Add AWS Secret Access Key regex

Adds regex to detect AWS Secret Access Keys
21 jobs for add-aws-regexes in 4 minutes and 20 seconds (queued for 1 second)
latest
Status Job ID Name Coverage
  Pre Build
passed #756322483
go build

00:00:57

passed #756322499
go check analyzer version

00:00:51

passed #756322495
go lint

00:00:36

passed #756322497
go mod tidy

00:00:41

passed #756322485
go test

00:01:09

35.4%
 
  Build Image
passed #756322501
build tmp image

00:01:56

 
  Test
passed #756322513
check image size

00:00:10

passed #756322506
container_scanning

00:00:44

passed #756322518
danger-review

00:00:48

passed #756322511
gemnasium-dependency_scanning

00:00:25

passed #756322504
gosec-sast

00:00:49

failed #756322516
integration test

00:01:12

passed #756322508
license_scanning

00:01:34

passed #756322509
secret_detection

00:00:14

failed secrets-commits-file-qa

failed secrets-commits-file-qa-limit-git-depth

failed secrets-commits-qa

failed secrets-qa

passed test-custom-ca-bundle

 
  Performance Metrics
skipped #756322526
check analyzer scan duration
 
  Release Version
skipped #756322528
tag branch
 
Name Stage Failure
failed
integration test Test
Status: Downloaded newer image for registry.gitlab.com/gitlab-org/security-products/analyzers/secrets/tmp:aecef49f470bf9aa84a85c7931410347976668db
[INFO] [secrets] [2020-09-24T20:01:43Z] ▶ GitLab secrets analyzer v3.9.4
[INFO] [secrets] [2020-09-24T20:01:43Z] ▶ Running non-historic scan
[ERRO] [secrets] [2020-09-24T20:01:43Z] ▶ Couldn't run the gitleaks command: exit status 2

[ERRO] [secrets] [2020-09-24T20:01:43Z] ▶ Gitleaks analysis failed: exit status 2

exit status 2
ERROR: Job failed: exit code 2