Skip to content

[CI/CD] Add govulncheck to CI #6445

[CI/CD] Add govulncheck to CI

[CI/CD] Add govulncheck to CI #6445

Triggered via pull request December 4, 2025 11:50
Status Failure
Total duration 12m 58s
Artifacts 3

ci.yml

on: pull_request
Build Unsigned Snapshot
3m 39s
Build Unsigned Snapshot
Cache Dependencies
Cache Dependencies
Lint
2m 7s
Lint
Vulnerability Scan  /  Vulnerability Check
1m 22s
Vulnerability Scan / Vulnerability Check
Unit Tests
3m 3s
Unit Tests
Unit tests with race condition detection
3m 28s
Unit tests with race condition detection
Matrix: Integration Tests
Matrix: Integration Tests - Official OSS Images
Matrix: Integration Tests - Official Plus Images
Matrix: Metrics Integration Tests - Official OSS Images
Matrix: Metrics Integration Tests - Official Plus Images
Matrix: Upgrade Tests
Fit to window
Zoom out
Zoom in

Annotations

7 errors and 5 warnings
Vulnerability Scan / Vulnerability Check
Process completed with exit code 3.
Vulnerability Scan / Vulnerability Check
file.FileOperator.ReadChunk calls bufio.Reader.Read, which eventually calls x509.Certificate.VerifyHostname
Vulnerability Scan / Vulnerability Check
file.FileOperator.ReadChunk calls bufio.Reader.Read, which eventually calls x509.Certificate.Verify
Vulnerability Scan / Vulnerability Check
file.FileOperator.ReadChunk calls bufio.Reader.Read, which eventually calls x509.Certificate.Verify
Integration Tests (alpine, 3.22)
Process completed with exit code 2.
Integration Tests - Official OSS Images (alpine, mainline, alpine)
Process completed with exit code 2.
Vulnerability Scan / Vulnerability Check
Failed to restore: Cache service responded with 400
JSON arguments recommended for ENTRYPOINT/CMD to prevent unintended behavior related to OS signals: test/docker/load/Dockerfile#L76
JSONArgsRecommended: JSON arguments recommended for CMD to prevent unintended behavior related to OS signals More info: https://docs.docker.com/go/dockerfile/rule/json-args-recommended/
JSON arguments recommended for ENTRYPOINT/CMD to prevent unintended behavior related to OS signals: test/docker/load/Dockerfile#L54
JSONArgsRecommended: JSON arguments recommended for CMD to prevent unintended behavior related to OS signals More info: https://docs.docker.com/go/dockerfile/rule/json-args-recommended/
The 'as' keyword should match the case of the 'from' keyword: test/docker/load/Dockerfile#L78
FromAsCasing: 'as' and 'FROM' keywords' casing do not match More info: https://docs.docker.com/go/dockerfile/rule/from-as-casing/
The 'as' keyword should match the case of the 'from' keyword: test/docker/load/Dockerfile#L56
FromAsCasing: 'as' and 'FROM' keywords' casing do not match More info: https://docs.docker.com/go/dockerfile/rule/from-as-casing/

Artifacts

Produced during runtime
Name Size Digest
load-test-results
384 Bytes
sha256:7cc76bf4df00f8c78bb1d29f76deb876153537ad84cc0cd86d428261dfa4cffd
nginx-agent-unsigned-snapshots Expired
71.6 MB
sha256:a3bf603ca67eafcfc30c64440ada99aabf55f837f0b4c83e9d7369b69169280a
nginx~agent~RYWRGR.dockerbuild
311 KB
sha256:a9c60fca876214275826bca96606842f8f78ffc3543f40e7701a494cfd3048d6