Running with gitlab-runner 13.8.0 (775dd39d)  on global-shared-gitlab-runner-89dbd4db8-gbfgw 79hzYLUT section_start:1614202900:resolve_secrets Resolving secrets section_end:1614202900:resolve_secrets section_start:1614202900:prepare_executor Preparing the "kubernetes" executor Using Kubernetes namespace: gitlab-runner WARNING: Pulling GitLab Runner helper image from Docker Hub. Helper image is migrating to registry.gitlab.com, for more information see https://docs.gitlab.com/runner/configuration/advanced-configuration.html#migrating-helper-image-to-registrygitlabcom Using Kubernetes executor with image ${GITLAB_INTERNAL_REGISTRY}/ironbank-tools/ironbank-pipeline/ib-pipeline-image:0.1 ... section_end:1614202900:prepare_executor section_start:1614202900:prepare_script Preparing environment Waiting for pod gitlab-runner/runner-79hzylut-project-4877-concurrent-0s5h9r to be running, status is Pending Waiting for pod gitlab-runner/runner-79hzylut-project-4877-concurrent-0s5h9r to be running, status is Pending ContainersNotReady: "containers with unready status: [build helper]" ContainersNotReady: "containers with unready status: [build helper]" Running on runner-79hzylut-project-4877-concurrent-0s5h9r via global-shared-gitlab-runner-89dbd4db8-gbfgw... section_end:1614202906:prepare_script section_start:1614202906:get_sources Getting source from Git repository Fetching changes with git depth set to 50... Initialized empty Git repository in /builds/dsop/opensource/spark-operator/spark-py/.git/ Created fresh repository. Checking out ed11be3d as initial... Skipping Git submodules setup section_end:1614202907:get_sources section_start:1614202907:download_artifacts Downloading artifacts Downloading artifacts for load scripts (2155454)... Downloading artifacts from coordinator... ok  id=2155454 responseStatus=200 OK token=irhqC5HE Downloading artifacts for hardening_manifest (2155457)... Downloading artifacts from coordinator... ok  id=2155457 responseStatus=200 OK token=trHzxg-s Downloading artifacts for wl compare lint (2155458)... Downloading artifacts from coordinator... ok  id=2155458 responseStatus=200 OK token=ZP6rhrdB Downloading artifacts for openscap compliance (2155462)... Downloading artifacts from coordinator... ok  id=2155462 responseStatus=200 OK token=dLq_szua Downloading artifacts for openscap cve (2155463)... Downloading artifacts from coordinator... ok  id=2155463 responseStatus=200 OK token=wUyAjC7D Downloading artifacts for twistlock scan (2155464)... Downloading artifacts from coordinator... ok  id=2155464 responseStatus=200 OK token=ggFHL3Pa Downloading artifacts for anchore scan (2155465)... Downloading artifacts from coordinator... ok  id=2155465 responseStatus=200 OK token=Dy-HMtmN section_end:1614202908:download_artifacts section_start:1614202908:step_script Executing "step_script" stage of the job script $ PROJ_PATH=$(echo "${CI_PROJECT_PATH}" | sed -e 's/.*dsop\/\(.*\)/\1/') $ export PROJ_PATH $ pip3 install jsonschema Collecting jsonschema Downloading jsonschema-3.2.0-py2.py3-none-any.whl (56 kB) Collecting pyrsistent>=0.14.0 Downloading pyrsistent-0.17.3.tar.gz (106 kB) Requirement already satisfied: setuptools in /opt/app-root/lib/python3.6/site-packages (from jsonschema) (39.2.0) Collecting attrs>=17.4.0 Downloading attrs-20.3.0-py2.py3-none-any.whl (49 kB) Collecting importlib-metadata; python_version < "3.8" Downloading importlib_metadata-3.7.0-py3-none-any.whl (11 kB) Requirement already satisfied: six>=1.11.0 in /opt/app-root/lib/python3.6/site-packages (from jsonschema) (1.15.0) Collecting typing-extensions>=3.6.4; python_version < "3.8" Downloading typing_extensions-3.7.4.3-py3-none-any.whl (22 kB) Collecting zipp>=0.5 Downloading zipp-3.4.0-py3-none-any.whl (5.2 kB) Building wheels for collected packages: pyrsistent Building wheel for pyrsistent (setup.py): started Building wheel for pyrsistent (setup.py): finished with status 'done' Created wheel for pyrsistent: filename=pyrsistent-0.17.3-cp36-cp36m-linux_x86_64.whl size=55876 sha256=8647883155c9f9dff54f86df2a947cb4e9f879d53327ee2242bea2e12df64141 Stored in directory: /tmp/pip-ephem-wheel-cache-3stvzldn/wheels/34/13/19/294da8e11bce7e563afee51251b9fa878185e14f4b5caf00cb Successfully built pyrsistent Installing collected packages: pyrsistent, attrs, typing-extensions, zipp, importlib-metadata, jsonschema Successfully installed attrs-20.3.0 importlib-metadata-3.7.0 jsonschema-3.2.0 pyrsistent-0.17.3 typing-extensions-3.7.4.3 zipp-3.4.0 WARNING: You are using pip version 20.2.4; however, version 21.0.1 is available. You should consider upgrading via the '/opt/app-root/bin/python3.6 -m pip install --upgrade pip' command. $ python3 "${PIPELINE_REPO_DIR}/stages/check-cves/pipeline_wl_compare.py" INFO: Log level set to info INFO: Number of whitelisted vulnerabilities: 113 INFO: Whitelisted vulnerabilities: {'anchorecve_CVE-2020-29363-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2020-8284-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-35512-dbus-common-1.12.8-12.el8_3', 'anchorecve_CVE-2019-25013-glibc-common-2.28-127.el8', 'oscapcomp_CCE-80938-4', 'anchorecve_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'oscapcomp_CCE-82368-2', 'anchorecomp_bcd159901fe47efddae5c095b4b0d7fd', 'anchorecomp_addbb93c22e9b0988b8b40392a4538cb', 'anchorecve_CVE-2021-3326-glibc-common-2.28-127.el8_3.2', 'anchorecomp_41cb7cdf04850e33a11f80c42bf660b3', 'oscapcomp_CCE-82880-6', 'anchorecve_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'anchorecomp_34de21e516c0ca50a96e5386f163f8bf', 'oscapcomp_CCE-83401-0', 'tl_CVE-2021-3326-glibc-2.28-127.el8', 'anchorecve_CVE-2020-8286-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-13434-sqlite-libs-3.26.0-11.el8', 'anchorecve_CVE-2019-25013-glibc-common-2.28-127.el8_3.2', 'anchorecve_CVE-2020-26116-python3-libs-3.6.8-31.el8', 'anchorecve_CVE-2020-28196-krb5-libs-1.18.2-5.el8', 'anchorecve_CVE-2020-29361-p11-kit-trust-0.23.14-5.el8_0', 'anchorecomp_68e630cef4a8533b139875aa5fc54da5', 'anchorecve_CVE-2020-27618-glibc-minimal-langpack-2.28-127.el8', 'anchorecve_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'oscapcomp_CCE-82168-6', 'anchorecve_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-24370-lua-libs-5.3.4-11.el8', 'anchorecve_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'anchorecve_VULNDB-247315-python-3.8.7', 'anchorecve_CVE-2020-35512-dbus-daemon-1.12.8-11.el8', 'anchorecve_CVE-2020-16135-libssh-config-0.9.4-2.el8', 'anchorecve_CVE-2020-13776-systemd-pam-239-41.el8_3.1', 'oscapcomp_CCE-80784-2', 'oscapcomp_CCE-82959-8', 'anchorecve_CVE-2020-26137-python3-urllib3-1.24.2-4.el8', 'anchorecve_CVE-2020-29362-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_VULNDB-115884-urllib3-1.24.2', 'oscapcomp_CCE-82985-3', 'oscapcomp_CCE-82474-8', 'oscapcomp_CCE-82220-5', 'oscapcomp_CCE-82979-6', 'tl_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-35512-dbus-1.12.8-11.el8', 'anchorecve_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-24977-libxml2-2.9.7-8.el8', 'anchorecve_CVE-2020-26116-platform-python-3.6.8-31.el8', 