Fix JaCoCo workflow: handle fork/Dependabot PRs, eliminate set-output deprecation, and pin actions to commit SHA#1499
Conversation
✅ Snyk checks have passed. No issues have been found so far.
💻 Catch issues earlier using the plugins for VS Code, JetBrains IDEs, Visual Studio, and Eclipse. |
…pport Co-authored-by: wajda <795479+wajda@users.noreply.github.com>
Co-authored-by: wajda <795479+wajda@users.noreply.github.com>
Co-authored-by: wajda <795479+wajda@users.noreply.github.com>
|
@copilot address SonarCloud analysis errors. |
Could you please provide more details about the specific SonarCloud analysis errors you're seeing? I've validated the YAML syntax and the workflow appears to be correct. Without access to the actual SonarCloud report, I need to know:
This will help me address the issues more effectively. Warning Firewall rules blocked me from connecting to one or more addresses (expand for details)I tried to connect to the following addresses, but was blocked by firewall rules:
If you need me to access, download, or install something from one of these locations, you can either:
|
|
Use full commit SHA hash for this dependency. Show 36 more lines Show 34 more lines |
|
@copilot see above |
Co-authored-by: wajda <795479+wajda@users.noreply.github.com>
Fixed in commit fb45bfd. Both instances of Warning Firewall rules blocked me from connecting to one or more addresses (expand for details)I tried to connect to the following addresses, but was blocked by firewall rules:
If you need me to access, download, or install something from one of these locations, you can either:
|
|
34bf452
into
dependabot/npm_and_yarn/arangodb-foxx-services/webpack-5.105.0



The JaCoCo workflow was failing on Dependabot PRs with
HttpError: Resource not accessible by integrationand emittingset-outputdeprecation warnings.Changes
Action upgrade:
madrapps/jacoco-report@v1.3→ commit SHA50d3aff4548aa991e6753342d9ba291084e63848(v1.7.2) (eliminates deprecatedset-output)Security hardening: Pinned action to full commit SHA instead of version tag to meet SonarCloud security requirements (rule
githubactions:S7637)Conditional execution: Split coverage reporting based on token permissions:
comment-type: summaryDRY paths config: Extracted JaCoCo XML paths to
JACOCO_PATHSenv varExplicit permissions: Added
contents: readandpull-requests: writeto jobOutput handling: Check
steps.<id>.conclusioninstead of relying on output presence for step success detectionCoverage threshold enforcement (80% for changed files) remains active across all PR contexts.
Original prompt
This pull request was created from Copilot chat.
💡 You can make Copilot smarter by setting up custom instructions, customizing its development environment and configuring Model Context Protocol (MCP) servers. Learn more Copilot coding agent tips in the docs.