add indexes+extension #7371
branch_meta
/
branch_meta
0s
Publish image and scan with trivy
/
Publish image
1m 28s
create_branch_identifier_for_deletion
/
convert_branch_name
select_helm_version_generation_and_image_tag_generation
0s
CodeQL
/
Analyze CodeQL
1m 55s
Linting
/
Nest Lint
1m 20s
Tests and Sonarcloud
/
Tests and Sonarcloud
12m 42s
scan_helm
/
Kics Helm Chart Scan
26s
Scheduled trivy scan of latest image
/
Trivy Scan
delete_namespace
/
create_dbildungs_iam_keycloak_db_name
delete_namespace
/
create_dbildungs_iam_server_db_name
delete_namespace
/
create_ticket_nr_variable
Publish image and scan with trivy
/
...
/
Trivy Scan
35s
delete_successful
0s
deploy
/
...
/
search_for_helm_tagname
3s
deploy
/
...
/
search_for_helm_tagname
13s
deploy
/
...
/
search_for_helm_tagname
12s
deploy
/
...
/
search_for_helm_tagname
28s
deploy
/
create_dbildungs_iam_keycloak_db_name
0s
deploy
/
create_dbildungs_iam_server_db_name
0s
deploy
/
...
/
convert_branch_name
0s
deploy
/
...
/
run_playwright_end2end_tests
6m 3s
Annotations
1 error and 14 warnings
Tests and Sonarcloud / Tests and Sonarcloud
Process completed with exit code 1.
|
[MEDIUM] Container Running As Root:
charts/dbildungs-iam-server/templates/cronjob.yaml#L20
Containers should only run as non-root user. This limits the exploitability of security misconfigurations and restricts an attacker's possibilities in case of compromise
|
[MEDIUM] Container Running As Root:
charts/dbildungs-iam-server/templates/cronjob.yaml#L20
Containers should only run as non-root user. This limits the exploitability of security misconfigurations and restricts an attacker's possibilities in case of compromise
|
[MEDIUM] Container Running As Root:
charts/dbildungs-iam-server/templates/cronjob.yaml#L20
Containers should only run as non-root user. This limits the exploitability of security misconfigurations and restricts an attacker's possibilities in case of compromise
|
[MEDIUM] Container Running As Root:
charts/dbildungs-iam-server/templates/cronjob.yaml#L20
Containers should only run as non-root user. This limits the exploitability of security misconfigurations and restricts an attacker's possibilities in case of compromise
|
[MEDIUM] Container Running With Low UID:
charts/dbildungs-iam-server/templates/cronjob.yaml#L20
Check if containers are running with low UID, which might cause conflicts with the host's user table.
|
[MEDIUM] Container Running With Low UID:
charts/dbildungs-iam-server/templates/cronjob.yaml#L20
Check if containers are running with low UID, which might cause conflicts with the host's user table.
|
[MEDIUM] Container Running With Low UID:
charts/dbildungs-iam-server/templates/backend-deployment.yaml#L24
Check if containers are running with low UID, which might cause conflicts with the host's user table.
|
[MEDIUM] Container Running With Low UID:
charts/dbildungs-iam-server/templates/backend-deployment.yaml#L24
Check if containers are running with low UID, which might cause conflicts with the host's user table.
|
[MEDIUM] Container Running With Low UID:
charts/dbildungs-iam-server/templates/backend-deployment.yaml#L71
Check if containers are running with low UID, which might cause conflicts with the host's user table.
|
[MEDIUM] Container Running With Low UID:
charts/dbildungs-iam-server/templates/cronjob.yaml#L20
Check if containers are running with low UID, which might cause conflicts with the host's user table.
|
|
|
|
Deprecation notice: v1, v2, and v3 of the artifact actions
The following artifacts were uploaded using a version of actions/upload-artifact that is scheduled for deprecation: "playwright-report".
Please update your workflow to use v4 of the artifact actions.
Learn more: https://github.blog/changelog/2024-04-16-deprecation-notice-v3-of-the-artifact-actions/
|
Artifacts
Produced during runtime
Name | Size | |
---|---|---|
playwright-report
|
494 KB |
|