-
Bug
-
Resolution: Cannot Reproduce
-
Undefined
-
None
-
0
-
Security (Vulnerability)
** Note that this is a public ticket, please refrain from adding any sensitive data. **
Description of Problem
How reproducible
(I was down when I ran the automation) I will try again in the morning.
Steps to Reproduce
- Run my automation to demo automated CVE patching with Insights and Ansible.
- [Step 2]
- [Step 3]
Actual Behavior
Between 6:45 pm phx and 6:52 pm I made 40 api calls to insights to get a list of vulenrabilites.
{ "content": "{\n \"errors\": [\n
{\n \"detail\": \"inventory_id exists but is not evaluated\",\n \"status\": \"404\"\n }\n ]\n}\n", "redirected": false, "url": "https://console.redhat.com/api/vulnerability/v1/systems/1e260fff-4a45-420e-8187-0d86d9ab38e9/cves?limit=30", "status": 404, "server": "openresty", "content_type": "application/vnd.api+json", "x_rh_insights_request_id": "2596576c70a04be3b7e841cd1349d346", "access_control_allow_origin": "*", "access_control_allow_headers": "Content-Type, Access-Control-Allow-Headers, Authorization, X-Requested-With, x-rh-identity", "access_control_allow_methods": "GET, OPTIONS, PATCH, POST", "x_content_type_options": "nosniff", "content_length": "116", "date": "Thu, 05 Sep 2024 01:52:47 GMT", "connection": "close", "set_cookie": "3ba1432eca9ab72ebcff858daecadbf5=75a8783bcfe1e8ae12f8cbd17250dd10; path=/; HttpOnly; Secure; SameSite=None", "x_rh_edge_request_id": "47962210", "x_rh_edge_reference_id": "0.8b6d3e17.1725501166.47962210", "x_rh_edge_cache_status": "NotCacheable from child", "x_frame_options": "SAMEORIGIN", "strict_transport_security": "max-age=31536000; includeSubDomains", "msg": "Status code was 404 and not [200]: HTTP Error 404: Not Found", "elapsed": 0, "changed": false, "json": { "errors": [
{ "detail": "inventory_id exists but is not evaluated", "status": "404" }] }, "invocation": { "module_args":
{ "url": "[https://console.redhat.com/api/vulnerability/v1/systems/1e260fff-4a45-420e-8187-0d86d9ab38e9/cves?limit=30]", "method": "GET", "user": "zigfreed", "password": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER", "validate_certs": false, "force_basic_auth": true, "status_code": [ "200" ], "return_content": true, "headers": \{ "Content-Type": "application/json" }, "unsafe_writes": true, "url_username": "zigfreed", "url_password": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER", "force": false, "http_agent": "ansible-httpget", "use_proxy": true, "body_format": "raw", "follow_redirects": "safe", "timeout": 30, "follow": false, "client_cert": null, "client_key": null, "dest": null, "body": null, "src": null, "creates": null, "removes": null, "unix_socket": null, "mode": null, "owner": null, "group": null, "seuser": null, "serole": null, "selevel": null, "setype": null, "attributes": null, "content": null, "backup": null, "remote_src": null, "regexp": null, "delimiter": null, "directory_mode": null } }, "_ansible_no_log": false, "attempts": 40 }
Expected Behavior
I should get a list of CVE related to the server.
Business Impact / Additional info
I use this to do automated cve remediation demos for customers. I can't do the demo when this happens.