Vulnerability Scan with CRDA #732
security_scan.yml
on: schedule
Scan project vulnerability with CRDA
17s
Annotations
1 error and 2 warnings
Scan project vulnerability with CRDA
crda exited with code 1
12:37AM FTL Unable to reach the server. hint: Check your Internet connection. error="Post \"https://gw.api.openshift.io/api/v2/stack-analyses?user_key=207c527cfc2a6b8dcf4fa43ad7a976da\": x509: certificate is valid for *.apps.app-sre-prod-01.i7w5.p1.openshiftapps.com, api.app-sre-prod-01.i7w5.p1.openshiftapps.com, rh-api.app-sre-prod-01.i7w5.p1.openshiftapps.com, not gw.api.openshift.io"
|
Scan project vulnerability with CRDA
Node.js 16 actions are deprecated. Please update the following actions to use Node.js 20: actions/checkout@v2, actions/setup-node@v2, redhat-actions/openshift-tools-installer@v1, redhat-actions/crda@v1. For more information see: https://github.blog/changelog/2023-09-22-github-actions-transitioning-from-node-16-to-node-20/.
|
Scan project vulnerability with CRDA
The following actions uses node12 which is deprecated and will be forced to run on node16: actions/checkout@v2, actions/setup-node@v2. For more info: https://github.blog/changelog/2023-06-13-github-actions-all-actions-will-run-on-node16-instead-of-node12-by-default/
|