Running with gitlab-runner 13.8.0 (775dd39d)  on global-shared-gitlab-runner-89dbd4db8-mnp6b RKzCU9YR section_start:1618863581:resolve_secrets Resolving secrets section_end:1618863581:resolve_secrets section_start:1618863581:prepare_executor Preparing the "kubernetes" executor Using Kubernetes namespace: gitlab-runner WARNING: Pulling GitLab Runner helper image from Docker Hub. Helper image is migrating to registry.gitlab.com, for more information see https://docs.gitlab.com/runner/configuration/advanced-configuration.html#migrating-helper-image-to-registrygitlabcom Using Kubernetes executor with image ${GITLAB_INTERNAL_REGISTRY}/ironbank-tools/ironbank-pipeline/ib-pipeline-image:0.1 ... section_end:1618863581:prepare_executor section_start:1618863581:prepare_script Preparing environment Waiting for pod gitlab-runner/runner-rkzcu9yr-project-5682-concurrent-0ghnfc to be running, status is Pending Running on runner-rkzcu9yr-project-5682-concurrent-0ghnfc via global-shared-gitlab-runner-89dbd4db8-mnp6b... section_end:1618863584:prepare_script section_start:1618863584:get_sources Getting source from Git repository Fetching changes with git depth set to 50... Initialized empty Git repository in /builds/dsop/opensource/jupyter/jupyterhub-k8s-network-tools/.git/ Created fresh repository. Checking out ee3c5ad0 as development... Skipping Git submodules setup section_end:1618863584:get_sources section_start:1618863584:download_artifacts Downloading artifacts Downloading artifacts for hardening_manifest (2829049)... Downloading artifacts from coordinator... ok  id=2829049 responseStatus=200 OK token=WM7Tsbpc Downloading artifacts for load scripts (2829046)... Downloading artifacts from coordinator... ok  id=2829046 responseStatus=200 OK token=ZV5Qa6Dg Downloading artifacts for wl compare lint (2829050)... Downloading artifacts from coordinator... ok  id=2829050 responseStatus=200 OK token=gMMMsK3s section_end:1618863585:download_artifacts section_start:1618863585:step_script Executing "step_script" stage of the job script $ mkdir -p "${ARTIFACT_DIR}" $ set +e $ python3 "${PIPELINE_REPO_DIR}/stages/vat-finding-compare/vat_findings.py" INFO: Log level set to info INFO: api set length: 128 INFO: db set length: 139 INFO: Number of findings in api not in query: 8 INFO: There are inherited CVEs returned by the api that are not returned by query INFO: Findings from api not in direct query INFO: ('CVE-2021-20231', 'twistlock_cve', 'A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and other consequences.', 'gnutls-3.6.14-7.el8_3', None) INFO: ('CVE-2021-20305', 'twistlock_cve', 'A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to force an invalid signature, causing an assertion failure or possible validation. The highest threat to this vulnerability is to confidentiality, integrity, as well as system availability.', 'gnutls-3.6.14-7.el8_3', None) INFO: ('CVE-2021-20305', 'twistlock_cve', 'A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to force an invalid signature, causing an assertion failure or possible validation. The highest threat to this vulnerability is to confidentiality, integrity, as well as system availability.', 'nettle-3.4.1-2.el8', None) INFO: ('CVE-2021-20231', 'anchore_cve', 'gnutls-3.6.14-7.el8_3\nhttps://access.redhat.com/security/cve/CVE-2021-20231', 'gnutls-3.6.14-7.el8_3', None) INFO: ('CVE-2021-20305', 'anchore_cve', 'gnutls-3.6.14-7.el8_3\nhttps://access.redhat.com/security/cve/CVE-2021-20305', 'gnutls-3.6.14-7.el8_3', None) INFO: ('CVE-2021-20232', 'twistlock_cve', 'A flaw was found in gnutls. A use after free issue in client_send_params in lib/ext/pre_shared_key.c may lead to memory corruption and other potential consequences.', 'gnutls-3.6.14-7.el8_3', None) INFO: ('CVE-2021-20305', 'anchore_cve', 'nettle-3.4.1-2.el8\nhttps://access.redhat.com/security/cve/CVE-2021-20305', 'nettle-3.4.1-2.el8', None) INFO: ('CVE-2021-20232', 'anchore_cve', 'gnutls-3.6.14-7.el8_3\nhttps://access.redhat.com/security/cve/CVE-2021-20232', 'gnutls-3.6.14-7.el8_3', None) section_end:1618863585:step_script section_start:1618863586:upload_artifacts_on_failure Uploading artifacts for failed job Uploading artifacts... ci-artifacts/compare/: found 2 matching files and directories Uploading artifacts as "archive" to coordinator... ok id=2829051 responseStatus=201 Created token=fvRJfach section_end:1618863587:upload_artifacts_on_failure section_start:1618863587:cleanup_file_variables Cleaning up file based variables section_end:1618863587:cleanup_file_variables ERROR: Job failed: command terminated with exit code 4