Running with gitlab-runner 13.8.0 (775dd39d)  on dsop-shared-gitlab-runner-5f4b468dff-8vfv5 BsbAJu5w section_start:1622708556:resolve_secrets Resolving secrets section_end:1622708556:resolve_secrets section_start:1622708556:prepare_executor Preparing the "kubernetes" executor Using Kubernetes namespace: gitlab-runner-ironbank-dsop WARNING: Pulling GitLab Runner helper image from Docker Hub. Helper image is migrating to registry.gitlab.com, for more information see https://docs.gitlab.com/runner/configuration/advanced-configuration.html#migrating-helper-image-to-registrygitlabcom Using Kubernetes executor with image registry1.dso.mil/ironbank/ironbank-pipelines/pipeline-runner:0.3 ... section_end:1622708556:prepare_executor section_start:1622708556:prepare_script Preparing environment Waiting for pod gitlab-runner-ironbank-dsop/runner-bsbaju5w-project-6689-concurrent-0wxqqd to be running, status is Pending Running on runner-bsbaju5w-project-6689-concurrent-0wxqqd via dsop-shared-gitlab-runner-5f4b468dff-8vfv5... section_end:1622708559:prepare_script section_start:1622708559:get_sources Getting source from Git repository Fetching changes with git depth set to 50... Initialized empty Git repository in /builds/dsop/opensource/pipeline-test-project/fluentd/.git/ Created fresh repository. Checking out 986922b1 as update-checklist-AO... Skipping Git submodules setup section_end:1622708560:get_sources section_start:1622708560:download_artifacts Downloading artifacts Downloading artifacts for anchore-scan (3777286)... Downloading artifacts from coordinator... ok  id=3777286 responseStatus=200 OK token=D3-yY7_d Downloading artifacts for hardening-manifest (3777281)... Downloading artifacts from coordinator... ok  id=3777281 responseStatus=200 OK token=_sWD7JQ5 Downloading artifacts for load-scripts (3777278)... Downloading artifacts from coordinator... ok  id=3777278 responseStatus=200 OK token=x664gGpJ Downloading artifacts for openscap-compliance (3777287)... Downloading artifacts from coordinator... ok  id=3777287 responseStatus=200 OK token=x2PcZCWm Downloading artifacts for twistlock-scan (3777288)... Downloading artifacts from coordinator... ok  id=3777288 responseStatus=200 OK token=cxYVbSE9 Downloading artifacts for wl-compare-lint (3777282)... Downloading artifacts from coordinator... ok  id=3777282 responseStatus=200 OK token=TCwETkzi section_end:1622708561:download_artifacts section_start:1622708561:step_script Executing "step_script" stage of the job script $ pip3 install jsonschema # collapsed multi-line command Requirement already satisfied: jsonschema in /usr/local/lib/python3.9/site-packages (3.2.0) Requirement already satisfied: pyrsistent>=0.14.0 in /usr/local/lib/python3.9/site-packages (from jsonschema) (0.17.3) Requirement already satisfied: setuptools in /usr/local/lib/python3.9/site-packages (from jsonschema) (56.1.0) Requirement already satisfied: six>=1.11.0 in /usr/local/lib/python3.9/site-packages (from jsonschema) (1.15.0) Requirement already satisfied: attrs>=17.4.0 in /usr/local/lib/python3.9/site-packages (from jsonschema) (21.2.0) WARNING: Running pip as root will break packages and permissions. You should install packages reliably by using venv: https://pip.pypa.io/warnings/venv WARNING: You are using pip version 21.1.1; however, version 21.1.2 is available. You should consider upgrading via the '/usr/local/bin/python3.9 -m pip install --upgrade pip' command. INFO: Log level set to info INFO: Number of whitelisted vulnerabilities: 110 INFO: Whitelisted vulnerabilities: {Finding(scan_source='anchore_cve', cve_id='CVE-2021-3421', package='rpm-4.14.3-13.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-20231', package='gnutls-3.6.14-8.el8_3', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-80935-0', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20271', package='rpm-libs-4.14.3-13.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-3516', package='libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-22876', package='curl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='c4ad80832b361f81df2a31e5b6b09864', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-20266', package='rpm-4.14.3-13.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-24370', package='lua-libs-5.3.4-11.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='addbb93c22e9b0988b8b40392a4538cb', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20266', package='python3-rpm-4.14.3-13.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20271', package='python3-rpm-4.14.3-13.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-16135', package='libssh-config-0.9.4-2.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82220-5', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-14155', package='pcre-8.42-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3516', package='libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3426', package='python3-libs-3.6.8-37.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22876', package='libcurl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3445', package='libdnf-0.55.0-7.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82368-2', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82880-6', package=None, package_path=None), Finding(scan_source='anchore_comp', cve_id='463a9a24225c26f7a5bf3f38908e5cb3', package=None, package_path=None), Finding(scan_source='anchore_comp', cve_id='639f6f1177735759703e928c14714a59', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3200', package='libsolv-0.7.16-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-14155', package='pcre-8.42-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2019-16201', package='webrick-1.4.2', package_path='/usr/local/lib/ruby/gems/2.6.0/specifications/default/webrick-1.4.2.gemspec'), Finding(scan_source='oscap_comp', cve_id='CCE-82214-8', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3541', package='libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3426', package='platform-python-3.6.8-37.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27218', package='glib2-2.56.4-9.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3445', package='python3-hawkey-0.55.0-7.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20266', package='rpm-4.14.3-13.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-80938-4', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-24032', package='libzstd-1.4.4-1.