Skip to content

update logo image #74182

update logo image

update logo image #74182

Triggered via push September 27, 2024 22:45
Status Cancelled
Total duration 6m 6s
Billable time 18m
Artifacts 2
Matrix: Build
Testing Reports Prep
3m 7s
Testing Reports Prep
Fetch Test Stability Allow Lists
57s
Fetch Test Stability Allow Lists
Security Audit
2m 47s
Security Audit
Linting (All)
0s
Linting (All)
Fetch ECR Credentials
0s
Fetch ECR Credentials
Matrix: Cypress E2E Tests
Matrix: E2E Test Stability Review
Matrix: Unit Test Stability Review
Matrix: Unit Tests
Testing Reports - Cypress E2E Tests
0s
Testing Reports - Cypress E2E Tests
Update E2E Test Stability Allow List
0s
Update E2E Test Stability Allow List
Testing Reports - E2E Test Stability Review
0s
Testing Reports - E2E Test Stability Review
Update Unit Test Stability Allow List
0s
Update Unit Test Stability Allow List
Testing Reports - Unit Test Stability Review
0s
Testing Reports - Unit Test Stability Review
Matrix: Archive
Testing Reports - Unit Tests
0s
Testing Reports - Unit Tests
Testing Reports - Unit Tests Coverage
0s
Testing Reports - Unit Tests Coverage
QA Merge Status
0s
QA Merge Status
Set Environments to Deploy
0s
Set Environments to Deploy
Matrix: Deploy
CD Production Deploy
0s
CD Production Deploy
Notify Failure
0s
Notify Failure
Fit to window
Zoom out
Zoom in

Annotations

18 errors
Security Audit
Security advisory: Title: Unauthenticated Denial of Service in the octokit/webhooks library Module name: octokit Dependency: octokit Path: octokit Severity: high Details: https://github.com/advisories/GHSA-pwfr-8pq7-x9qv
Security Audit
Security advisory: Title: send vulnerable to template injection that can lead to XSS Module name: send Dependency: express Path: express>send Severity: moderate Details: https://github.com/advisories/GHSA-m6fv-jmcg-4jfg
Security Audit
Security advisory: Title: serve-static vulnerable to template injection that can lead to XSS Module name: serve-static Dependency: express Path: express>serve-static Severity: moderate Details: https://github.com/advisories/GHSA-cm22-4g7w-348p
Security Audit
Security advisory: Title: path-to-regexp outputs backtracking regular expressions Module name: path-to-regexp Dependency: express Path: express>path-to-regexp Severity: high Details: https://github.com/advisories/GHSA-9wv6-86v2-598j
Security Audit
Security advisory: Title: Express.js Open Redirect in malformed URLs Module name: express Dependency: express Path: express Severity: moderate Details: https://github.com/advisories/GHSA-rv95-896h-c2vc
Security Audit
Security advisory: Title: express vulnerable to XSS via response.redirect() Module name: express Dependency: express Path: express Severity: moderate Details: https://github.com/advisories/GHSA-qw6h-vgh9-j6wx
Security Audit
Security advisory: Title: Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code Module name: @babel/traverse Dependency: styled-components Path: styled-components>@babel/traverse Severity: critical Details: https://github.com/advisories/GHSA-67hx-6x53-jw92
Security Audit
Security advisory: Title: Elliptic's EDDSA missing signature length check Module name: elliptic Dependency: uswds Path: uswds>browserify>crypto-browserify>browserify-sign>elliptic Severity: low Details: https://github.com/advisories/GHSA-f7q4-pwc6-w24p
Security Audit
Security advisory: Title: Elliptic's ECDSA missing check for whether leading bit of r and s is zero Module name: elliptic Dependency: uswds Path: uswds>browserify>crypto-browserify>browserify-sign>elliptic Severity: low Details: https://github.com/advisories/GHSA-977x-g7h5-7qgw
Security Audit
Security advisory: Title: Elliptic allows BER-encoded signatures Module name: elliptic Dependency: uswds Path: uswds>browserify>crypto-browserify>browserify-sign>elliptic Severity: low Details: https://github.com/advisories/GHSA-49q7-c7j4-3p7m
Tests Prep
Canceling since a higher priority waiting request for 'refs/heads/mc-core-style-test' exists
Tests Prep
The operation was canceled.
Build (vagovstaging)
Canceling since a higher priority waiting request for 'refs/heads/mc-core-style-test' exists
Build (vagovstaging)
The operation was canceled.
Build (vagovdev)
Canceling since a higher priority waiting request for 'refs/heads/mc-core-style-test' exists
Build (vagovdev)
The operation was canceled.
Build (vagovprod)
Canceling since a higher priority waiting request for 'refs/heads/mc-core-style-test' exists
Build (vagovprod)
The operation was canceled.

Artifacts

Produced during runtime
Name Size
e2e-allow-list
10.5 KB
unit-test-allow-list
34.6 KB