Skip to content

chore(deps): update vitest monorepo to v4 (major) #7579

chore(deps): update vitest monorepo to v4 (major)

chore(deps): update vitest monorepo to v4 (major) #7579

Triggered via pull request December 31, 2025 17:27
Status Failure
Total duration 6m 42s
Artifacts 1

ci.yml

on: pull_request
checking file changes
11s
checking file changes
Build & Deploy Docker Image
4m 59s
Build & Deploy Docker Image
Matrix: lint, build and test for GeoHub
Build and deploy GeoHub userguide
0s
Build and deploy GeoHub userguide
Deploy cogserver-dev to Kubernetes
0s
Deploy cogserver-dev to Kubernetes
Deploy cogserver to Kubernetes
0s
Deploy cogserver to Kubernetes
Deploy geohub-data-pipeline to Kubernetes
0s
Deploy geohub-data-pipeline to Kubernetes
Deploy pg_tileserv to Kubernetes
0s
Deploy pg_tileserv to Kubernetes
Deploy geo-undpstac-pipeline to Kubernetes
0s
Deploy geo-undpstac-pipeline to Kubernetes
Build and deploy Static Image API to ACR
0s
Build and deploy Static Image API to ACR
Build and deploy Static Image API to GitHub Package
0s
Build and deploy Static Image API to GitHub Package
Matrix: Build and deploy svelte UNDP components storybook
Matrix: Build and deploy svelte UNDP design storybook
Fit to window
Zoom out
Zoom in

Annotations

1 error and 10 warnings
lint, build and test for GeoHub (22)
Process completed with exit code 1.
checking file changes
'base' input parameter is ignored when action is triggered by pull request event
Build and deploy svelte UNDP design storybook (22)
Skip setting environment url as environment 'Svelte UNDP Design' may contain secret.
Build and deploy svelte UNDP components storybook (22)
Skip setting environment url as environment 'Svelte UNDP Components' may contain secret.
Sensitive data should not be used in the ARG or ENV commands: docker/Dockerfile.production#L64
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "GEOHUB_GITHUB_SECRET") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: docker/Dockerfile.production#L61
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "AZURE_AD_B2C_CLIENT_SECRET") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: docker/Dockerfile.production#L58
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "AUTH_SECRET") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: docker/Dockerfile.production#L54
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "AZURE_STORAGE_ACCESS_KEY_UPLOAD") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: docker/Dockerfile.production#L52
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "AZURE_STORAGE_ACCESS_KEY") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: docker/Dockerfile.production#L72
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "MAPTILER_API_KEY") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: docker/Dockerfile.production#L67
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "JWT_SECRET_KEY") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/

Artifacts

Produced during runtime
Name Size Digest
UNDP-Data~geohub~MGDB4M.dockerbuild
236 KB
sha256:f5cbe8cf561f3bbdd6649ddc55ad375c2f004803e1f6b9c3b1a73488584f29d5