Running with gitlab-runner 13.8.0 (775dd39d)  on global-shared-gitlab-runner-89dbd4db8-gbfgw 79hzYLUT section_start:1612389811:resolve_secrets Resolving secrets section_end:1612389811:resolve_secrets section_start:1612389811:prepare_executor Preparing the "kubernetes" executor Using Kubernetes namespace: gitlab-runner WARNING: Pulling GitLab Runner helper image from Docker Hub. Helper image is migrating to registry.gitlab.com, for more information see https://docs.gitlab.com/runner/configuration/advanced-configuration.html#migrating-helper-image-to-registrygitlabcom Using Kubernetes executor with image ${GITLAB_INTERNAL_REGISTRY}/ironbank-tools/ironbank-pipeline/ib-pipeline-image:0.1 ... section_end:1612389811:prepare_executor section_start:1612389811:prepare_script Preparing environment Waiting for pod gitlab-runner/runner-79hzylut-project-1007-concurrent-082dww to be running, status is Pending Running on runner-79hzylut-project-1007-concurrent-082dww via global-shared-gitlab-runner-89dbd4db8-gbfgw... section_end:1612389814:prepare_script section_start:1612389814:get_sources Getting source from Git repository Fetching changes with git depth set to 50... Initialized empty Git repository in /builds/dsop/redhat/openjdk/openjdk8/.git/ Created fresh repository. Checking out 91b13a6e as development... Skipping Git submodules setup section_end:1612389815:get_sources section_start:1612389815:download_artifacts Downloading artifacts Downloading artifacts for load scripts (1769557)... Downloading artifacts from coordinator... ok  id=1769557 responseStatus=200 OK token=V51XitxM Downloading artifacts for hardening_manifest (1769560)... Downloading artifacts from coordinator... ok  id=1769560 responseStatus=200 OK token=XEux15i6 Downloading artifacts for wl compare lint (1769561)... Downloading artifacts from coordinator... ok  id=1769561 responseStatus=200 OK token=b6C-r5LZ Downloading artifacts for openscap compliance (1769565)... Downloading artifacts from coordinator... ok  id=1769565 responseStatus=200 OK token=tK6MQn5b Downloading artifacts for openscap cve (1769566)... Downloading artifacts from coordinator... ok  id=1769566 responseStatus=200 OK token=_yNFMsDA Downloading artifacts for twistlock scan (1769567)... Downloading artifacts from coordinator... ok  id=1769567 responseStatus=200 OK token=2yAyNy2s Downloading artifacts for anchore scan (1769568)... Downloading artifacts from coordinator... ok  id=1769568 responseStatus=200 OK token=AP42Y2b1 section_end:1612389816:download_artifacts section_start:1612389816:step_script Executing "step_script" stage of the job script $ python3 "${PIPELINE_REPO_DIR}/stages/check-cves/pipeline_wl_compare.py" INFO: Log level set to info INFO: Number of whitelisted vulnerabilities: 87 INFO: Whitelisted vulnerabilities: {'oscapcomp_CCE-82220-5', 'anchorecve_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-29361-p11-kit-trust-0.23.14-5.el8_0', 'oscapcomp_CCE-80935-0', 'tl_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-35512-dbus-tools-1.12.8-11.el8', 'anchorecomp_e7573262736ef52353cde3bae2617782', 'anchorecve_CVE-2020-13776-systemd-libs-239-41.el8_3.1', 'anchorecve_CVE-2020-26116-python3-libs-3.6.8-31.el8', 'oscapcomp_CCE-82473-0', 'anchorecomp_698044205a9c4a6d48b7937e66a6bf4f', 'anchorecve_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'oscapcomp_CCE-80784-2', 