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-3445', package='libdnf-0.55.0-7.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3421', package='rpm-libs-4.14.3-13.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='698044205a9c4a6d48b7937e66a6bf4f', package=None, package_path=None), Finding(scan_source='anchore_comp', cve_id='c2e44319ae5b3b040044d8ae116d1c2f', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3518', package='libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-23840', package='openssl-libs-1.1.1g-15.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27645', package='glibc-common-2.28-151.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3516', package='python3-libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3445', package='python3-libdnf-0.55.0-7.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3421', package='python3-rpm-4.14.3-13.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3537', package='libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27219', package='glib2-2.56.4-9.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-33574', package='glibc-2.28-151.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3517', package='libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3541', package='python3-libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-27218', package='glib2-2.56.4-9.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2019-20838', package='pcre-8.42-4.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='bcd159901fe47efddae5c095b4b0d7fd', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-3518', package='libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-3200', package='libsolv-0.7.16-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27645', package='glibc-2.28-151.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-25613', package='webrick-1.4.2', package_path=None), Finding(scan_source='anchore_comp', cve_id='abb121e9621abdd452f65844954cf1c1', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-83401-0', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82474-8', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2019-20838', package='pcre-8.42-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20266', package='rpm-libs-4.14.3-13.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3518', package='python3-libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82472-2', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-33574', package='glibc-common-2.28-151.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82959-8', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-3421', package='rpm-4.14.3-13.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2019-11879', package='webrick-1.4.2', package_path='/usr/local/lib/ruby/gems/2.6.0/specifications/default/webrick-1.4.2.gemspec'), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-16135', package='libssh-0.9.4-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22876', package='curl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3537', package='python3-libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27645', package='glibc-minimal-langpack-2.28-151.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82985-3', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-15945', package='lua-libs-5.3.4-11.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3517', package='python3-libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='3456a263793066e9b5063ada6e47917d', package=None, package_path=None), Finding(scan_source='anchore_comp', cve_id='e7573262736ef52353cde3bae2617782', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82168-6', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-16135', package='libssh-0.9.4-2.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82979-6', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82360-9', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82473-0', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-3517', package='libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82267-6', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-23841', package='openssl-libs-1.1.1g-15.el8_3', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82949-9', package=None, package_path=None), Finding(scan_source='anchore_comp', cve_id='34de21e516c0ca50a96e5386f163f8bf', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-33574', package='glibc-minimal-langpack-2.28-151.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20271', package='rpm-build-libs-4.14.3-13.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-10663', package='json-2.1.0', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20271', package='rpm-4.14.3-13.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82494-6', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28153', package='glib2-2.56.4-9.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2019-3881', package='bundler-1.17.2', package_path='/usr/local/lib/ruby/gems/2.6.0/specifications/default/bundler-1.17.2.gemspec'), Finding(scan_source='oscap_comp', cve_id='CCE-82395-5', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-25613', package='webrick-1.4.2', package_path='/usr/local/lib/ruby/gems/2.6.0/specifications/default/webrick-1.4.2.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20231', package='gnutls-3.6.14-8.el8_3', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-20232', package='gnutls-3.6.14-8.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='GHSA-jphg-qwrw-7w9g', package='json-2.1.0', package_path='/usr/local/lib/ruby/gems/2.6.0/specifications/default/json-2.1.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='VULNDB-177647', package='webrick-1.4.2', package_path='/usr/local/lib/ruby/gems/2.6.0/specifications/default/webrick-1.4.2.gemspec'), Finding(scan_source='anchore_comp', cve_id='320a97c6816565eedf3545833df99dd0', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-33574', package='glibc-2.28-151.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20232', package='gnutls-3.6.14-8.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20266', package='rpm-build-libs-4.14.3-13.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3520', package='lz4-libs-1.8.3-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3421', package='rpm-build-libs-4.14.3-13.