Running with gitlab-runner 13.8.0 (775dd39d)  on global-shared-gitlab-runner-89dbd4db8-gbfgw 79hzYLUT section_start:1614027417:resolve_secrets Resolving secrets section_end:1614027417:resolve_secrets section_start:1614027417:prepare_executor Preparing the "kubernetes" executor Using Kubernetes namespace: gitlab-runner WARNING: Pulling GitLab Runner helper image from Docker Hub. Helper image is migrating to registry.gitlab.com, for more information see https://docs.gitlab.com/runner/configuration/advanced-configuration.html#migrating-helper-image-to-registrygitlabcom Using Kubernetes executor with image ${GITLAB_INTERNAL_REGISTRY}/ironbank-tools/ironbank-pipeline/ib-pipeline-image:0.1 ... section_end:1614027417:prepare_executor section_start:1614027417:prepare_script Preparing environment Waiting for pod gitlab-runner/runner-79hzylut-project-515-concurrent-02hk8h to be running, status is Pending Running on runner-79hzylut-project-515-concurrent-02hk8h via global-shared-gitlab-runner-89dbd4db8-gbfgw... section_end:1614027420:prepare_script section_start:1614027420:get_sources Getting source from Git repository Fetching changes with git depth set to 50... Initialized empty Git repository in /builds/dsop/opensource/mbtest/mountebank/.git/ Created fresh repository. Checking out 07cad1d7 as development... Skipping Git submodules setup section_end:1614027421:get_sources section_start:1614027421:download_artifacts Downloading artifacts Downloading artifacts for load scripts (2098465)... Downloading artifacts from coordinator... ok  id=2098465 responseStatus=200 OK token=QyLzR2fS Downloading artifacts for hardening_manifest (2098468)... Downloading artifacts from coordinator... ok  id=2098468 responseStatus=200 OK token=yypzUKsy Downloading artifacts for wl compare lint (2098469)... Downloading artifacts from coordinator... ok  id=2098469 responseStatus=200 OK token=kjsbEJEy Downloading artifacts for openscap compliance (2098473)... Downloading artifacts from coordinator... ok  id=2098473 responseStatus=200 OK token=TydH2RBh Downloading artifacts for openscap cve (2098474)... Downloading artifacts from coordinator... ok  id=2098474 responseStatus=200 OK token=1fFxp_7u Downloading artifacts for twistlock scan (2098475)... Downloading artifacts from coordinator... ok  id=2098475 responseStatus=200 OK token=4-qD99oz Downloading artifacts for anchore scan (2098476)... Downloading artifacts from coordinator... ok  id=2098476 responseStatus=200 OK token=Ahaq_qsB section_end:1614027422:download_artifacts section_start:1614027422:step_script Executing "step_script" stage of the job script $ pip3 install jsonschema Collecting jsonschema Downloading jsonschema-3.2.0-py2.py3-none-any.whl (56 kB) Collecting attrs>=17.4.0 Downloading attrs-20.3.0-py2.py3-none-any.whl (49 kB) Collecting importlib-metadata; python_version < "3.8" Downloading importlib_metadata-3.4.0-py3-none-any.whl (10 kB) Requirement already satisfied: six>=1.11.0 in /opt/app-root/lib/python3.6/site-packages (from jsonschema) (1.15.0) Requirement already satisfied: setuptools in /opt/app-root/lib/python3.6/site-packages (from jsonschema) (39.2.0) Collecting pyrsistent>=0.14.0 Downloading pyrsistent-0.17.3.tar.gz (106 kB) Collecting zipp>=0.5 Downloading zipp-3.4.0-py3-none-any.whl (5.2 kB) Collecting typing-extensions>=3.6.4; python_version < "3.8" Downloading typing_extensions-3.7.4.3-py3-none-any.whl (22 kB) Building wheels for collected packages: pyrsistent Building wheel for pyrsistent (setup.py): started Building wheel for pyrsistent (setup.py): finished with status 'done' Created wheel for pyrsistent: filename=pyrsistent-0.17.3-cp36-cp36m-linux_x86_64.whl size=55876 sha256=89afcf0080b613807c8e645b93153e8f31b17a717b03fb3b1af7b6bebaa876b1 Stored in directory: /tmp/pip-ephem-wheel-cache-8awqlxt7/wheels/34/13/19/294da8e11bce7e563afee51251b9fa878185e14f4b5caf00cb Successfully built pyrsistent Installing collected packages: attrs, zipp, typing-extensions, importlib-metadata, pyrsistent, jsonschema Successfully installed attrs-20.3.0 importlib-metadata-3.4.0 jsonschema-3.2.0 pyrsistent-0.17.3 typing-extensions-3.7.4.3 zipp-3.4.0 WARNING: You are using pip version 20.2.4; however, version 21.0.1 is available. You should consider upgrading via the '/opt/app-root/bin/python3.6 -m pip install --upgrade pip' command. $ python3 "${PIPELINE_REPO_DIR}/stages/check-cves/pipeline_wl_compare.py" INFO: Log level set to info INFO: Number of whitelisted vulnerabilities: 112 INFO: Whitelisted vulnerabilities: {'anchorecve_CVE-2020-35512-dbus-daemon-1.12.8-11.el8', 'anchorecomp_698044205a9c4a6d48b7937e66a6bf4f', 'anchorecve_CVE-2020-26137-python3-urllib3-1.24.2-4.el8', 'tl_CVE-2019-25013-glibc-2.28-127.el8', 'oscapcomp_CCE-82395-5', 'anchorecve_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-82959-8', 'oscapcomp_CCE-80935-0', 'anchorecve_CVE-2019-25013-glibc-minimal-langpack-2.28-127.el8', 'anchorecve_CVE-2020-13434-sqlite-libs-3.26.0-11.el8', 'anchorecve_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-27618-glibc-2.28-127.el8_3.2', 'anchorecve_CVE-2021-3326-glibc-minimal-langpack-2.28-127.el8_3.2', 'anchorecve_VULNDB-115884-urllib3-1.24.2', 'oscapcomp_CCE-82473-0', 'anchorecve_CVE-2020-35512-dbus-1.12.8-12.el8_3', 'anchorecomp_41cb7cdf04850e33a11f80c42bf660b3', 'oscapcomp_CCE-82979-6', 'tl_CVE-2020-8927-brotli-1.0.6-2.el8', 'anchorecve_CVE-2020-29363-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2020-8284-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2021-3326-glibc-2.28-127.el8_3.2', 'oscapcomp_CCE-83401-0', 'anchorecve_CVE-2020-24977-python3-libxml2-2.9.7-8.el8', 'anchorecve_GHSA-qqgx-2p2h-9c37-ini-1.3.5', 'anchorecve_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-35512-dbus-common-1.12.8-11.el8', 'anchorecomp_3e5fad1c039f3ecfd1dcdc94d2f1f9a0', 'tl_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-35512-dbus-libs-1.12.8-11.el8', 'tl_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'anchorecomp_bcd159901fe47efddae5c095b4b0d7fd', 'anchorecve_CVE-2020-29361-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-35512-dbus-common-1.12.8-12.el8_3', 'anchorecve_CVE-2020-27618-glibc-common-2.28-127.el8_3.2', 'oscapcomp_CCE-80938-4', 