'tl_CVE-2020-8927-brotli-1.0.6-2.el8', 'tl_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecomp_34de21e516c0ca50a96e5386f163f8bf', 'anchorecve_CVE-2019-25013-glibc-common-2.28-127.el8', 'tl_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'anchorecomp_41cb7cdf04850e33a11f80c42bf660b3', 'anchorecomp_abb121e9621abdd452f65844954cf1c1', 'anchorecomp_c2e44319ae5b3b040044d8ae116d1c2f', 'oscapcomp_CCE-82949-9', 'oscapcomp_CCE-83401-0', 'anchorecve_CVE-2020-27618-glibc-common-2.28-127.el8', 'anchorecomp_c4ad80832b361f81df2a31e5b6b09864', 'anchorecve_CVE-2020-35512-dbus-libs-1.12.8-11.el8', 'anchorecve_CVE-2020-29362-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2019-25013-glibc-minimal-langpack-2.28-127.el8', 'anchorecomp_320a97c6816565eedf3545833df99dd0', 'anchorecve_CVE-2020-13776-systemd-pam-239-41.el8_3.1', 'anchorecve_CVE-2020-29363-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-13434-sqlite-libs-3.26.0-11.el8', 'anchorecve_CVE-2020-8231-libcurl-7.61.1-14.el8_3.1', 'anchorecomp_3456a263793066e9b5063ada6e47917d', 'anchorecve_CVE-2020-27619-platform-python-3.6.8-31.el8', 'anchorecve_CVE-2020-24370-lua-5.3.4-11.el8', 'oscapcomp_CCE-80938-4', 'tl_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'anchorecomp_68e630cef4a8533b139875aa5fc54da5', 'oscapcomp_CCE-82494-6', 'oscapcomp_CCE-82360-9', 'tl_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-16135-libssh-0.9.4-2.el8', 'anchorecve_CVE-2020-8927-brotli-1.0.6-2.el8', 'tl_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-27618-glibc-minimal-langpack-2.28-127.el8', 'anchorecomp_639f6f1177735759703e928c14714a59', 'oscapcomp_CCE-82880-6', 'anchorecve_CVE-2020-28196-krb5-libs-1.18.2-5.el8', 'oscapcomp_CCE-82368-2', 'tl_CVE-2019-25013-glibc-2.28-127.el8', 'anchorecve_CVE-2020-27619-python3-libs-3.6.8-31.el8', 'anchorecve_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2019-25013-glibc-2.28-127.el8', 'anchorecve_CVE-2020-8284-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-16135-libssh-config-0.9.4-2.el8', 'tl_CVE-2020-13776-systemd-239-41.el8_3.1', 'anchorecve_CVE-2020-26116-platform-python-3.6.8-31.el8', 'anchorecve_CVE-2020-35512-dbus-common-1.12.8-11.el8', 'anchorecomp_bcd159901fe47efddae5c095b4b0d7fd', 'anchorecve_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'tl_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'oscapcomp_CCE-82979-6', 'anchorecve_CVE-2020-13776-systemd-239-41.el8_3.1', 'anchorecve_CVE-2020-24370-lua-libs-5.3.4-11.el8', 'oscapcomp_CCE-82474-8', 'anchorecve_CVE-2020-35512-dbus-1.12.8-11.el8', 'anchorecomp_463a9a24225c26f7a5bf3f38908e5cb3', 'anchorecve_CVE-2020-8285-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-24977-libxml2-2.9.7-8.el8', 'anchorecomp_addbb93c22e9b0988b8b40392a4538cb', 'oscapcomp_CCE-82168-6', 'anchorecve_CVE-2020-27618-glibc-2.28-127.el8', 'oscapcomp_CCE-82959-8', 'anchorecve_CVE-2020-15358-sqlite-libs-3.26.0-11.el8', 'oscapcomp_CCE-82985-3', 'anchorecve_CVE-2020-35512-dbus-daemon-1.12.8-11.el8', 'oscapcomp_CCE-82214-8', 'oscapcomp_CCE-82472-2', 'oscapcomp_CCE-82267-6', 'oscapcomp_CCE-82395-5', 'anchorecomp_3e5fad1c039f3ecfd1dcdc94d2f1f9a0', 'anchorecve_CVE-2020-8286-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-24977-python3-libxml2-2.9.7-8.el8'} INFO: Vulnerabilities found in scanning stage: 72 INFO: {'tl_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-24370-lua-libs-5.3.4-11.el8', 