Add more tests #18
ruby_tests.yml
on: push
Annotations
12 errors
Ruby / test:foreman_cve_scanner - Foreman develop with Ruby 3.0 and Node 18 on PostgreSQL 13:
foreman_cve_scanner/test/services/foreman_cve_scanner/cve_report_scanner_test.rb#L40
Failure: test_0004_grype scan has valid data
--- expected
+++ actual
@@ -1 +1 @@
-"CVE-2007-0086: The Apache HTTP Server, when accessed through a TCP connection with a large window size, allows remote attackers to cause a denial of service (network bandwidth consumption) via a Range header that specifies multiple copies of the same fragment. NOTE: the severity of this issue has been disputed by third parties, who state that the large window size required by the attack is not normally supported or configured by the server, or that a DDoS-style attack would accomplish the same goal # url: https://nvd.nist.gov/vuln/detail/CVE-2007-0086"
+"CVE-2023-48795: ssh: Prefix truncation attack on Binary Packet Protocol (BPP) # url: https://avd.aquasec.com/nvd/cve-2023-48795"
|
Ruby / test:foreman_cve_scanner - Foreman develop with Ruby 3.0 and Node 18 on PostgreSQL 13:
foreman_cve_scanner/test/services/foreman_cve_scanner/cve_report_scanner_test.rb#L26
Failure: test_0003_trivy scan has valid data
Expected: 10
Actual: 1
|
Ruby / test:foreman_cve_scanner - Foreman develop with Ruby 3.0 and Node 18 on PostgreSQL 13
Process completed with exit code 1.
|
Ruby / test:foreman_cve_scanner - Foreman develop with Ruby 3.0 and Node 14 on PostgreSQL 13:
foreman_cve_scanner/test/services/foreman_cve_scanner/cve_report_scanner_test.rb#L40
Failure: test_0004_grype scan has valid data
--- expected
+++ actual
@@ -1 +1 @@
-"CVE-2007-0086: The Apache HTTP Server, when accessed through a TCP connection with a large window size, allows remote attackers to cause a denial of service (network bandwidth consumption) via a Range header that specifies multiple copies of the same fragment. NOTE: the severity of this issue has been disputed by third parties, who state that the large window size required by the attack is not normally supported or configured by the server, or that a DDoS-style attack would accomplish the same goal # url: https://nvd.nist.gov/vuln/detail/CVE-2007-0086"
+"CVE-2023-48795: ssh: Prefix truncation attack on Binary Packet Protocol (BPP) # url: https://avd.aquasec.com/nvd/cve-2023-48795"
|
Ruby / test:foreman_cve_scanner - Foreman develop with Ruby 3.0 and Node 14 on PostgreSQL 13:
foreman_cve_scanner/test/services/foreman_cve_scanner/cve_report_scanner_test.rb#L26
Failure: test_0003_trivy scan has valid data
Expected: 10
Actual: 1
|
Ruby / test:foreman_cve_scanner - Foreman develop with Ruby 3.0 and Node 14 on PostgreSQL 13
Process completed with exit code 1.
|
Ruby / test:foreman_cve_scanner - Foreman develop with Ruby 2.7 and Node 14 on PostgreSQL 13:
foreman_cve_scanner/test/services/foreman_cve_scanner/cve_report_scanner_test.rb#L26
Failure: test_0003_trivy scan has valid data
Expected: 10
Actual: 1
|
Ruby / test:foreman_cve_scanner - Foreman develop with Ruby 2.7 and Node 14 on PostgreSQL 13:
foreman_cve_scanner/test/services/foreman_cve_scanner/cve_report_scanner_test.rb#L40
Failure: test_0004_grype scan has valid data
--- expected
+++ actual
@@ -1 +1 @@
-"CVE-2007-0086: The Apache HTTP Server, when accessed through a TCP connection with a large window size, allows remote attackers to cause a denial of service (network bandwidth consumption) via a Range header that specifies multiple copies of the same fragment. NOTE: the severity of this issue has been disputed by third parties, who state that the large window size required by the attack is not normally supported or configured by the server, or that a DDoS-style attack would accomplish the same goal # url: https://nvd.nist.gov/vuln/detail/CVE-2007-0086"
+"CVE-2023-48795: ssh: Prefix truncation attack on Binary Packet Protocol (BPP) # url: https://avd.aquasec.com/nvd/cve-2023-48795"
|
Ruby / test:foreman_cve_scanner - Foreman develop with Ruby 2.7 and Node 14 on PostgreSQL 13
Process completed with exit code 1.