'anchorecve_CVE-2020-27618-glibc-common-2.28-127.el8', 'anchorecomp_e7573262736ef52353cde3bae2617782', 'tl_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'anchorecomp_c4ad80832b361f81df2a31e5b6b09864', 'anchorecve_CVE-2020-24370-lua-libs-5.3.4-11.el8', 'oscapcomp_CCE-82494-6', 'anchorecve_CVE-2020-24977-libxml2-2.9.7-8.el8', 'oscapcomp_CCE-82472-2', 'anchorecve_CVE-2019-25013-glibc-minimal-langpack-2.28-127.el8_3.2', 'tl_CVE-2021-3326-glibc-2.28-127.el8_3.2', 'anchorecve_CVE-2019-25013-glibc-2.28-127.el8', 'anchorecomp_68e630cef4a8533b139875aa5fc54da5', 'anchorecve_VULNDB-238614-opener-1.5.1', 'oscapcomp_CCE-82220-5', 'tl_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-29362-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2020-15358-sqlite-libs-3.26.0-11.el8', 'anchorecve_CVE-2020-35512-dbus-daemon-1.12.8-12.el8_3', 'anchorecve_CVE-2020-8927-brotli-1.0.6-2.el8', 'anchorecve_CVE-2020-35512-dbus-tools-1.12.8-12.el8_3', 'anchorecomp_abb121e9621abdd452f65844954cf1c1', 'tl_CVE-2020-7788-ini-1.3.5', 'anchorecve_CVE-2020-35512-dbus-libs-1.12.8-12.el8_3', 'anchorecomp_639f6f1177735759703e928c14714a59', 'oscapcomp_CCE-82880-6', 'anchorecve_CVE-2020-27618-glibc-2.28-127.el8', 'anchorecve_CVE-2020-8231-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-13776-systemd-pam-239-41.el8_3.1', 'anchorecve_CVE-2020-35512-dbus-tools-1.12.8-11.el8', 'anchorecve_CVE-2020-27619-platform-python-3.6.8-31.el8', 'tl_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'anchorecomp_34de21e516c0ca50a96e5386f163f8bf', 'anchorecomp_addbb93c22e9b0988b8b40392a4538cb', 'anchorecve_CVE-2019-25013-glibc-2.28-127.el8_3.2', 'anchorecomp_320a97c6816565eedf3545833df99dd0', 'anchorecve_CVE-2020-26116-platform-python-3.6.8-31.el8', 'anchorecve_CVE-2020-13776-systemd-239-41.el8_3.1', 'anchorecve_CVE-2020-16135-libssh-config-0.9.4-2.el8', 'anchorecve_CVE-2020-26116-python3-libs-3.6.8-31.el8', 'anchorecomp_953dfbea1b1e9d5829fbed2e390bd3af', 'anchorecve_CVE-2021-3326-glibc-common-2.28-127.el8_3.2', 'anchorecve_CVE-2020-8286-libcurl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-82985-3', 'anchorecomp_463a9a24225c26f7a5bf3f38908e5cb3', 'anchorecve_CVE-2020-27619-python3-libs-3.6.8-31.el8', 'oscapcomp_CCE-82267-6', 'oscapcomp_CCE-82360-9', 'tl_CVE-2019-25013-glibc-2.28-127.el8_3.2', 'oscapcomp_CCE-82168-6', 'anchorecve_CVE-2020-16135-libssh-0.9.4-2.el8', 'anchorecve_CVE-2020-28196-krb5-libs-1.18.2-5.el8', 'oscapcomp_CCE-82949-9', 'anchorecve_CVE-2020-27618-glibc-minimal-langpack-2.28-127.el8', 'anchorecve_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-8285-libcurl-7.61.1-14.el8_3.1', 'tl_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-82214-8', 'anchorecve_CVE-2020-7754-npm-user-validate-1.0.0', 'oscapcomp_CCE-82368-2', 'anchorecve_CVE-2019-25013-glibc-common-2.28-127.el8_3.2', 'anchorecve_CVE-2019-25013-glibc-common-2.28-127.el8', 'anchorecve_CVE-2020-27618-glibc-minimal-langpack-2.28-127.el8_3.2', 'tl_GHSA-xgh6-85xh-479p-npm-user-validate-1.0.0', 'anchorecomp_c2e44319ae5b3b040044d8ae116d1c2f', 'anchorecve_CVE-2020-35512-dbus-1.12.8-11.el8', 