Skip to content

pin the 16 core runner to ubuntu 22.04 (#34139) #84513

pin the 16 core runner to ubuntu 22.04 (#34139)

pin the 16 core runner to ubuntu 22.04 (#34139) #84513

Triggered via push January 16, 2025 22:02
Status Failure
Total duration 18m 47s
Artifacts 27
Matrix: Build
Testing Reports Prep
1m 54s
Testing Reports Prep
Fetch Test Stability Allow Lists
52s
Fetch Test Stability Allow Lists
Fetch ECR Credentials
9s
Fetch ECR Credentials
Matrix: Cypress E2E Tests
Matrix: E2E Test Stability Review
Matrix: Unit Test Stability Review
Matrix: Unit Tests
Testing Reports - Cypress E2E Tests
48s
Testing Reports - Cypress E2E Tests
Update E2E Test Stability Allow List
0s
Update E2E Test Stability Allow List
Testing Reports - E2E Test Stability Review
0s
Testing Reports - E2E Test Stability Review
Update Unit Test Stability Allow List
0s
Update Unit Test Stability Allow List
Testing Reports - Unit Test Stability Review
0s
Testing Reports - Unit Test Stability Review
Matrix: Archive
Testing Reports - Unit Tests
1m 16s
Testing Reports - Unit Tests
Testing Reports - Unit Tests Coverage
1m 58s
Testing Reports - Unit Tests Coverage
QA Merge Status
0s
QA Merge Status
Set Environments to Deploy
0s
Set Environments to Deploy
Matrix: Deploy
CD Production Deploy
0s
CD Production Deploy
Fit to window
Zoom out
Zoom in

