adding session affinity cookie #7457
branch_meta
/
branch_meta
2s
Publish image and scan with trivy
/
Publish image
1m 19s
create_branch_identifier_for_deletion
/
convert_branch_name
select_helm_version_generation_and_image_tag_generation
3s
CodeQL
/
Analyze CodeQL
1m 40s
Linting
/
Nest Lint
1m 20s
Tests and Sonarcloud
/
Tests and Sonarcloud
14m 59s
scan_helm
/
Kics Helm Chart Scan
26s
Scheduled trivy scan of latest image
/
Trivy Scan
delete_namespace
/
create_dbildungs_iam_keycloak_db_name
delete_namespace
/
create_dbildungs_iam_server_db_name
delete_namespace
/
create_ticket_nr_variable
Publish image and scan with trivy
/
...
/
Trivy Scan
31s
delete_successful
0s
deploy
/
...
/
search_for_helm_tagname
2s
deploy
/
...
/
search_for_helm_tagname
11s
deploy
/
...
/
search_for_helm_tagname
7s
deploy
/
...
/
search_for_helm_tagname
21s
deploy
/
create_dbildungs_iam_keycloak_db_name
0s
deploy
/
create_dbildungs_iam_server_db_name
0s
deploy
/
...
/
convert_branch_name
0s
deploy
/
...
/
run_playwright_end2end_tests
Annotations
1 error and 12 warnings
deploy / deployment
Process completed with exit code 1.
|
[MEDIUM] Container Running As Root:
charts/dbildungs-iam-server/templates/cronjob.yaml#L20
Containers should only run as non-root user. This limits the exploitability of security misconfigurations and restricts an attacker's possibilities in case of compromise
|
[MEDIUM] Container Running As Root:
charts/dbildungs-iam-server/templates/cronjob.yaml#L20
Containers should only run as non-root user. This limits the exploitability of security misconfigurations and restricts an attacker's possibilities in case of compromise
|
[MEDIUM] Container Running As Root:
charts/dbildungs-iam-server/templates/cronjob.yaml#L20
Containers should only run as non-root user. This limits the exploitability of security misconfigurations and restricts an attacker's possibilities in case of compromise
|
[MEDIUM] Container Running As Root:
charts/dbildungs-iam-server/templates/cronjob.yaml#L20
Containers should only run as non-root user. This limits the exploitability of security misconfigurations and restricts an attacker's possibilities in case of compromise
|
[MEDIUM] Container Running With Low UID:
charts/dbildungs-iam-server/templates/backend-deployment.yaml#L71
Check if containers are running with low UID, which might cause conflicts with the host's user table.
|
[MEDIUM] Container Running With Low UID:
charts/dbildungs-iam-server/templates/cronjob.yaml#L20
Check if containers are running with low UID, which might cause conflicts with the host's user table.
|
[MEDIUM] Container Running With Low UID:
charts/dbildungs-iam-server/templates/backend-deployment.yaml#L24
Check if containers are running with low UID, which might cause conflicts with the host's user table.
|
[MEDIUM] Container Running With Low UID:
charts/dbildungs-iam-server/templates/cronjob.yaml#L20
Check if containers are running with low UID, which might cause conflicts with the host's user table.
|
[MEDIUM] Container Running With Low UID:
charts/dbildungs-iam-server/templates/cronjob.yaml#L20
Check if containers are running with low UID, which might cause conflicts with the host's user table.
|
[MEDIUM] Container Running With Low UID:
charts/dbildungs-iam-server/templates/cronjob.yaml#L20
Check if containers are running with low UID, which might cause conflicts with the host's user table.
|
|
|
Artifacts
Produced during runtime
Name | Size | |
---|---|---|
test-artifacts
|
1.63 MB |
|