Skip to content

Add workflow for generating SBOM doc from a binary #6797

Add workflow for generating SBOM doc from a binary

Add workflow for generating SBOM doc from a binary #6797

Triggered via pull request February 23, 2026 15:25
Status Failure
Total duration 18m 39s
Artifacts 3

ci.yml

on: pull_request
Build Unsigned Snapshot
4m 14s
Build Unsigned Snapshot
Cache Dependencies
0s
Cache Dependencies
Lint
3m 39s
Lint
Vulnerability Scan  /  Vulnerability Check
1m 33s
Vulnerability Scan / Vulnerability Check
Unit Tests
3m 32s
Unit Tests
Unit tests with race condition detection
3m 57s
Unit tests with race condition detection
Matrix: Integration Tests
Matrix: Integration Tests - Official OSS Images
Matrix: Integration Tests - Official Plus Images
Matrix: Metrics Integration Tests - Official OSS Images
Matrix: Metrics Integration Tests - Official Plus Images
Matrix: Upgrade Tests
Fit to window
Zoom out
Zoom in

Annotations

20 errors and 5 warnings
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.SpanLinkCount
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.SpanLinkAttributeCount
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.SpanEventCount
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.SpanEventAttributeCount
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.SpanAttributeValueLength
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.SpanAttributeCount
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.BatchSpanProcessorScheduleDelay
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.BatchSpanProcessorMaxQueueSize
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.BatchSpanProcessorMaxExportBatchSize
Vulnerability Scan / Vulnerability Check
collector.bootup calls otelcol.Collector.Run, which eventually calls env.BatchSpanProcessorExportTimeout
Integration Tests - Official OSS Images (alpine, stable, alpine)
Process completed with exit code 2.
Integration Tests - Official OSS Images (bookworm, stable, debian)
The strategy configuration was canceled because "official-oss-image-integration-tests.alpine_stable_alpine" failed
Integration Tests - Official OSS Images (bookworm, stable, debian)
The operation was canceled.
Integration Tests - Official OSS Images (bookworm, mainline, debian)
The strategy configuration was canceled because "official-oss-image-integration-tests.alpine_stable_alpine" failed
Integration Tests - Official OSS Images (bookworm, mainline, debian)
The operation was canceled.
Integration Tests (redhatenterprise, 9)
Process completed with exit code 2.
Integration Tests (ubuntu, 24.04)
The strategy configuration was canceled because "integration-tests.redhatenterprise_9" failed
Integration Tests (ubuntu, 24.04)
The operation was canceled.
Vulnerability Scan / Vulnerability Check
Failed to restore: Cache service responded with 400
The 'as' keyword should match the case of the 'from' keyword: test/docker/load/Dockerfile#L80
FromAsCasing: 'as' and 'FROM' keywords' casing do not match More info: https://docs.docker.com/go/dockerfile/rule/from-as-casing/
The 'as' keyword should match the case of the 'from' keyword: test/docker/load/Dockerfile#L58
FromAsCasing: 'as' and 'FROM' keywords' casing do not match More info: https://docs.docker.com/go/dockerfile/rule/from-as-casing/
JSON arguments recommended for ENTRYPOINT/CMD to prevent unintended behavior related to OS signals: test/docker/load/Dockerfile#L78
JSONArgsRecommended: JSON arguments recommended for CMD to prevent unintended behavior related to OS signals More info: https://docs.docker.com/go/dockerfile/rule/json-args-recommended/
JSON arguments recommended for ENTRYPOINT/CMD to prevent unintended behavior related to OS signals: test/docker/load/Dockerfile#L56
JSONArgsRecommended: JSON arguments recommended for CMD to prevent unintended behavior related to OS signals More info: https://docs.docker.com/go/dockerfile/rule/json-args-recommended/

Artifacts

Produced during runtime
Name Size Digest
load-test-results
386 Bytes
sha256:955c9bb193ce825fc1cb5be48a3ea45dd8cf15140012e270d7bad12bc4819f7d
nginx-agent-unsigned-snapshots Expired
73.4 MB
sha256:6ec618a22dadc4fef4df292c013564820f0786831e7ee51ef65b374f654f7200
nginx~agent~YLCSK1.dockerbuild
300 KB
sha256:d686a323892b208cfa4e71048083c4f457ffd330c9e64e1f3be64514c0a1c426