Skip to content

Addressing comment on PR #22 #11

Addressing comment on PR #22

Addressing comment on PR #22 #11

Triggered via dynamic January 25, 2026 03:16
Status Success
Total duration 13m 26s
Artifacts

copilot

on: dynamic
Fit to window
Zoom out
Zoom in

Annotations

1 error
copilot
Process completed with exit code 101.\n2026-01-25T02:55:34.5995347Z Post job cleanup.\n2026-01-25T02:55:35.7380727Z [command]/opt/hostedtoolcache/CodeQL/2.23.9/x64/codeql/codeql database export-diagnostics /home/runner/work/_temp/codeql_databases --db-cluster --format=sarif-latest --output=../codeql-failed-run.sarif --sarif-include-diagnostics -vvv\n2026-01-25T02:55:36.2102565Z Writing logs to /home/runner/work/_temp/codeql_databases/log/database-export-diagnostics-20260125.025536.207.log.\n2026-01-25T02:55:36.4584327Z Interpreting diagnostic messages...\n2026-01-25T02:55:36.4600602Z Looking for diagnostics in /home/runner/work/_temp/codeql_databases/rust/diagnostic...\n2026-01-25T02:55:36.4607187Z Looking for diagnostics in /home/runner/work/_temp/codeql_databases/rust/diagnostic/codeql-action...\n2026-01-25T02:55:36.4609054Z Found diagnostics file /home/runner/work/_temp/codeql_databases/rust/diagnostic/codeql-action/codeql-action-2026-01-25T025403.908Z.json.\n2026-01-25T02:55:36.4922832Z Found diagnostics file /home/runner/work/_temp/codeql_databases/rust/diagnostic/codeql-action/codeql-action-2026-01-25T025403.909Z.json.\n2026-01-25T02:55:36.4990287Z Found diagnostics file /home/runner/work/_temp/codeql_databases/rust/diagnostic/cli-diagnostics-add-20260125T025410.921Z.json.\n2026-01-25T02:55:36.5046756Z Won't look for diagnostics in /home/runner/work/_temp/codeql_databases/diagnostic since this directory does not exist.\n2026-01-25T02:55:36.5054595Z Found 3 raw diagnostic messages.\n2026-01-25T02:55:36.5205183Z Processed diagnostic messages (removed 0 due to limits, created 0 summary diagnostics for status page).\n2026-01-25T02:55:36.5223517Z Interpreted diagnostic messages (62ms).\n2026-01-25T02:55:36.6509540Z Uploading failed SARIF file ../codeql-failed-run.sarif\n2026-01-25T02:55:36.6512406Z Post-processing sarif files: [\"../codeql-failed-run.sarif\"]\n2026-01-25T02:55:36.6523008Z Adding fingerprints to SARIF file. See https://docs.github.com/en/enterprise-cloud@latest/code-security/code-scanning/integrating-with-code-scanning/sarif-support-for-code-scanning#providing-data-to-track-code-scanning-alerts-across-runs for more information.\n2026-01-25T02:55:36.6525272Z ##[group]Uploading code scanning results\n2026-01-25T02:55:36.6695207Z Uploading results\n2026-01-25T02:55:37.2265420Z Successfully uploaded results\n2026-01-25T02:55:37.2266144Z ##[endgroup]\n2026-01-25T02:55:37.2268659Z ##[group]Waiting for processing to finish\n2026-01-25T02:55:37.3511081Z Analysis upload status is pending.\n2026-01-25T02:55:42.4879403Z Analysis upload status is failed.\n2026-01-25T02:55:42.4880563Z Successfully uploaded a SARIF file for the unsuccessful execution. Received expected \"unsuccessful execution\" processing error, and no other errors.\n2026-01-25T02:55:42.4882038Z ##[endgroup]\n2026-01-25T02:55:42.4931230Z CodeQL job status was configuration error.\n2026-01-25T02:55:42.4976398Z Sending status report for init-post step.\n2026-01-25T02:55:42.6391221Z Status report sent for init-post step.\n2026-01-25T02:55:42.6557602Z Post job cleanup.\n2026-01-25T02:55:42.7537361Z [command]/usr/bin/git version\n2026-01-25T02:55:42.7580850Z git version 2.52.0\n2026-01-25T02:55:42.7623965Z Temporarily overriding HOME='/home/runner/work/_temp/f428a168-f11b-4e5f-a3ed-e816b582cb92' before making global git config changes\n2026-01-25T02:55:42.7625265Z Adding repository directory to the temporary git global config as a safe directory\n2026-01-25T02:55:42.7630573Z [command]/usr/bin/git config --global --add safe.directory /home/runner/work/ProRT-IP/ProRT-IP\n2026-01-25T02:55:42.7663935Z [command]/usr/bin/git config --local --name-only --get-regexp core\\.sshCommand\n2026-01-25T02:55:42.7696081Z [command]/usr/bin/git submodule foreach --recursive sh -c \"git config --local --name-only --get-regexp 'core\\.sshCommand' && git config --local --unset-all 'core.sshCommand' || :\"\n2026-01-25T02:55:42.7924877Z [command]/usr/bin/git config --local --name-only --get-regexp http\\.https\\:\\/\\/github\\.com\\/\\.extraheader\n2026-01-25T02:55:42.7945557Z