Running with gitlab-runner 14.7.0 (98daeee0)  on System Shared Runner J9EsdQ92 section_start:1654697764:resolve_secrets Resolving secrets section_end:1654697764:resolve_secrets section_start:1654697764:prepare_executor Preparing the "docker" executor Using Docker executor with image registry.gitlab.com/gitlab-org/security-products/analyzers/secrets:3 ... Pulling docker image gitlab/gitlab-runner-helper:x86_64-6fbc7474 ... Using docker image sha256:4ab73fe41bd466dff16a0e732b568862dce676f1d49de2a85309349266c882f8 for gitlab/gitlab-runner-helper:x86_64-6fbc7474 with digest gitlab/gitlab-runner-helper@sha256:6275194f2d67051ee4538cbd086c4c61b35e15d4439f76b5b5b710bee7344895 ... Using docker image sha256:4ab73fe41bd466dff16a0e732b568862dce676f1d49de2a85309349266c882f8 for gitlab/gitlab-runner-helper:x86_64-6fbc7474 with digest gitlab/gitlab-runner-helper@sha256:6275194f2d67051ee4538cbd086c4c61b35e15d4439f76b5b5b710bee7344895 ... Pulling docker image registry.gitlab.com/gitlab-org/security-products/analyzers/secrets:3 ... Using docker image sha256:f390210539d9224965764b376a06660c481d104f00e0043c7209d8396fe51ef1 for registry.gitlab.com/gitlab-org/security-products/analyzers/secrets:3 with digest registry.gitlab.com/gitlab-org/security-products/analyzers/secrets@sha256:e9f2df058eda3a86987db272fc29aa72b7de95754dda2873e94ddc74c4a3d340 ... section_end:1654697768:prepare_executor section_start:1654697768:prepare_script Preparing environment Using docker image sha256:4ab73fe41bd466dff16a0e732b568862dce676f1d49de2a85309349266c882f8 for gitlab/gitlab-runner-helper:x86_64-6fbc7474 with digest gitlab/gitlab-runner-helper@sha256:6275194f2d67051ee4538cbd086c4c61b35e15d4439f76b5b5b710bee7344895 ... Running on osm-gitlab via 041affc38694... section_end:1654697770:prepare_script section_start:1654697770:get_sources Getting source from Git repository Using docker image sha256:4ab73fe41bd466dff16a0e732b568862dce676f1d49de2a85309349266c882f8 for gitlab/gitlab-runner-helper:x86_64-6fbc7474 with digest gitlab/gitlab-runner-helper@sha256:6275194f2d67051ee4538cbd086c4c61b35e15d4439f76b5b5b710bee7344895 ... Fetching changes with git depth set to 50... Initialized empty Git repository in /builds/gitlab/osm/tests/.git/ Created fresh repository. Checking out d26d5a13 as master... Skipping Git submodules setup section_end:1654697774:get_sources section_start:1654697774:step_script Executing "step_script" stage of the job script Using docker image sha256:f390210539d9224965764b376a06660c481d104f00e0043c7209d8396fe51ef1 for registry.gitlab.com/gitlab-org/security-products/analyzers/secrets:3 with digest registry.gitlab.com/gitlab-org/security-products/analyzers/secrets@sha256:e9f2df058eda3a86987db272fc29aa72b7de95754dda2873e94ddc74c4a3d340 ... $ if [[ $CI_COMMIT_TAG ]]; then echo "Skipping Secret Detection for tags. No code changes have occurred."; exit 0; fi $ if [[ $CI_COMMIT_BRANCH == $CI_DEFAULT_BRANCH ]]; then echo "Running Secret Detection on default branch."; /analyzer run; exit 0; fi Running Secret Detection on default branch. [INFO] [secrets] [2022-06-08T14:16:16Z] ▶ GitLab secrets analyzer v3.27.1 [INFO] [secrets] [2022-06-08T14:16:16Z] ▶ Detecting project [INFO] [secrets] [2022-06-08T14:16:16Z] ▶ Found relevant files in project, analyzing entire repository [INFO] [secrets] [2022-06-08T14:16:16Z] ▶ Running analyzer [DEBU] [secrets] [2022-06-08T14:16:16Z] ▶ /builds/gitlab/osm/tests/.gitlab/secret-detection-ruleset.toml not found, ruleset support will be disabled. [DEBU] [secrets] [2022-06-08T14:16:16Z] ▶ Running gitleaks command: /usr/local/bin/gitleaks detect --report-path /tmp/gitleaks-1605860957.json --report-format json --source /builds/gitlab/osm/tests --config /gitleaks.toml --exit-code 0 --log-level debug --no-git [INFO] [secrets] [2022-06-08T14:16:16Z] ▶ [INFO] [secrets] [2022-06-08T14:16:16Z] ▶ ○ [INFO] [secrets] [2022-06-08T14:16:16Z] ▶ │╲ [INFO] [secrets] [2022-06-08T14:16:16Z] ▶ │ ○ [INFO] [secrets] [2022-06-08T14:16:16Z] ▶ ○ ░ [INFO] [secrets] [2022-06-08T14:16:16Z] ▶ ░ gitleaks [INFO] [secrets] [2022-06-08T14:16:16Z] ▶ [INFO] [secrets] [2022-06-08T14:16:16Z] ▶ 2:16PM DBG Using gitleaks config /gitleaks.toml from `--config` [INFO] [secrets] [2022-06-08T14:16:17Z] ▶ 2:16PM INF scan completed in 566.312363ms [INFO] [secrets] [2022-06-08T14:16:17Z] ▶ 2:16PM INF no leaks found [INFO] [secrets] [2022-06-08T14:16:17Z] ▶ Creating report [DEBU] [secrets] [2022-06-08T14:16:17Z] ▶ /builds/gitlab/osm/tests/.gitlab/secret-detection-ruleset.toml not found, ruleset support will be disabled. [DEBU] [secrets] [2022-06-08T14:16:17Z] ▶ Applying report overrides [DEBU] [secrets] [2022-06-08T14:16:17Z] ▶ /builds/gitlab/osm/tests/.gitlab/secret-detection-ruleset.toml not found, ruleset support will be disabled. [DEBU] [secrets] [2022-06-08T14:16:17Z] ▶ Optimizing JSON Output section_end:1654697777:step_script section_start:1654697777:upload_artifacts_on_success Uploading artifacts for successful job Using docker image sha256:4ab73fe41bd466dff16a0e732b568862dce676f1d49de2a85309349266c882f8 for gitlab/gitlab-runner-helper:x86_64-6fbc7474 with digest gitlab/gitlab-runner-helper@sha256:6275194f2d67051ee4538cbd086c4c61b35e15d4439f76b5b5b710bee7344895 ... Uploading artifacts... gl-secret-detection-report.json: found 1 matching files and directories Uploading artifacts as "secret_detection" to coordinator... ok id=34673 responseStatus=201 Created token=7CC-rqyZ section_end:1654697780:upload_artifacts_on_success section_start:1654697780:cleanup_file_variables Cleaning up project directory and file based variables Using docker image sha256:4ab73fe41bd466dff16a0e732b568862dce676f1d49de2a85309349266c882f8 for gitlab/gitlab-runner-helper:x86_64-6fbc7474 with digest gitlab/gitlab-runner-helper@sha256:6275194f2d67051ee4538cbd086c4c61b35e15d4439f76b5b5b710bee7344895 ... section_end:1654697781:cleanup_file_variables Job succeeded