Skip to content

Handle child to parent broker migration #557

Handle child to parent broker migration

Handle child to parent broker migration #557

Triggered via pull request December 24, 2024 08:42
Status Success
Total duration 22m 16s
Artifacts

pir_end_to_end_tests.yml

on: pull_request
Matrix: PIR e2e tests
Notify on failure
0s
Notify on failure
Fit to window
Zoom out
Zoom in

Annotations

6 errors and 10 warnings
MaliciousSiteProtectionIntegrationTests.testPhishingDetected_tabIsMarkedPhishing: DerivedData/Build/Intermediates.noindex/DuckDuckGo.build/CI/Integration Tests App Store.build/Objects-normal/arm64/MaliciousSiteProtectionIntegrationTests.d#L1
/Users/runner/work/macos-browser/macos-browser/IntegrationTests/MaliciousSiteProtection/MaliciousSiteProtectionIntegrationTests.swift:51 - failed - Phishing request loaded
MaliciousSiteProtectionIntegrationTests.testPhishingDetectedThenDDGLoaded_tabIsNotMarkedPhishing: DerivedData/Build/Intermediates.noindex/DuckDuckGo.build/CI/Integration Tests App Store.build/Objects-normal/arm64/MaliciousSiteProtectionIntegrationTests.d#L1
/Users/runner/work/macos-browser/macos-browser/IntegrationTests/MaliciousSiteProtection/MaliciousSiteProtectionIntegrationTests.swift:51 - failed - Phishing request loaded
MaliciousSiteProtectionIntegrationTests.testPhishingDetectedThenNotDetected_tabIsNotMarkedPhishing: DerivedData/Build/Intermediates.noindex/DuckDuckGo.build/CI/Integration Tests App Store.build/Objects-normal/arm64/MaliciousSiteProtectionIntegrationTests.d#L1
/Users/runner/work/macos-browser/macos-browser/IntegrationTests/MaliciousSiteProtection/MaliciousSiteProtectionIntegrationTests.swift:51 - failed - Phishing request loaded
MaliciousSiteProtectionIntegrationTests.testPhishingDetectedViaHTTPRedirectChain_tabIsMarkedPhishing: DerivedData/Build/Intermediates.noindex/DuckDuckGo.build/CI/Integration Tests App Store.build/Objects-normal/arm64/MaliciousSiteProtectionIntegrationTests.d#L1
/Users/runner/work/macos-browser/macos-browser/IntegrationTests/MaliciousSiteProtection/MaliciousSiteProtectionIntegrationTests.swift:158 - XCTAssertEqual failed: ("nil") is not equal to ("Optional(MaliciousSiteProtection.MaliciousSiteError(code: MaliciousSiteProtection.MaliciousSiteError.Code.phishing, failingUrl: http://privacy-test-pages.site/security/badware/phishing.html))")
MaliciousSiteProtectionIntegrationTests.testPhishingDetectedViaJSRedirectChain_tabIsMarkedPhishing: DerivedData/Build/Intermediates.noindex/DuckDuckGo.build/CI/Integration Tests App Store.build/Objects-normal/arm64/MaliciousSiteProtectionIntegrationTests.d#L1
/Users/runner/work/macos-browser/macos-browser/IntegrationTests/MaliciousSiteProtection/MaliciousSiteProtectionIntegrationTests.swift:180 - failed - -[MaliciousSiteProtectionIntegrationTests testPhishingDetectedViaJSRedirectChain_tabIsMarkedPhishing]: Phishing request loaded for http://privacy-test-pages.site/security/badware/phishing.html
PIR e2e tests (macos-15-xlarge): main/DBPE2ETests/DBPEndToEndTests.swift#L360
testWhenProfileIsSaved_ThenEachStepHappensInSequence, Asynchronous wait failed: Exceeded timeout of 600 seconds, with unfulfilled expectations: "Opt out confirmed".
PIR e2e tests (macos-15-xlarge): main/LocalPackages/UDSHelper/Sources/UDSHelper/UDSServer.swift#L25
extension declares a conformance of imported type 'NWConnection' to imported protocols 'Hashable', 'Equatable'; this will not behave correctly if the owners of 'Network' introduce this conformance in the future
PIR e2e tests (macos-15-xlarge): main/LocalPackages/AppKitExtensions/Sources/AppKitExtensions/NSEventExtension.swift#L118
extension declares a conformance of imported type 'Set' to imported protocols 'ExpressibleByStringLiteral', 'ExpressibleByExtendedGraphemeClusterLiteral', 'ExpressibleByUnicodeScalarLiteral'; this will not behave correctly if the owners of 'Swift' introduce this conformance in the future
PIR e2e tests (macos-15-xlarge): main/LocalPackages/NetworkProtectionMac/Sources/NetworkProtectionProxy/FlowManagers/TCPFlowManager.swift#L194
capture of 'flow' with non-sendable type 'NEAppProxyTCPFlow?' in a `@Sendable` closure
PIR e2e tests (macos-15-xlarge): main/LocalPackages/NetworkProtectionMac/Sources/NetworkProtectionProxy/FlowManagers/TCPFlowManager.swift#L20
add '@preconcurrency' to suppress 'Sendable'-related warnings from module 'NetworkExtension'
PIR e2e tests (macos-15-xlarge): main/LocalPackages/NetworkProtectionMac/Sources/NetworkProtectionProxy/FlowManagers/UDPFlowManager.swift#L179
global actor 'UDPFlowActor'-isolated instance method 'hash(into:)' cannot be used to satisfy nonisolated protocol requirement; this is an error in the Swift 6 language mode
PIR e2e tests (macos-15-xlarge): main/LocalPackages/NetworkProtectionMac/Sources/NetworkProtectionProxy/FlowManagers/UDPFlowManager.swift#L173
global actor 'UDPFlowActor'-isolated operator function '==' cannot be used to satisfy nonisolated protocol requirement; this is an error in the Swift 6 language mode
PIR e2e tests (macos-15-xlarge): main/LocalPackages/NetworkProtectionMac/Sources/NetworkProtectionProxy/FlowManagers/UDPFlowManager.swift#L326
global actor 'UDPFlowActor'-isolated instance method 'hash(into:)' cannot be used to satisfy nonisolated protocol requirement; this is an error in the Swift 6 language mode
PIR e2e tests (macos-15-xlarge): main/LocalPackages/NetworkProtectionMac/Sources/NetworkProtectionProxy/FlowManagers/UDPFlowManager.swift#L322
global actor 'UDPFlowActor'-isolated operator function '==' cannot be used to satisfy nonisolated protocol requirement; this is an error in the Swift 6 language mode
PIR e2e tests (macos-15-xlarge): main/LocalPackages/SubscriptionUI/Sources/SubscriptionUI/DebugMenu/DebugPurchaseView.swift#L167
extension declares a conformance of imported type 'String' to imported protocol 'Identifiable'; this will not behave correctly if the owners of 'Swift' introduce this conformance in the future
PIR e2e tests (macos-15-xlarge): main/DuckDuckGo/NetworkProtection/NetworkExtensionTargets/NetworkExtensionTargets/NetworkProtectionTokenStore+SubscriptionTokenKeychainStorage.swift#L25
extension declares a conformance of imported type 'NetworkProtectionKeychainTokenStore' to imported protocol 'SubscriptionTokenStoring'; this will not behave correctly if the owners of 'NetworkProtection' introduce this conformance in the future