Install XML libs required by lxml on macOS #3081
ci-cd.yml
on: pull_request
Matrix: Test Ubuntu / test
Waiting for pending jobs
Matrix: Test macOS / test
Matrix: Test Windows / test
Test python/requirements.txt
13s
Event File
2s
Matrix: Publish / publish-composite
Matrix: Publish / publish-docker-image
Matrix: Publish / publish-linux
Matrix: Publish / publish-macos
Matrix: Publish / publish-windows
Publish
/
Publish Test Results (Dockerfile)
1m 10s
Publish
/
Publish Test Files
1m 33s
Publish
/
Publish Test File
1m 10s
Configure Deployment
0s
Deploy to GitHub
0s
Annotations
17 errors, 8 warnings, and 4 notices
Test python/requirements.txt
Process completed with exit code 1.
|
Test macOS / Test (python-3.10, macos-14)
[notice] A new release of pip is available: 23.0.1 -> 24.0
[notice] To update, run: python3.10 -m pip install --upgrade pip
|
Publish / Publish Test Results (macOS python venv)
[notice] A new release of pip is available: 23.0.1 -> 24.0
[notice] To update, run: python3.10 -m pip install --upgrade pip
|
Publish / Publish Test Files
RuntimeError: Unsupported file format: test-files/junit-xml/non-junit.xml
|
Publish / Publish Test Files:
test-files/junit-xml/non-junit.xml#L1
Error processing result file: Unsupported file format: test-files/junit-xml/non-junit.xml
|
Publish / Publish Test Files
RuntimeError: Unsupported file format: test-files/xunit/mstest/jenkinsci/testcase4.results.json
|
Publish / Publish Test Files:
test-files/xunit/mstest/jenkinsci/testcase4.results.json#L1
Error processing result file: Unsupported file format: test-files/xunit/mstest/jenkinsci/testcase4.results.json
|
Publish / Publish Test Files
RuntimeError: Unsupported file format: test-files/nunit/nunit3/jenkins/NUnit-issue6353.results.json
|
Publish / Publish Test Files:
test-files/nunit/nunit3/jenkins/NUnit-issue6353.results.json#L1
Error processing result file: Unsupported file format: test-files/nunit/nunit3/jenkins/NUnit-issue6353.results.json
|
Publish / Publish Test Files
RuntimeError: Unsupported file format: test-files/xml/non-xml.xml
|
Publish / Publish Test Files:
test-files/xml/non-xml.xml#L1
Error processing result file: Unsupported file format: test-files/xml/non-xml.xml
|
Publish / Publish Test Files
RuntimeError: Unsupported file format: test-files/junit-xml/pytest/junit.gloo.static.results.json
|
Publish / Publish Test Files:
test-files/junit-xml/pytest/junit.gloo.static.results.json#L1
Error processing result file: Unsupported file format: test-files/junit-xml/pytest/junit.gloo.static.results.json
|
Publish / Publish Test Results (Docker Image amd64)
CVE-2022-40897 - HIGH severity - pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py vulnerability in setuptools
|
Publish / Publish Test Results (macOS python 3.8)
[notice] A new release of pip is available: 21.1.1 -> 24.0
[notice] To update, run: python3.8 -m pip install --upgrade pip
|
Publish / Publish Test Results (Docker Image arm64)
CVE-2022-40897 - HIGH severity - pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py vulnerability in setuptools
|
CI/CD
Error when evaluating 'strategy' for job 'test'. EnricoMi/publish-unit-test-result-action/.github/workflows/test-os.yml@85facf9e1cfe1da931d3a572322e3623da122606 (Line: 22, Col: 13): Error parsing fromJson,EnricoMi/publish-unit-test-result-action/.github/workflows/test-os.yml@85facf9e1cfe1da931d3a572322e3623da122606 (Line: 22, Col: 13): After parsing a value an unexpected character was encountered: u. Path '[0]', line 1, position 3.,EnricoMi/publish-unit-test-result-action/.github/workflows/test-os.yml@85facf9e1cfe1da931d3a572322e3623da122606 (Line: 22, Col: 13): Unexpected value ''
|
Publish / Publish Test Results (Docker Image amd64)
CVE-2024-2511 - LOW severity - openssl: Unbounded memory growth with session handling in TLSv1.3 vulnerability in libcrypto3
|
Publish / Publish Test Results (Docker Image amd64)
CVE-2024-2511 - LOW severity - openssl: Unbounded memory growth with session handling in TLSv1.3 vulnerability in libssl3
|
Publish / Publish Test Results (Docker Image arm64)
CVE-2024-2511 - LOW severity - openssl: Unbounded memory growth with session handling in TLSv1.3 vulnerability in libcrypto3
|
Publish / Publish Test Results (Docker Image arm64)
