Skip to content

Disable instance manipulation from HM when provisioned disabled (#366) #70

Disable instance manipulation from HM when provisioned disabled (#366)

Disable instance manipulation from HM when provisioned disabled (#366) #70

Triggered via push February 11, 2026 12:04
Status Failure
Total duration 8m 20s
Artifacts 12
post-merge-pipeline  /  sanitize-project-folder
2s
post-merge-pipeline / sanitize-project-folder
post-merge-pipeline  /  version-bump
8s
post-merge-pipeline / version-bump
post-merge-pipeline  /  run-repo-pipelines
6m 59s
post-merge-pipeline / run-repo-pipelines
post-merge-pipeline  /  trivy-filesystem-scan
28s
post-merge-pipeline / trivy-filesystem-scan
post-merge-pipeline  /  trivy-config-scan
19s
post-merge-pipeline / trivy-config-scan
post-merge-pipeline  /  zizmor-scan
18s
post-merge-pipeline / zizmor-scan
post-merge-pipeline  /  bandit
22s
post-merge-pipeline / bandit
post-merge-pipeline  /  ...  /  notify
post-merge-pipeline / notify-teams / notify
Matrix: post-merge-pipeline / sign-binaries
Matrix: post-merge-pipeline / sign-images
Matrix: post-merge-pipeline / scan-images
Fit to window
Zoom out
Zoom in

Annotations

1 error and 3 warnings
post-merge-pipeline / trivy-config-scan
Resource not accessible by integration - https://docs.github.com/rest
post-merge-pipeline / trivy-config-scan
This run of the CodeQL Action does not have permission to access the CodeQL Action API endpoints. This could be because the Action is running on a pull request from a fork. If not, please ensure the workflow has at least the 'security-events: read' permission. Details: Resource not accessible by integration - https://docs.github.com/rest
post-merge-pipeline / trivy-config-scan
Resource not accessible by integration - https://docs.github.com/rest
post-merge-pipeline / trivy-config-scan
This run of the CodeQL Action does not have permission to access the CodeQL Action API endpoints. This could be because the Action is running on a pull request from a fork. If not, please ensure the workflow has at least the 'security-events: read' permission. Details: Resource not accessible by integration - https://docs.github.com/rest

Artifacts

Produced during runtime
Name Size Digest
bandit-results-30kmzs Expired
527 Bytes
sha256:5d2c76fde6c8793636240fd48d0f60a3fb32c878c7b417dec54886e8ce56f249
built-binaries-40fb89c2dc1a07280bee86a14082b6eb49582373 Expired
14.4 MB
sha256:1a8a6a2492a638ad0207fca1f7eb4d1f22830835d0c62d21d26656d2d158f0d9
built-binaries-40fb89c2dc1a07280bee86a14082b6eb49582373-hostmgr-ce7cfded-0 Expired
6.81 KB
sha256:28be2dd1b0a0ccc33df276ecf056b3d60267624af876c7e2c5016920eed7011b
cosign-binary-3956fd Expired
6.81 KB
sha256:28be2dd1b0a0ccc33df276ecf056b3d60267624af876c7e2c5016920eed7011b
cosign-image-62c331 Expired
690 Bytes
sha256:0b2cb8e55ccff27783aab55c1bc8d51d4d7a634917a1c958d9ae3a918b38cbb2
docker-images-host Expired
45.2 MB
sha256:33dba1b7648bfc8ef0bb238b71021359d58a00e1c258891c3cfb7047101116bd
trivy-config-scan-host Expired
1.06 KB
sha256:e2e975397231e9d18fa02d103a22c6ec90fd53f5812f7d6eb19e807c3e0a5fad
trivy-fs-scan-report-fs-host Expired
501 Bytes
sha256:dd9ef54515ed995314e789513e2413144eb358b2b86bcb29a3a9b23c67b61b94
trivy-image-vuln-080137407410.dkr.ecr.us-west-2.amazonaws.com_edge-orch_infra_hostmgr_1.25.1 Expired
2.42 KB
sha256:3f663e335cf0c7a2ca99d0b7c5a2385273de890102e70c0110d03b18ac6760bd
trivy-image-vuln-080137407410.dkr.ecr.us-west-2.amazonaws.com_edge-orch_infra_hostmgr_main Expired
2.41 KB
sha256:4b8dc91e804fd6dd5acd15dec5bafadf2b9224ad8d1327e109e282c5c64e7e5d
trivy-image-vuln-hostmgr_1.25.1 Expired
2.3 KB
sha256:04d05bfa5fb2e3e3f85646f418f1150e66c6f867acbf9cf0b8ce642f61d0d1fd
trivy-scan-report-sbom-host Expired
30.8 KB
sha256:488363d37a99b4bdf39072e995ac424e2c05049437dd1a720d1c1cba8ebfa7b4