gitlab.com/gitlab-org/security-products/analyzers/secrets:3 with digest registry.gitlab.com/gitlab-org/security-products/analyzers/secrets@sha256:c93d8e1b51ad3b0705fbfefc0480221f9589fd13e05c9162242e42e483c03d39 ...10Running on runner-j2nyww-s-project-2009901-concurrent-0 via runner-j2nyww-s-shared-1637579937-a48709e8...12$ eval "$CI_PRE_CLONE_SCRIPT"13Fetching changes...14Initialized empty Git repository in /builds/gitlab-org/gitaly/.git/15Created fresh repository.16Checking out c82a4b2b as refs/merge-requests/4117/merge...17Skipping Git submodules setup19Using docker image sha256:038b908750b7584a9978a05a7910cf77b4d62db7345fc0b14e76a5f4da8f881d for registry.gitlab.com/gitlab-org/security-products/analyzers/secrets:3 with digest registry.gitlab.com/gitlab-org/security-products/analyzers/secrets@sha256:c93d8e1b51ad3b0705fbfefc0480221f9589fd13e05c9162242e42e483c03d39 ...20$ if [ -n "$CI_COMMIT_TAG" ]; then echo "Skipping Secret Detection for tags. No code changes have occurred."; exit 0; fi21$ if [ "$CI_COMMIT_BRANCH" = "$CI_DEFAULT_BRANCH" ]; then echo "Running Secret Detection on default branch."; /analyzer run; exit 0; fi22$ git fetch origin $CI_DEFAULT_BRANCH $CI_COMMIT_REF_NAME24 * branch master -> FETCH_HEAD25 * branch pks-revert-materialized-valid-primaries-view-v14.4 -> FETCH_HEAD26$ git log --left-right --cherry-pick --pretty=format:"%H" refs/remotes/origin/$CI_DEFAULT_BRANCH...refs/remotes/origin/$CI_COMMIT_REF_NAME > "$CI_COMMIT_SHA"_commit_list.txt27$ export SECRET_DETECTION_COMMITS_FILE="$CI_COMMIT_SHA"_commit_list.txt28$ /analyzer run29[INFO] [secrets] [2021-11-22T11:19:59Z] ▶ GitLab secrets analyzer v3.23.030[INFO] [secrets] [2021-11-22T11:19:59Z] ▶ Detecting project31[INFO] [secrets] [2021-11-22T11:19:59Z] ▶ Found project in /builds/gitlab-org/gitaly32[INFO] [secrets] [2021-11-22T11:19:59Z] ▶ Running analyzer33[INFO] [secrets] [2021-11-22T11:20:16Z] ▶ Creating report34$ rm "$CI_COMMIT_SHA"_commit_list.txt36Uploading artifacts...37gl-secret-detection-report.json: found 1 matching files and directories 38Uploading artifacts as "secret_detection" to coordinator... ok id=1806504778 responseStatus=201 Created token=1X2vyvoz40Job succeeded