[0KRunning with gitlab-runner 17.1.0 (fe451d5a)[0;m [0K on osm-cicd-10 S9P1hQmo, system ID: s_0c544012072a[0;m [0K[36;1mResolving secrets[0;m[0;m section_start:1744401792:prepare_executor [0K[0K[36;1mPreparing the "docker" executor[0;m[0;m [0KUsing Docker executor with image registry.gitlab.com/security-products/secrets:6 ...[0;m [0KPulling docker image registry.gitlab.com/security-products/secrets:6 ...[0;m [0KUsing docker image sha256:5b2d7c5beeae28b0006cad45fd782414140644235c803d90429b862cf2310dd5 for registry.gitlab.com/security-products/secrets:6 with digest registry.gitlab.com/security-products/secrets@sha256:35f2839d838a50b318187c44bcead2994493a5b45eb5a9fb7fe77afef6fe7d65 ...[0;m section_end:1744401795:prepare_executor [0Ksection_start:1744401795:prepare_script [0K[0K[36;1mPreparing environment[0;m[0;m Running on runner-s9p1hqmo-project-67-concurrent-2 via osm-cicd-10... section_end:1744401796:prepare_script [0Ksection_start:1744401796:get_sources [0K[0K[36;1mGetting source from Git repository[0;m[0;m [32;1mFetching changes with git depth set to 50...[0;m Reinitialized existing Git repository in /builds/gitlab/osm/nbi/.git/ [32;1mChecking out 844f6482 as detached HEAD (ref is master)...[0;m Removing gl-secret-detection-report.json [32;1mSkipping Git submodules setup[0;m section_end:1744401798:get_sources [0Ksection_start:1744401798:step_script [0K[0K[36;1mExecuting "step_script" stage of the job script[0;m[0;m [0KUsing docker image sha256:5b2d7c5beeae28b0006cad45fd782414140644235c803d90429b862cf2310dd5 for registry.gitlab.com/security-products/secrets:6 with digest registry.gitlab.com/security-products/secrets@sha256:35f2839d838a50b318187c44bcead2994493a5b45eb5a9fb7fe77afef6fe7d65 ...[0;m [32;1m$ /analyzer run[0;m [33;49m[DEBUG] ▶ Choosing the input analyzer report: '/builds/gitlab/osm/nbi/gl-secret-detection-report.json' [0;32m[INFO] [secrets] [2025-04-11T20:03:18Z] [/go/src/app/main.go:25] ▶ GitLab secrets analyzer v6.28.0[0m [0;32m[INFO] [secrets] [2025-04-11T20:03:18Z] [/go/src/app/main.go:75] ▶ Using secret detection rules version "0.9.0" from "https://gitlab.com/gitlab-org/security-products/secret-detection/secret-detection-rules/-/releases/v0.9.0"[0m [0;35m[DEBU] [secrets] [2025-04-11T20:03:18Z] [/go/pkg/mod/gitlab.com/gitlab-org/security-products/analyzers/command/v3@v3.1.1/run.go:267] ▶ ANALYZER_TARGET_DIR,CI_PROJECT_DIR=/builds/gitlab/osm/nbi[0m [0;35m[DEBU] [secrets] [2025-04-11T20:03:18Z] [/go/pkg/mod/gitlab.com/gitlab-org/security-products/analyzers/command/v3@v3.1.1/run.go:267] ▶ ANALYZER_ARTIFACT_DIR,CI_PROJECT_DIR=/builds/gitlab/osm/nbi[0m [0;35m[DEBU] [secrets] [2025-04-11T20:03:18Z] [/go/pkg/mod/gitlab.com/gitlab-org/security-products/analyzers/command/v3@v3.1.1/run.go:267] ▶ ANALYZER_INDENT_REPORT=false[0m [0;35m[DEBU] [secrets] [2025-04-11T20:03:18Z] [/go/pkg/mod/gitlab.com/gitlab-org/security-products/analyzers/command/v3@v3.1.1/run.go:267] ▶ ANALYZER_OPTIMIZE_REPORT=true[0m [0;35m[DEBU] [secrets] [2025-04-11T20:03:18Z] [/go/pkg/mod/gitlab.com/gitlab-org/security-products/analyzers/command/v3@v3.1.1/run.go:267] ▶ ADDITIONAL_CA_CERT_BUNDLE=[0m [0;35m[DEBU] [secrets] [2025-04-11T20:03:18Z] [/go/pkg/mod/gitlab.com/gitlab-org/security-products/analyzers/command/v3@v3.1.1/run.go:267] ▶ SEARCH_IGNORED_DIRS=bundle,node_modules,vendor,tmp,test,tests[0m [0;35m[DEBU] [secrets] [2025-04-11T20:03:18Z] [/go/pkg/mod/gitlab.com/gitlab-org/security-products/analyzers/command/v3@v3.1.1/run.go:267] ▶ SEARCH_IGNORE_HIDDEN_DIRS=true[0m [0;35m[DEBU] [secrets] [2025-04-11T20:03:18Z] [/go/pkg/mod/gitlab.com/gitlab-org/security-products/analyzers/command/v3@v3.1.1/run.go:267] ▶ SEARCH_MAX_DEPTH=2[0m [0;35m[DEBU] [secrets] [2025-04-11T20:03:18Z] [/go/pkg/mod/gitlab.com/gitlab-org/security-products/analyzers/command/v3@v3.1.1/run.go:267] ▶ SECRET_DETECTION_LOG_OPTIONS=[0m [0;35m[DEBU] [secrets] [2025-04-11T20:03:18Z] [/go/pkg/mod/gitlab.com/gitlab-org/security-products/analyzers/command/v3@v3.1.1/run.go:267] ▶ SECRET_DETECTION_HISTORIC_SCAN=false[0m [0;35m[DEBU] [secrets] [2025-04-11T20:03:18Z] [/go/pkg/mod/gitlab.com/gitlab-org/security-products/analyzers/command/v3@v3.1.1/run.go:267] ▶ SECRET_DETECTION_EXCLUDED_PATHS=[0m [0;35m[DEBU] [secrets] [2025-04-11T20:03:18Z] [/go/pkg/mod/gitlab.com/gitlab-org/security-products/analyzers/common/v3@v3.4.0/cacert/cacert.go:65] ▶ CA cert bundle not imported: empty bundle or empty target path[0m [0;32m[INFO] [secrets] [2025-04-11T20:03:18Z] [/go/pkg/mod/gitlab.com/gitlab-org/security-products/analyzers/command/v3@v3.1.1/run.go:131] ▶ Detecting project[0m [0;32m[INFO] [secrets] [2025-04-11T20:03:18Z] [/go/pkg/mod/gitlab.com/gitlab-org/security-products/analyzers/command/v3@v3.1.1/run.go:153] ▶ Analyzer will attempt to analyze all projects in the repository[0m [0;32m[INFO] [secrets] [2025-04-11T20:03:18Z] [/go/pkg/mod/gitlab.com/gitlab-org/security-products/analyzers/command/v3@v3.1.1/run.go:165] ▶ Loading ruleset for /builds/gitlab/osm/nbi[0m [0;33m[WARN] [secrets] [2025-04-11T20:03:18Z] [/go/pkg/mod/gitlab.com/gitlab-org/security-products/analyzers/ruleset/v3@v3.3.2/ruleset.go:263] ▶ /builds/gitlab/osm/nbi/.gitlab/secret-detection-ruleset.toml not found, ruleset customization will be disabled.[0m [0;32m[INFO] [secrets] [2025-04-11T20:03:18Z] [/go/pkg/mod/gitlab.com/gitlab-org/security-products/analyzers/command/v3@v3.1.1/run.go:175] ▶ Running analyzer[0m [0;35m[DEBU] [secrets] [2025-04-11T20:03:18Z] [/go/src/app/analyze.go:103] ▶ Running gitleaks command: /usr/local/bin/gitleaks detect --report-path /tmp/gitleaks-61549133.json --report-format json --source /builds/gitlab/osm/nbi --config /gitleaks.toml --exit-code 0 --log-level debug --no-git [0m [0;32m[INFO] [secrets] [2025-04-11T20:03:18Z] [/go/src/app/analyze.go:136] ▶ [0m [0;32m[INFO] [secrets] [2025-04-11T20:03:18Z] [/go/src/app/analyze.go:136] ▶ ○[0m [0;32m[INFO] [secrets] [2025-04-11T20:03:18Z] [/go/src/app/analyze.go:136] ▶ │╲[0m [0;32m[INFO] [secrets] [2025-04-11T20:03:18Z] [/go/src/app/analyze.go:136] ▶ │ ○[0m [0;32m[INFO] [secrets] [2025-04-11T20:03:18Z] [/go/src/app/analyze.go:136] ▶ ○ ░[0m [0;32m[INFO] [secrets] [2025-04-11T20:03:18Z] [/go/src/app/analyze.go:136] ▶ ░ gitleaks[0m [0;32m[INFO] [secrets] [2025-04-11T20:03:18Z] [/go/src/app/analyze.go:136] ▶ [0m [0;32m[INFO] [secrets] [2025-04-11T20:03:18Z] [/go/src/app/analyze.go:136] ▶ [90m8:03PM[0m DBG using github.com/wasilibs/go-re2 regex engine[0m [0;32m[INFO] [secrets] [2025-04-11T20:03:18Z] [/go/src/app/analyze.go:136] ▶ [90m8:03PM[0m DBG using gitleaks config /gitleaks.toml from `--config`[0m [0;32m[INFO] [secrets] [2025-04-11T20:03:18Z] [/go/src/app/analyze.go:136] ▶ [90m8:03PM[0m [32mINF[0m [1mscanned ~1341267 bytes (1.34 MB) in 162ms[0m[0m [0;32m[INFO] [secrets] [2025-04-11T20:03:18Z] [/go/src/app/analyze.go:136] ▶ [90m8:03PM[0m [32mINF[0m [1mno leaks found[0m[0m [0;32m[INFO] [secrets] [2025-04-11T20:03:18Z] [/go/pkg/mod/gitlab.com/gitlab-org/security-products/analyzers/command/v3@v3.1.1/run.go:189] ▶ Creating report[0m [0;35m[DEBU] [secrets] [2025-04-11T20:03:18Z] [/go/src/app/rules/parser.go:32] ▶ Parsing rule file /gitleaks.toml[0m [0;35m[DEBU] [secrets] [2025-04-11T20:03:18Z] [/go/pkg/mod/gitlab.com/gitlab-org/security-products/analyzers/report/v5@v5.7.0/report.go:214] ▶ No Ids found to disable[0m [0;35m[DEBU] [secrets] [2025-04-11T20:03:18Z] [/go/pkg/mod/gitlab.com/gitlab-org/security-products/analyzers/report/v5@v5.7.0/report.go:256] ▶ Applying report overrides[0m [0;35m[DEBU] [secrets] [2025-04-11T20:03:18Z] [/go/pkg/mod/gitlab.com/gitlab-org/security-products/analyzers/report/v5@v5.7.0/report.go:275] ▶ No Ids found to override[0m [0;35m[DEBU] [secrets] [2025-04-11T20:03:18Z] [/go/pkg/mod/gitlab.com/gitlab-org/security-products/analyzers/command/v3@v3.1.1/jsonout.go:54] ▶ Optimizing JSON Output[0m [0;32m[INFO] [2025-04-11T20:03:18Z] [/build/clicmds/query.go:89] ▶ /builds/gitlab/osm/nbi/gl-report-post.json written[0m section_end:1744401799:step_script [0Ksection_start:1744401799:upload_artifacts_on_success [0K[0K[36;1mUploading artifacts for successful job[0;m[0;m [32;1mUploading artifacts...[0;m gl-secret-detection-report.json: found 1 matching artifact files and directories[0;m Uploading artifacts as "secret_detection" to coordinator... 201 Created[0;m id[0;m=112723 responseStatus[0;m=201 Created token[0;m=glcbt-64 section_end:1744401800:upload_artifacts_on_success [0Ksection_start:1744401800:cleanup_file_variables [0K[0K[36;1mCleaning up project directory and file based variables[0;m[0;m section_end:1744401800:cleanup_file_variables [0K[32;1mJob succeeded[0;m