Skip to content

feat: add e2e setup workflow #45

feat: add e2e setup workflow

feat: add e2e setup workflow #45

Triggered via push June 27, 2024 12:54
Status Success
Total duration 55s
Artifacts 1

kics.yml

on: push
Fit to window
Zoom out
Zoom in

Annotations

46 warnings and 1 notice
[MEDIUM] Container Running With Low UID: .github/configs/deploy.yaml#L499
Check if containers are running with low UID, which might cause conflicts with the host's user table.
[MEDIUM] Memory Limits Not Defined: .github/configs/deploy.yaml#L611
Memory limits should be defined for each container. This prevents potential resource exhaustion by ensuring that containers consume not more than the designated amount of memory
[MEDIUM] Memory Limits Not Defined: .github/configs/deploy.yaml#L558
Memory limits should be defined for each container. This prevents potential resource exhaustion by ensuring that containers consume not more than the designated amount of memory
[MEDIUM] Memory Limits Not Defined: .github/configs/deploy.yaml#L463
Memory limits should be defined for each container. This prevents potential resource exhaustion by ensuring that containers consume not more than the designated amount of memory
[MEDIUM] Memory Requests Not Defined: .github/configs/deploy.yaml#L558
Memory requests should be defined for each container. This allows the kubelet to reserve the requested amount of system resources and prevents over-provisioning on individual nodes
[MEDIUM] Memory Requests Not Defined: .github/configs/deploy.yaml#L611
Memory requests should be defined for each container. This allows the kubelet to reserve the requested amount of system resources and prevents over-provisioning on individual nodes
[MEDIUM] RBAC Roles with Read Secrets Permissions: .github/configs/deploy.yaml#L59
Roles and ClusterRoles with get/watch/list RBAC permissions on Kubernetes secrets are dangerous and should be avoided. In case of compromise, attackers could abuse these roles to access sensitive data, such as passwords, tokens and keys
[MEDIUM] RBAC Roles with Read Secrets Permissions: .github/configs/deploy.yaml#L163
Roles and ClusterRoles with get/watch/list RBAC permissions on Kubernetes secrets are dangerous and should be avoided. In case of compromise, attackers could abuse these roles to access sensitive data, such as passwords, tokens and keys
[MEDIUM] RBAC Roles with Read Secrets Permissions: .github/configs/deploy.yaml#L140
Roles and ClusterRoles with get/watch/list RBAC permissions on Kubernetes secrets are dangerous and should be avoided. In case of compromise, attackers could abuse these roles to access sensitive data, such as passwords, tokens and keys
[MEDIUM] Service Account Token Automount Not Disabled: .github/configs/deploy.yaml#L595
Service Account Tokens are automatically mounted even if not necessary
End 2 End for upward direction and SingleLevelUsageAsBuilt (SingleLevelUsageAsBuilt) failed: SingleLevelUsageAsBuilt#L0
irs-cucumber-tests/target/cucumber-junit-report.xml [took 0s]
Tombstone for not found GlobalAssetId (SingleLevelUsageAsBuilt) failed: SingleLevelUsageAsBuilt#L0
irs-cucumber-tests/target/cucumber-junit-report.xml [took 0s]
End 2 End for aspect "TractionBatteryCode" (SingleLevelUsageAsBuilt) failed: SingleLevelUsageAsBuilt#L0
irs-cucumber-tests/target/cucumber-junit-report.xml [took 0s]
Policy Store API: Delete policy for BPN (IRS Policy Store) failed: IRS Policy Store#L0
irs-cucumber-tests/target/cucumber-junit-report.xml [took 0s]
Policy Store API: Try to update policy with invalid policyId (bad case) (IRS Policy Store) failed: IRS Policy Store#L0
irs-cucumber-tests/target/cucumber-junit-report.xml [took 0s]
Policy Store API: Try to delete policy with invalid policyId (bad case) (IRS Policy Store) failed: IRS Policy Store#L0
irs-cucumber-tests/target/cucumber-junit-report.xml [took 0s]
Policy Store API: Try to register policy with invalid policyId (bad case) (IRS Policy Store) failed: IRS Policy Store#L0
irs-cucumber-tests/target/cucumber-junit-report.xml [took 0s]
Policy Store API: Updating policy for invalid BPNL (bad case) (IRS Policy Store) failed: IRS Policy Store#L0
irs-cucumber-tests/target/cucumber-junit-report.xml [took 0s]
Policy Store API: Registering policy for invalid BPNL (bad case) (IRS Policy Store) failed: IRS Policy Store#L0
irs-cucumber-tests/target/cucumber-junit-report.xml [took 0s]
Policy Store API: Register policy without validUntil (bad case) (IRS Policy Store) failed: IRS Policy Store#L0
irs-cucumber-tests/target/cucumber-junit-report.xml [took 0s]
Policy Store API: Delete some policies (IRS Policy Store) failed: IRS Policy Store#L0
irs-cucumber-tests/target/cucumber-junit-report.xml [took 0s]
Policy Store API: Add policyId to given BPNs (IRS Policy Store) failed: IRS Policy Store#L0
irs-cucumber-tests/target/cucumber-junit-report.xml [took 0s]
Policy Store API: Add BPN to policy (IRS Policy Store) failed: IRS Policy Store#L0
irs-cucumber-tests/target/cucumber-junit-report.xml [took 0s]
Policy Store API: Update a policy validUntil date (IRS Policy Store) failed: IRS Policy Store#L0
irs-cucumber-tests/target/cucumber-junit-report.xml [took 0s]
Policy Store API: Register policies (IRS Policy Store) failed: IRS Policy Store#L0
irs-cucumber-tests/target/cucumber-junit-report.xml [took 0s]
36 tests found
There are 36 tests, see "Raw output" for the full list of tests.

Artifacts

Produced during runtime
Name Size
kicsResults.json Expired
10.1 KB