prevent potential option injections in job input files

A malicious user may submit an input file starting with '-'.
A loosely-implemented webapp entrypoint could misinterpret
it as a command-line option a let the user inject arbitrary
options to the commands executed inside the job.

To prevent this the leading '-' in input filenames are silently
changed into '_'.
3 jobs for prevent-option-injections in 1 second (queued for 2 seconds)
latest
Status Job ID Name Coverage
  Build
failed #625591
allgo
bootstrap

00:00:01

 
  Test
skipped #625592
allowed to fail
django_pylint
 
  Cleanning
failed #625593
nettoyage

00:00:00

 
Name Stage Failure
failed
bootstrap Build
Running with gitlab-runner 12.7.1 (003fe500)
on gitlab-runner for allgo project. GsVG3gec
Using Shell executor...
Running on gitlabrunner...
bash: line 15: echo: write error: No space left on device
bash: line 15: echo: write error: No space left on device
ERROR: Job failed: exit status 1
failed
nettoyage Cleanning
Running with gitlab-runner 12.7.1 (003fe500)
on gitlab-runner for allgo project. GsVG3gec
Using Shell executor...
Running on gitlabrunner...
bash: line 15: echo: write error: No space left on device
bash: line 15: echo: write error: No space left on device
ERROR: Job failed: exit status 1