run-integration-tests #915
Annotations
8 errors and 4 warnings
|
ubuntu-latest - P8.4 - prefer-stable
Process completed with exit code 2.
|
|
ubuntu-latest - P8.2 - prefer-stable
Process completed with exit code 2.
|
|
ubuntu-latest - P8.4 - prefer-stable
Your requirements could not be resolved to an installable set of packages.
Problem 1
- Root composer.json requires pestphp/pest ^2.0|^3.0|^4.0 -> satisfiable by pestphp/pest[v2.0.1, ..., v2.36.1, v3.0.0, ..., v3.8.6, v4.0.0, ..., v4.6.1].
- pestphp/pest v2.0.1 requires phpunit/phpunit ^10.0.16 -> found phpunit/phpunit[10.0.16, ..., 10.5.63] but these were not loaded, because they are affected by security advisories ("PKSA-5jz8-6tcw-pbk4", "PKSA-z3gr-8qht-p93v"). Go to https://packagist.org/security-advisories/ to find advisory details. To ignore the advisories, add them to the audit "ignore" config. To turn the feature off entirely, you can set "block-insecure" to false in your "audit" config.
- pestphp/pest[v2.0.2, ..., v2.2.0] require phpunit/phpunit ^10.0.17 -> found phpunit/phpunit[10.0.17, ..., 10.5.63] but these were not loaded, because they are affected by security advisories ("PKSA-5jz8-6tcw-pbk4", "PKSA-z3gr-8qht-p93v"). Go to https://packagist.org/security-advisories/ to find advisory details. To ignore the advisories, add them to the audit "ignore" config. To turn the feature off entirely, you can set "block-insecure" to false in your "audit" config.
- pestphp/pest[v2.9.1, ..., v2.11.0] require phpunit/phpunit ^10.2.6 -> found phpunit/phpunit[10.2.6, ..., 10.5.63] but these were not loaded, because they are affected by security advisories ("PKSA-5jz8-6tcw-pbk4", "PKSA-z3gr-8qht-p93v"). Go to https://packagist.org/security-advisories/ to find advisory details. To ignore the advisories, add them to the audit "ignore" config. To turn the feature off entirely, you can set "block-insecure" to false in your "audit" config.
- pestphp/pest v2.12.0 requires phpunit/phpunit ^10.2.7 -> found phpunit/phpunit[10.2.7, ..., 10.5.63] but these were not loaded, because they are affected by security advisories ("PKSA-5jz8-6tcw-pbk4", "PKSA-z3gr-8qht-p93v"). Go to https://packagist.org/security-advisories/ to find advisory details. To ignore the advisories, add them to the audit "ignore" config. To turn the feature off entirely, you can set "block-insecure" to false in your "audit" config.
- pestphp/pest[v2.12.1, ..., v2.14.0] require phpunit/phpunit ^10.3.1 -> found phpunit/phpunit[10.3.1, ..., 10.5.63] but these were not loaded, because they are affected by security advisories ("PKSA-5jz8-6tcw-pbk4", "PKSA-z3gr-8qht-p93v"). Go to https://packagist.org/security-advisories/ to find advisory details. To ignore the advisories, add them to the audit "ignore" config. To turn the feature off entirely, you can set "block-insecure" to false in your "audit" config.
- pestphp/pest[v2.14.1, ..., v2.17.0] require phpunit/phpunit ^10.3.2 -> found phpunit/phpunit[10.3.2, ..., 10.5.63] but these were not loaded, because they are affected by security advisories ("PKSA-5jz8-6tcw-pbk4", "PKSA-z3gr-8qht-p93v"). Go to https://packagist.org/security-advisories/ to find advisory details. To ignore the advisories, add them to the audit "ignore" config. To turn the feature off entirely, you can set "block-insecure" to false in your "audit" config.
- pestphp/pest[v2.18.0, ..., v2.18.1] require phpunit/phpunit ^10.3.3 -> found phpunit/phpunit[10.3.3, ..., 10.5.63] but these were not loaded, because they are affected by security advisories ("PKSA-5jz8-6tcw-pbk4", "PKSA-z3gr-8qht-p93v"). Go to https://packagist.org/security-advisories/ to find advisory details. To ignore the advisories, add them to the audit "ignore" config. To turn the feature off entirely, you can set "block-insecure" to false in your "audit" config.
