UNCLASSIFIED

Merge branch 'renovate/docker-sonarqube-8.6-community' into 'development'

Update sonarqube:8.6-community Docker digest to de70dac

See merge request !22
19 jobs for development in 50 minutes and 8 seconds (queued for 48 minutes and 6 seconds)
Status Job ID Name Coverage
  .Pre
passed #1689020
ironbank
load scripts

00:00:45

 
  Preflight
passed #1689021
ironbank
folder structure

00:00:34

passed #1689023
ironbank
hardening_manifest

00:00:39

passed #1689022
ironbank
hardening_manifest migration

00:00:40

 
  Lint
passed #1689024
ironbank
wl compare lint

00:00:39

 
  Import Artifacts
passed #1689025
ironbank
import artifacts

00:05:19

 
  Scan Artifacts
passed #1689026
ironbank
clamav scan

00:06:19

 
  Build
passed #1689027
ironbank-isolated
build

00:04:33

 
  Scanning
passed #1689031
ironbank
anchore scan

00:19:07

passed #1689028
ironbank
openscap compliance

00:06:30

passed #1689029
ironbank
openscap cve

00:16:15

passed #1689030
ironbank
twistlock scan

00:02:01

 
  Csv Output
passed #1689032
ironbank
csv output

00:02:27

 
  Check Cves
failed #1689033
ironbank allowed to fail
check cves

00:00:53

 
  Documentation
passed #1689034
ironbank
sign image

00:02:18

passed #1689035
ironbank
sign manifest

00:02:12

passed #1689036
ironbank
write json documentation

00:04:06

 
  Publish
passed #1689037
ironbank
upload to s3

00:03:28

 
  Vat
passed #1689038
ironbank
vat

00:01:36

 
Name Stage Failure
failed
check cves Check Cves
INFO: Vulnerabilities found in scanning stage: 93
INFO: {'tl_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'tl_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'tl_CVE-2020-8908-com.google.guava_guava-28.2-jre', 'anchorecve_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'tl_CVE-2020-8908-com.google.guava_guava-28.0-jre', 'anchorecve_VULNDB-204607-logback-1.2.3', 'tl_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-29362-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2020-15358-sqlite-libs-3.26.0-11.el8', 'anchorecve_CVE-2021-23240-sudo-1.8.29-6.el8', 'tl_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-8908-guava-10.0.1', 'anchorecve_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'anchorecve_GHSA-vwqq-5vrc-xw9h-log4j-core-2.11.1', 'tl_CVE-2020-9488-org.apache.logging.log4j_log4j-api-2.8.2', 'anchorecve_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-82168-6', 'oscapcomp_CCE-82368-2', 'anchorecve_CVE-2020-10663-json-1.1.1', 'anchorecve_CVE-2020-8231-libcurl-7.61.1-14.el8_3.1', 'tl_CVE-2021-23239-sudo-1.8.29-6.el8', 'anchorecve_CVE-2020-35512-dbus-libs-1.12.8-11.el8', 'anchorecve_CVE-2019-25013-glibc-minimal-langpack-2.28-127.el8', 'anchorecve_CVE-2020-8286-libcurl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-82979-6', 'anchorecve_CVE-2020-27619-python3-libs-3.6.8-31.el8', 'anchorecve_VULNDB-247072-elasticsearch-7.9.3', 'tl_CVE-2020-8927-brotli-1.0.6-2.el8', 'anchorecve_CVE-2020-13776-systemd-239-41.el8_3.1', 'tl_CVE-2019-25013-glibc-2.28-127.el8', 'anchorecve_CVE-2020-27619-platform-python-3.6.8-31.el8', 'anchorecve_VULNDB-239195-commons-io-2.7', 'oscapcomp_CCE-82220-5', 