CVE-2024-2511 - LOW severity - openssl: Unbounded memory growth with session handling in TLSv1.3 vulnerability in libssl3
|
Publish / Publish Test Results (macOS composite)
Running this action via 'uses: EnricoMi/publish-unit-test-result-action/composite@v2 is deprecated! For details, see: https://github.com/EnricoMi/publish-unit-test-result-action/tree/v2#running-as-a-composite-action
|
Publish / Publish Test Results (Dockerfile)
Unexpected input(s) 'log_level', valid inputs are ['entryPoint', 'args', 'github_token', 'github_token_actor', 'github_retries', 'commit', 'check_name', 'comment_title', 'comment_mode', 'fail_on', 'action_fail', 'action_fail_on_inconclusive', 'files', 'junit_files', 'nunit_files', 'xunit_files', 'trx_files', 'time_unit', 'test_file_prefix', 'report_individual_runs', 'report_suite_logs', 'deduplicate_classes_by_file_name', 'large_files', 'ignore_runs', 'check_run', 'job_summary', 'compare_to_earlier_commit', 'pull_request_build', 'event_file', 'event_name', 'test_changes_limit', 'check_run_annotations', 'check_run_annotations_branch', 'seconds_between_github_reads', 'seconds_between_github_writes', 'secondary_rate_limit_wait_seconds', 'json_file', 'json_thousands_separator', 'json_suite_details', 'json_test_case_results', 'search_pull_requests']
|
Publish / Publish Test File
Unexpected input(s) 'log_level', valid inputs are ['entryPoint', 'args', 'github_token', 'github_token_actor', 'github_retries', 'commit', 'check_name', 'comment_title', 'comment_mode', 'fail_on', 'action_fail', 'action_fail_on_inconclusive', 'files', 'junit_files', 'nunit_files', 'xunit_files', 'trx_files', 'time_unit', 'test_file_prefix', 'report_individual_runs', 'report_suite_logs', 'deduplicate_classes_by_file_name', 'large_files', 'ignore_runs', 'check_run', 'job_summary', 'compare_to_earlier_commit', 'pull_request_build', 'event_file', 'event_name', 'test_changes_limit', 'check_run_annotations', 'check_run_annotations_branch', 'seconds_between_github_reads', 'seconds_between_github_writes', 'secondary_rate_limit_wait_seconds', 'json_file', 'json_thousands_separator', 'json_suite_details', 'json_test_case_results', 'search_pull_requests']
|
Publish / Publish Test Files
Unexpected input(s) 'log_level', valid inputs are ['entryPoint', 'args', 'github_token', 'github_token_actor', 'github_retries', 'commit', 'check_name', 'comment_title', 'comment_mode', 'fail_on', 'action_fail', 'action_fail_on_inconclusive', 'files', 'junit_files', 'nunit_files', 'xunit_files', 'trx_files', 'time_unit', 'test_file_prefix', 'report_individual_runs', 'report_suite_logs', 'deduplicate_classes_by_file_name', 'large_files', 'ignore_runs', 'check_run', 'job_summary', 'compare_to_earlier_commit', 'pull_request_build', 'event_file', 'event_name', 'test_changes_limit', 'check_run_annotations', 'check_run_annotations_branch', 'seconds_between_github_reads', 'seconds_between_github_writes', 'secondary_rate_limit_wait_seconds', 'json_file', 'json_thousands_separator', 'json_suite_details', 'json_test_case_results', 'search_pull_requests']
|
Publish / Publish Test Results (Linux composite)
Running this action via 'uses: EnricoMi/publish-unit-test-result-action/composite@v2 is deprecated! For details, see: https://github.com/EnricoMi/publish-unit-test-result-action/tree/v2#running-as-a-composite-action
|
Publish / Publish Test Results (Docker Image amd64)
CVE-2024-3651 - MEDIUM severity - python-idna: potential DoS via resource consumption via specially crafted inputs to idna.encode() vulnerability in idna
|
Publish / Publish Test Results (Windows composite)
Running this action via 'uses: EnricoMi/publish-unit-test-result-action/composite@v2 is deprecated! For details, see: https://github.com/EnricoMi/publish-unit-test-result-action/tree/v2#running-as-a-composite-action
|
Publish / Publish Test Results (Docker Image arm64)
CVE-2024-3651 - MEDIUM severity - python-idna: potential DoS via resource consumption via specially crafted inputs to idna.encode() vulnerability in idna
|
Artifacts
Produced during runtime
Name | Size | |
---|---|---|
Event File
|
2.86 KB |
|
SARIF amd64
|
2.21 KB |
|
SARIF arm64
|
2.21 KB |
|
Test Results (python-3.10, macos-13)
|
17.2 KB |
|
Test Results (python-3.10, macos-14)
|
16.9 KB |
|
Test Results (python-3.10, windows-2022)
|
17.2 KB |
|