Skip to content

SPSH-1423: Disable the existing email when the user does not have any… #27

SPSH-1423: Disable the existing email when the user does not have any…

SPSH-1423: Disable the existing email when the user does not have any… #27

Triggered via push November 25, 2024 16:11
Status Success
Total duration 17m 18s
Artifacts 1
scan_helm  /  Kics Helm Chart Scan
29s
scan_helm / Kics Helm Chart Scan
CodeQL  /  Analyze CodeQL
1m 42s
CodeQL / Analyze CodeQL
Linting  /  Nest Lint
1m 19s
Linting / Nest Lint
Tests and Sonarcloud  /  Tests and Sonarcloud
14m 54s
Tests and Sonarcloud / Tests and Sonarcloud
release_helm  /  release
49s
release_helm / release
Publish image and scan with trivy  /  Publish image
1m 22s
Publish image and scan with trivy / Publish image
Publish image and scan with trivy  /  pre_scan
0s
Publish image and scan with trivy / pre_scan
Publish image and scan with trivy  /  ...  /  Trivy Scan
33s
Publish image and scan with trivy / Trivy scan for uploaded image / Trivy Scan
Fit to window
Zoom out
Zoom in

Annotations

10 warnings
[MEDIUM] Container Running As Root: charts/dbildungs-iam-server/templates/cronjob.yaml#L20
Containers should only run as non-root user. This limits the exploitability of security misconfigurations and restricts an attacker's possibilities in case of compromise
[MEDIUM] Container Running As Root: charts/dbildungs-iam-server/templates/cronjob.yaml#L20
Containers should only run as non-root user. This limits the exploitability of security misconfigurations and restricts an attacker's possibilities in case of compromise
[MEDIUM] Container Running As Root: charts/dbildungs-iam-server/templates/cronjob.yaml#L20
Containers should only run as non-root user. This limits the exploitability of security misconfigurations and restricts an attacker's possibilities in case of compromise
[MEDIUM] Container Running As Root: charts/dbildungs-iam-server/templates/cronjob.yaml#L20
Containers should only run as non-root user. This limits the exploitability of security misconfigurations and restricts an attacker's possibilities in case of compromise
[MEDIUM] Container Running With Low UID: charts/dbildungs-iam-server/templates/cronjob.yaml#L20
Check if containers are running with low UID, which might cause conflicts with the host's user table.
[MEDIUM] Container Running With Low UID: charts/dbildungs-iam-server/templates/backend-deployment.yaml#L24
Check if containers are running with low UID, which might cause conflicts with the host's user table.
[MEDIUM] Container Running With Low UID: charts/dbildungs-iam-server/templates/cronjob.yaml#L20
Check if containers are running with low UID, which might cause conflicts with the host's user table.
[MEDIUM] Container Running With Low UID: charts/dbildungs-iam-server/templates/cronjob.yaml#L20
Check if containers are running with low UID, which might cause conflicts with the host's user table.
[MEDIUM] Container Running With Low UID: charts/dbildungs-iam-server/templates/cronjob.yaml#L20
Check if containers are running with low UID, which might cause conflicts with the host's user table.
[MEDIUM] Container Running With Low UID: charts/dbildungs-iam-server/templates/backend-deployment.yaml#L24
Check if containers are running with low UID, which might cause conflicts with the host's user table.

Artifacts

Produced during runtime
Name Size
test-artifacts
1.61 MB