Skip to content

[CI] add renovate config #6566

[CI] add renovate config

[CI] add renovate config #6566

Triggered via pull request January 6, 2026 14:42
Status Failure
Total duration 13m 3s
Artifacts 3

ci.yml

on: pull_request
Build Unsigned Snapshot
3m 48s
Build Unsigned Snapshot
Cache Dependencies
0s
Cache Dependencies
Lint
3m 6s
Lint
Vulnerability Scan  /  Vulnerability Check
1m 21s
Vulnerability Scan / Vulnerability Check
Unit Tests
2m 57s
Unit Tests
Unit tests with race condition detection
3m 21s
Unit tests with race condition detection
Matrix: Integration Tests
Matrix: Integration Tests - Official OSS Images
Matrix: Integration Tests - Official Plus Images
Matrix: Metrics Integration Tests - Official OSS Images
Matrix: Metrics Integration Tests - Official Plus Images
Matrix: Upgrade Tests
Fit to window
Zoom out
Zoom in

Annotations

14 errors and 5 warnings
Vulnerability Scan / Vulnerability Check
config.ResolveConfig calls viper.Viper.GetString, which eventually calls ast.IdentifierNode.String
Vulnerability Scan / Vulnerability Check
config.ResolveConfig calls viper.Viper.GetString, which eventually calls ast.FloatNode.String
Vulnerability Scan / Vulnerability Check
config.ResolveConfig calls viper.Viper.GetString, which eventually calls ast.ConstantNode.String
Vulnerability Scan / Vulnerability Check
config.ResolveConfig calls viper.Viper.GetString, which eventually calls ast.ConditionalNode.String
Vulnerability Scan / Vulnerability Check
config.ResolveConfig calls viper.Viper.GetString, which eventually calls ast.ChainNode.String
Vulnerability Scan / Vulnerability Check
config.ResolveConfig calls viper.Viper.GetString, which eventually calls ast.CallNode.String
Vulnerability Scan / Vulnerability Check
config.ResolveConfig calls viper.Viper.GetString, which eventually calls ast.BuiltinNode.String
Vulnerability Scan / Vulnerability Check
config.ResolveConfig calls viper.Viper.GetString, which eventually calls ast.BoolNode.String
Vulnerability Scan / Vulnerability Check
config.ResolveConfig calls viper.Viper.GetString, which eventually calls ast.BinaryNode.String
Vulnerability Scan / Vulnerability Check
config.ResolveConfig calls viper.Viper.GetString, which eventually calls ast.ArrayNode.String
Integration Tests - Official OSS Images (alpine, mainline, alpine)
Process completed with exit code 2.
Integration Tests - Official OSS Images (alpine, stable, alpine)
The strategy configuration was canceled because "official-oss-image-integration-tests.alpine_mainline_alpine" failed
Integration Tests - Official OSS Images (alpine, stable, alpine)
The operation was canceled.
Integration Tests (ubuntu, 24.04)
Process completed with exit code 2.
Vulnerability Scan / Vulnerability Check
Failed to restore: Cache service responded with 400
JSON arguments recommended for ENTRYPOINT/CMD to prevent unintended behavior related to OS signals: test/docker/load/Dockerfile#L76
JSONArgsRecommended: JSON arguments recommended for CMD to prevent unintended behavior related to OS signals More info: https://docs.docker.com/go/dockerfile/rule/json-args-recommended/
JSON arguments recommended for ENTRYPOINT/CMD to prevent unintended behavior related to OS signals: test/docker/load/Dockerfile#L54
JSONArgsRecommended: JSON arguments recommended for CMD to prevent unintended behavior related to OS signals More info: https://docs.docker.com/go/dockerfile/rule/json-args-recommended/
The 'as' keyword should match the case of the 'from' keyword: test/docker/load/Dockerfile#L78
FromAsCasing: 'as' and 'FROM' keywords' casing do not match More info: https://docs.docker.com/go/dockerfile/rule/from-as-casing/
The 'as' keyword should match the case of the 'from' keyword: test/docker/load/Dockerfile#L56
FromAsCasing: 'as' and 'FROM' keywords' casing do not match More info: https://docs.docker.com/go/dockerfile/rule/from-as-casing/

Artifacts

Produced during runtime
Name Size Digest
load-test-results
386 Bytes
sha256:b7bb8674ff4e9977133afab400b21adc79953928b2dd8f66fd6a2233e2953094
nginx-agent-unsigned-snapshots Expired
72.8 MB
sha256:4997fa4a857043319fc35dd4da639f8cb840f2fe7ef9345febf5a8fc2afd0eef
nginx~agent~G5OL55.dockerbuild
311 KB
sha256:7b19ccdbf50f62f0f23b0826efc5984c23078181279a992434ca2dafa38090e1