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-28153', package='glib2-2.56.4-9.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-3537', package='libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3572', package='python3-pip-wheel-9.0.3-19.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-27219', package='glib2-2.56.4-9.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='3e5fad1c039f3ecfd1dcdc94d2f1f9a0', package=None, package_path=None)} INFO: Vulnerabilities found in scanning stage: 120 INFO: {Finding(scan_source='anchore_cve', cve_id='GHSA-8cr8-4vfw-mr7h', package='rexml-3.1.9', package_path='/usr/local/lib/ruby/gems/2.6.0/specifications/default/rexml-3.1.9.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3421', package='rpm-4.14.3-13.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-20231', package='gnutls-3.6.14-8.el8_3', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-80935-0', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-3516', package='libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20271', package='rpm-libs-4.14.3-13.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-22876', package='curl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='c4ad80832b361f81df2a31e5b6b09864', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-20266', package='rpm-4.14.3-13.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-24370', package='lua-libs-5.3.4-11.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20266', package='python3-rpm-4.14.3-13.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='addbb93c22e9b0988b8b40392a4538cb', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20271', package='python3-rpm-4.14.3-13.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-16135', package='libssh-config-0.9.4-2.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82220-5', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-14155', package='pcre-8.42-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3516', package='libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3426', package='python3-libs-3.6.8-37.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22876', package='libcurl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3445', package='libdnf-0.55.0-7.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82368-2', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82880-6', package=None, package_path=None), Finding(scan_source='anchore_comp', cve_id='463a9a24225c26f7a5bf3f38908e5cb3', package=None, package_path=None), Finding(scan_source='anchore_comp', cve_id='639f6f1177735759703e928c14714a59', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3200', package='libsolv-0.7.16-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-14155', package='pcre-8.42-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2019-16201', package='webrick-1.4.2', package_path='/usr/local/lib/ruby/gems/2.6.0/specifications/default/webrick-1.4.2.gemspec'), Finding(scan_source='oscap_comp', cve_id='CCE-82214-8', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3541', package='libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3426', package='platform-python-3.6.8-37.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27218', package='glib2-2.56.4-9.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3445', package='python3-hawkey-0.55.0-7.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20266', package='rpm-4.14.3-13.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-80938-4', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-24032', package='libzstd-1.4.4-1.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-31799', package='rdoc-6.1.2', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-3445', package='libdnf-0.55.0-7.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='GHSA-g98m-96g9-wfjq', package='bundler-1.17.2', package_path='/usr/local/lib/ruby/gems/2.6.0/specifications/default/bundler-1.17.2.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3421', package='rpm-libs-4.14.3-13.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='c2e44319ae5b3b040044d8ae116d1c2f', package=None, package_path=None), Finding(scan_source='anchore_comp', cve_id='698044205a9c4a6d48b7937e66a6bf4f', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3518', package='libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27645', package='glibc-common-2.28-151.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-23840', package='openssl-libs-1.1.1g-15.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3516', package='python3-libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3445', package='python3-libdnf-0.55.0-7.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3421', package='python3-rpm-4.14.3-13.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3537', package='libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27219', package='glib2-2.56.4-9.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-36327', package='bundler-1.17.2', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-33574', package='glibc-2.28-151.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3517', package='libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3541', package='python3-libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-27218', package='glib2-2.56.4-9.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2019-20838', package='pcre-8.42-4.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='bcd159901fe47efddae5c095b4b0d7fd', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-3518', package='libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-3200', package='libsolv-0.7.16-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-31799', package='rdoc-6.1.2', package_path='/usr/local/lib/ruby/gems/2.6.0/specifications/default/rdoc-6.1.2.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27645', package='glibc-2.28-151.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-83401-0', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2019-20838', package='pcre-8.42-4.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82474-8', package=None, package_path=None), Finding(scan_source='anchore_comp', cve_id='abb121e9621abdd452f65844954cf1c1', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20266', package='rpm-libs-4.14.3-13.