Update access-dev.yaml #740
cicd-1-pull-request.yaml
on: push
Set CI/CD metadata
6s
Commit stage
/
Scan secrets
10s
Commit stage
/
Check file format
7s
Commit stage
/
Check Markdown format
7s
Commit stage
/
Check English usage
6s
Commit stage
/
Count lines of code
7s
Commit stage
/
Scan dependencies
39s
Commit stage
/
Lint and validate OpenAPI
38s
Test stage
/
Test coverage
3s
Test stage
/
Perform static analysis
4s
Build stage
/
Artefact 1
5s
Build stage
/
Artefact 2
4s
Acceptance stage
/
Contract test
4s
Acceptance stage
/
Security test
4s
Acceptance stage
/
UI test
7s
Acceptance stage
/
UI performance test
6s
Acceptance stage
/
Integration test
3s
Acceptance stage
/
Accessibility test
4s
Acceptance stage
/
Load test
6s
Acceptance stage
/
Environment tear down
4s
Annotations
2 warnings
|
Commit stage / Lint and validate OpenAPI:
build/specification/sandbox/eligibility-signposting-api.yaml#L27
oas3-operation-security-defined Operation "security" values must match a scheme defined in the "components.securitySchemes" object.
|
|
Commit stage / Lint and validate OpenAPI:
build/specification/sandbox/eligibility-signposting-api.yaml#L22
operation-tags Operation must have non-empty "tags" array.
|
Artifacts
Produced during runtime
| Name | Size | Digest | |
|---|---|---|---|
|
lines-of-code-report.json.zip
|
819 Bytes |
sha256:d831ebe742d4c38a1b70bbe5335cb3ab99eba4f3a688b3dbc9e5c72eedbfa107
|
|
|
sbom-repository-report.json.zip
|
92.4 KB |
sha256:2d83c645eddd27511209caec7839a75fef688db553d21c055df1f1798dfcab86
|
|
|
vulnerabilities-repository-report.json.zip
|
7.04 KB |
sha256:390d6ca3ce5fa89e681795a0e45cd8ca21eda9405f002d58c67b380a689aebce
|
|