Skip to content

fix: was missing tunnel when listing apps on iOS #480

fix: was missing tunnel when listing apps on iOS

fix: was missing tunnel when listing apps on iOS #480

Triggered via pull request January 13, 2026 15:11
Status Success
Total duration 5m 12s
Artifacts 3

build.yml

on: pull_request
server_test
9s
server_test
Matrix: android_emulator_test
Matrix: ios_simulator_test
publish
publish
Fit to window
Zoom out
Zoom in

Annotations

20 errors
security
server.StartServer calls http.Server.ListenAndServe, which eventually calls url.ParseRequestURI
security
wda.WdaClient.DeleteEndpoint calls http.NewRequestWithContext, which calls url.Parse
security
ios.TunnelManager.StopTunnel calls tunnel.TunnelManager.Close, which eventually calls asn1.Unmarshal
security
utils.GetLatestReleaseDownloadURL calls http.Get
security
devices.IOSDevice.getEnhancedDevice calls tunnel.TunnelInfoForDevice, which calls http.Client.Get
security
wda.WdaClient.DeleteEndpoint calls http.Client.Do
security
mjpeg.WdaMjpegClient.StartScreenCapture calls tls.Conn.Read, which eventually calls x509.Certificate.Verify
security
mjpeg.WdaMjpegClient.StartScreenCapture calls tls.Conn.Read, which eventually calls x509.Certificate.VerifyHostname
security
mjpeg.WdaMjpegClient.StartScreenCapture calls tls.Conn.Read, which eventually calls x509.Certificate.Verify
security
mjpeg.WdaMjpegClient.StartScreenCapture calls tls.Conn.Read, which eventually calls x509.Certificate.Verify
lint: devices/simulator.go#L114
G204: Subprocess launched with variable (gosec)
lint: devices/ios/port-forwarding.go#L50
G115: integer overflow conversion int -> uint16 (gosec)
lint: devices/android.go#L821
G204: Subprocess launched with a potential tainted input or cmd arguments (gosec)
lint: devices/android.go#L573
G204: Subprocess launched with a potential tainted input or cmd arguments (gosec)
lint: devices/android.go#L536
G204: Subprocess launched with a potential tainted input or cmd arguments (gosec)
lint: devices/android.go#L452
G204: Subprocess launched with a potential tainted input or cmd arguments (gosec)
lint: devices/android.go#L441
G204: Subprocess launched with a potential tainted input or cmd arguments (gosec)
lint: devices/android.go#L431
G204: Subprocess launched with a potential tainted input or cmd arguments (gosec)
lint: devices/android.go#L414
G204: Subprocess launched with a potential tainted input or cmd arguments (gosec)
lint: devices/android.go#L143
G204: Subprocess launched with a potential tainted input or cmd arguments (gosec)

Artifacts

Produced during runtime
Name Size Digest
linux-build Expired
9.68 MB
sha256:cfe7f570077ef65f0149897190da72cee00d2e7619409adb0e96626ed09cf14a
macos-build Expired
9.93 MB
sha256:00fda58891d58b799ebd984e3eec81579827e403e104635dff029a80fbc1524c
windows-build
5.18 MB
sha256:843a8c149fa9166bdb23ce6340be4df3ab8c63021d7b3cf049e361e41d9abcf9