'anchorecve_CVE-2020-35512-dbus-common-1.12.8-11.el8', 'oscapcomp_CCE-82267-6', 'anchorecomp_320a97c6816565eedf3545833df99dd0', 'anchorecve_CVE-2020-8231-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-27618-glibc-2.28-127.el8', 'tl_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-27619-python3-libs-3.6.8-31.el8', 'oscapcomp_CCE-82473-0', 'anchorecve_CVE-2020-8285-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-13776-systemd-libs-239-41.el8_3.1', 'anchorecve_CVE-2020-16135-libssh-0.9.4-2.el8', 'anchorecve_CVE-2020-35512-dbus-libs-1.12.8-11.el8', 'tl_CVE-2019-25013-glibc-2.28-127.el8', 'anchorecve_CVE-2020-27618-glibc-common-2.28-127.el8_3.2', 'anchorecomp_463a9a24225c26f7a5bf3f38908e5cb3', 'anchorecve_CVE-2020-27618-glibc-minimal-langpack-2.28-127.el8_3.2', 'anchorecve_CVE-2019-25013-glibc-minimal-langpack-2.28-127.el8_3.2', 'anchorecve_VULNDB-249730-python-3.8.7', 'oscapcomp_CCE-82949-9', 'anchorecomp_e7573262736ef52353cde3bae2617782', 'anchorecve_CVE-2021-3326-glibc-2.28-127.el8', 'anchorecve_CVE-2021-3326-glibc-2.28-127.el8_3.2', 'anchorecve_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-15358-sqlite-libs-3.26.0-11.el8', 'tl_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-27618-glibc-common-2.28-127.el8', 'anchorecve_CVE-2021-23336-python3-libs-3.6.8-31.el8', 'oscapcomp_CCE-82360-9', 'oscapcomp_CCE-82395-5', 'tl_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-35512-dbus-tools-1.12.8-12.el8_3', 'anchorecve_CVE-2021-3326-glibc-minimal-langpack-2.28-127.el8_3.2', 'tl_CVE-2019-25013-glibc-2.28-127.el8_3.2', 'oscapcomp_CCE-80935-0', 'anchorecve_CVE-2020-8927-brotli-1.0.6-2.el8', 'anchorecomp_c2e44319ae5b3b040044d8ae116d1c2f', 'anchorecomp_abb121e9621abdd452f65844954cf1c1', 'tl_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'tl_CVE-2020-13776-systemd-239-41.el8_3.1', 'anchorecve_VULNDB-247765-python-3.8.7', 'oscapcomp_CCE-82472-2', 'anchorecve_CVE-2020-24977-python3-libxml2-2.9.7-8.el8', 'anchorecomp_3456a263793066e9b5063ada6e47917d', 'anchorecve_CVE-2020-27618-glibc-2.28-127.el8_3.2', 'anchorecve_CVE-2021-23336-platform-python-3.6.8-31.el8', 'oscapcomp_CCE-82214-8', 'tl_CVE-2020-8927-brotli-1.0.6-2.el8', 'tl_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-35512-dbus-daemon-1.12.8-12.el8_3', 'tl_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-35512-dbus-1.12.8-12.el8_3', 'anchorecve_CVE-2020-27619-platform-python-3.6.8-31.el8', 'anchorecomp_3e5fad1c039f3ecfd1dcdc94d2f1f9a0', 'anchorecomp_639f6f1177735759703e928c14714a59', 'anchorecve_CVE-2020-13776-systemd-239-41.el8_3.1', 'tl_CVE-2021-3326-glibc-2.28-127.el8_3.2', 'anchorecomp_c4ad80832b361f81df2a31e5b6b09864', 'anchorecve_CVE-2021-3326-glibc-minimal-langpack-2.28-127.el8', 'anchorecve_CVE-2019-25013-glibc-minimal-langpack-2.28-127.el8', 'anchorecomp_698044205a9c4a6d48b7937e66a6bf4f', 'oscapcomp_CCE-82494-6', 'anchorecve_CVE-2019-25013-glibc-2.28-127.el8_3.2', 'anchorecve_CVE-2021-3326-glibc-common-2.28-127.el8', 'anchorecve_CVE-2020-35512-dbus-libs-1.12.8-12.el8_3', 'anchorecve_CVE-2020-35512-dbus-tools-1.12.8-11.el8', 'anchorecve_CVE-2019-25013-glibc-2.28-127.el8'} INFO: Vulnerabilities found in scanning stage: 82 INFO: {'oscapcomp_CCE-82959-8', 'anchorecve_CVE-2020-16135-libssh-0.9.4-2.el8', 'anchorecve_CVE-2020-26137-python3-urllib3-1.24.2-4.el8', 'anchorecve_CVE-2020-29362-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2020-27618-glibc-2.28-127.el8_3.2', 'anchorecve_CVE-2020-27618-glibc-common-2.28-127.el8_3.2', 'anchorecve_CVE-2020-35512-dbus-common-1.12.8-12.el8_3', 