'tl_CVE-2020-8908-com.google.guava_guava-10.0.1', 'anchorecve_CVE-2020-29361-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2020-8022-tomcat-8.5.60', 'anchorecve_CVE-2020-29363-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2020-16135-libssh-0.9.4-2.el8', 'oscapcomp_CCE-82473-0', 'anchorecve_CVE-2020-16135-libssh-config-0.9.4-2.el8', 'anchorecve_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-25649-jackson-databind-2.10.4', 'anchorecve_CVE-2020-13956-httpclient-4.5', 'anchorecve_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-26116-python3-libs-3.6.8-31.el8', 'oscapcomp_CCE-82395-5', 'anchorecve_CVE-2020-35512-dbus-tools-1.12.8-11.el8', 'anchorecve_CVE-2020-27618-glibc-common-2.28-127.el8', 'oscapcomp_CCE-82474-8', 'oscapcomp_CCE-82267-6', 'tl_CVE-2020-9488-org.apache.logging.log4j_log4j-api-2.11.1', 'anchorecve_CVE-2020-26116-platform-python-3.6.8-31.el8', 'anchorecve_CVE-2020-24370-lua-5.3.4-11.el8', 'anchorecve_CVE-2020-13776-systemd-libs-239-41.el8_3.1', 'anchorecve_CVE-2020-35512-dbus-common-1.12.8-11.el8', 'anchorecve_VULNDB-193304-jackson-core-2.9.7', 'anchorecve_CVE-2020-13776-systemd-pam-239-41.el8_3.1', 'tl_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'tl_CVE-2021-3156-sudo-1.8.29-6.el8', 'oscapcomp_CCE-80935-0', 'anchorecve_VULNDB-193303-jackson-core-2.9.7', 'anchorecve_CVE-2020-8927-brotli-1.0.6-2.el8', 'oscapcomp_CCE-82494-6', 'anchorecve_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'tl_CVE-2020-8908-com.google.guava_guava-29.0-jre', 'anchorecve_CVE-2020-8285-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-35512-dbus-daemon-1.12.8-11.el8', 'anchorecve_CVE-2019-25013-glibc-2.28-127.el8', 'tl_CVE-2020-8908-com.google.guava_guava-26.0-jre', 'tl_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'tl_CVE-2020-25649-com.fasterxml.jackson.core_jackson-databind-2.10.4', 'tl_CVE-2020-13776-systemd-239-41.el8_3.1', 'oscapcomp_CCE-82959-8', 'anchorecve_CVE-2019-25013-glibc-common-2.28-127.el8', 'oscapcomp_CCE-82472-2', 'anchorecve_CVE-2020-24370-lua-libs-5.3.4-11.el8', 'anchorecve_CVE-2020-24977-libxml2-2.9.7-8.el8', 'tl_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-82949-9', 'anchorecve_CVE-2020-13434-sqlite-libs-3.26.0-11.el8', 'anchorecve_CVE-2021-23239-sudo-1.8.29-6.el8', 'anchorecve_CVE-2020-28196-krb5-libs-1.18.2-5.el8', 'anchorecve_CVE-2020-27618-glibc-2.28-127.el8', 'anchorecve_CVE-2020-27618-glibc-minimal-langpack-2.28-127.el8', 'anchorecve_VULNDB-193302-jackson-core-2.9.7', 'oscapcomp_CCE-82985-3', 'anchorecve_CVE-2020-8284-libcurl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-82360-9', 'anchorecve_CVE-2020-35512-dbus-1.12.8-11.el8', 'oscapcomp_CCE-80938-4', 'anchorecve_CVE-2020-24977-python3-libxml2-2.9.7-8.el8', 'tl_CVE-2021-23240-sudo-1.8.29-6.el8'}
ERROR: NON-WHITELISTED VULNERABILITIES FOUND
ERROR: Number of non-whitelisted vulnerabilities: 2
ERROR: The following vulnerabilities are not whitelisted:
ERROR: Anchore CVE - VULNDB-247072-elasticsearch-7.9.3
ERROR: Twistlock CVE - CVE-2021-3156-sudo-1.8.29-6.el8
Cleaning up file based variables
ERROR: Job failed: command terminated with exit code 1