ci: fix failing code-coverage job#526
Conversation
There was a problem hiding this comment.
❌ Changes requested. Reviewed everything up to 6eb8e97 in 2 minutes and 19 seconds
More details
- Looked at
16lines of code in1files - Skipped
0files when reviewing. - Skipped posting
1drafted comments based on config settings.
1. .github/workflows/build.yml:91
- Draft comment:
Consider using HTTPS for wget; HTTP is insecure and may lead to MITM attacks. Also, prefer installing libssl1.1 via apt (e.g., apt-get install libssl1.1) to properly handle dependencies. - Reason this comment was not posted:
Decided after close inspection that this draft comment was likely wrong and/or not actionable: usefulness confidence = 30% vs. threshold = 50%
This is a GitHub Actions workflow file running in a controlled CI environment. While using HTTPS is generally better practice, this is downloading from Ubuntu's official archive mirror. The package will be verified by dpkg's signature checking. The apt-get suggestion is technically better practice but the current approach works fine for a single package.
The security concern is valid - using HTTP could theoretically allow package tampering. Also, apt would handle dependencies better.
However, this is in a disposable CI environment, the package comes from an official Ubuntu mirror, and dpkg verifies packages. The risk is minimal in this specific context.
While the suggestions are technically correct, the security risk is minimal in this context and the current approach works reliably. The comment is not important enough to keep.
Workflow ID: wflow_hHz3easIjCFYGMpJ
Want Ellipsis to fix these issues? Tag @ellipsis-dev in a comment. You can customize Ellipsis with 👍 / 👎 feedback, review rules, user-specific overrides, quiet mode, and more.
.github/workflows/build.yml
Outdated
| # https://github.com/actions-rs/tarpaulin/pull/22 | ||
| - name: Install OpenSSL 1.1 | ||
| run: | | ||
| wget http://nz2.archive.ubuntu.com/ubuntu/pool/main/o/openssl/libssl1.1_1.1.1f-1ubuntu2_amd64.deb |
There was a problem hiding this comment.
Use HTTPS and verify package integrity. The wget call uses HTTP which might expose you to man-in-the-middle attacks. Consider using an HTTPS URL, adding a checksum/hash verification for the downloaded .deb file, and possibly cleaning up the file afterwards.
| wget http://nz2.archive.ubuntu.com/ubuntu/pool/main/o/openssl/libssl1.1_1.1.1f-1ubuntu2_amd64.deb | |
| wget https://nz2.archive.ubuntu.com/ubuntu/pool/main/o/openssl/libssl1.1_1.1.1f-1ubuntu2_amd64.deb |
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## master #526 +/- ##
==========================================
- Coverage 70.81% 70.18% -0.64%
==========================================
Files 51 51
Lines 2916 2941 +25
==========================================
- Hits 2065 2064 -1
- Misses 851 877 +26 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
|
@ErikBjare ping |
Important
Fixes failing code-coverage job by installing OpenSSL 1.1 in
build-coverage-tarpaulinjob inbuild.yml.build-coverage-tarpaulinjob inbuild.yml.wgetto download anddpkgto installlibssl1.1_1.1.1f-1ubuntu2_amd64.deb.This description was created by
for 6eb8e97. It will automatically update as commits are pushed.