- pestphp/pest[v2.18.2, ..., v2.19.0] require phpunit/phpunit ^10.3.4 -> found phpunit/phpunit[10.3.4, ..., 10.5.63] but these were not loaded, because they are affected by security advisories ("PKSA-5jz8-6tcw-pbk4", "PKSA-z3gr-8qht-p93v"). Go to https://packagist.org/security-advisories/ to find advisory details. To ignore the advisories, add them to the audit "ignore" config. To turn the feature off entirely, you can set "block-insecure" to false in your "audit" config.
- pestphp/pest[v2.19.1, ..
|
|
ubuntu-latest - P8.2 - prefer-stable
Your requirements could not be resolved to an installable set of packages.
Problem 1
- Root composer.json requires pestphp/pest ^2.0|^3.0|^4.0 -> satisfiable by pestphp/pest[v2.0.1, ..., v2.36.1, v3.0.0, ..., v3.8.6, v4.0.0, ..., v4.6.1].
- pestphp/pest v2.0.1 requires phpunit/phpunit ^10.0.16 -> found phpunit/phpunit[10.0.16, ..., 10.5.63] but these were not loaded, because they are affected by security advisories ("PKSA-5jz8-6tcw-pbk4", "PKSA-z3gr-8qht-p93v"). Go to https://packagist.org/security-advisories/ to find advisory details. To ignore the advisories, add them to the audit "ignore" config. To turn the feature off entirely, you can set "block-insecure" to false in your "audit" config.
- pestphp/pest[v2.0.2, ..., v2.2.0] require phpunit/phpunit ^10.0.17 -> found phpunit/phpunit[10.0.17, ..., 10.5.63] but these were not loaded, because they are affected by security advisories ("PKSA-5jz8-6tcw-pbk4", "PKSA-z3gr-8qht-p93v"). Go to https://packagist.org/security-advisories/ to find advisory details. To ignore the advisories, add them to the audit "ignore" config. To turn the feature off entirely, you can set "block-insecure" to false in your "audit" config.
- pestphp/pest[v2.9.1, ..., v2.11.0] require phpunit/phpunit ^10.2.6 -> found phpunit/phpunit[10.2.6, ..., 10.5.63] but these were not loaded, because they are affected by security advisories ("PKSA-5jz8-6tcw-pbk4", "PKSA-z3gr-8qht-p93v"). Go to https://packagist.org/security-advisories/ to find advisory details. To ignore the advisories, add them to the audit "ignore" config. To turn the feature off entirely, you can set "block-insecure" to false in your "audit" config.
- pestphp/pest v2.12.0 requires phpunit/phpunit ^10.2.7 -> found phpunit/phpunit[10.2.7, ..., 10.5.63] but these were not loaded, because they are affected by security advisories ("PKSA-5jz8-6tcw-pbk4", "PKSA-z3gr-8qht-p93v"). Go to https://packagist.org/security-advisories/ to find advisory details. To ignore the advisories, add them to the audit "ignore" config. To turn the feature off entirely, you can set "block-insecure" to false in your "audit" config.
- pestphp/pest[v2.12.1, ..., v2.14.0] require phpunit/phpunit ^10.3.1 -> found phpunit/phpunit[10.3.1, ..., 10.5.63] but these were not loaded, because they are affected by security advisories ("PKSA-5jz8-6tcw-pbk4", "PKSA-z3gr-8qht-p93v"). Go to https://packagist.org/security-advisories/ to find advisory details. To ignore the advisories, add them to the audit "ignore" config. To turn the feature off entirely, you can set "block-insecure" to false in your "audit" config.
- pestphp/pest[v2.14.1, ..., v2.17.0] require phpunit/phpunit ^10.3.2 -> found phpunit/phpunit[10.3.2, ..., 10.5.63] but these were not loaded, because they are affected by security advisories ("PKSA-5jz8-6tcw-pbk4", "PKSA-z3gr-8qht-p93v"). Go to https://packagist.org/security-advisories/ to find advisory details. To ignore the advisories, add them to the audit "ignore" config. To turn the feature off entirely, you can set "block-insecure" to false in your "audit" config.
- pestphp/pest[v2.18.0, ..., v2.18.1] require phpunit/phpunit ^10.3.3 -> found phpunit/phpunit[10.3.3, ..., 10.5.63] but these were not loaded, because they are affected by security advisories ("PKSA-5jz8-6tcw-pbk4", "PKSA-z3gr-8qht-p93v"). Go to https://packagist.org/security-advisories/ to find advisory details. To ignore the advisories, add them to the audit "ignore" config. To turn the feature off entirely, you can set "block-insecure" to false in your "audit" config.
