SPSH-1286: Added a reference to the ImportDataItem table and refactor… #7473
branch_meta
/
branch_meta
0s
Publish image and scan with trivy
/
Publish image
1m 24s
create_branch_identifier_for_deletion
/
convert_branch_name
select_helm_version_generation_and_image_tag_generation
0s
CodeQL
/
Analyze CodeQL
1m 55s
Linting
/
Nest Lint
1m 19s
Tests and Sonarcloud
/
Tests and Sonarcloud
15m 8s
scan_helm
/
Kics Helm Chart Scan
26s
Scheduled trivy scan of latest image
/
Trivy Scan
delete_namespace
/
create_dbildungs_iam_keycloak_db_name
delete_namespace
/
create_dbildungs_iam_server_db_name
delete_namespace
/
create_ticket_nr_variable
Publish image and scan with trivy
/
...
/
Trivy Scan
37s
delete_successful
0s
deploy
/
...
/
search_for_helm_tagname
2s
deploy
/
...
/
search_for_helm_tagname
15s
deploy
/
...
/
search_for_helm_tagname
13s
deploy
/
...
/
search_for_helm_tagname
29s
deploy
/
create_dbildungs_iam_keycloak_db_name
0s
deploy
/
create_dbildungs_iam_server_db_name
deploy
/
...
/
convert_branch_name
0s
deploy
/
...
/
run_playwright_end2end_tests
4m 44s
Annotations
14 warnings
[MEDIUM] Container Running As Root:
charts/dbildungs-iam-server/templates/cronjob.yaml#L20
Containers should only run as non-root user. This limits the exploitability of security misconfigurations and restricts an attacker's possibilities in case of compromise
|
[MEDIUM] Container Running As Root:
charts/dbildungs-iam-server/templates/cronjob.yaml#L20
Containers should only run as non-root user. This limits the exploitability of security misconfigurations and restricts an attacker's possibilities in case of compromise
|
[MEDIUM] Container Running As Root:
charts/dbildungs-iam-server/templates/cronjob.yaml#L20
Containers should only run as non-root user. This limits the exploitability of security misconfigurations and restricts an attacker's possibilities in case of compromise
|
[MEDIUM] Container Running As Root:
charts/dbildungs-iam-server/templates/cronjob.yaml#L20
Containers should only run as non-root user. This limits the exploitability of security misconfigurations and restricts an attacker's possibilities in case of compromise
|
[MEDIUM] Container Running With Low UID:
charts/dbildungs-iam-server/templates/cronjob.yaml#L20
Check if containers are running with low UID, which might cause conflicts with the host's user table.
|
[MEDIUM] Container Running With Low UID:
charts/dbildungs-iam-server/templates/cronjob.yaml#L20
Check if containers are running with low UID, which might cause conflicts with the host's user table.
|
[MEDIUM] Container Running With Low UID:
charts/dbildungs-iam-server/templates/backend-deployment.yaml#L24
Check if containers are running with low UID, which might cause conflicts with the host's user table.
|
[MEDIUM] Container Running With Low UID:
charts/dbildungs-iam-server/templates/cronjob.yaml#L20
Check if containers are running with low UID, which might cause conflicts with the host's user table.
|
[MEDIUM] Container Running With Low UID:
charts/dbildungs-iam-server/templates/backend-deployment.yaml#L24
Check if containers are running with low UID, which might cause conflicts with the host's user table.
|
[MEDIUM] Container Running With Low UID:
charts/dbildungs-iam-server/templates/backend-deployment.yaml#L24
Check if containers are running with low UID, which might cause conflicts with the host's user table.
|
|
|
|
Deprecation notice: v1, v2, and v3 of the artifact actions
The following artifacts were uploaded using a version of actions/upload-artifact that is scheduled for deprecation: "playwright-report".
Please update your workflow to use v4 of the artifact actions.
Learn more: https://github.blog/changelog/2024-04-16-deprecation-notice-v3-of-the-artifact-actions/
|
Artifacts
Produced during runtime
Name | Size | |
---|---|---|
playwright-report
|
494 KB |
|
test-artifacts
|
1.65 MB |
|