Running with gitlab-runner 13.12.0 (7a6612da)  on dsop-shared-gitlab-runner-5fcd8977b8-m6qmr JrExJ6yx  feature flags: FF_USE_LEGACY_KUBERNETES_EXECUTION_STRATEGY:false section_start:1631099996:resolve_secrets Resolving secrets section_end:1631099996:resolve_secrets section_start:1631099996:prepare_executor Preparing the "kubernetes" executor Using Kubernetes namespace: gitlab-runner-ironbank-dsop Using Kubernetes executor with image registry1.dso.mil/ironbank/ironbank-pipelines/pipeline-runner:0.3 ... Using attach strategy to execute scripts... section_end:1631099996:prepare_executor section_start:1631099996:prepare_script Preparing environment Waiting for pod gitlab-runner-ironbank-dsop/runner-jrexj6yx-project-5092-concurrent-0rrbbs to be running, status is Pending Waiting for pod gitlab-runner-ironbank-dsop/runner-jrexj6yx-project-5092-concurrent-0rrbbs to be running, status is Pending ContainersNotInitialized: "containers with incomplete status: [istio-init]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" Running on runner-jrexj6yx-project-5092-concurrent-0rrbbs via dsop-shared-gitlab-runner-5fcd8977b8-m6qmr... section_end:1631100002:prepare_script section_start:1631100002:get_sources Getting source from Git repository $ until [ $(curl --fail --silent --output /dev/stderr --write-out "%{http_code}" localhost:15020/healthz/ready) -eq 200 ]; do echo Waiting for Sidecar; sleep 3 ; done ; echo Sidecar available; Sidecar available Fetching changes with git depth set to 50... Initialized empty Git repository in /builds/JrExJ6yx/0/dsop/opensource/gdal/gdal/.git/ Created fresh repository. Checking out 0563fb48 as master... Skipping Git submodules setup section_end:1631100003:get_sources section_start:1631100003:download_artifacts Downloading artifacts Downloading artifacts for anchore-scan (6314030)... Downloading artifacts from coordinator... ok  id=6314030 responseStatus=200 OK token=BfQwQqrb WARNING: ci-artifacts/scan-results/anchore/: lchown ci-artifacts/scan-results/anchore/: operation not permitted (suppressing repeats) Downloading artifacts for hardening-manifest (6314024)... Downloading artifacts from coordinator... ok  id=6314024 responseStatus=200 OK token=2a29U3sz WARNING: ci-artifacts/preflight/: lchown ci-artifacts/preflight/: operation not permitted (suppressing repeats) Downloading artifacts for load-scripts (6314021)... Downloading artifacts from coordinator... ok  id=6314021 responseStatus=200 OK token=pas-vZc2 WARNING: ci-artifacts/[MASKED]/: lchown ci-artifacts/[MASKED]/: operation not permitted (suppressing repeats) Downloading artifacts for openscap-compliance (6314031)... Downloading artifacts from coordinator... ok  id=6314031 responseStatus=200 OK token=xRYmg6AL WARNING: ci-artifacts/scan-results/openscap/: lchown ci-artifacts/scan-results/openscap/: operation not permitted (suppressing repeats) Downloading artifacts for twistlock-scan (6314032)... Downloading artifacts from coordinator... ok  id=6314032 responseStatus=200 OK token=ZwfkVnV2 WARNING: ci-artifacts/scan-results/twistlock/: lchown ci-artifacts/scan-results/twistlock/: operation not permitted (suppressing repeats) Downloading artifacts for wl-compare-lint (6314025)... Downloading artifacts from coordinator... ok  id=6314025 responseStatus=200 OK token=GEzVVbzB WARNING: ci-artifacts/lint/: lchown ci-artifacts/lint/: operation not permitted (suppressing repeats) section_end:1631100004:download_artifacts section_start:1631100004:step_script Executing "step_script" stage of the job script $ pip3 install jsonschema # collapsed multi-line command Requirement already satisfied: jsonschema in /usr/local/lib/python3.9/site-packages (3.2.0) Requirement already satisfied: setuptools in /usr/local/lib/python3.9/site-packages (from jsonschema) (56.1.0) Requirement already satisfied: pyrsistent>=0.14.0 in /usr/local/lib/python3.9/site-packages (from jsonschema) (0.17.3) Requirement already satisfied: attrs>=17.4.0 in /usr/local/lib/python3.9/site-packages (from jsonschema) (21.2.0) Requirement already satisfied: six>=1.11.0 in /usr/local/lib/python3.9/site-packages (from jsonschema) (1.15.0) WARNING: Running pip as root will break packages and permissions. You should install packages reliably by using venv: https://pip.pypa.io/warnings/venv WARNING: You are using pip version 21.1.1; however, version 21.2.4 is available. You should consider upgrading via the '/usr/local/bin/python3.9 -m pip install --upgrade pip' command. INFO: Log level set to info INFO: Number of whitelisted vulnerabilities: 183 WARNING: Error writing log line to trace: transform: short internal buffer nchore_cve', cve_id='CVE-2021-35937', package='rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-33574', package='glibc-2.28-151.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3737', package='python3-libs-3.6.8-37.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22923', package='curl-7.61.1-18.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-27842', package='openjpeg2-2.3.1-6.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-36085', package='libsepol-2.9-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2019-20838', package='pcre-8.42-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3634', package='libssh-config-0.9.4-2.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-27843', package='openjpeg2-2.3.1-6.