Skip to content

Test on ubuntu-24.04 #3107

Test on ubuntu-24.04

Test on ubuntu-24.04 #3107

Re-run triggered May 22, 2024 17:15
Status Failure
Total duration 8m 13s
Artifacts 59

ci-cd.yml

on: pull_request
Matrix: Test Ubuntu / test
Matrix: Test macOS / test
Matrix: Test Windows / test
Test python/requirements.txt
12s
Test python/requirements.txt
Event File
9s
Event File
Matrix: Publish / publish-composite
Matrix: Publish / publish-docker-image
Matrix: Publish / publish-linux
Matrix: Publish / publish-macos
Matrix: Publish / publish-windows
Publish  /  Publish Test Results (Dockerfile)
1m 37s
Publish / Publish Test Results (Dockerfile)
Publish  /  Publish Test Files
1m 33s
Publish / Publish Test Files
Publish  /  Publish Test File
1m 16s
Publish / Publish Test File
Configure Deployment
0s
Configure Deployment
Deploy to GitHub
0s
Deploy to GitHub
Fit to window
Zoom out
Zoom in

Annotations

15 errors, 27 warnings, and 4 notices
Test python/requirements.txt
Process completed with exit code 1.
Test macOS / Test (python-3.10, macos-14)
[notice] A new release of pip is available: 23.0.1 -> 24.0 [notice] To update, run: python3.10 -m pip install --upgrade pip
Test Ubuntu / Test (python-3.8, ubuntu-24.04)
The version '3.8' with architecture 'x64' was not found for Ubuntu 24.04. The list of all available versions can be found here: https://raw.githubusercontent.com/actions/python-versions/main/versions-manifest.json
Publish / Publish Test Files
RuntimeError: Unsupported file format: test-files/trx/mstest/pickles.results.json
Publish / Publish Test Files: test-files/trx/mstest/pickles.results.json#L1
Error processing result file: Unsupported file format: test-files/trx/mstest/pickles.results.json
Publish / Publish Test Files
RuntimeError: Unsupported file format: test-files/nunit/nunit3/jenkins/NUnit-correct2.results.json
Publish / Publish Test Files: test-files/nunit/nunit3/jenkins/NUnit-correct2.results.json#L1
Error processing result file: Unsupported file format: test-files/nunit/nunit3/jenkins/NUnit-correct2.results.json
Publish / Publish Test Files
RuntimeError: Unsupported file format: test-files/junit-xml/non-junit.results.json
Publish / Publish Test Files: test-files/junit-xml/non-junit.results.json#L1
Error processing result file: Unsupported file format: test-files/junit-xml/non-junit.results.json
Publish / Publish Test Files
RuntimeError: Unsupported file format: test-files/nunit/nunit3/jenkins/NUnit-sec1752-file.results.json
Publish / Publish Test Files: test-files/nunit/nunit3/jenkins/NUnit-sec1752-file.results.json#L1
Error processing result file: Unsupported file format: test-files/nunit/nunit3/jenkins/NUnit-sec1752-file.results.json
Publish / Publish Test Files
RuntimeError: Unsupported file format: test-files/trx/xunit/dotnet-trx.results.json
Publish / Publish Test Files: test-files/trx/xunit/dotnet-trx.results.json#L1
Error processing result file: Unsupported file format: test-files/trx/xunit/dotnet-trx.results.json
Publish / Publish Test Results (Docker Image amd64)
CVE-2022-40897 - HIGH severity - pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py vulnerability in setuptools
Publish / Publish Test Results (Docker Image arm64)
CVE-2022-40897 - HIGH severity - pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py vulnerability in setuptools
Publish / Publish Test Results (Docker Image amd64)
CVE-2024-2511 - LOW severity - openssl: Unbounded memory growth with session handling in TLSv1.3 vulnerability in libcrypto3
Publish / Publish Test Results (Docker Image amd64)
CVE-2024-2511 - LOW severity - openssl: Unbounded memory growth with session handling in TLSv1.3 vulnerability in libssl3
Publish / Publish Test Results (Docker Image arm64)
