Updating the setup script to handle sample data import for Docker #4512
pull-request.yml
on: pull_request
Check for linting, formatting, and type errors
1m 28s
Checks if sensitive files have been changed without authorization
8s
Checks if number of files changed is acceptable
4s
Base branch check
0s
Matrix: Testing Application
JSDocs comments and pipeline
0s
Annotations
4 errors and 6 warnings
Base branch check
Process completed with exit code 1.
|
Checks if sensitive files have been changed without authorization
Process completed with exit code 1.
|
tests/resolvers/Query/getVolunteerRanks.spec.ts > resolvers -> Query -> getVolunteerRanks > getVolunteerRanks for monthly, descending, name, no limit:
tests/resolvers/Query/getVolunteerRanks.spec.ts#L79
AssertionError: expected 6 to deeply equal 2
- Expected
+ Received
- 2
+ 6
❯ tests/resolvers/Query/getVolunteerRanks.spec.ts:79:48
|
Testing Application (22.x)
Process completed with exit code 1.
|
Checks if number of files changed is acceptable
Unexpected input(s) 'persist-crendetials', valid inputs are ['repository', 'ref', 'token', 'ssh-key', 'ssh-known-hosts', 'ssh-strict', 'ssh-user', 'persist-credentials', 'path', 'clean', 'filter', 'sparse-checkout', 'sparse-checkout-cone-mode', 'fetch-depth', 'fetch-tags', 'show-progress', 'lfs', 'submodules', 'set-safe-directory', 'github-server-url']
|
Checks if number of files changed is acceptable
Unexpected input(s) 'persist-crendetials', valid inputs are ['repository', 'ref', 'token', 'ssh-key', 'ssh-known-hosts', 'ssh-strict', 'ssh-user', 'persist-credentials', 'path', 'clean', 'filter', 'sparse-checkout', 'sparse-checkout-cone-mode', 'fetch-depth', 'fetch-tags', 'show-progress', 'lfs', 'submodules', 'set-safe-directory', 'github-server-url']
|
Checks if sensitive files have been changed without authorization
Unexpected input(s) 'persist-crendetials', valid inputs are ['repository', 'ref', 'token', 'ssh-key', 'ssh-known-hosts', 'ssh-strict', 'ssh-user', 'persist-credentials', 'path', 'clean', 'filter', 'sparse-checkout', 'sparse-checkout-cone-mode', 'fetch-depth', 'fetch-tags', 'show-progress', 'lfs', 'submodules', 'set-safe-directory', 'github-server-url']
|
Checks if sensitive files have been changed without authorization
Unexpected input(s) 'persist-crendetials', valid inputs are ['repository', 'ref', 'token', 'ssh-key', 'ssh-known-hosts', 'ssh-strict', 'ssh-user', 'persist-credentials', 'path', 'clean', 'filter', 'sparse-checkout', 'sparse-checkout-cone-mode', 'fetch-depth', 'fetch-tags', 'show-progress', 'lfs', 'submodules', 'set-safe-directory', 'github-server-url']
|
Check for linting, formatting, and type errors
Unexpected input(s) 'persist-crendetials', valid inputs are ['repository', 'ref', 'token', 'ssh-key', 'ssh-known-hosts', 'ssh-strict', 'ssh-user', 'persist-credentials', 'path', 'clean', 'filter', 'sparse-checkout', 'sparse-checkout-cone-mode', 'fetch-depth', 'fetch-tags', 'show-progress', 'lfs', 'submodules', 'set-safe-directory', 'github-server-url']
|
Check for linting, formatting, and type errors
Unexpected input(s) 'persist-crendetials', valid inputs are ['repository', 'ref', 'token', 'ssh-key', 'ssh-known-hosts', 'ssh-strict', 'ssh-user', 'persist-credentials', 'path', 'clean', 'filter', 'sparse-checkout', 'sparse-checkout-cone-mode', 'fetch-depth', 'fetch-tags', 'show-progress', 'lfs', 'submodules', 'set-safe-directory', 'github-server-url']
|