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='e7573262736ef52353cde3bae2617782', package=None, package_path=None), Finding(scan_source='anchore_comp', cve_id='463a9a24225c26f7a5bf3f38908e5cb3', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-20231', package='gnutls-3.6.14-8.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3634', package='libssh-0.9.4-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-24370', package='lua-libs-5.3.4-11.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82473-0', package=None, package_path=None), Finding(scan_source='anchore_comp', cve_id='639f6f1177735759703e928c14714a59', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82395-5', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35938', package='rpm-build-libs-4.14.3-14.el8_4', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-3580', package='nettle-3.4.1-4.el8_3', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-33928', package='libsolv-0.7.16-2.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-83401-0', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2018-25012', package='libwebp-1.0.0-3.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-36222', package='krb5-libs-1.18.2-8.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2018-25014', package='libwebp-1.0.0-3.el8_4', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2018-25013', package='libwebp-1.0.0-3.el8_4', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82267-6', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20232', package='gnutls-3.6.14-8.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3426', package='platform-python-3.6.8-37.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-3200', package='libsolv-0.7.16-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35939', package='python3-rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-36085', package='libsepol-2.9-2.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='3456a263793066e9b5063ada6e47917d', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-37750', package='krb5-libs-1.18.2-8.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-27845', package='openjpeg2-2.3.1-6.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35939', package='rpm-libs-4.14.3-14.el8_4', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82168-6', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27218', package='glib2-2.56.4-10.el8_4', package_path=None)} INFO: Vulnerabilities found in scanning stage: 179 WARNING: Error writing log line to trace: transform: short internal buffer ', package='curl-7.61.1-18.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-27842', package='openjpeg2-2.3.1-6.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-36085', package='libsepol-2.9-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2019-20838', package='pcre-8.42-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3634', package='libssh-config-0.9.4-2.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-27843', package='openjpeg2-2.3.1-6.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='e7573262736ef52353cde3bae2617782', package=None, package_path=None), Finding(scan_source='anchore_comp', cve_id='463a9a24225c26f7a5bf3f38908e5cb3', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-20231', package='gnutls-3.6.14-8.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3634', package='libssh-0.9.4-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-24370', package='lua-libs-5.3.4-11.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82473-0', package=None, package_path=None), Finding(scan_source='anchore_comp', cve_id='639f6f1177735759703e928c14714a59', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82395-5', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35938', package='rpm-build-libs-4.14.3-14.el8_4', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-3580', package='nettle-3.4.1-4.el8_3', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-33928', package='libsolv-0.7.16-2.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-83401-0', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2018-25012', package='libwebp-1.0.0-3.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-36222', package='krb5-libs-1.18.2-8.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2018-25014', package='libwebp-1.0.0-3.el8_4', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2018-25013', package='libwebp-1.0.0-3.el8_4', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82267-6', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20232', package='gnutls-3.6.14-8.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3426', package='platform-python-3.6.8-37.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-3200', package='libsolv-0.7.16-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35939', package='python3-rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-36085', package='libsepol-2.9-2.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='3456a263793066e9b5063ada6e47917d', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-37750', package='krb5-libs-1.18.2-8.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-27845', package='openjpeg2-2.3.1-6.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35939', package='rpm-libs-4.14.3-14.el8_4', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82168-6', package=None, package_path=None)} INFO: ALL VULNERABILITIES WHITELISTED INFO: Scans are passing 100% section_end:1631100006:step_script section_start:1631100006:cleanup_file_variables Cleaning up file based variables section_end:1631100007:cleanup_file_variables Job succeeded