CVE-2024-2511 - LOW severity - openssl: Unbounded memory growth with session handling in TLSv1.3 vulnerability in libcrypto3
Publish / Publish Test Results (Docker Image arm64)
CVE-2024-2511 - LOW severity - openssl: Unbounded memory growth with session handling in TLSv1.3 vulnerability in libssl3
Test Ubuntu / Test (python-3.8, ubuntu-24.04)
No files were found with the provided path: test-results/*.xml unit-test-results.json. No artifacts will be uploaded.
Publish / Publish Test File
Unexpected input(s) 'log_level', valid inputs are ['entryPoint', 'args', 'github_token', 'github_token_actor', 'github_retries', 'commit', 'check_name', 'comment_title', 'comment_mode', 'fail_on', 'action_fail', 'action_fail_on_inconclusive', 'files', 'junit_files', 'nunit_files', 'xunit_files', 'trx_files', 'time_unit', 'test_file_prefix', 'report_individual_runs', 'report_suite_logs', 'deduplicate_classes_by_file_name', 'large_files', 'ignore_runs', 'check_run', 'job_summary', 'compare_to_earlier_commit', 'pull_request_build', 'event_file', 'event_name', 'test_changes_limit', 'check_run_annotations', 'check_run_annotations_branch', 'seconds_between_github_reads', 'seconds_between_github_writes', 'secondary_rate_limit_wait_seconds', 'json_file', 'json_thousands_separator', 'json_suite_details', 'json_test_case_results', 'search_pull_requests']
Publish / Publish Test Files
Unexpected input(s) 'log_level', valid inputs are ['entryPoint', 'args', 'github_token', 'github_token_actor', 'github_retries', 'commit', 'check_name', 'comment_title', 'comment_mode', 'fail_on', 'action_fail', 'action_fail_on_inconclusive', 'files', 'junit_files', 'nunit_files', 'xunit_files', 'trx_files', 'time_unit', 'test_file_prefix', 'report_individual_runs', 'report_suite_logs', 'deduplicate_classes_by_file_name', 'large_files', 'ignore_runs', 'check_run', 'job_summary', 'compare_to_earlier_commit', 'pull_request_build', 'event_file', 'event_name', 'test_changes_limit', 'check_run_annotations', 'check_run_annotations_branch', 'seconds_between_github_reads', 'seconds_between_github_writes', 'secondary_rate_limit_wait_seconds', 'json_file', 'json_thousands_separator', 'json_suite_details', 'json_test_case_results', 'search_pull_requests']
Publish / Publish Test Results (Dockerfile)
Unexpected input(s) 'log_level', valid inputs are ['entryPoint', 'args', 'github_token', 'github_token_actor', 'github_retries', 'commit', 'check_name', 'comment_title', 'comment_mode', 'fail_on', 'action_fail', 'action_fail_on_inconclusive', 'files', 'junit_files', 'nunit_files', 'xunit_files', 'trx_files', 'time_unit', 'test_file_prefix', 'report_individual_runs', 'report_suite_logs', 'deduplicate_classes_by_file_name', 'large_files', 'ignore_runs', 'check_run', 'job_summary', 'compare_to_earlier_commit', 'pull_request_build', 'event_file', 'event_name', 'test_changes_limit', 'check_run_annotations', 'check_run_annotations_branch', 'seconds_between_github_reads', 'seconds_between_github_writes', 'secondary_rate_limit_wait_seconds', 'json_file', 'json_thousands_separator', 'json_suite_details', 'json_test_case_results', 'search_pull_requests']
Publish / Publish Test Results (macOS composite)
Running this action via 'uses: EnricoMi/publish-unit-test-result-action/composite@v2 is deprecated! For details, see: https://github.com/EnricoMi/publish-unit-test-result-action/tree/v2#running-as-a-composite-action
Publish / Publish Test Results (Docker Image amd64)
CVE-2023-42363 - MEDIUM severity - busybox: use-after-free in awk vulnerability in busybox
Publish / Publish Test Results (Docker Image amd64)
CVE-2023-42366 - MEDIUM severity - busybox: A heap-buffer-overflow vulnerability in busybox
Publish / Publish Test Results (Docker Image amd64)
