Files
gitlabhq/gems/gitlab-secret_detection

Gitlab::SecretDetection

The gitlab-secret_detection gem performs keyword and regex matching on input payloads that may include secrets. The gem accepts one or more payloads, matches them against a defined ruleset of regular expressions, and returns scan results.

Scan parameters

The method for triggering the scan ( i.e.,Gitlab::SecretDetection.secrets_scan) accepts the following parameters:

Parameter Type Required Default Description
payloads Array Yes NA Array of input payloads. Each payload has attributes: id, and data`.
timeout Number No 60s The maximum duration allowed for the scan to run on a commit request comprising multiple blobs. If the specified timeout elapses, the scan is automatically terminated. The timeout duration is specified in seconds but can also accept floating-point values to denote smaller units. For instance, use 0.5 to represent 500ms.
payload_timeout Number No 5s The maximum duration allowed for the scan to run on an individual payload. Upon expiration of the specified timeout, the scan is interrupted for the current payload and advances to the next payload in the request. The timeout duration is specified in seconds but can also accept floating-point values to denote smaller units. For instance, use 0.5 to represent 500ms.
subprocess Boolean No true Runs the scan operation within a subprocess rather than the main process. This design aims to mitigate memory overconsumption issues that may arise from scanning multiple large paylaods within a single subprocess. Check here for more details.
Scan Constraints
Name Value Description
MAX_PROCS_PER_REQUEST 5 The maximum number of processes spawned per commit request.
MIN_CHUNK_SIZE_PER_PROC_BYTES 2MiB The minimum cumulative size of blobs necessary to initiate the creation of a new subprocess, where the scan will be executed within that dedicated process.
Ruleset Source

The Ruleset file referenced for running the Pre-receive Secret Detection is located here.