isolating 21a sub app #79825
continuous-integration.yml
on: push
Matrix: Build
Testing Reports Prep
1m 49s
Fetch Test Stability Allow Lists
48s
Matrix: Cypress E2E Tests
Matrix: E2E Test Stability Review
Matrix: Unit Test Stability Review
Matrix: Unit Tests
Testing Reports - Cypress E2E Tests
1m 13s
Testing Reports - E2E Test Stability Review
1m 22s
Testing Reports - Unit Test Stability Review
0s
Matrix: Archive
Testing Reports - Unit Tests
1m 8s
Testing Reports - Unit Tests Coverage
1m 56s
QA Merge Status
2m 1s
Matrix: Deploy
CD Production Deploy
0s
Notify Failure
0s
Annotations
11 errors and 4 warnings
Security Audit
Security advisory:
Title: Unauthenticated Denial of Service in the octokit/webhooks library
Module name: octokit
Dependency: octokit
Path: octokit
Severity: high
Details: https://github.com/advisories/GHSA-pwfr-8pq7-x9qv
|
Security Audit
Security advisory:
Title: path-to-regexp outputs backtracking regular expressions
Module name: path-to-regexp
Dependency: express
Path: express>path-to-regexp
Severity: high
Details: https://github.com/advisories/GHSA-9wv6-86v2-598j
|
Security Audit
Security advisory:
Title: cookie accepts cookie name, path, and domain with out of bounds characters
Module name: cookie
Dependency: express
Path: express>cookie
Severity: low
Details: https://github.com/advisories/GHSA-pxg6-pf52-xh8x
|
Security Audit
Security advisory:
Title: send vulnerable to template injection that can lead to XSS
Module name: send
Dependency: express
Path: express>send
Severity: low
Details: https://github.com/advisories/GHSA-m6fv-jmcg-4jfg
|
Security Audit
Security advisory:
Title: serve-static vulnerable to template injection that can lead to XSS
Module name: serve-static
Dependency: express
Path: express>serve-static
Severity: low
Details: https://github.com/advisories/GHSA-cm22-4g7w-348p
|
Security Audit
Security advisory:
Title: cookie accepts cookie name, path, and domain with out of bounds characters
Module name: cookie
Dependency: cookie
Path: cookie
Severity: low
Details: https://github.com/advisories/GHSA-pxg6-pf52-xh8x
|
Security Audit
Security advisory:
Title: cookie accepts cookie name, path, and domain with out of bounds characters
Module name: cookie
Dependency: local-storage-fallback
Path: local-storage-fallback>cookie
Severity: low
Details: https://github.com/advisories/GHSA-pxg6-pf52-xh8x
|
Security Audit
Security advisory:
Title: Express.js Open Redirect in malformed URLs
Module name: express
Dependency: express
Path: express
Severity: moderate
Details: https://github.com/advisories/GHSA-rv95-896h-c2vc
|
Security Audit
Security advisory:
Title: express vulnerable to XSS via response.redirect()
Module name: express
Dependency: express
Path: express
Severity: low
Details: https://github.com/advisories/GHSA-qw6h-vgh9-j6wx
|
Security Audit
Security advisory:
Title: Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code
Module name: @babel/traverse
Dependency: styled-components
Path: styled-components>@babel/traverse
Severity: critical
Details: https://github.com/advisories/GHSA-67hx-6x53-jw92
|
Testing Reports - Unit Tests
Error: Missing message content, please input a valid payload or message to send. No Message has been send.
|
Fetch ECR Credentials
Your docker password is not masked. See https://github.com/aws-actions/amazon-ecr-login#docker-credentials for more information.
|
Testing Reports - Unit Tests
No files were found with the provided path: qa-standards-dashboard-data/coverage. No artifacts will be uploaded.
|
Testing Reports - Unit Tests
Unexpected input(s) 'attachments', valid inputs are ['channel_id', 'payload', 'aws-access-key-id', 'aws-secret-access-key']
|
Testing Reports - Unit Tests
Unexpected input(s) 'attachments', valid inputs are ['channel_id', 'payload', 'aws-access-key-id', 'aws-secret-access-key']
|
Artifacts
Produced during runtime
Name | Size | |
---|---|---|
cypress-mochawesome-test-results-2
|
116 KB |
|
cypress-mochawesome-test-results-6
|
102 KB |
|