- pestphp/pest[v2.18.2, ..., v2.19.0] require phpunit/phpunit ^10.3.4 -> found phpunit/phpunit[10.3.4, ..., 10.5.63] but these were not loaded, because they are affected by security advisories ("PKSA-5jz8-6tcw-pbk4", "PKSA-z3gr-8qht-p93v"). Go to https://packagist.org/security-advisories/ to find advisory details. To ignore the advisories, add them to the audit "ignore" config. To turn the feature off entirely, you can set "block-insecure" to false in your "audit" config.
- pestphp/pest[v2.19.1, ..
|
|
ubuntu-latest - P8.3 - prefer-stable
Process completed with exit code 2.
|
|
ubuntu-latest - P8.3 - prefer-stable
Your requirements could not be resolved to an installable set of packages.
Problem 1
- Root composer.json requires pestphp/pest ^2.0|^3.0|^4.0 -> satisfiable by pestphp/pest[v2.0.1, ..., v2.36.1, v3.0.0, ..., v3.8.6, v4.0.0, ..., v4.6.1].
- pestphp/pest v2.0.1 requires phpunit/phpunit ^10.0.16 -> found phpunit/phpunit[10.0.16, ..., 10.5.63] but these were not loaded, because they are affected by security advisories ("PKSA-5jz8-6tcw-pbk4", "PKSA-z3gr-8qht-p93v"). Go to https://packagist.org/security-advisories/ to find advisory details. To ignore the advisories, add them to the audit "ignore" config. To turn the feature off entirely, you can set "block-insecure" to false in your "audit" config.
- pestphp/pest[v2.0.2, ..., v2.2.0] require phpunit/phpunit ^10.0.17 -> found phpunit/phpunit[10.0.17, ..., 10.5.63] but these were not loaded, because they are affected by security advisories ("PKSA-5jz8-6tcw-pbk4", "PKSA-z3gr-8qht-p93v"). Go to https://packagist.org/security-advisories/ to find advisory details. To ignore the advisories, add them to the audit "ignore" config. To turn the feature off entirely, you can set "block-insecure" to false in your "audit" config.
- pestphp/pest[v2.9.1, ..., v2.11.0] require phpunit/phpunit ^10.2.6 -> found phpunit/phpunit[10.2.6, ..., 10.5.63] but these were not loaded, because they are affected by security advisories ("PKSA-5jz8-6tcw-pbk4", "PKSA-z3gr-8qht-p93v"). Go to https://packagist.org/security-advisories/ to find advisory details. To ignore the advisories, add them to the audit "ignore" config. To turn the feature off entirely, you can set "block-insecure" to false in your "audit" config.
- pestphp/pest v2.12.0 requires phpunit/phpunit ^10.2.7 -> found phpunit/phpunit[10.2.7, ..., 10.5.63] but these were not loaded, because they are affected by security advisories ("PKSA-5jz8-6tcw-pbk4", "PKSA-z3gr-8qht-p93v"). Go to https://packagist.org/security-advisories/ to find advisory details. To ignore the advisories, add them to the audit "ignore" config. To turn the feature off entirely, you can set "block-insecure" to false in your "audit" config.
- pestphp/pest[v2.12.1, ..., v2.14.0] require phpunit/phpunit ^10.3.1 -> found phpunit/phpunit[10.3.1, ..., 10.5.63] but these were not loaded, because they are affected by security advisories ("PKSA-5jz8-6tcw-pbk4", "PKSA-z3gr-8qht-p93v"). Go to https://packagist.org/security-advisories/ to find advisory details. To ignore the advisories, add them to the audit "ignore" config. To turn the feature off entirely, you can set "block-insecure" to false in your "audit" config.
- pestphp/pest[v2.14.1, ..., v2.17.0] require phpunit/phpunit ^10.3.2 -> found phpunit/phpunit[10.3.2, ..., 10.5.63] but these were not loaded, because they are affected by security advisories ("PKSA-5jz8-6tcw-pbk4", "PKSA-z3gr-8qht-p93v"). Go to https://packagist.org/security-advisories/ to find advisory details. To ignore the advisories, add them to the audit "ignore" config. To turn the feature off entirely, you can set "block-insecure" to false in your "audit" config.
- pestphp/pest[v2.18.0, ..., v2.18.1] require phpunit/phpunit ^10.3.3 -> found phpunit/phpunit[10.3.3, ..., 10.5.63] but these were not loaded, because they are affected by security advisories ("PKSA-5jz8-6tcw-pbk4", "PKSA-z3gr-8qht-p93v"). Go to https://packagist.org/security-advisories/ to find advisory details. To ignore the advisories, add them to the audit "ignore" config. To turn the feature off entirely, you can set "block-insecure" to false in your "audit" config.
