UNCLASSIFIED

Merge branch 'david.freeman-development-patch-90383' into 'development'

Add new file

See merge request !14
19 jobs for development in 143 minutes and 21 seconds (queued for 132 minutes and 54 seconds)
Status Job ID Name Coverage
  .Pre
passed #2635120
ironbank
load scripts

00:00:09

 
  Preflight
passed #2635121
ironbank
folder structure

00:00:16

passed #2635122
ironbank
hardening_manifest

00:00:19

 
  Lint
passed #2635123
ironbank
wl compare lint

00:00:14

 
  Finding Compare
failed #2635124
ironbank allowed to fail
vat compare

00:00:14

 
  Import Artifacts
passed #2635125
ironbank
import artifacts

00:06:18

 
  Scan Artifacts
passed #2635126
ironbank
clamav scan

00:29:39

 
  Build
passed #2635127
ironbank-isolated
build

00:50:53

 
  Scanning
passed #2635131
ironbank
anchore scan

00:18:28

passed #2635128
ironbank
openscap compliance

00:18:22

passed #2635129
ironbank
openscap cve

00:21:35

passed #2635130
ironbank
twistlock scan

00:15:48

 
  Csv Output
passed #2635132
ironbank
csv output

00:04:25

 
  Check Cves
failed #2635133
ironbank allowed to fail
check cves

00:00:15

 
  Documentation
passed #2635134
ironbank
sign image

00:16:17

passed #2635135
ironbank
sign manifest

00:03:51

passed #2635136
ironbank
write json documentation

00:03:53

 
  S3 Publish
failed #2635137
ironbank
upload to s3

00:12:57

 
  Vat
skipped #2635138
ironbank
vat
 
Name Stage Failure
failed
upload to s3 S3 Publish
Downloading artifacts from coordinator... ok        id=2635136 responseStatus=200 OK token=Y_qrVJDc
Executing "step_script" stage of the job script
$ "${PIPELINE_REPO_DIR}/stages/s3/upload-to-s3-run.sh"
INFO: Log level set to info
testing/container-scan-reports/opensource/triton-inference-server/server/repo_map.json
Number of keywords detected: 2
Number of tags detected: 2
Cleaning up file based variables
ERROR: Job failed: command terminated with exit code 137
failed
check cves Check Cves
ERROR: Number of non-whitelisted vulnerabilities: 4
ERROR: The following vulnerabilities are not whitelisted:
ERROR: scan_source cve_id package package_path
ERROR: anchore_cve CVE-2021-23840 openssl-1.1.1g-15.el8_3 None
ERROR: anchore_cve CVE-2021-23841 openssl-1.1.1g-15.el8_3 None
ERROR: twistlock_cve CVE-2021-23840 openssl-1.1.1g-15.el8_3 None
ERROR: twistlock_cve CVE-2021-23841 openssl-1.1.1g-15.el8_3 None
Cleaning up file based variables
ERROR: Job failed: command terminated with exit code 1
failed
vat compare Finding Compare
('CVE-2021-22876', 'twistlock_cve', 'curl 7.1.1 to and including 7.75.0 is vulnerable to an \\"Exposure of Private Personal Information to an Unauthorized Actor\\" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.', 'curl-7.61.1-14.el8_3.1', None)
('CVE-2021-20305', 'anchore_cve', 'nettle-3.4.1-2.el8\nhttps://access.redhat.com/security/cve/CVE-2021-20305', 'nettle-3.4.1-2.el8', None)
('cbff271f45d32e78dcc1979dbca9c14d', 'anchore_comp', 'User root found as effective user, which is explicity not allowed\n Gate: dockerfile\n Trigger: effective_user\n Policy ID: DoDEffectiveUserChecks', None, None)
Uploading artifacts for failed job
Uploading artifacts...
ci-artifacts/compare/: found 2 matching files and directories

Uploading artifacts as "archive" to coordinator... ok
id=2635124 responseStatus=201 Created token=yRpdXKQz
Cleaning up file based variables
ERROR: Job failed: command terminated with exit code 4