UNCLASSIFIED

You need to sign in or sign up before continuing.

Merge branch 'renovate/docker-goharbor-registry-photon-2.x' into 'development'

Update goharbor/registry-photon Docker tag to v2.2.0

See merge request !16
19 jobs for development in 13 minutes and 49 seconds (queued for 14 minutes and 53 seconds)
Status Job ID Name Coverage
  .Pre
passed #2224526
ironbank
load scripts

00:00:09

 
  Preflight
passed #2224527
ironbank
folder structure

00:00:09

passed #2224529
ironbank
hardening_manifest

00:00:15

passed #2224528
ironbank
hardening_manifest migration

00:00:13

 
  Lint
passed #2224530
ironbank
wl compare lint

00:00:13

 
  Import Artifacts
passed #2224531
ironbank
import artifacts

00:00:22

 
  Scan Artifacts
passed #2224532
ironbank
clamav scan

00:01:10

 
  Build
passed #2224533
ironbank-isolated
build

00:01:41

 
  Scanning
passed #2224537
ironbank
anchore scan

00:06:47

passed #2224534
ironbank
openscap compliance

00:01:06

passed #2224535
ironbank
openscap cve

00:06:24

passed #2224536
ironbank
twistlock scan

00:00:32

 
  Csv Output
passed #2224538
ironbank
csv output

00:00:47

 
  Check Cves
failed #2224539
ironbank allowed to fail
check cves

00:00:14

 
  Documentation
passed #2224540
ironbank
sign image

00:00:26

passed #2224541
ironbank
sign manifest

00:00:17

passed #2224542
ironbank
write json documentation

00:00:20

 
  Publish
passed #2224543
ironbank
upload to s3

00:01:07

 
  Vat
passed #2224544
ironbank
vat

00:00:31

 
Name Stage Failure
failed
check cves Check Cves
INFO: Whitelisted vulnerabilities: {'oscapcomp_CCE-80938-4', 'oscapcomp_CCE-82949-9', 'tl_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'anchorecomp_639f6f1177735759703e928c14714a59', 'anchorecve_CVE-2021-3177-platform-python-3.6.8-31.el8', 'tl_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'anchorecomp_addbb93c22e9b0988b8b40392a4538cb', 'anchorecve_CVE-2020-16135-libssh-config-0.9.4-2.el8', 'anchorecve_CVE-2020-24977-libxml2-2.9.7-8.el8', 'anchorecve_CVE-2020-8231-libcurl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-82360-9', 'anchorecve_CVE-2019-25013-glibc-common-2.28-127.el8_3.2', 'anchorecve_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-29362-p11-kit-trust-0.23.14-5.el8_0', 'oscapcomp_CCE-82494-6', 'anchorecve_CVE-2020-15358-sqlite-libs-3.26.0-11.el8', 'anchorecve_CVE-2020-8286-libcurl-7.61.1-14.el8_3.1', 'anchorecomp_34de21e516c0ca50a96e5386f163f8bf', 'anchorecve_CVE-2020-27619-python3-libs-3.6.8-31.el8', 'anchorecomp_abb121e9621abdd452f65844954cf1c1', 'anchorecve_CVE-2020-13776-systemd-libs-239-41.el8_3.1', 'tl_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'anchorecomp_c2e44319ae5b3b040044d8ae116d1c2f', 'anchorecve_CVE-2020-35512-dbus-libs-1.12.8-12.el8_3', 'anchorecve_CVE-2019-25013-glibc-2.28-127.el8_3.2', 'tl_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'tl_CVE-2020-13776-systemd-239-41.el8_3.1', 'anchorecve_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-24977-python3-libxml2-2.9.7-8.el8', 'anchorecve_CVE-2020-13434-sqlite-libs-3.26.0-11.el8', 'oscapcomp_CCE-82368-2', 'tl_CVE-2021-3326-glibc-2.28-127.el8_3.2', 'anchorecve_CVE-2020-35512-dbus-tools-1.12.8-12.el8_3', 'tl_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-24370-lua-libs-5.3.4-11.el8', 'tl_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecomp_68e630cef4a8533b139875aa5fc54da5', 