Skip to content

Bump andymckay/cancel-action from 0.3 to 0.5 #8549

Bump andymckay/cancel-action from 0.3 to 0.5

Bump andymckay/cancel-action from 0.3 to 0.5 #8549

Status Failure
Total duration 48m 9s
Artifacts
Matrix: Build
login-to-amazon-ecr
6s
login-to-amazon-ecr
Validate App Registry
28s
Validate App Registry
Unit Tests
56s
Unit Tests
Linting
1m 43s
Linting
Security Audit
29s
Security Audit
Drupal Cache Test
4m 11s
Drupal Cache Test
Run Jenkins CI
31s
Run Jenkins CI
Cypress E2E Tests
0s
Cypress E2E Tests
Get Latest Workflow Run Number
0s
Get Latest Workflow Run Number
Testing Reports
0s
Testing Reports
Matrix: Deploy
Notify Failure
0s
Notify Failure
Fit to window
Zoom out
Zoom in

Annotations

16 errors and 12 warnings
Security Audit
Security advisory: Title: qs vulnerable to Prototype Pollution Module name: qs Dependency: node-libcurl Path: node-libcurl>node-gyp>request>qs Severity: high Details: https://github.com/advisories/GHSA-hrpp-h998-j3pp
Security Audit
Security advisory: Title: tough-cookie Prototype Pollution vulnerability Module name: tough-cookie Dependency: node-libcurl Path: node-libcurl>node-gyp>request>tough-cookie Severity: moderate Details: https://github.com/advisories/GHSA-72xf-g2v4-qvf3
Security Audit
Security advisory: Title: qs vulnerable to Prototype Pollution Module name: qs Dependency: express Path: express>qs Severity: high Details: https://github.com/advisories/GHSA-hrpp-h998-j3pp
Security Audit
Security advisory: Title: send vulnerable to template injection that can lead to XSS Module name: send Dependency: express Path: express>send Severity: low Details: https://github.com/advisories/GHSA-m6fv-jmcg-4jfg
Security Audit
Security advisory: Title: serve-static vulnerable to template injection that can lead to XSS Module name: serve-static Dependency: express Path: express>serve-static Severity: low Details: https://github.com/advisories/GHSA-cm22-4g7w-348p
Security Audit
Security advisory: Title: Unpatched `path-to-regexp` ReDoS in 0.1.x Module name: path-to-regexp Dependency: express Path: express>path-to-regexp Severity: high Details: https://github.com/advisories/GHSA-rhx6-c78j-4q9w
Security Audit
Security advisory: Title: path-to-regexp outputs backtracking regular expressions Module name: path-to-regexp Dependency: express Path: express>path-to-regexp Severity: high Details: https://github.com/advisories/GHSA-9wv6-86v2-598j
Security Audit
Security advisory: Title: Command Injection in moment-timezone Module name: moment-timezone Dependency: moment-timezone Path: moment-timezone Severity: low Details: https://github.com/advisories/GHSA-56x4-j7p9-fcf9
Security Audit
Security advisory: Title: Cleartext Transmission of Sensitive Information in moment-timezone Module name: moment-timezone Dependency: moment-timezone Path: moment-timezone Severity: moderate Details: https://github.com/advisories/GHSA-v78c-4p63-2j6c
Security Audit
Security advisory: Title: Moment.js vulnerable to Inefficient Regular Expression Complexity Module name: moment Dependency: moment Path: moment Severity: high Details: https://github.com/advisories/GHSA-wc69-rhjr-hc9g
Unit Tests
❌ Failed to create checks using the provided token. (HttpError: Resource not accessible by integration)
Build (vagovdev)
User: arn:aws-us-gov:iam::008577686731:user/service_account/svc-gha-vagov-cms-user is not authorized to perform: ssm:GetParameter on resource: arn:aws-us-gov:ssm:us-gov-west-1:008577686731:parameter/frontend-team/github-actions/parameters/AWS_FRONTEND_NONPROD_ROLE because no identity-based policy allows the ssm:GetParameter action
Build (vagovstaging)
The job was canceled because "vagovdev" failed.
Build (vagovstaging)
The operation was canceled.
Build (vagovprod)
The job was canceled because "vagovdev" failed.
Build (vagovprod)
The operation was canceled.
login-to-amazon-ecr
Your docker password is not masked. See https://github.com/aws-actions/amazon-ecr-login#docker-credentials for more information.
Unit Tests
⚠️ This usually indicates insufficient permissions. More details: https://github.com/mikepenz/action-junit-report/issues/23
Linting: config/webpack.config.js#L31
config/webpack.config.js:31:22:Use an object spread instead of `Object.assign` eg: `{ ...foo }`.
Linting: script/pr-check.js#L122
script/pr-check.js:122:7:Use array destructuring.
Linting: script/pr-check.js#L129
script/pr-check.js:129:7:Unary operator '++' used.
Linting: script/pr-check.js#L134
script/pr-check.js:134:7:Unary operator '++' used.
Linting: script/run-unit-test.js#L2
script/run-unit-test.js:2:35:Unexpected use of file extension "js" for "./run-unit-test-help.js"
Linting: script/serve.js#L2
script/serve.js:2:25:`command-line-args` import should occur before import of `./utils`
Linting: src/platform/testing/e2e/cypress/support/commands/keyboard.js#L8
src/platform/testing/e2e/cypress/support/commands/keyboard.js:8:33:Unary operator '++' used.
Linting: src/platform/testing/unit/axe-plugin.js#L1
src/platform/testing/unit/axe-plugin.js:1:18:Unexpected unnamed function.
Linting: src/platform/testing/unit/axe-plugin.js#L5
src/platform/testing/unit/axe-plugin.js:5:59:Unexpected unnamed function.
Linting: src/platform/testing/unit/renameKey.unit.spec.js#L8
src/platform/testing/unit/renameKey.unit.spec.js:8:3:Cypress E2E tests must include at least one axeCheck call. Documentation for adding checks and understanding errors can be found here: https://depo-platform-documentation.scrollhelp.site/developer-docs/A11y-Testing.1935409178.html