|
Ruby / test:foreman_cve_scanner - Foreman develop with Ruby 2.7 and Node 18 on PostgreSQL 13:
foreman_cve_scanner/test/services/foreman_cve_scanner/cve_report_scanner_test.rb#L40
Failure: test_0004_grype scan has valid data
--- expected
+++ actual
@@ -1 +1 @@
-"CVE-2007-0086: The Apache HTTP Server, when accessed through a TCP connection with a large window size, allows remote attackers to cause a denial of service (network bandwidth consumption) via a Range header that specifies multiple copies of the same fragment. NOTE: the severity of this issue has been disputed by third parties, who state that the large window size required by the attack is not normally supported or configured by the server, or that a DDoS-style attack would accomplish the same goal # url: https://nvd.nist.gov/vuln/detail/CVE-2007-0086"
+"CVE-2023-48795: ssh: Prefix truncation attack on Binary Packet Protocol (BPP) # url: https://avd.aquasec.com/nvd/cve-2023-48795"
|
Ruby / test:foreman_cve_scanner - Foreman develop with Ruby 2.7 and Node 18 on PostgreSQL 13:
foreman_cve_scanner/test/services/foreman_cve_scanner/cve_report_scanner_test.rb#L26
Failure: test_0003_trivy scan has valid data
Expected: 10
Actual: 1
|
Ruby / test:foreman_cve_scanner - Foreman develop with Ruby 2.7 and Node 18 on PostgreSQL 13
Process completed with exit code 1.
|
Artifacts
Produced during runtime
Name | Size | |
---|---|---|
Gemfile-ruby-27-node-14-pg-13-foreman-develop-dbseed.lock
Expired
|
4.92 KB |
|
Gemfile-ruby-27-node-14-pg-13-foreman-develop-pluginassetsprecompileforemancvescannerRAILSENVproductionDATABASEURLnulldbnohost.lock
Expired
|
4.92 KB |
|
Gemfile-ruby-27-node-14-pg-13-foreman-develop-testforemancvescanner.lock
Expired
|
4.92 KB |
|
Gemfile-ruby-27-node-18-pg-13-foreman-develop-dbseed.lock
Expired
|
4.92 KB |
|
Gemfile-ruby-27-node-18-pg-13-foreman-develop-pluginassetsprecompileforemancvescannerRAILSENVproductionDATABASEURLnulldbnohost.lock
Expired
|
4.92 KB |
|
Gemfile-ruby-27-node-18-pg-13-foreman-develop-testforemancvescanner.lock
Expired
|
4.92 KB |
|
Gemfile-ruby-30-node-14-pg-13-foreman-develop-dbseed.lock
Expired
|
4.93 KB |
|
Gemfile-ruby-30-node-14-pg-13-foreman-develop-pluginassetsprecompileforemancvescannerRAILSENVproductionDATABASEURLnulldbnohost.lock
Expired
|
4.93 KB |
|
Gemfile-ruby-30-node-14-pg-13-foreman-develop-testforemancvescanner.lock
Expired
|
4.93 KB |
|
Gemfile-ruby-30-node-18-pg-13-foreman-develop-dbseed.lock
Expired
|
4.93 KB |
|
Gemfile-ruby-30-node-18-pg-13-foreman-develop-pluginassetsprecompileforemancvescannerRAILSENVproductionDATABASEURLnulldbnohost.lock
Expired
|
4.93 KB |
|
Gemfile-ruby-30-node-18-pg-13-foreman-develop-testforemancvescanner.lock
Expired
|
4.93 KB |
|
Gemfile-theforeman-actions-rubocop-ruby-2.7.lock
Expired
|
1.59 KB |
|
logs-ruby-27-node-14-pg-13-foreman-develop-testforemancvescanner
Expired
|
15.9 KB |
|
logs-ruby-27-node-18-pg-13-foreman-develop-testforemancvescanner
Expired
|
15.9 KB |
|
logs-ruby-30-node-14-pg-13-foreman-develop-testforemancvescanner
Expired
|
15.9 KB |
|
logs-ruby-30-node-18-pg-13-foreman-develop-testforemancvescanner
Expired
|
15.8 KB |
|