Skip to content

Respect original variable type when using extract on optional keys #23301

Respect original variable type when using extract on optional keys

Respect original variable type when using extract on optional keys #23301

Triggered via pull request December 5, 2025 16:16
Status Success
Total duration 12m 53s
Artifacts 2

phar.yml

on: pull_request
integration-tests  /  Check PHAR checksum
8s
integration-tests / Check PHAR checksum
Download base SHA PHAR
0s
Download base SHA PHAR
extension-tests  /  Check PHAR checksum
5s
extension-tests / Check PHAR checksum
other-tests  /  Check PHAR checksum
5s
other-tests / Check PHAR checksum
Commit PHAR
0s
Commit PHAR
Matrix: integration-tests / integration-run-phpstan
integration-tests  /  PMMP Tests
1m 22s
integration-tests / PMMP Tests
Matrix: integration-tests / integration-tests
Checksum PHAR
0s
Checksum PHAR
PHAR Prefix Diff
0s
PHAR Prefix Diff
Matrix: extension-tests / tests-extensions
Matrix: other-tests / Other Tests
integration-tests  /  Integration - Update baselines
0s
integration-tests / Integration - Update baselines
Fit to window
Zoom out
Zoom in

Annotations

1 error
other-tests / Other Tests (8, ubuntu-latest, cd e2e/symfony-event composer install --ignore-platform-reqs ../.....
Your requirements could not be resolved to an installable set of packages. Problem 1 - Root composer.json requires symfony/framework-bundle 4.4.* -> satisfiable by symfony/framework-bundle[v4.4.0, ..., v4.4.51]. - symfony/framework-bundle[v4.4.0, ..., v4.4.51] require symfony/http-foundation ^4.4|^5.0 -> found symfony/http-foundation[v4.4.0, ..., v4.4.49, v5.0.0, ..., v5.4.50] but these were not loaded, because they are affected by security advisories. To ignore the advisories, add ("PKSA-365x-2zjk-pt47", "PKSA-b35n-565h-rs4q") to the audit "ignore" config. To turn the feature off entirely, you can set "block-insecure" to false in your "audit" config. Use the option --with-all-dependencies (-W) to allow upgrades, downgrades and removals for packages currently locked to specific versions.

Artifacts

Produced during runtime
Name Size Digest
phar-file
3.75 MB
sha256:7f113b13ff8f5cca47bcbb8869010573e4530424e99b0a89c85899de82ce9224
phar-file-checksum
3.75 MB
sha256:c10f4d18f000b445e948ec64f9f9c16bea625fc9ba26720acd17fa5b006dabaf