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3518', package='python3-libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82472-2', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-33574', package='glibc-common-2.28-151.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82959-8', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-3421', package='rpm-4.14.3-13.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2019-11879', package='webrick-1.4.2', package_path='/usr/local/lib/ruby/gems/2.6.0/specifications/default/webrick-1.4.2.gemspec'), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-16135', package='libssh-0.9.4-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22876', package='curl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3537', package='python3-libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-83377-2', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27645', package='glibc-minimal-langpack-2.28-151.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82985-3', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-15945', package='lua-libs-5.3.4-11.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3517', package='python3-libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='e7573262736ef52353cde3bae2617782', package=None, package_path=None), Finding(scan_source='anchore_comp', cve_id='3456a263793066e9b5063ada6e47917d', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82168-6', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-16135', package='libssh-0.9.4-2.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82979-6', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82360-9', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82473-0', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-3517', package='libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82267-6', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-23841', package='openssl-libs-1.1.1g-15.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-33574', package='glibc-langpack-en-2.28-151.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82949-9', package=None, package_path=None), Finding(scan_source='anchore_comp', cve_id='34de21e516c0ca50a96e5386f163f8bf', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-33574', package='glibc-minimal-langpack-2.28-151.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20271', package='rpm-build-libs-4.14.3-13.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-83364-0', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27645', package='glibc-langpack-en-2.28-151.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20271', package='rpm-4.14.3-13.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2019-3881', package='bundler-1.17.2', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82494-6', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28153', package='glib2-2.56.4-9.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82395-5', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-25613', package='webrick-1.4.2', package_path='/usr/local/lib/ruby/gems/2.6.0/specifications/default/webrick-1.4.2.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20231', package='gnutls-3.6.14-8.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3572', package='platform-python-pip-9.0.3-19.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-20232', package='gnutls-3.6.14-8.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='GHSA-jphg-qwrw-7w9g', package='json-2.1.0', package_path='/usr/local/lib/ruby/gems/2.6.0/specifications/default/json-2.1.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='VULNDB-177647', package='webrick-1.4.2', package_path='/usr/local/lib/ruby/gems/2.6.0/specifications/default/webrick-1.4.2.gemspec'), Finding(scan_source='anchore_comp', cve_id='320a97c6816565eedf3545833df99dd0', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-28965', package='rexml-3.1.9', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-33574', package='glibc-2.28-151.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20232', package='gnutls-3.6.14-8.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20266', package='rpm-build-libs-4.14.3-13.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3520', package='lz4-libs-1.8.3-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='GHSA-fp4w-jxhp-m23p', package='bundler-1.17.2', package_path='/usr/local/lib/ruby/gems/2.6.0/specifications/default/bundler-1.17.2.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3421', package='rpm-build-libs-4.14.3-13.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-28153', package='glib2-2.56.4-9.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-3537', package='libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3572', package='python3-pip-wheel-9.0.3-19.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-27219', package='glib2-2.56.4-9.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='3e5fad1c039f3ecfd1dcdc94d2f1f9a0', package=None, package_path=None)} ERROR: NON-WHITELISTED VULNERABILITIES FOUND ERROR: Number of non-whitelisted vulnerabilities: 13 ERROR: The following vulnerabilities are not whitelisted: ERROR: scan_source cve_id package package_path ERROR: anchore_cve GHSA-fp4w-jxhp-m23p bundler-1.17.2 /usr/local/lib/ruby/gems/2.6.0/specifications/default/bundler-1.17.2.gemspec ERROR: anchore_cve GHSA-g98m-96g9-wfjq bundler-1.17.2 /usr/local/lib/ruby/gems/2.6.0/specifications/default/bundler-1.17.2.gemspec ERROR: anchore_cve CVE-2021-27645 glibc-langpack-en-2.28-151.el8 None ERROR: anchore_cve CVE-2021-33574 glibc-langpack-en-2.28-151.el8 None ERROR: anchore_cve CVE-2021-3572 platform-python-pip-9.0.3-19.el8 None ERROR: anchore_cve CVE-2021-31799 rdoc-6.1.2 /usr/local/lib/ruby/gems/2.6.0/specifications/default/rdoc-6.1.2.gemspec ERROR: anchore_cve GHSA-8cr8-4vfw-mr7h rexml-3.1.9 /usr/local/lib/ruby/gems/2.6.0/specifications/default/rexml-3.1.9.gemspec ERROR: oscap_comp CCE-83364-0 None None ERROR: oscap_comp CCE-83377-2 None None ERROR: twistlock_cve CVE-2019-3881 bundler-1.17.2 None ERROR: twistlock_cve CVE-2020-36327 bundler-1.17.2 None ERROR: twistlock_cve CVE-2021-31799 rdoc-6.1.2 None ERROR: twistlock_cve CVE-2021-28965 rexml-3.1.9 None INFO: pipeline-test-project detected. Allowing the pipeline to continue section_end:1622708565:step_script section_start:1622708565:cleanup_file_variables Cleaning up file based variables section_end:1622708565:cleanup_file_variables Job succeeded