pin the 16 core runner to ubuntu 22.04 (#34139) #84513
continuous-integration.yml
on: push
Matrix: Build
Testing Reports Prep
1m 54s
Fetch Test Stability Allow Lists
52s
Matrix: Cypress E2E Tests
Matrix: E2E Test Stability Review
Matrix: Unit Test Stability Review
Matrix: Unit Tests
Testing Reports - Cypress E2E Tests
48s
Testing Reports - E2E Test Stability Review
0s
Testing Reports - Unit Test Stability Review
0s
Matrix: Archive
Testing Reports - Unit Tests
1m 16s
Testing Reports - Unit Tests Coverage
1m 58s
QA Merge Status
0s
Matrix: Deploy
CD Production Deploy
0s
Notify Failure
1m 23s
Annotations
18 errors and 12 warnings
Security Audit
Security advisory:
Title: Unauthenticated Denial of Service in the octokit/webhooks library
Module name: octokit
Dependency: octokit
Path: octokit
Severity: high
Details: https://github.com/advisories/GHSA-pwfr-8pq7-x9qv
|
Security Audit
Security advisory:
Title: path-to-regexp outputs backtracking regular expressions
Module name: path-to-regexp
Dependency: express
Path: express>path-to-regexp
Severity: high
Details: https://github.com/advisories/GHSA-9wv6-86v2-598j
|
Security Audit
Security advisory:
Title: cookie accepts cookie name, path, and domain with out of bounds characters
Module name: cookie
Dependency: express
Path: express>cookie
Severity: low
Details: https://github.com/advisories/GHSA-pxg6-pf52-xh8x
|
Security Audit
Security advisory:
Title: send vulnerable to template injection that can lead to XSS
Module name: send
Dependency: express
Path: express>send
Severity: low
Details: https://github.com/advisories/GHSA-m6fv-jmcg-4jfg
|
Security Audit
Security advisory:
Title: serve-static vulnerable to template injection that can lead to XSS
Module name: serve-static
Dependency: express
Path: express>serve-static
Severity: low
Details: https://github.com/advisories/GHSA-cm22-4g7w-348p
|
Security Audit
Security advisory:
Title: Unpatched `path-to-regexp` ReDoS in 0.1.x
Module name: path-to-regexp
Dependency: express
Path: express>path-to-regexp
Severity: moderate
Details: https://github.com/advisories/GHSA-rhx6-c78j-4q9w
|
Security Audit
Security advisory:
Title: cookie accepts cookie name, path, and domain with out of bounds characters
Module name: cookie
Dependency: cookie
Path: cookie
Severity: low
Details: https://github.com/advisories/GHSA-pxg6-pf52-xh8x
|
Security Audit
Security advisory:
Title: cookie accepts cookie name, path, and domain with out of bounds characters
Module name: cookie
Dependency: local-storage-fallback
Path: local-storage-fallback>cookie
Severity: low
Details: https://github.com/advisories/GHSA-pxg6-pf52-xh8x
|
Security Audit
Security advisory:
Title: Express.js Open Redirect in malformed URLs
Module name: express
Dependency: express
Path: express
Severity: moderate
Details: https://github.com/advisories/GHSA-rv95-896h-c2vc
|
Security Audit
Security advisory:
Title: express vulnerable to XSS via response.redirect()
Module name: express
Dependency: express
Path: express
Severity: low
Details: https://github.com/advisories/GHSA-qw6h-vgh9-j6wx
|
Linting (All):
src/applications/vaos/referral-appointments/ChooseDateAndTime.jsx#L6
src/applications/vaos/referral-appointments/ChooseDateAndTime.jsx:6:48:Unexpected path "../appointment-list/redux/selectors" imported in restricted zone.
|
Linting (All):
src/applications/vaos/referral-appointments/ChooseDateAndTime.jsx#L8
src/applications/vaos/referral-appointments/ChooseDateAndTime.jsx:8:41:Unexpected path "../appointment-list/redux/actions" imported in restricted zone.
