Skip to content

isolating 21a sub app #79825

isolating 21a sub app

isolating 21a sub app #79825

Re-run triggered November 27, 2024 19:14
Status Success
Total duration 27m 41s
Billable time 4h 38m
Artifacts 52
Matrix: Build
Testing Reports Prep
1m 49s
Testing Reports Prep
Fetch Test Stability Allow Lists
48s
Fetch Test Stability Allow Lists
Security Audit
1m 36s
Security Audit
Linting (All)
0s
Linting (All)
Fetch ECR Credentials
8s
Fetch ECR Credentials
Matrix: Cypress E2E Tests
Matrix: E2E Test Stability Review
Matrix: Unit Test Stability Review
Matrix: Unit Tests
Testing Reports - Cypress E2E Tests
1m 13s
Testing Reports - Cypress E2E Tests
Update E2E Test Stability Allow List
58s
Update E2E Test Stability Allow List
Testing Reports - E2E Test Stability Review
1m 22s
Testing Reports - E2E Test Stability Review
Update Unit Test Stability Allow List
0s
Update Unit Test Stability Allow List
Testing Reports - Unit Test Stability Review
0s
Testing Reports - Unit Test Stability Review
Matrix: Archive
Testing Reports - Unit Tests
1m 8s
Testing Reports - Unit Tests
Testing Reports - Unit Tests Coverage
1m 56s
Testing Reports - Unit Tests Coverage
QA Merge Status
2m 1s
QA Merge Status
Set Environments to Deploy
0s
Set Environments to Deploy
Matrix: Deploy
CD Production Deploy
0s
CD Production Deploy
Notify Failure
0s
Notify Failure
Fit to window
Zoom out
Zoom in

Annotations

11 errors and 4 warnings
Security Audit
Security advisory: Title: Unauthenticated Denial of Service in the octokit/webhooks library Module name: octokit Dependency: octokit Path: octokit Severity: high Details: https://github.com/advisories/GHSA-pwfr-8pq7-x9qv
Security Audit
Security advisory: Title: path-to-regexp outputs backtracking regular expressions Module name: path-to-regexp Dependency: express Path: express>path-to-regexp Severity: high Details: https://github.com/advisories/GHSA-9wv6-86v2-598j
Security Audit
Security advisory: Title: cookie accepts cookie name, path, and domain with out of bounds characters Module name: cookie Dependency: express Path: express>cookie Severity: low Details: https://github.com/advisories/GHSA-pxg6-pf52-xh8x
Security Audit
Security advisory: Title: send vulnerable to template injection that can lead to XSS Module name: send Dependency: express Path: express>send Severity: low Details: https://github.com/advisories/GHSA-m6fv-jmcg-4jfg
Security Audit
Security advisory: Title: serve-static vulnerable to template injection that can lead to XSS Module name: serve-static Dependency: express Path: express>serve-static Severity: low Details: https://github.com/advisories/GHSA-cm22-4g7w-348p
Security Audit
Security advisory: Title: cookie accepts cookie name, path, and domain with out of bounds characters Module name: cookie Dependency: cookie Path: cookie Severity: low Details: https://github.com/advisories/GHSA-pxg6-pf52-xh8x
Security Audit
Security advisory: Title: cookie accepts cookie name, path, and domain with out of bounds characters Module name: cookie Dependency: local-storage-fallback Path: local-storage-fallback>cookie Severity: low Details: https://github.com/advisories/GHSA-pxg6-pf52-xh8x
Security Audit
Security advisory: Title: Express.js Open Redirect in malformed URLs Module name: express Dependency: express Path: express Severity: moderate Details: https://github.com/advisories/GHSA-rv95-896h-c2vc
Security Audit
Security advisory: Title: express vulnerable to XSS via response.redirect() Module name: express Dependency: express Path: express Severity: low Details: https://github.com/advisories/GHSA-qw6h-vgh9-j6wx
Security Audit
Security advisory: Title: Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code Module name: @babel/traverse Dependency: styled-components Path: styled-components>@babel/traverse Severity: critical Details: https://github.com/advisories/GHSA-67hx-6x53-jw92
Testing Reports - Unit Tests
Error: Missing message content, please input a valid payload or message to send. No Message has been send.
Fetch ECR Credentials
Your docker password is not masked. See https://github.com/aws-actions/amazon-ecr-login#docker-credentials for more information.
Testing Reports - Unit Tests
No files were found with the provided path: qa-standards-dashboard-data/coverage. No artifacts will be uploaded.
Testing Reports - Unit Tests
Unexpected input(s) 'attachments', valid inputs are ['channel_id', 'payload', 'aws-access-key-id', 'aws-secret-access-key']
Testing Reports - Unit Tests
Unexpected input(s) 'attachments', valid inputs are ['channel_id', 'payload', 'aws-access-key-id', 'aws-secret-access-key']

Artifacts

Produced during runtime
Name Size
cypress-mochawesome-test-results-2
116 KB
cypress-mochawesome-test-results-6
102 KB