Skip to content

eja - bumping redocly version to resolve security vulnerability #863

eja - bumping redocly version to resolve security vulnerability

eja - bumping redocly version to resolve security vulnerability #863

Triggered via pull request January 14, 2026 14:31
Status Success
Total duration 1m 46s
Artifacts 3

cicd-1-pull-request.yaml

on: pull_request
Set CI/CD metadata
5s
Set CI/CD metadata
Commit stage  /  Scan secrets
5s
Commit stage / Scan secrets
Commit stage  /  Check file format
6s
Commit stage / Check file format
Commit stage  /  Check Markdown format
9s
Commit stage / Check Markdown format
Commit stage  /  Check English usage
8s
Commit stage / Check English usage
Commit stage  /  Count lines of code
8s
Commit stage / Count lines of code
Commit stage  /  Scan dependencies
42s
Commit stage / Scan dependencies
Commit stage  /  Lint and validate OpenAPI
39s
Commit stage / Lint and validate OpenAPI
Test stage  /  Linting
4s
Test stage / Linting
Test stage  /  Unit tests
5s
Test stage / Unit tests
Test stage  /  Test coverage
4s
Test stage / Test coverage
Test stage  /  Perform static analysis
6s
Test stage / Perform static analysis
Build stage  /  Artefact 1
4s
Build stage / Artefact 1
Build stage  /  Artefact 2
6s
Build stage / Artefact 2
Acceptance stage  /  Environment set up
6s
Acceptance stage / Environment set up
Acceptance stage  /  Contract test
3s
Acceptance stage / Contract test
Acceptance stage  /  Security test
4s
Acceptance stage / Security test
Acceptance stage  /  UI test
6s
Acceptance stage / UI test
Acceptance stage  /  UI performance test
4s
Acceptance stage / UI performance test
Acceptance stage  /  Integration test
4s
Acceptance stage / Integration test
Acceptance stage  /  Accessibility test
6s
Acceptance stage / Accessibility test
Acceptance stage  /  Load test
6s
Acceptance stage / Load test
Acceptance stage  /  Environment tear down
5s
Acceptance stage / Environment tear down
Fit to window
Zoom out
Zoom in

Annotations

1 warning
Commit stage / Lint and validate OpenAPI: build/specification/sandbox/eligibility-signposting-api.yaml#L22
operation-tags Operation must have non-empty "tags" array.

Artifacts

Produced during runtime
Name Size Digest
lines-of-code-report.json.zip Expired
792 Bytes
sha256:219435c50ae5c7fadc60fbb892452155f64153de4022df587cd15d9fee3e55c1
sbom-repository-report.json.zip Expired
91.9 KB
sha256:f4042e3844c7b0dd98e404903f101714600ac92179390fc47fa5248420190722
vulnerabilities-repository-report.json.zip Expired
4.72 KB
sha256:98e415b454e1117249512b0e51e7faec97cdb238c3c6891a9998f6923a5f7110