'anchorecve_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-13776-systemd-libs-239-41.el8_3.1', 'tl_CVE-2020-13776-systemd-239-41.el8_3.1', 'oscapcomp_CCE-82474-8', 'anchorecomp_3456a263793066e9b5063ada6e47917d', 'tl_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-7774-y18n-4.0.0', 'anchorecve_GHSA-xgh6-85xh-479p-npm-user-validate-1.0.0', 'oscapcomp_CCE-80784-2'} INFO: Vulnerabilities found in scanning stage: 100 INFO: {'anchorecve_CVE-2020-26137-python3-urllib3-1.24.2-4.el8', 'oscapcomp_CCE-82395-5', 'anchorecve_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-82959-8', 'oscapcomp_CCE-80935-0', 'anchorecve_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-27618-glibc-2.28-127.el8_3.2', 'anchorecve_CVE-2020-13434-sqlite-libs-3.26.0-11.el8', 'anchorecve_CVE-2021-3326-glibc-minimal-langpack-2.28-127.el8_3.2', 'anchorecve_CVE-2021-23239-sudo-1.8.29-6.el8_3.1', 'anchorecve_VULNDB-115884-urllib3-1.24.2', 'oscapcomp_CCE-82473-0', 'anchorecve_CVE-2020-35512-dbus-1.12.8-12.el8_3', 'oscapcomp_CCE-82979-6', 'tl_CVE-2020-8927-brotli-1.0.6-2.el8', 'anchorecve_CVE-2020-29363-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2020-8284-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2021-3326-glibc-2.28-127.el8_3.2', 'oscapcomp_CCE-83401-0', 'anchorecve_CVE-2020-24977-python3-libxml2-2.9.7-8.el8', 'anchorecve_GHSA-qqgx-2p2h-9c37-ini-1.3.5', 'anchorecve_VULNDB-242996-y18n-4.0.0', 'anchorecve_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'tl_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'tl_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-29361-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-35512-dbus-common-1.12.8-12.el8_3', 'anchorecve_CVE-2020-27618-glibc-common-2.28-127.el8_3.2', 'anchorecve_CVE-2019-25013-glibc-langpack-en-2.28-127.el8_3.2', 'oscapcomp_CCE-80938-4', 'anchorecve_CVE-2021-23240-sudo-1.8.29-6.el8_3.1', 'oscapcomp_CCE-83364-0', 'tl_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-24370-lua-libs-5.3.4-11.el8', 'oscapcomp_CCE-82494-6', 'anchorecve_CVE-2020-24977-libxml2-2.9.7-8.el8', 'oscapcomp_CCE-82472-2', 'anchorecve_CVE-2019-25013-glibc-minimal-langpack-2.28-127.el8_3.2', 'tl_CVE-2021-3326-glibc-2.28-127.el8_3.2', 'anchorecve_CVE-2021-3326-glibc-langpack-en-2.28-127.el8_3.2', 'anchorecve_VULNDB-238614-opener-1.5.1', 'oscapcomp_CCE-82220-5', 'tl_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-29362-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2020-15358-sqlite-libs-3.26.0-11.el8', 'tl_CVE-2021-23239-sudo-1.8.29-6.el8_3.1', 'anchorecve_CVE-2020-35512-dbus-daemon-1.12.8-12.el8_3', 'anchorecve_CVE-2020-8927-brotli-1.0.6-2.el8', 'anchorecve_CVE-2020-35512-dbus-tools-1.12.8-12.el8_3', 'tl_CVE-2020-7788-ini-1.3.5', 'anchorecve_CVE-2020-35512-dbus-libs-1.12.8-12.el8_3', 'oscapcomp_CCE-82880-6', 'anchorecve_CVE-2020-8231-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-13776-systemd-pam-239-41.el8_3.1', 'anchorecve_VULNDB-130613-debug-4.1.1', 'anchorecve_VULNDB-240639-npm-user-validate-1.0.0', 'oscapcomp_CCE-83377-2', 'tl_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-27619-platform-python-3.6.8-31.el8', 