Skip to content

Add more tests

Add more tests #18

Triggered via push April 8, 2024 21:43
Status Failure
Total duration 3m 26s
Artifacts 17

ruby_tests.yml

on: push
Rubocop  /  Rubocop
32s
Rubocop / Rubocop
Ruby  /  Setup matrix
5s
Ruby / Setup matrix
Matrix: Ruby / existing-database
Matrix: Ruby / test
Fit to window
Zoom out
Zoom in

Annotations

12 errors
Ruby / test:foreman_cve_scanner - Foreman develop with Ruby 3.0 and Node 18 on PostgreSQL 13: foreman_cve_scanner/test/services/foreman_cve_scanner/cve_report_scanner_test.rb#L40
Failure: test_0004_grype scan has valid data --- expected +++ actual @@ -1 +1 @@ -"CVE-2007-0086: The Apache HTTP Server, when accessed through a TCP connection with a large window size, allows remote attackers to cause a denial of service (network bandwidth consumption) via a Range header that specifies multiple copies of the same fragment. NOTE: the severity of this issue has been disputed by third parties, who state that the large window size required by the attack is not normally supported or configured by the server, or that a DDoS-style attack would accomplish the same goal # url: https://nvd.nist.gov/vuln/detail/CVE-2007-0086" +"CVE-2023-48795: ssh: Prefix truncation attack on Binary Packet Protocol (BPP) # url: https://avd.aquasec.com/nvd/cve-2023-48795"
Ruby / test:foreman_cve_scanner - Foreman develop with Ruby 3.0 and Node 14 on PostgreSQL 13: foreman_cve_scanner/test/services/foreman_cve_scanner/cve_report_scanner_test.rb#L40
Failure: test_0004_grype scan has valid data --- expected +++ actual @@ -1 +1 @@ -"CVE-2007-0086: The Apache HTTP Server, when accessed through a TCP connection with a large window size, allows remote attackers to cause a denial of service (network bandwidth consumption) via a Range header that specifies multiple copies of the same fragment. NOTE: the severity of this issue has been disputed by third parties, who state that the large window size required by the attack is not normally supported or configured by the server, or that a DDoS-style attack would accomplish the same goal # url: https://nvd.nist.gov/vuln/detail/CVE-2007-0086" +"CVE-2023-48795: ssh: Prefix truncation attack on Binary Packet Protocol (BPP) # url: https://avd.aquasec.com/nvd/cve-2023-48795"
Ruby / test:foreman_cve_scanner - Foreman develop with Ruby 2.7 and Node 14 on PostgreSQL 13: foreman_cve_scanner/test/services/foreman_cve_scanner/cve_report_scanner_test.rb#L40
Failure: test_0004_grype scan has valid data --- expected +++ actual @@ -1 +1 @@ -"CVE-2007-0086: The Apache HTTP Server, when accessed through a TCP connection with a large window size, allows remote attackers to cause a denial of service (network bandwidth consumption) via a Range header that specifies multiple copies of the same fragment. NOTE: the severity of this issue has been disputed by third parties, who state that the large window size required by the attack is not normally supported or configured by the server, or that a DDoS-style attack would accomplish the same goal # url: https://nvd.nist.gov/vuln/detail/CVE-2007-0086" +"CVE-2023-48795: ssh: Prefix truncation attack on Binary Packet Protocol (BPP) # url: https://avd.aquasec.com/nvd/cve-2023-48795"
Ruby / test:foreman_cve_scanner - Foreman develop with Ruby 2.7 and Node 18 on PostgreSQL 13: foreman_cve_scanner/test/services/foreman_cve_scanner/cve_report_scanner_test.rb#L40
Failure: test_0004_grype scan has valid data --- expected +++ actual @@ -1 +1 @@ -"CVE-2007-0086: The Apache HTTP Server, when accessed through a TCP connection with a large window size, allows remote attackers to cause a denial of service (network bandwidth consumption) via a Range header that specifies multiple copies of the same fragment. NOTE: the severity of this issue has been disputed by third parties, who state that the large window size required by the attack is not normally supported or configured by the server, or that a DDoS-style attack would accomplish the same goal # url: https://nvd.nist.gov/vuln/detail/CVE-2007-0086" +"CVE-2023-48795: ssh: Prefix truncation attack on Binary Packet Protocol (BPP) # url: https://avd.aquasec.com/nvd/cve-2023-48795"

Artifacts

Produced during runtime
Name Size
Gemfile-ruby-27-node-14-pg-13-foreman-develop-dbseed.lock Expired
4.92 KB
Gemfile-ruby-27-node-14-pg-13-foreman-develop-pluginassetsprecompileforemancvescannerRAILSENVproductionDATABASEURLnulldbnohost.lock Expired
4.92 KB
Gemfile-ruby-27-node-14-pg-13-foreman-develop-testforemancvescanner.lock Expired
4.92 KB
Gemfile-ruby-27-node-18-pg-13-foreman-develop-dbseed.lock Expired
4.92 KB
Gemfile-ruby-27-node-18-pg-13-foreman-develop-pluginassetsprecompileforemancvescannerRAILSENVproductionDATABASEURLnulldbnohost.lock Expired
4.92 KB
Gemfile-ruby-27-node-18-pg-13-foreman-develop-testforemancvescanner.lock Expired
4.92 KB
Gemfile-ruby-30-node-14-pg-13-foreman-develop-dbseed.lock Expired
4.93 KB
Gemfile-ruby-30-node-14-pg-13-foreman-develop-pluginassetsprecompileforemancvescannerRAILSENVproductionDATABASEURLnulldbnohost.lock Expired
4.93 KB
Gemfile-ruby-30-node-14-pg-13-foreman-develop-testforemancvescanner.lock Expired
4.93 KB
Gemfile-ruby-30-node-18-pg-13-foreman-develop-dbseed.lock Expired
4.93 KB
Gemfile-ruby-30-node-18-pg-13-foreman-develop-pluginassetsprecompileforemancvescannerRAILSENVproductionDATABASEURLnulldbnohost.lock Expired
4.93 KB
Gemfile-ruby-30-node-18-pg-13-foreman-develop-testforemancvescanner.lock Expired
4.93 KB
Gemfile-theforeman-actions-rubocop-ruby-2.7.lock Expired
1.59 KB
logs-ruby-27-node-14-pg-13-foreman-develop-testforemancvescanner Expired
15.9 KB
logs-ruby-27-node-18-pg-13-foreman-develop-testforemancvescanner Expired
15.9 KB
logs-ruby-30-node-14-pg-13-foreman-develop-testforemancvescanner Expired
15.9 KB
logs-ruby-30-node-18-pg-13-foreman-develop-testforemancvescanner Expired
15.8 KB