'anchorecve_CVE-2020-8284-libcurl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-82985-3', 'oscapcomp_CCE-82474-8', 'oscapcomp_CCE-82220-5', 'anchorecve_CVE-2020-29363-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2021-23336-platform-python-3.6.8-31.el8', 'oscapcomp_CCE-82979-6', 'oscapcomp_CCE-80938-4', 'tl_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2019-25013-glibc-minimal-langpack-2.28-127.el8_3.2', 'oscapcomp_CCE-82368-2', 'oscapcomp_CCE-82949-9', 'oscapcomp_CCE-82214-8', 'anchorecve_CVE-2020-27618-glibc-minimal-langpack-2.28-127.el8_3.2', 'tl_CVE-2020-8927-brotli-1.0.6-2.el8', 'anchorecve_CVE-2021-3326-glibc-common-2.28-127.el8_3.2', 'anchorecve_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'anchorecve_VULNDB-249730-python-3.8.7', 'tl_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-82880-6', 'anchorecve_CVE-2020-35512-dbus-daemon-1.12.8-12.el8_3', 'anchorecve_CVE-2020-24977-python3-libxml2-2.9.7-8.el8', 'tl_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-35512-dbus-1.12.8-12.el8_3', 'anchorecve_CVE-2021-3326-glibc-2.28-127.el8_3.2', 'anchorecve_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-27619-platform-python-3.6.8-31.el8', 'anchorecve_CVE-2020-24977-libxml2-2.9.7-8.el8', 'tl_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-15358-sqlite-libs-3.26.0-11.el8', 'oscapcomp_CCE-83401-0', 'anchorecve_CVE-2021-23336-python3-libs-3.6.8-31.el8', 'anchorecve_CVE-2020-8286-libcurl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-82360-9', 'anchorecve_CVE-2020-26116-platform-python-3.6.8-31.el8', 'oscapcomp_CCE-82395-5', 'tl_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-13434-sqlite-libs-3.26.0-11.el8', 'anchorecve_CVE-2019-25013-glibc-common-2.28-127.el8_3.2', 'anchorecve_CVE-2020-13776-systemd-239-41.el8_3.1', 'tl_CVE-2021-3326-glibc-2.28-127.el8_3.2', 'anchorecve_CVE-2020-35512-dbus-tools-1.12.8-12.el8_3', 'anchorecve_VULNDB-115884-urllib3-1.24.2', 'oscapcomp_CCE-82267-6', 'anchorecve_CVE-2020-26116-python3-libs-3.6.8-31.el8', 'anchorecve_CVE-2020-28196-krb5-libs-1.18.2-5.el8', 'anchorecve_CVE-2021-3326-glibc-minimal-langpack-2.28-127.el8_3.2', 'anchorecve_CVE-2020-8231-libcurl-7.61.1-14.el8_3.1', 'tl_CVE-2019-25013-glibc-2.28-127.el8_3.2', 'oscapcomp_CCE-80935-0', 'anchorecve_CVE-2020-29361-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2020-8927-brotli-1.0.6-2.el8', 'tl_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'oscapcomp_CCE-82168-6', 'anchorecve_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-24370-lua-libs-5.3.4-11.el8', 'anchorecve_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-27619-python3-libs-3.6.8-31.el8', 'oscapcomp_CCE-82494-6', 'tl_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'anchorecve_VULNDB-247315-python-3.8.7', 'anchorecve_CVE-2019-25013-glibc-2.28-127.el8_3.2', 'oscapcomp_CCE-82473-0', 'tl_CVE-2020-13776-systemd-239-41.el8_3.1', 'anchorecve_CVE-2020-16135-libssh-config-0.9.4-2.el8', 'anchorecve_CVE-2020-35512-dbus-libs-1.12.8-12.el8_3', 'anchorecve_CVE-2020-8285-libcurl-7.61.1-14.el8_3.1', 'anchorecve_VULNDB-247765-python-3.8.7', 'anchorecve_CVE-2020-13776-systemd-pam-239-41.el8_3.1', 'anchorecve_CVE-2020-13776-systemd-libs-239-41.el8_3.1', 'oscapcomp_CCE-82472-2', 'oscapcomp_CCE-80784-2'} INFO: ALL VULNERABILITIES WHITELISTED INFO: Scans are passing 100% section_end:1614202919:step_script section_start:1614202919:cleanup_file_variables Cleaning up file based variables section_end:1614202919:cleanup_file_variables Job succeeded