[CI] add renovate config #6567
ci.yml
on: pull_request
Build Unsigned Snapshot
3m 40s
Cache Dependencies
0s
Lint
2m 12s
Vulnerability Scan
/
Vulnerability Check
1m 30s
Unit Tests
2m 52s
Unit tests with race condition detection
3m 29s
Matrix: Integration Tests
Matrix: Integration Tests - Official OSS Images
Matrix: Integration Tests - Official Plus Images
Matrix: Metrics Integration Tests - Official OSS Images
Matrix: Metrics Integration Tests - Official Plus Images
Matrix: Upgrade Tests
Annotations
13 errors and 5 warnings
|
Vulnerability Scan / Vulnerability Check
config.ResolveConfig calls viper.Viper.GetString, which eventually calls ast.IdentifierNode.String
|
|
Vulnerability Scan / Vulnerability Check
config.ResolveConfig calls viper.Viper.GetString, which eventually calls ast.FloatNode.String
|
|
Vulnerability Scan / Vulnerability Check
config.ResolveConfig calls viper.Viper.GetString, which eventually calls ast.ConstantNode.String
|
|
Vulnerability Scan / Vulnerability Check
config.ResolveConfig calls viper.Viper.GetString, which eventually calls ast.ConditionalNode.String
|
|
Vulnerability Scan / Vulnerability Check
config.ResolveConfig calls viper.Viper.GetString, which eventually calls ast.ChainNode.String
|
|
Vulnerability Scan / Vulnerability Check
config.ResolveConfig calls viper.Viper.GetString, which eventually calls ast.CallNode.String
|
|
Vulnerability Scan / Vulnerability Check
config.ResolveConfig calls viper.Viper.GetString, which eventually calls ast.BuiltinNode.String
|
|
Vulnerability Scan / Vulnerability Check
config.ResolveConfig calls viper.Viper.GetString, which eventually calls ast.BoolNode.String
|
|
Vulnerability Scan / Vulnerability Check
config.ResolveConfig calls viper.Viper.GetString, which eventually calls ast.BinaryNode.String
|
|
Vulnerability Scan / Vulnerability Check
config.ResolveConfig calls viper.Viper.GetString, which eventually calls ast.ArrayNode.String
|
|
Integration Tests - Official Plus Images (debian, bookworm, r34, debian, /nginx-plus/agent)
Process completed with exit code 2.
|
|
Integration Tests - Official Plus Images (alpine, 3.21, r34, alpine, /nginx-plus/agent)
The strategy configuration was canceled because "official-plus-image-integration-tests.debian_bookworm_r34_debia" failed
|
|
Integration Tests - Official OSS Images (bookworm, stable, debian)
Process completed with exit code 2.
|
|
Vulnerability Scan / Vulnerability Check
Failed to restore: Cache service responded with 400
|
|
The 'as' keyword should match the case of the 'from' keyword:
test/docker/load/Dockerfile#L56
FromAsCasing: 'as' and 'FROM' keywords' casing do not match
More info: https://docs.docker.com/go/dockerfile/rule/from-as-casing/
|
|
JSON arguments recommended for ENTRYPOINT/CMD to prevent unintended behavior related to OS signals:
test/docker/load/Dockerfile#L76
JSONArgsRecommended: JSON arguments recommended for CMD to prevent unintended behavior related to OS signals
More info: https://docs.docker.com/go/dockerfile/rule/json-args-recommended/
|
|
JSON arguments recommended for ENTRYPOINT/CMD to prevent unintended behavior related to OS signals:
test/docker/load/Dockerfile#L54
JSONArgsRecommended: JSON arguments recommended for CMD to prevent unintended behavior related to OS signals
More info: https://docs.docker.com/go/dockerfile/rule/json-args-recommended/
|
|
The 'as' keyword should match the case of the 'from' keyword:
test/docker/load/Dockerfile#L78
FromAsCasing: 'as' and 'FROM' keywords' casing do not match
More info: https://docs.docker.com/go/dockerfile/rule/from-as-casing/
|
Artifacts
Produced during runtime
| Name | Size | Digest | |
|---|---|---|---|
|
load-test-results
|
385 Bytes |
sha256:7dc784ae9550a7048db8db579c74998e46dea36a8b2b015cbde341bc6e5785ef
|
|
|
nginx-agent-unsigned-snapshots
Expired
|
72.8 MB |
sha256:87b0114a6a7d25b7d2a22c8d10bd1c984b242718ecb6737614f9e1f32feedac9
|
|
|
nginx~agent~5L3K3X.dockerbuild
|
306 KB |
sha256:f9850f3fd1f32cf40599fce586edbf88b7e976a5b255fd5ca76c01ccbc102d1c
|
|