Skip to content

Give vulcheck workflow contents read permission (#1487) #6612

Give vulcheck workflow contents read permission (#1487)

Give vulcheck workflow contents read permission (#1487) #6612

Triggered via push January 15, 2026 11:01
Status Failure
Total duration 12m 32s
Artifacts 3

ci.yml

on: push
Build Unsigned Snapshot
3m 22s
Build Unsigned Snapshot
Cache Dependencies
1m 24s
Cache Dependencies
Lint
3m 18s
Lint
Vulnerability Scan  /  Vulnerability Check
1m 14s
Vulnerability Scan / Vulnerability Check
Unit Tests
2m 58s
Unit Tests
Unit tests with race condition detection
3m 25s
Unit tests with race condition detection
Matrix: Integration Tests
Matrix: Integration Tests - Official OSS Images
Matrix: Integration Tests - Official Plus Images
Matrix: Metrics Integration Tests - Official OSS Images
Matrix: Metrics Integration Tests - Official Plus Images
Matrix: Upgrade Tests
Fit to window
Zoom out
Zoom in

Annotations

3 errors and 6 warnings
Integration Tests (redhatenterprise, 9)
Process completed with exit code 2.
Integration Tests (ubuntu, 24.04)
The strategy configuration was canceled because "integration-tests.redhatenterprise_9" failed
Integration Tests (ubuntu, 24.04)
The operation was canceled.
Vulnerability Scan / Vulnerability Check
Failed to save: <h2>Our services aren't available right now</h2><p>We're working to restore all services as soon as possible. Please check back soon.</p>0O8loaQAAAACsrAtogc8hRY+KDN7jTfyZUEhMMzBFREdFMDQxNwBFZGdl
Vulnerability Scan / Vulnerability Check
Failed to restore: Cache service responded with 400
JSON arguments recommended for ENTRYPOINT/CMD to prevent unintended behavior related to OS signals: test/docker/load/Dockerfile#L76
JSONArgsRecommended: JSON arguments recommended for CMD to prevent unintended behavior related to OS signals More info: https://docs.docker.com/go/dockerfile/rule/json-args-recommended/
JSON arguments recommended for ENTRYPOINT/CMD to prevent unintended behavior related to OS signals: test/docker/load/Dockerfile#L54
JSONArgsRecommended: JSON arguments recommended for CMD to prevent unintended behavior related to OS signals More info: https://docs.docker.com/go/dockerfile/rule/json-args-recommended/
The 'as' keyword should match the case of the 'from' keyword: test/docker/load/Dockerfile#L78
FromAsCasing: 'as' and 'FROM' keywords' casing do not match More info: https://docs.docker.com/go/dockerfile/rule/from-as-casing/
The 'as' keyword should match the case of the 'from' keyword: test/docker/load/Dockerfile#L56
FromAsCasing: 'as' and 'FROM' keywords' casing do not match More info: https://docs.docker.com/go/dockerfile/rule/from-as-casing/

Artifacts

Produced during runtime
Name Size Digest
load-test-results
385 Bytes
sha256:d53a38918609d0ec3507426d2b0fe7e6a531b961b25173d26ad8b4aa304e617b
nginx-agent-unsigned-snapshots Expired
73 MB
sha256:ceea6a4835f5289ad869e0d1e535f8077f895db8917f27c0ac64ac569af9c1e0
nginx~agent~9QGDQD.dockerbuild
301 KB
sha256:27235c253ee3a2299558af46cd49ae142b81f0ffed06a287ef57f01af561bf10