Add workflow for generating SBOM doc from a binary #6797
ci.yml
on: pull_request
Build Unsigned Snapshot
4m 14s
Cache Dependencies
0s
Lint
3m 39s
Vulnerability Scan
/
Vulnerability Check
1m 33s
Unit Tests
3m 32s
Unit tests with race condition detection
3m 57s
Matrix: Integration Tests
Matrix: Integration Tests - Official OSS Images
Matrix: Integration Tests - Official Plus Images
Matrix: Metrics Integration Tests - Official OSS Images
Matrix: Metrics Integration Tests - Official Plus Images
Matrix: Upgrade Tests
Annotations
20 errors and 5 warnings
|
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.SpanLinkCount
|
|
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.SpanLinkAttributeCount
|
|
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.SpanEventCount
|
|
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.SpanEventAttributeCount
|
|
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.SpanAttributeValueLength
|
|
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.SpanAttributeCount
|
|
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.BatchSpanProcessorScheduleDelay
|
|
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.BatchSpanProcessorMaxQueueSize
|
|
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.BatchSpanProcessorMaxExportBatchSize
|
|
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.BatchSpanProcessorExportTimeout
|
|
Integration Tests - Official OSS Images (alpine, stable, alpine)
Process completed with exit code 2.
|
|
Integration Tests - Official OSS Images (bookworm, stable, debian)
The strategy configuration was canceled because "official-oss-image-integration-tests.alpine_stable_alpine" failed
|
|
Integration Tests - Official OSS Images (bookworm, stable, debian)
The operation was canceled.
|
|
Integration Tests - Official OSS Images (bookworm, mainline, debian)
The strategy configuration was canceled because "official-oss-image-integration-tests.alpine_stable_alpine" failed
|
|
Integration Tests - Official OSS Images (bookworm, mainline, debian)
The operation was canceled.
|
|
Integration Tests (redhatenterprise, 9)
Process completed with exit code 2.
|
|
Integration Tests (ubuntu, 24.04)
The strategy configuration was canceled because "integration-tests.redhatenterprise_9" failed
|
|
Integration Tests (ubuntu, 24.04)
The operation was canceled.
|
|
Integration Tests - Official Plus Images (debian, bookworm, r35, debian, /nginx-plus/agent)
Process completed with exit code 1.
|
|
Integration Tests - Official Plus Images (debian, bookworm, r35, debian, /nginx-plus/agent)
Process completed with exit code 2.
|
|
Vulnerability Scan / Vulnerability Check
Failed to restore: Cache service responded with 400
|
|
The 'as' keyword should match the case of the 'from' keyword:
test/docker/load/Dockerfile#L80
FromAsCasing: 'as' and 'FROM' keywords' casing do not match
More info: https://docs.docker.com/go/dockerfile/rule/from-as-casing/
|
|
The 'as' keyword should match the case of the 'from' keyword:
test/docker/load/Dockerfile#L58
FromAsCasing: 'as' and 'FROM' keywords' casing do not match
More info: https://docs.docker.com/go/dockerfile/rule/from-as-casing/
|
|
JSON arguments recommended for ENTRYPOINT/CMD to prevent unintended behavior related to OS signals:
test/docker/load/Dockerfile#L78
JSONArgsRecommended: JSON arguments recommended for CMD to prevent unintended behavior related to OS signals
More info: https://docs.docker.com/go/dockerfile/rule/json-args-recommended/
|
|
JSON arguments recommended for ENTRYPOINT/CMD to prevent unintended behavior related to OS signals:
test/docker/load/Dockerfile#L56
JSONArgsRecommended: JSON arguments recommended for CMD to prevent unintended behavior related to OS signals
More info: https://docs.docker.com/go/dockerfile/rule/json-args-recommended/
|
Artifacts
Produced during runtime
| Name | Size | Digest | |
|---|---|---|---|
|
load-test-results
|
386 Bytes |
sha256:955c9bb193ce825fc1cb5be48a3ea45dd8cf15140012e270d7bad12bc4819f7d
|
|
|
nginx-agent-unsigned-snapshots
Expired
|
73.4 MB |
sha256:6ec618a22dadc4fef4df292c013564820f0786831e7ee51ef65b374f654f7200
|
|
|
nginx~agent~YLCSK1.dockerbuild
|
300 KB |
sha256:d686a323892b208cfa4e71048083c4f457ffd330c9e64e1f3be64514c0a1c426
|
|