Annotations

18 errors and 12 warnings
Security Audit
Security advisory: Title: Unauthenticated Denial of Service in the octokit/webhooks library Module name: octokit Dependency: octokit Path: octokit Severity: high Details: https://github.com/advisories/GHSA-pwfr-8pq7-x9qv
Security Audit
Security advisory: Title: path-to-regexp outputs backtracking regular expressions Module name: path-to-regexp Dependency: express Path: express>path-to-regexp Severity: high Details: https://github.com/advisories/GHSA-9wv6-86v2-598j
Security Audit
Security advisory: Title: cookie accepts cookie name, path, and domain with out of bounds characters Module name: cookie Dependency: express Path: express>cookie Severity: low Details: https://github.com/advisories/GHSA-pxg6-pf52-xh8x
Security Audit
Security advisory: Title: send vulnerable to template injection that can lead to XSS Module name: send Dependency: express Path: express>send Severity: low Details: https://github.com/advisories/GHSA-m6fv-jmcg-4jfg
Security Audit
Security advisory: Title: serve-static vulnerable to template injection that can lead to XSS Module name: serve-static Dependency: express Path: express>serve-static Severity: low Details: https://github.com/advisories/GHSA-cm22-4g7w-348p
Security Audit
Security advisory: Title: Unpatched `path-to-regexp` ReDoS in 0.1.x Module name: path-to-regexp Dependency: express Path: express>path-to-regexp Severity: moderate Details: https://github.com/advisories/GHSA-rhx6-c78j-4q9w
Security Audit
Security advisory: Title: cookie accepts cookie name, path, and domain with out of bounds characters Module name: cookie Dependency: cookie Path: cookie Severity: low Details: https://github.com/advisories/GHSA-pxg6-pf52-xh8x
Security Audit
Security advisory: Title: cookie accepts cookie name, path, and domain with out of bounds characters Module name: cookie Dependency: local-storage-fallback Path: local-storage-fallback>cookie Severity: low Details: https://github.com/advisories/GHSA-pxg6-pf52-xh8x
Security Audit
Security advisory: Title: Express.js Open Redirect in malformed URLs Module name: express Dependency: express Path: express Severity: moderate Details: https://github.com/advisories/GHSA-rv95-896h-c2vc
Security Audit
Security advisory: Title: express vulnerable to XSS via response.redirect() Module name: express Dependency: express Path: express Severity: low Details: https://github.com/advisories/GHSA-qw6h-vgh9-j6wx
Linting (All): src/applications/vaos/referral-appointments/ChooseDateAndTime.jsx#L6
src/applications/vaos/referral-appointments/ChooseDateAndTime.jsx:6:48:Unexpected path "../appointment-list/redux/selectors" imported in restricted zone.
Linting (All): src/applications/vaos/referral-appointments/ChooseDateAndTime.jsx#L8
src/applications/vaos/referral-appointments/ChooseDateAndTime.jsx:8:41:Unexpected path "../appointment-list/redux/actions" imported in restricted zone.
Linting (All): src/applications/vaos/referral-appointments/components/RequestsList.jsx#L6
src/applications/vaos/referral-appointments/components/RequestsList.jsx:6:37:Unexpected path "../../appointment-list/components/ScheduleAppointmentLink" imported in restricted zone.
Linting (All)
Process completed with exit code 1.
Testing Reports - Cypress E2E Tests
invalid format for 'output: SyntaxError: Unexpected token '}', "{"summary":}" is not valid JSON
Testing Reports - Cypress E2E Tests
Error: Data directory has no files.
Testing Reports - Cypress E2E Tests
Process completed with exit code 1.
Notify Failure
Credentials could not be loaded, please check your action inputs: Could not load credentials from any providers
Fetch ECR Credentials
Your docker password is not masked. See https://github.com/aws-actions/amazon-ecr-login#docker-credentials for more information.
Testing Reports - Unit Tests
No files were found with the provided path: qa-standards-dashboard-data/coverage. No artifacts will be uploaded.
Cypress E2E Tests (0)
No files were found with the provided path: cypress/results. No artifacts will be uploaded.
Cypress E2E Tests (2)
No files were found with the provided path: cypress/results. No artifacts will be uploaded.
Cypress E2E Tests (6)
No files were found with the provided path: cypress/results. No artifacts will be uploaded.
Cypress E2E Tests (7)
No files were found with the provided path: cypress/results. No artifacts will be uploaded.
Cypress E2E Tests (5)
No files were found with the provided path: cypress/results. No artifacts will be uploaded.
Cypress E2E Tests (3)
No files were found with the provided path: cypress/results. No artifacts will be uploaded.
Cypress E2E Tests (1)
No files were found with the provided path: cypress/results. No artifacts will be uploaded.
Cypress E2E Tests (4)
No files were found with the provided path: cypress/results. No artifacts will be uploaded.
Notify Failure
Unexpected input(s) 'aws_id', 'aws_key', valid inputs are ['channel_id', 'payload', 'aws-access-key-id', 'aws-secret-access-key']
Notify Failure
Unexpected input(s) 'aws_id', 'aws_key', valid inputs are ['channel_id', 'payload', 'aws-access-key-id', 'aws-secret-access-key']

Artifacts

Produced during runtime
Name Size
e2e-allow-list
13.2 KB
e2e-tests-to-test
162 Bytes
unit-test-allow-list
32.7 KB
unit-test-coverage-0
19 KB
unit-test-coverage-1
17.1 KB
unit-test-coverage-2
23.5 KB
unit-test-coverage-3
25.6 KB
unit-test-coverage-4
20.7 KB
unit-test-coverage-5
24.8 KB
unit-test-coverage-6
22.3 KB
unit-test-coverage-7
18.9 KB
unit-test-coverage-8
68.2 KB
unit-test-coverage-9
6.72 KB
unit-test-coverage-txt
10.8 KB
unit-test-report-0
253 KB
unit-test-report-1
309 KB
unit-test-report-2
308 KB
unit-test-report-3
350 KB
unit-test-report-4
248 KB
unit-test-report-5
316 KB
unit-test-report-6
250 KB
unit-test-report-7
203 KB
unit-test-report-8
309 KB
unit-test-report-9
111 KB
vagovdev.tar.bz2
317 MB
vagovprod.tar.bz2
271 MB
vagovstaging.tar.bz2
271 MB