UNCLASSIFIED

Merge branch 'hardening_manifest' into 'development'

Migrate to hardening_manifest.yaml

See merge request !15
19 jobs for development in 15 minutes and 3 seconds (queued for 16 minutes and 12 seconds)
Status Job ID Name Coverage
  .Pre
passed #2649591
ironbank
load scripts

00:00:09

 
  Preflight
passed #2649592
ironbank
folder structure

00:00:15

passed #2649593
ironbank
hardening_manifest

00:00:30

 
  Lint
passed #2649594
ironbank
wl compare lint

00:00:25

 
  Finding Compare
failed #2649595
ironbank allowed to fail
vat compare

00:00:11

 
  Import Artifacts
passed #2649596
ironbank
import artifacts

00:00:09

 
  Scan Artifacts
passed #2649597
ironbank
clamav scan

00:00:21

 
  Build
passed #2649598
ironbank-isolated
build

00:02:18

 
  Scanning
passed #2649602
ironbank
anchore scan

00:03:02

passed #2649599
ironbank
openscap compliance

00:01:12

passed #2649600
ironbank
openscap cve

00:06:43

passed #2649601
ironbank
twistlock scan

00:00:34

 
  Csv Output
passed #2649603
ironbank
csv output

00:00:59

 
  Check Cves
passed #2649604
ironbank
check cves

00:00:41

 
  Documentation
passed #2649605
ironbank
sign image

00:00:41

passed #2649606
ironbank
sign manifest

00:00:35

passed #2649607
ironbank
write json documentation

00:00:39

 
  S3 Publish
passed #2649608
ironbank
upload to s3

00:01:41

 
  Vat
passed #2649609
ironbank
vat

00:00:08

 
Name Stage Failure
failed
vat compare Finding Compare
('CVE-2020-13776', 'anchore_cve', 'systemd-239-41.el8_3.2\nhttps://access.redhat.com/security/cve/CVE-2020-13776', 'systemd-239-41.el8_3.2', None)
('CVE-2020-13776', 'twistlock_cve', 'systemd through v245 mishandles numerical usernames such as ones composed of decimal digits or 0x followed by hex digits, as demonstrated by use of root privileges when privileges of the 0x0 user account were intended. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000082.', 'systemd-239-41.el8_3.2', None)
('cbff271f45d32e78dcc1979dbca9c14d', 'anchore_comp', 'User root found as effective user, which is explicity not allowed\n Gate: dockerfile\n Trigger: effective_user\n Policy ID: DoDEffectiveUserChecks', None, None)
Uploading artifacts for failed job
ci-artifacts/compare/: found 2 matching files and directories
Uploading artifacts...
Uploading artifacts as "archive" to coordinator... ok
id=2649595 responseStatus=201 Created token=1FpxPDTN
Cleaning up file based variables
ERROR: Job failed: command terminated with exit code 4