Skip to content

MHV-62755 MHV SM recipient combobox feature flag #79790

MHV-62755 MHV SM recipient combobox feature flag

MHV-62755 MHV SM recipient combobox feature flag #79790

Triggered via push November 27, 2024 14:54
Status Success
Total duration 41m 50s
Billable time 4h 2m
Artifacts 37
Matrix: Build
Testing Reports Prep
1m 54s
Testing Reports Prep
Fetch Test Stability Allow Lists
56s
Fetch Test Stability Allow Lists
Security Audit
1m 27s
Security Audit
Linting (All)
0s
Linting (All)
Fetch ECR Credentials
10s
Fetch ECR Credentials
Matrix: Cypress E2E Tests
Matrix: E2E Test Stability Review
Matrix: Unit Test Stability Review
Matrix: Unit Tests
Testing Reports - Cypress E2E Tests
1m 10s
Testing Reports - Cypress E2E Tests
Update E2E Test Stability Allow List
0s
Update E2E Test Stability Allow List
Testing Reports - E2E Test Stability Review
0s
Testing Reports - E2E Test Stability Review
Update Unit Test Stability Allow List
0s
Update Unit Test Stability Allow List
Testing Reports - Unit Test Stability Review
0s
Testing Reports - Unit Test Stability Review
Matrix: Archive
Testing Reports - Unit Tests
1m 6s
Testing Reports - Unit Tests
Testing Reports - Unit Tests Coverage
2m 20s
Testing Reports - Unit Tests Coverage
QA Merge Status
2m 9s
QA Merge Status
Set Environments to Deploy
0s
Set Environments to Deploy
Matrix: Deploy
CD Production Deploy
0s
CD Production Deploy
Notify Failure
0s
Notify Failure
Fit to window
Zoom out
Zoom in

Annotations

11 errors and 4 warnings
Security Audit
Security advisory: Title: Unauthenticated Denial of Service in the octokit/webhooks library Module name: octokit Dependency: octokit Path: octokit Severity: high Details: https://github.com/advisories/GHSA-pwfr-8pq7-x9qv
Security Audit
Security advisory: Title: path-to-regexp outputs backtracking regular expressions Module name: path-to-regexp Dependency: express Path: express>path-to-regexp Severity: high Details: https://github.com/advisories/GHSA-9wv6-86v2-598j
Security Audit
Security advisory: Title: cookie accepts cookie name, path, and domain with out of bounds characters Module name: cookie Dependency: express Path: express>cookie Severity: low Details: https://github.com/advisories/GHSA-pxg6-pf52-xh8x
Security Audit
Security advisory: Title: send vulnerable to template injection that can lead to XSS Module name: send Dependency: express Path: express>send Severity: low Details: https://github.com/advisories/GHSA-m6fv-jmcg-4jfg
Security Audit
Security advisory: Title: serve-static vulnerable to template injection that can lead to XSS Module name: serve-static Dependency: express Path: express>serve-static Severity: low Details: https://github.com/advisories/GHSA-cm22-4g7w-348p
Security Audit
Security advisory: Title: cookie accepts cookie name, path, and domain with out of bounds characters Module name: cookie Dependency: cookie Path: cookie Severity: low Details: https://github.com/advisories/GHSA-pxg6-pf52-xh8x
Security Audit
Security advisory: Title: cookie accepts cookie name, path, and domain with out of bounds characters Module name: cookie Dependency: local-storage-fallback Path: local-storage-fallback>cookie Severity: low Details: https://github.com/advisories/GHSA-pxg6-pf52-xh8x
Security Audit
Security advisory: Title: Express.js Open Redirect in malformed URLs Module name: express Dependency: express Path: express Severity: moderate Details: https://github.com/advisories/GHSA-rv95-896h-c2vc
Security Audit
Security advisory: Title: express vulnerable to XSS via response.redirect() Module name: express Dependency: express Path: express Severity: low Details: https://github.com/advisories/GHSA-qw6h-vgh9-j6wx
Security Audit
Security advisory: Title: Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code Module name: @babel/traverse Dependency: styled-components Path: styled-components>@babel/traverse Severity: critical Details: https://github.com/advisories/GHSA-67hx-6x53-jw92
Testing Reports - Unit Tests
Error: Missing message content, please input a valid payload or message to send. No Message has been send.
Fetch ECR Credentials
Your docker password is not masked. See https://github.com/aws-actions/amazon-ecr-login#docker-credentials for more information.
Testing Reports - Unit Tests
No files were found with the provided path: qa-standards-dashboard-data/coverage. No artifacts will be uploaded.
Testing Reports - Unit Tests
Unexpected input(s) 'attachments', valid inputs are ['channel_id', 'payload', 'aws-access-key-id', 'aws-secret-access-key']
Testing Reports - Unit Tests
Unexpected input(s) 'attachments', valid inputs are ['channel_id', 'payload', 'aws-access-key-id', 'aws-secret-access-key']

Artifacts

Produced during runtime
Name Size
cypress-mochawesome-test-results-0
109 KB
cypress-mochawesome-test-results-1
106 KB
cypress-mochawesome-test-results-10
124 KB
cypress-mochawesome-test-results-11
1.26 KB
cypress-mochawesome-test-results-2
116 KB
cypress-mochawesome-test-results-3
93.6 KB
cypress-mochawesome-test-results-4
90.1 KB
cypress-mochawesome-test-results-5
91.2 KB
cypress-mochawesome-test-results-6
102 KB
cypress-mochawesome-test-results-7
106 KB
cypress-mochawesome-test-results-8
114 KB
cypress-mochawesome-test-results-9
110 KB
e2e-allow-list
11.1 KB
e2e-tests-to-test
8.04 KB
unit-test-allow-list
32.7 KB
unit-test-coverage-0
18.2 KB
unit-test-coverage-1
25.5 KB
unit-test-coverage-2
21.2 KB
unit-test-coverage-3
20.1 KB
unit-test-coverage-4
17 KB
unit-test-coverage-5
23.6 KB
unit-test-coverage-6
20.6 KB
unit-test-coverage-7
20.7 KB
unit-test-coverage-8
64.1 KB
unit-test-coverage-txt
10.7 KB
unit-test-report-0
235 KB
unit-test-report-1
502 KB
unit-test-report-2
207 KB
unit-test-report-3
276 KB
unit-test-report-4
222 KB
unit-test-report-5
294 KB
unit-test-report-6
199 KB
unit-test-report-7
346 KB
unit-test-report-8
223 KB
vagovdev.tar.bz2
320 MB
vagovprod.tar.bz2
279 MB
vagovstaging.tar.bz2
279 MB