UNCLASSIFIED

Update helm chart artifactory to v11.12.2

14 jobs for renovate/artifactory-11.x in 18 minutes and 43 seconds (queued for 4 seconds)
Status Job ID Name Coverage
  .Pre
passed #2565723
ironbank
load scripts

00:00:07

 
  Preflight
passed #2565724
ironbank
folder structure

00:00:05

passed #2565725
ironbank
hardening_manifest

00:00:10

 
  Lint
passed #2565726
ironbank
wl compare lint

00:00:11

 
  Finding Compare
failed #2565727
ironbank allowed to fail
vat compare

00:00:08

 
  Import Artifacts
passed #2565728
ironbank
import artifacts

00:01:42

 
  Scan Artifacts
passed #2565729
ironbank
clamav scan

00:02:42

 
  Build
passed #2565730
ironbank-isolated
build

00:06:36

 
  Scanning
passed #2565734
ironbank
anchore scan

00:04:38

passed #2565731
ironbank
openscap compliance

00:01:36

passed #2565732
ironbank
openscap cve

00:05:33

passed #2565733
ironbank
twistlock scan

00:01:21

 
  Csv Output
passed #2565735
ironbank
csv output

00:01:14

 
  Check Cves
failed #2565736
ironbank allowed to fail
check cves

00:00:17

 
Name Stage Failure
failed
check cves Check Cves
ERROR: twistlock_cve                 CVE-2020-29582                kotlin-stdlib_kotlin-stdlib-1.3.50    None                          
ERROR: twistlock_cve CVE-2020-28500 lodash-4.17.20 None
ERROR: twistlock_cve CVE-2021-23337 lodash-4.17.20 None
ERROR: twistlock_cve CVE-2021-22883 node-10.23.1 None
ERROR: twistlock_cve CVE-2021-22884 node-10.23.1 None
ERROR: twistlock_cve CVE-2021-22112 spring-security-core_spring-security-core-5.4.0 None
ERROR: twistlock_cve PRISMA-2021-0036 ua-parser-js-0.7.23 None
Cleaning up file based variables
ERROR: Job failed: command terminated with exit code 1
failed
vat compare Finding Compare
('CVE-2021-3445', 'anchore_cve', 'python3-libdnf-0.48.0-5.el8\nhttps://access.redhat.com/security/cve/CVE-2021-3445', 'python3-libdnf-0.48.0-5.el8', None)
('CVE-2021-28153', 'twistlock_cve', 'An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)', 'glib2-2.56.4-8.el8', None)
('CVE-2021-20231', 'anchore_cve', 'gnutls-3.6.14-7.el8_3\nhttps://access.redhat.com/security/cve/CVE-2021-20231', 'gnutls-3.6.14-7.el8_3', None)
Uploading artifacts for failed job
Uploading artifacts...
ci-artifacts/compare/: found 2 matching files and directories

Uploading artifacts as "archive" to coordinator... ok
id=2565727 responseStatus=201 Created token=CwFWMKv2
Cleaning up file based variables
ERROR: Job failed: command terminated with exit code 4