|
Linting (All):
src/applications/vaos/referral-appointments/components/RequestsList.jsx#L6
src/applications/vaos/referral-appointments/components/RequestsList.jsx:6:37:Unexpected path "../../appointment-list/components/ScheduleAppointmentLink" imported in restricted zone.
|
Linting (All)
Process completed with exit code 1.
|
Testing Reports - Cypress E2E Tests
invalid format for 'output: SyntaxError: Unexpected token '}', "{"summary":}" is not valid JSON
|
Testing Reports - Cypress E2E Tests
Error: Data directory has no files.
|
Testing Reports - Cypress E2E Tests
Process completed with exit code 1.
|
Notify Failure
Credentials could not be loaded, please check your action inputs: Could not load credentials from any providers
|
Fetch ECR Credentials
Your docker password is not masked. See https://github.com/aws-actions/amazon-ecr-login#docker-credentials for more information.
|
Testing Reports - Unit Tests
No files were found with the provided path: qa-standards-dashboard-data/coverage. No artifacts will be uploaded.
|
Cypress E2E Tests (0)
No files were found with the provided path: cypress/results. No artifacts will be uploaded.
|
Cypress E2E Tests (2)
No files were found with the provided path: cypress/results. No artifacts will be uploaded.
|
Cypress E2E Tests (6)
No files were found with the provided path: cypress/results. No artifacts will be uploaded.
|
Cypress E2E Tests (7)
No files were found with the provided path: cypress/results. No artifacts will be uploaded.
|
Cypress E2E Tests (5)
No files were found with the provided path: cypress/results. No artifacts will be uploaded.
|
Cypress E2E Tests (3)
No files were found with the provided path: cypress/results. No artifacts will be uploaded.
|
Cypress E2E Tests (1)
No files were found with the provided path: cypress/results. No artifacts will be uploaded.
|
Cypress E2E Tests (4)
No files were found with the provided path: cypress/results. No artifacts will be uploaded.
|
Notify Failure
Unexpected input(s) 'aws_id', 'aws_key', valid inputs are ['channel_id', 'payload', 'aws-access-key-id', 'aws-secret-access-key']
|
Notify Failure
Unexpected input(s) 'aws_id', 'aws_key', valid inputs are ['channel_id', 'payload', 'aws-access-key-id', 'aws-secret-access-key']
|
Artifacts
Produced during runtime
Name | Size | |
---|---|---|
e2e-allow-list
|
13.2 KB |
|
e2e-tests-to-test
|
162 Bytes |
|
unit-test-allow-list
|
32.7 KB |
|
unit-test-coverage-0
|
19 KB |
|
unit-test-coverage-1
|
17.1 KB |
|
unit-test-coverage-2
|
23.5 KB |
|
unit-test-coverage-3
|
25.6 KB |
|
unit-test-coverage-4
|
20.7 KB |
|
unit-test-coverage-5
|
24.8 KB |
|
unit-test-coverage-6
|
22.3 KB |
|
unit-test-coverage-7
|
18.9 KB |
|
unit-test-coverage-8
|
68.2 KB |
|
unit-test-coverage-9
|
6.72 KB |
|
unit-test-coverage-txt
|
10.8 KB |
|
unit-test-report-0
|
253 KB |
|
unit-test-report-1
|
309 KB |
|
unit-test-report-2
|
308 KB |
|
unit-test-report-3
|
350 KB |
|
unit-test-report-4
|
248 KB |
|
unit-test-report-5
|
316 KB |
|
unit-test-report-6
|
250 KB |
|
unit-test-report-7
|
203 KB |
|
unit-test-report-8
|
309 KB |
|
unit-test-report-9
|
111 KB |
|
vagovdev.tar.bz2
|
317 MB |
|
vagovprod.tar.bz2
|
271 MB |
|
vagovstaging.tar.bz2
|
271 MB |
|