'anchorecve_CVE-2020-27618-glibc-minimal-langpack-2.28-127.el8_3.2', 'anchorecve_CVE-2021-3326-glibc-2.28-127.el8_3.2', 'tl_CVE-2019-25013-glibc-2.28-127.el8_3.2', 'anchorecve_CVE-2020-26137-python3-urllib3-1.24.2-4.el8', 'anchorecve_CVE-2020-16135-libssh-0.9.4-2.el8', 'anchorecve_VULNDB-115884-urllib3-1.24.2', 'anchorecve_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'anchorecomp_698044205a9c4a6d48b7937e66a6bf4f', 'anchorecve_CVE-2020-27619-platform-python-3.6.8-31.el8', 'anchorecve_CVE-2020-35512-dbus-daemon-1.12.8-12.el8_3', 'anchorecve_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-82267-6', 'oscapcomp_CCE-82474-8', 'anchorecve_CVE-2020-28196-krb5-libs-1.18.2-5.el8', 'anchorecomp_e7573262736ef52353cde3bae2617782', 'anchorecomp_c4ad80832b361f81df2a31e5b6b09864', 'oscapcomp_CCE-80935-0', 'tl_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-8284-libcurl-7.61.1-14.el8_3.1', 'anchorecomp_3456a263793066e9b5063ada6e47917d', 'anchorecve_CVE-2020-29363-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2021-3326-glibc-minimal-langpack-2.28-127.el8_3.2', 'tl_CVE-2020-8927-brotli-1.0.6-2.el8', 'anchorecve_CVE-2020-27618-glibc-common-2.28-127.el8_3.2', 'oscapcomp_CCE-82214-8', 'oscapcomp_CCE-80784-2', 'oscapcomp_CCE-82985-3', 'oscapcomp_CCE-82959-8', 'oscapcomp_CCE-82395-5', 'anchorecve_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'oscapcomp_CCE-82473-0', 'anchorecve_CVE-2021-3326-glibc-common-2.28-127.el8_3.2', 'anchorecve_CVE-2020-35512-dbus-common-1.12.8-12.el8_3', 'anchorecomp_320a97c6816565eedf3545833df99dd0', 'anchorecve_CVE-2019-25013-glibc-minimal-langpack-2.28-127.el8_3.2', 'anchorecve_CVE-2020-29361-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2020-35512-dbus-1.12.8-12.el8_3', 'anchorecve_CVE-2020-8927-brotli-1.0.6-2.el8', 'anchorecomp_41cb7cdf04850e33a11f80c42bf660b3', 'anchorecve_CVE-2021-3177-python3-libs-3.6.8-31.el8', 'oscapcomp_CCE-82880-6', 'oscapcomp_CCE-82220-5', 'oscapcomp_CCE-83401-0', 'anchorecve_CVE-2021-23840-openssl-libs-1.1.1g-12.el8_3', 'anchorecve_CVE-2021-23336-platform-python-3.6.8-31.el8', 'oscapcomp_CCE-82472-2', 'oscapcomp_CCE-82979-6', 'anchorecve_CVE-2020-13776-systemd-pam-239-41.el8_3.1', 'anchorecomp_bcd159901fe47efddae5c095b4b0d7fd', 'anchorecve_CVE-2020-27618-glibc-2.28-127.el8_3.2', 'anchorecve_CVE-2021-23841-openssl-libs-1.1.1g-12.el8_3', 'anchorecve_CVE-2020-8285-libcurl-7.61.1-14.el8_3.1', 'anchorecomp_3e5fad1c039f3ecfd1dcdc94d2f1f9a0', 'anchorecve_CVE-2020-13776-systemd-239-41.el8_3.1', 'anchorecve_CVE-2021-23336-python3-libs-3.6.8-31.el8', 'oscapcomp_CCE-82168-6', 'anchorecomp_463a9a24225c26f7a5bf3f38908e5cb3'}
INFO: Vulnerabilities found in scanning stage: 81
INFO: {'anchorecve_CVE-2020-13776-systemd-pam-239-41.el8_3.1', 'tl_CVE-2020-13776-systemd-239-41.el8_3.1', 'oscapcomp_CCE-82473-0', 'anchorecve_CVE-2021-3326-glibc-common-2.28-127.el8_3.2', 'oscapcomp_CCE-80938-4', 'oscapcomp_CCE-82949-9', 'anchorecve_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'tl_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-35512-dbus-daemon-1.12.8-12.el8_3', 'anchorecve_CVE-2020-35512-dbus-common-1.12.8-12.el8_3', 'anchorecve_CVE-2020-35512-dbus-1.12.8-12.el8_3', 'anchorecve_CVE-2019-25013-glibc-minimal-langpack-2.28-127.el8_3.2', 'anchorecve_CVE-2020-8927-brotli-1.0.6-2.el8', 