Bump andymckay/cancel-action from 0.3 to 0.5 #8549
continuous-integration.yml
on: push
Matrix: Build
login-to-amazon-ecr
6s
Validate App Registry
28s
Unit Tests
56s
Linting
1m 43s
Security Audit
29s
Drupal Cache Test
4m 11s
Run Jenkins CI
31s
Testing Reports
0s
Matrix: Deploy
Notify Failure
0s
Annotations
16 errors and 12 warnings
Security Audit
Security advisory:
Title: qs vulnerable to Prototype Pollution
Module name: qs
Dependency: node-libcurl
Path: node-libcurl>node-gyp>request>qs
Severity: high
Details: https://github.com/advisories/GHSA-hrpp-h998-j3pp
|
Security Audit
Security advisory:
Title: tough-cookie Prototype Pollution vulnerability
Module name: tough-cookie
Dependency: node-libcurl
Path: node-libcurl>node-gyp>request>tough-cookie
Severity: moderate
Details: https://github.com/advisories/GHSA-72xf-g2v4-qvf3
|
Security Audit
Security advisory:
Title: qs vulnerable to Prototype Pollution
Module name: qs
Dependency: express
Path: express>qs
Severity: high
Details: https://github.com/advisories/GHSA-hrpp-h998-j3pp
|
Security Audit
Security advisory:
Title: send vulnerable to template injection that can lead to XSS
Module name: send
Dependency: express
Path: express>send
Severity: low
Details: https://github.com/advisories/GHSA-m6fv-jmcg-4jfg
|
Security Audit
Security advisory:
Title: serve-static vulnerable to template injection that can lead to XSS
Module name: serve-static
Dependency: express
Path: express>serve-static
Severity: low
Details: https://github.com/advisories/GHSA-cm22-4g7w-348p
|
Security Audit
Security advisory:
Title: Unpatched `path-to-regexp` ReDoS in 0.1.x
Module name: path-to-regexp
Dependency: express
Path: express>path-to-regexp
Severity: high
Details: https://github.com/advisories/GHSA-rhx6-c78j-4q9w
|
Security Audit
Security advisory:
Title: path-to-regexp outputs backtracking regular expressions
Module name: path-to-regexp
Dependency: express
Path: express>path-to-regexp
Severity: high
Details: https://github.com/advisories/GHSA-9wv6-86v2-598j
|
Security Audit
Security advisory:
Title: Command Injection in moment-timezone
Module name: moment-timezone
Dependency: moment-timezone
Path: moment-timezone
Severity: low
Details: https://github.com/advisories/GHSA-56x4-j7p9-fcf9
|
Security Audit
Security advisory:
Title: Cleartext Transmission of Sensitive Information in moment-timezone
Module name: moment-timezone
Dependency: moment-timezone
Path: moment-timezone
Severity: moderate
Details: https://github.com/advisories/GHSA-v78c-4p63-2j6c
|
Security Audit
Security advisory:
Title: Moment.js vulnerable to Inefficient Regular Expression Complexity
Module name: moment
Dependency: moment
Path: moment
Severity: high
Details: https://github.com/advisories/GHSA-wc69-rhjr-hc9g
|
Unit Tests
❌ Failed to create checks using the provided token. (HttpError: Resource not accessible by integration)
|
Build (vagovdev)
User: arn:aws-us-gov:iam::008577686731:user/service_account/svc-gha-vagov-cms-user is not authorized to perform: ssm:GetParameter on resource: arn:aws-us-gov:ssm:us-gov-west-1:008577686731:parameter/frontend-team/github-actions/parameters/AWS_FRONTEND_NONPROD_ROLE because no identity-based policy allows the ssm:GetParameter action
|
Build (vagovstaging)
The job was canceled because "vagovdev" failed.
|
Build (vagovstaging)
The operation was canceled.
|
Build (vagovprod)
The job was canceled because "vagovdev" failed.
|
Build (vagovprod)
The operation was canceled.
|
login-to-amazon-ecr
Your docker password is not masked. See https://github.com/aws-actions/amazon-ecr-login#docker-credentials for more information.
|
Unit Tests
⚠️ This usually indicates insufficient permissions. More details: https://github.com/mikepenz/action-junit-report/issues/23
|
Linting:
config/webpack.config.js#L31
config/webpack.config.js:31:22:Use an object spread instead of `Object.assign` eg: `{ ...foo }`.
|
Linting:
script/pr-check.js#L122
script/pr-check.js:122:7:Use array destructuring.
|
Linting:
script/pr-check.js#L129
script/pr-check.js:129:7:Unary operator '++' used.
|
Linting:
script/pr-check.js#L134
script/pr-check.js:134:7:Unary operator '++' used.
|
Linting:
script/run-unit-test.js#L2
script/run-unit-test.js:2:35:Unexpected use of file extension "js" for "./run-unit-test-help.js"
|
Linting:
script/serve.js#L2
script/serve.js:2:25:`command-line-args` import should occur before import of `./utils`
|
Linting:
src/platform/testing/e2e/cypress/support/commands/keyboard.js#L8
src/platform/testing/e2e/cypress/support/commands/keyboard.js:8:33:Unary operator '++' used.
|
Linting:
src/platform/testing/unit/axe-plugin.js#L1
src/platform/testing/unit/axe-plugin.js:1:18:Unexpected unnamed function.
|
Linting:
src/platform/testing/unit/axe-plugin.js#L5
src/platform/testing/unit/axe-plugin.js:5:59:Unexpected unnamed function.
|
Linting:
src/platform/testing/unit/renameKey.unit.spec.js#L8
src/platform/testing/unit/renameKey.unit.spec.js:8:3:Cypress E2E tests must include at least one axeCheck call. Documentation for adding checks and understanding errors can be found here: https://depo-platform-documentation.scrollhelp.site/developer-docs/A11y-Testing.1935409178.html
|