'anchorecve_CVE-2019-25013-glibc-2.28-127.el8_3.2', 'anchorecve_VULNDB-244597-ini-1.3.5', 'anchorecve_CVE-2020-26116-platform-python-3.6.8-31.el8', 'anchorecve_CVE-2020-13776-systemd-239-41.el8_3.1', 'anchorecve_CVE-2020-16135-libssh-config-0.9.4-2.el8', 'anchorecve_CVE-2020-26116-python3-libs-3.6.8-31.el8', 'anchorecve_CVE-2021-3326-glibc-common-2.28-127.el8_3.2', 'anchorecve_VULNDB-249660-lodash-4.17.20', 'tl_CVE-2020-8265-node-12.20.0', 'anchorecve_CVE-2020-8286-libcurl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-82985-3', 'tl_CVE-2021-23240-sudo-1.8.29-6.el8_3.1', 'anchorecve_CVE-2020-27619-python3-libs-3.6.8-31.el8', 'oscapcomp_CCE-82267-6', 'oscapcomp_CCE-82360-9', 'tl_CVE-2019-25013-glibc-2.28-127.el8_3.2', 'oscapcomp_CCE-82168-6', 'anchorecve_CVE-2020-16135-libssh-0.9.4-2.el8', 'anchorecve_CVE-2020-28196-krb5-libs-1.18.2-5.el8', 'oscapcomp_CCE-82949-9', 'anchorecve_CVE-2017-18589-cookie-0.4.0', 'anchorecve_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-8285-libcurl-7.61.1-14.el8_3.1', 'tl_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-82368-2', 'anchorecve_CVE-2019-25013-glibc-common-2.28-127.el8_3.2', 'anchorecve_VULNDB-166319-debug-4.1.1', 'anchorecve_CVE-2020-27618-glibc-minimal-langpack-2.28-127.el8_3.2', 'tl_GHSA-xgh6-85xh-479p-npm-user-validate-1.0.0', 'oscapcomp_CCE-83318-6', 'anchorecve_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-13776-systemd-libs-239-41.el8_3.1', 'tl_CVE-2020-13776-systemd-239-41.el8_3.1', 'oscapcomp_CCE-82474-8', 'tl_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-27618-glibc-langpack-en-2.28-127.el8_3.2', 'anchorecve_GHSA-xgh6-85xh-479p-npm-user-validate-1.0.0', 'oscapcomp_CCE-80784-2', 'tl_CVE-2020-8287-node-12.20.0'} ERROR: NON-WHITELISTED VULNERABILITIES FOUND ERROR: Number of non-whitelisted vulnerabilities: 19 ERROR: The following vulnerabilities are not whitelisted: ERROR: Anchore CVE - CVE-2017-18589-cookie-0.4.0 ERROR: Anchore CVE - CVE-2019-25013-glibc-langpack-en-2.28-127.el8_3.2 ERROR: Anchore CVE - CVE-2020-27618-glibc-langpack-en-2.28-127.el8_3.2 ERROR: Anchore CVE - CVE-2021-23239-sudo-1.8.29-6.el8_3.1 ERROR: Anchore CVE - CVE-2021-23240-sudo-1.8.29-6.el8_3.1 ERROR: Anchore CVE - CVE-2021-3326-glibc-langpack-en-2.28-127.el8_3.2 ERROR: Anchore CVE - VULNDB-130613-debug-4.1.1 ERROR: Anchore CVE - VULNDB-166319-debug-4.1.1 ERROR: Anchore CVE - VULNDB-240639-npm-user-validate-1.0.0 ERROR: Anchore CVE - VULNDB-242996-y18n-4.0.0 ERROR: Anchore CVE - VULNDB-244597-ini-1.3.5 ERROR: Anchore CVE - VULNDB-249660-lodash-4.17.20 ERROR: OpenSCAP DISA Compliance - CCE-83318-6 ERROR: OpenSCAP DISA Compliance - CCE-83364-0 ERROR: OpenSCAP DISA Compliance - CCE-83377-2 ERROR: Twistlock CVE - CVE-2020-8265-node-12.20.0 ERROR: Twistlock CVE - CVE-2020-8287-node-12.20.0 ERROR: Twistlock CVE - CVE-2021-23239-sudo-1.8.29-6.el8_3.1 ERROR: Twistlock CVE - CVE-2021-23240-sudo-1.8.29-6.el8_3.1 section_end:1614027432:step_script section_start:1614027432:cleanup_file_variables Cleaning up file based variables section_end:1614027432:cleanup_file_variables ERROR: Job failed: command terminated with exit code 1