Skip to content

OPSEXP-2875: add search enterprise mediation & reindex + fix tests #62

OPSEXP-2875: add search enterprise mediation & reindex + fix tests

OPSEXP-2875: add search enterprise mediation & reindex + fix tests #62

Triggered via pull request October 4, 2024 07:07
@alxgomzalxgomz
synchronize #57
OPSEXP-2875
Status Success
Total duration 42s
Billable time 1m
Artifacts

kics.yml

on: pull_request
Fit to window
Zoom out
Zoom in

Annotations

10 warnings
[HIGH] Missing User Instruction: java/Dockerfile#L24
A user should be specified in the dockerfile, otherwise the image will run as root
[HIGH] Missing User Instruction: search/enterprise/reindexing/Dockerfile#L1
A user should be specified in the dockerfile, otherwise the image will run as root
[HIGH] Missing User Instruction: search/enterprise/common/Dockerfile#L1
A user should be specified in the dockerfile, otherwise the image will run as root
[HIGH] Missing User Instruction: search/enterprise/all-in-one/Dockerfile#L1
A user should be specified in the dockerfile, otherwise the image will run as root
[MEDIUM] Add Instead of Copy: tengine/libreoffice/Dockerfile#L26
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
[MEDIUM] Add Instead of Copy: repository/Dockerfile#L11
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
[MEDIUM] Add Instead of Copy: ats/sfs/Dockerfile#L11
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
[MEDIUM] Add Instead of Copy: repository/Dockerfile#L32
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
[MEDIUM] Add Instead of Copy: tengine/pdfrenderer/Dockerfile#L18
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
[MEDIUM] Add Instead of Copy: search/enterprise/reindexing/Dockerfile#L3
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.