Skip to content

Update libwebp and improve updates configuration (#308) #749

Update libwebp and improve updates configuration (#308)

Update libwebp and improve updates configuration (#308) #749

Triggered via push December 21, 2024 12:58
Status Success
Total duration 20m 20s
Artifacts 1

unit-test.yml

on: push
Matrix: Execute unit tests
Perform Qodana analysis
2m 34s
Perform Qodana analysis
Fit to window
Zoom out
Zoom in

Annotations

2 warnings and 4 notices
Execute unit tests (ubuntu-latest)
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
Perform Qodana analysis
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
Execute unit tests (macos-13)
Submitted dependency-graph-reports/unit_tests_ci-tests-macos-13.json: Dependency results for the repo have been successfully updated.
Execute unit tests (ubuntu-latest)
Submitted dependency-graph-reports/unit_tests_ci-tests-ubuntu-latest.json: Dependency results for the repo have been successfully updated.
Execute unit tests (windows-latest)
Submitted dependency-graph-reports\unit_tests_ci-tests-windows-latest.json: Dependency results for the repo have been successfully updated.
Vulnerable declared dependency: build.gradle#L19
Dependency maven:ch.qos.logback:logback-core:1.5.12 is vulnerable , safe version 1.5.13 * [GHSA-pr98-23f8-jwxv](https://osv.dev/vulnerability/GHSA-pr98-23f8-jwxv) 5.9 QOS.CH logback-core Expression Language Injection vulnerability * [GHSA-6v67-2wr5-gvf4](https://osv.dev/vulnerability/GHSA-6v67-2wr5-gvf4) 2.4 QOS.CH logback-core Server-Side Request Forgery vulnerability Results powered by [OSV](https://osv.dev/)

Artifacts

Produced during runtime
Name Size Digest
coverage_report Expired
3.61 KB
sha256:4487d5d0f98992775baa3131508675522c2eb7a8fed9a626ac89081852ecb8be