Skip to content

chore: Use noreply for va-vsp-bot email #8306

chore: Use noreply for va-vsp-bot email

chore: Use noreply for va-vsp-bot email #8306

Triggered via push November 27, 2024 20:34
Status Success
Total duration 1h 31m 12s
Artifacts 1
Matrix: Build
login-to-amazon-ecr
4s
login-to-amazon-ecr
Validate App Registry
19s
Validate App Registry
Unit Tests
40s
Unit Tests
Linting
1m 43s
Linting
Security Audit
24s
Security Audit
Drupal Cache Test
7m 15s
Drupal Cache Test
Run Jenkins CI
37s
Run Jenkins CI
Cypress E2E Tests
8m 50s
Cypress E2E Tests
Get Latest Workflow Run Number
0s
Get Latest Workflow Run Number
Testing Reports
46s
Testing Reports
Matrix: Deploy
Notify Failure
0s
Notify Failure
Fit to window
Zoom out
Zoom in

Annotations

10 errors and 17 warnings
Security Audit
Security advisory: Title: qs vulnerable to Prototype Pollution Module name: qs Dependency: node-libcurl Path: node-libcurl>node-gyp>request>qs Severity: high Details: https://github.com/advisories/GHSA-hrpp-h998-j3pp
Security Audit
Security advisory: Title: tough-cookie Prototype Pollution vulnerability Module name: tough-cookie Dependency: node-libcurl Path: node-libcurl>node-gyp>request>tough-cookie Severity: moderate Details: https://github.com/advisories/GHSA-72xf-g2v4-qvf3
Security Audit
Security advisory: Title: qs vulnerable to Prototype Pollution Module name: qs Dependency: express Path: express>qs Severity: high Details: https://github.com/advisories/GHSA-hrpp-h998-j3pp
Security Audit
Security advisory: Title: path-to-regexp outputs backtracking regular expressions Module name: path-to-regexp Dependency: express Path: express>path-to-regexp Severity: high Details: https://github.com/advisories/GHSA-9wv6-86v2-598j
Security Audit
Security advisory: Title: send vulnerable to template injection that can lead to XSS Module name: send Dependency: express Path: express>send Severity: low Details: https://github.com/advisories/GHSA-m6fv-jmcg-4jfg
Security Audit
Security advisory: Title: serve-static vulnerable to template injection that can lead to XSS Module name: serve-static Dependency: express Path: express>serve-static Severity: low Details: https://github.com/advisories/GHSA-cm22-4g7w-348p
Security Audit
Security advisory: Title: Command Injection in moment-timezone Module name: moment-timezone Dependency: moment-timezone Path: moment-timezone Severity: low Details: https://github.com/advisories/GHSA-56x4-j7p9-fcf9
Security Audit
Security advisory: Title: Cleartext Transmission of Sensitive Information in moment-timezone Module name: moment-timezone Dependency: moment-timezone Path: moment-timezone Severity: moderate Details: https://github.com/advisories/GHSA-v78c-4p63-2j6c
Security Audit
Security advisory: Title: json-schema is vulnerable to Prototype Pollution Module name: json-schema Dependency: node-libcurl Path: node-libcurl>node-gyp>request>http-signature>jsprim>json-schema Severity: critical Details: https://github.com/advisories/GHSA-896r-f27r-55mw
Security Audit
Security advisory: Title: Moment.js vulnerable to Inefficient Regular Expression Complexity Module name: moment Dependency: moment Path: moment Severity: high Details: https://github.com/advisories/GHSA-wc69-rhjr-hc9g
login-to-amazon-ecr
Your docker password is not masked. See https://github.com/aws-actions/amazon-ecr-login#docker-credentials for more information.
Linting: config/webpack.config.js#L31
config/webpack.config.js:31:22:Use an object spread instead of `Object.assign` eg: `{ ...foo }`.
Linting: script/pr-check.js#L122
script/pr-check.js:122:7:Use array destructuring.
Linting: script/pr-check.js#L129
script/pr-check.js:129:7:Unary operator '++' used.
Linting: script/pr-check.js#L134
script/pr-check.js:134:7:Unary operator '++' used.
Linting: script/run-unit-test.js#L2
script/run-unit-test.js:2:35:Unexpected use of file extension "js" for "./run-unit-test-help.js"
Linting: script/serve.js#L2
script/serve.js:2:25:`command-line-args` import should occur before import of `./utils`
Linting: src/platform/testing/e2e/cypress/support/commands/keyboard.js#L8
src/platform/testing/e2e/cypress/support/commands/keyboard.js:8:33:Unary operator '++' used.
Linting: src/platform/testing/unit/axe-plugin.js#L1
src/platform/testing/unit/axe-plugin.js:1:18:Unexpected unnamed function.
Linting: src/platform/testing/unit/axe-plugin.js#L5
src/platform/testing/unit/axe-plugin.js:5:59:Unexpected unnamed function.
Linting: src/platform/testing/unit/renameKey.unit.spec.js#L8
src/platform/testing/unit/renameKey.unit.spec.js:8:3:Cypress E2E tests must include at least one axeCheck call. Documentation for adding checks and understanding errors can be found here: https://depo-platform-documentation.scrollhelp.site/developer-docs/A11y-Testing.1935409178.html
Build (vagovprod)
Failed to restore: "/usr/bin/tar" failed with error: The process '/usr/bin/tar' failed with exit code 2
Build (vagovdev)
Failed to restore: "/usr/bin/tar" failed with error: The process '/usr/bin/tar' failed with exit code 2
Build (vagovstaging)
Failed to restore: "/usr/bin/tar" failed with error: The process '/usr/bin/tar' failed with exit code 2
Testing Reports
Unexpected input(s) 'service_account_key', 'export_default_credentials', valid inputs are ['skip_install', 'version', 'project_id', 'install_components']
Testing Reports
No authentication found for gcloud, authenticate with `google-github-actions/auth`.
Deprecation notice: v1, v2, and v3 of the artifact actions
The following artifacts were uploaded using a version of actions/upload-artifact that is scheduled for deprecation: "cypress-mochawesome-test-results". Please update your workflow to use v4 of the artifact actions. Learn more: https://github.blog/changelog/2024-04-16-deprecation-notice-v3-of-the-artifact-actions/

Artifacts

Produced during runtime
Name Size
cypress-mochawesome-test-results Expired
49.8 KB