CVE-2023-42363 - MEDIUM severity - busybox: use-after-free in awk vulnerability in busybox-binsh
Publish / Publish Test Results (Docker Image amd64)
CVE-2023-42366 - MEDIUM severity - busybox: A heap-buffer-overflow vulnerability in busybox-binsh
Publish / Publish Test Results (Docker Image amd64)
CVE-2024-4603 - MEDIUM severity - openssl: Excessive time spent checking DSA keys and parameters vulnerability in libcrypto3
Publish / Publish Test Results (Docker Image amd64)
CVE-2024-4603 - MEDIUM severity - openssl: Excessive time spent checking DSA keys and parameters vulnerability in libssl3
Publish / Publish Test Results (Docker Image amd64)
CVE-2023-42363 - MEDIUM severity - busybox: use-after-free in awk vulnerability in ssl_client
Publish / Publish Test Results (Docker Image amd64)
CVE-2023-42366 - MEDIUM severity - busybox: A heap-buffer-overflow vulnerability in ssl_client
Publish / Publish Test Results (Docker Image amd64)
CVE-2024-3651 - MEDIUM severity - python-idna: potential DoS via resource consumption via specially crafted inputs to idna.encode() vulnerability in idna
Publish / Publish Test Results (Docker Image amd64)
CVE-2024-35195 - MEDIUM severity - requests: subsequent requests to the same host ignore cert verification vulnerability in requests
Publish / Publish Test Results (Linux composite)
Running this action via 'uses: EnricoMi/publish-unit-test-result-action/composite@v2 is deprecated! For details, see: https://github.com/EnricoMi/publish-unit-test-result-action/tree/v2#running-as-a-composite-action
Publish / Publish Test Results (Windows composite)
Running this action via 'uses: EnricoMi/publish-unit-test-result-action/composite@v2 is deprecated! For details, see: https://github.com/EnricoMi/publish-unit-test-result-action/tree/v2#running-as-a-composite-action
Publish / Publish Test Results (Docker Image arm64)
CVE-2023-42363 - MEDIUM severity - busybox: use-after-free in awk vulnerability in busybox
Publish / Publish Test Results (Docker Image arm64)
CVE-2023-42366 - MEDIUM severity - busybox: A heap-buffer-overflow vulnerability in busybox
Publish / Publish Test Results (Docker Image arm64)
CVE-2023-42363 - MEDIUM severity - busybox: use-after-free in awk vulnerability in busybox-binsh
Publish / Publish Test Results (Docker Image arm64)
CVE-2023-42366 - MEDIUM severity - busybox: A heap-buffer-overflow vulnerability in busybox-binsh
Publish / Publish Test Results (Docker Image arm64)
CVE-2024-4603 - MEDIUM severity - openssl: Excessive time spent checking DSA keys and parameters vulnerability in libcrypto3
Publish / Publish Test Results (Docker Image arm64)
CVE-2024-4603 - MEDIUM severity - openssl: Excessive time spent checking DSA keys and parameters vulnerability in libssl3
Publish / Publish Test Results (Docker Image arm64)
CVE-2023-42363 - MEDIUM severity - busybox: use-after-free in awk vulnerability in ssl_client
Publish / Publish Test Results (Docker Image arm64)
CVE-2023-42366 - MEDIUM severity - busybox: A heap-buffer-overflow vulnerability in ssl_client
Publish / Publish Test Results (Docker Image arm64)
CVE-2024-3651 - MEDIUM severity - python-idna: potential DoS via resource consumption via specially crafted inputs to idna.encode() vulnerability in idna
Publish / Publish Test Results (Docker Image arm64)
CVE-2024-35195 - MEDIUM severity - requests: subsequent requests to the same host ignore cert verification vulnerability in requests

Artifacts

Produced during runtime
Name Size
SARIF amd64
3.64 KB
SARIF arm64
3.64 KB
Test Results (python-3.10, ubuntu-24.04)
16.6 KB
Test Results (python-3.11, ubuntu-24.04)
16.5 KB
Test Results (python-3.12, ubuntu-24.04)
16.5 KB
Test Results (python-3.9, ubuntu-24.04)
16.6 KB
Test Results (python-installed, ubuntu-24.04)
16.5 KB