'anchorecve_CVE-2020-29361-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2021-3177-platform-python-3.6.8-31.el8', 'tl_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-26137-urllib3-1.24.2', 'anchorecve_CVE-2021-3177-python3-libs-3.6.8-31.el8', 'anchorecve_CVE-2020-24977-python3-libxml2-2.9.7-8.el8', 'anchorecve_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-82368-2', 'anchorecve_CVE-2020-13434-sqlite-libs-3.26.0-11.el8', 'oscapcomp_CCE-82880-6', 'anchorecve_CVE-2020-16135-libssh-config-0.9.4-2.el8', 'oscapcomp_CCE-82220-5', 'oscapcomp_CCE-82267-6', 'oscapcomp_CCE-82474-8', 'oscapcomp_CCE-83401-0', 'anchorecve_CVE-2020-24977-libxml2-2.9.7-8.el8', 'anchorecve_CVE-2020-28196-krb5-libs-1.18.2-5.el8', 'anchorecve_CVE-2021-23840-openssl-libs-1.1.1g-12.el8_3', 'tl_CVE-2021-3326-glibc-2.28-127.el8_3.2', 'anchorecve_CVE-2020-8231-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-35512-dbus-tools-1.12.8-12.el8_3', 'anchorecve_CVE-2021-23336-platform-python-3.6.8-31.el8', 'tl_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'oscapcomp_CCE-82472-2', 'anchorecve_CVE-2020-24370-lua-libs-5.3.4-11.el8', 'oscapcomp_CCE-80935-0', 'oscapcomp_CCE-82360-9', 'anchorecve_CVE-2019-25013-glibc-common-2.28-127.el8_3.2', 'tl_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'tl_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-82494-6', 'oscapcomp_CCE-82979-6', 'anchorecve_CVE-2020-8284-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-29362-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2020-29363-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2020-15358-sqlite-libs-3.26.0-11.el8', 'anchorecve_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2021-23841-openssl-libs-1.1.1g-12.el8_3', 'anchorecve_CVE-2020-27618-glibc-2.28-127.el8_3.2', 'anchorecve_CVE-2021-3326-glibc-minimal-langpack-2.28-127.el8_3.2', 'tl_CVE-2020-8927-brotli-1.0.6-2.el8', 'anchorecve_CVE-2020-8285-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-27618-glibc-minimal-langpack-2.28-127.el8_3.2', 'anchorecve_CVE-2020-8286-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2021-3326-glibc-2.28-127.el8_3.2', 'anchorecve_CVE-2020-27619-platform-python-3.6.8-31.el8', 'anchorecve_CVE-2020-27618-glibc-common-2.28-127.el8_3.2', 'anchorecve_CVE-2020-27619-python3-libs-3.6.8-31.el8', 'anchorecve_CVE-2020-13776-systemd-libs-239-41.el8_3.1', 'tl_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-82214-8', 'oscapcomp_CCE-80784-2', 'tl_CVE-2019-25013-glibc-2.28-127.el8_3.2', 'anchorecve_CVE-2020-13776-systemd-239-41.el8_3.1', 'anchorecve_CVE-2020-16135-libssh-0.9.4-2.el8', 'oscapcomp_CCE-82985-3', 'anchorecve_CVE-2020-35512-dbus-libs-1.12.8-12.el8_3', 'anchorecve_CVE-2021-23336-python3-libs-3.6.8-31.el8', 'anchorecve_VULNDB-115884-urllib3-1.24.2', 'oscapcomp_CCE-82959-8', 'oscapcomp_CCE-82168-6', 'anchorecve_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2019-25013-glibc-2.28-127.el8_3.2', 'anchorecve_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'oscapcomp_CCE-82395-5', 'anchorecve_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'tl_CVE-2020-29361-p11-kit-0.23.14-5.el8_0'}
ERROR: NON-WHITELISTED VULNERABILITIES FOUND
ERROR: Number of non-whitelisted vulnerabilities: 1
ERROR: The following vulnerabilities are not whitelisted:
ERROR: Anchore CVE - CVE-2020-26137-urllib3-1.24.2
Cleaning up file based variables
ERROR: Job failed: command terminated with exit code 1