'tl_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2019-25013-glibc-common-2.28-127.el8', 'anchorecve_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-82220-5', 'anchorecve_CVE-2020-16135-libssh-0.9.4-2.el8', 'anchorecve_CVE-2020-8927-brotli-1.0.6-2.el8', 'oscapcomp_CCE-82474-8', 'anchorecve_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-35512-dbus-1.12.8-11.el8', 'tl_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-27618-glibc-minimal-langpack-2.28-127.el8', 'anchorecve_CVE-2020-29361-p11-kit-trust-0.23.14-5.el8_0', 'oscapcomp_CCE-82880-6', 'oscapcomp_CCE-82949-9', 'oscapcomp_CCE-80935-0', 'anchorecve_CVE-2020-28196-krb5-libs-1.18.2-5.el8', 'oscapcomp_CCE-82368-2', 'tl_CVE-2019-25013-glibc-2.28-127.el8', 'oscapcomp_CCE-83401-0', 'anchorecve_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-27619-python3-libs-3.6.8-31.el8', 'tl_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-35512-dbus-tools-1.12.8-11.el8', 'anchorecve_CVE-2019-25013-glibc-2.28-127.el8', 'anchorecve_CVE-2020-8285-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-27618-glibc-common-2.28-127.el8', 'anchorecve_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-13776-systemd-239-41.el8_3.1', 'anchorecve_CVE-2020-35512-dbus-libs-1.12.8-11.el8', 'anchorecve_CVE-2020-13776-systemd-libs-239-41.el8_3.1', 'anchorecve_CVE-2020-8284-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-24977-libxml2-2.9.7-8.el8', 'anchorecve_CVE-2020-29362-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2019-25013-glibc-minimal-langpack-2.28-127.el8', 'anchorecve_CVE-2020-26116-python3-libs-3.6.8-31.el8', 'anchorecve_CVE-2020-16135-libssh-config-0.9.4-2.el8', 'oscapcomp_CCE-82168-6', 'oscapcomp_CCE-82473-0', 'anchorecve_CVE-2020-27618-glibc-2.28-127.el8', 'tl_CVE-2020-13776-systemd-239-41.el8_3.1', 'anchorecve_CVE-2020-13776-systemd-pam-239-41.el8_3.1', 'anchorecve_CVE-2020-29363-p11-kit-trust-0.23.14-5.el8_0', 'oscapcomp_CCE-80784-2', 'anchorecve_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'tl_CVE-2020-8927-brotli-1.0.6-2.el8', 'oscapcomp_CCE-82959-8', 'anchorecve_CVE-2020-26116-platform-python-3.6.8-31.el8', 'anchorecve_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-35512-dbus-common-1.12.8-11.el8', 'anchorecve_CVE-2020-15358-sqlite-libs-3.26.0-11.el8', 'oscapcomp_CCE-82985-3', 'anchorecve_CVE-2020-35512-dbus-daemon-1.12.8-11.el8', 'anchorecve_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'oscapcomp_CCE-82214-8', 'anchorecve_CVE-2020-13434-sqlite-libs-3.26.0-11.el8', 'tl_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-8231-libcurl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-82472-2', 'oscapcomp_CCE-82267-6', 'oscapcomp_CCE-82395-5', 'tl_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-27619-platform-python-3.6.8-31.el8', 'anchorecve_CVE-2020-24370-lua-5.3.4-11.el8', 'oscapcomp_CCE-80938-4', 'tl_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-8286-libcurl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-82979-6', 'anchorecve_CVE-2020-24977-python3-libxml2-2.9.7-8.el8', 'oscapcomp_CCE-82494-6', 'oscapcomp_CCE-82360-9'} INFO: ALL VULNERABILITIES WHITELISTED INFO: Scans are passing 100% section_end:1612389822:step_script section_start:1612389822:cleanup_file_variables Cleaning up file based variables section_end:1612389822:cleanup_file_variables Job succeeded