- pestphp/pest[v2.18.2, ..., v2.19.0] require phpunit/phpunit ^10.3.4 -> found phpunit/phpunit[10.3.4, ..., 10.5.63] but these were not loaded, because they are affected by security advisories ("PKSA-5jz8-6tcw-pbk4", "PKSA-z3gr-8qht-p93v"). Go to https://packagist.org/security-advisories/ to find advisory details. To ignore the advisories, add them to the audit "ignore" config. To turn the feature off entirely, you can set "block-insecure" to false in your "audit" config.
- pestphp/pest[v2.19.1, ..
|
|
ubuntu-latest - P8.5 - prefer-stable
Process completed with exit code 2.
|
|
ubuntu-latest - P8.5 - prefer-stable
Your requirements could not be resolved to an installable set of packages.
Problem 1
- Root composer.json requires pestphp/pest ^2.0|^3.0|^4.0 -> satisfiable by pestphp/pest[v2.0.1, ..., v2.36.1, v3.0.0, ..., v3.8.6, v4.0.0, ..., v4.6.1].
- pestphp/pest v2.0.1 requires phpunit/phpunit ^10.0.16 -> found phpunit/phpunit[10.0.16, ..., 10.5.63] but these were not loaded, because they are affected by security advisories ("PKSA-5jz8-6tcw-pbk4", "PKSA-z3gr-8qht-p93v"). Go to https://packagist.org/security-advisories/ to find advisory details. To ignore the advisories, add them to the audit "ignore" config. To turn the feature off entirely, you can set "block-insecure" to false in your "audit" config.
- pestphp/pest[v2.0.2, ..., v2.2.0] require phpunit/phpunit ^10.0.17 -> found phpunit/phpunit[10.0.17, ..., 10.5.63] but these were not loaded, because they are affected by security advisories ("PKSA-5jz8-6tcw-pbk4", "PKSA-z3gr-8qht-p93v"). Go to https://packagist.org/security-advisories/ to find advisory details. To ignore the advisories, add them to the audit "ignore" config. To turn the feature off entirely, you can set "block-insecure" to false in your "audit" config.
- pestphp/pest[v2.9.1, ..., v2.11.0] require phpunit/phpunit ^10.2.6 -> found phpunit/phpunit[10.2.6, ..., 10.5.63] but these were not loaded, because they are affected by security advisories ("PKSA-5jz8-6tcw-pbk4", "PKSA-z3gr-8qht-p93v"). Go to https://packagist.org/security-advisories/ to find advisory details. To ignore the advisories, add them to the audit "ignore" config. To turn the feature off entirely, you can set "block-insecure" to false in your "audit" config.
- pestphp/pest v2.12.0 requires phpunit/phpunit ^10.2.7 -> found phpunit/phpunit[10.2.7, ..., 10.5.63] but these were not loaded, because they are affected by security advisories ("PKSA-5jz8-6tcw-pbk4", "PKSA-z3gr-8qht-p93v"). Go to https://packagist.org/security-advisories/ to find advisory details. To ignore the advisories, add them to the audit "ignore" config. To turn the feature off entirely, you can set "block-insecure" to false in your "audit" config.
- pestphp/pest[v2.12.1, ..., v2.14.0] require phpunit/phpunit ^10.3.1 -> found phpunit/phpunit[10.3.1, ..., 10.5.63] but these were not loaded, because they are affected by security advisories ("PKSA-5jz8-6tcw-pbk4", "PKSA-z3gr-8qht-p93v"). Go to https://packagist.org/security-advisories/ to find advisory details. To ignore the advisories, add them to the audit "ignore" config. To turn the feature off entirely, you can set "block-insecure" to false in your "audit" config.
- pestphp/pest[v2.14.1, ..., v2.17.0] require phpunit/phpunit ^10.3.2 -> found phpunit/phpunit[10.3.2, ..., 10.5.63] but these were not loaded, because they are affected by security advisories ("PKSA-5jz8-6tcw-pbk4", "PKSA-z3gr-8qht-p93v"). Go to https://packagist.org/security-advisories/ to find advisory details. To ignore the advisories, add them to the audit "ignore" config. To turn the feature off entirely, you can set "block-insecure" to false in your "audit" config.
- pestphp/pest[v2.18.0, ..., v2.18.1] require phpunit/phpunit ^10.3.3 -> found phpunit/phpunit[10.3.3, ..., 10.5.63] but these were not loaded, because they are affected by security advisories ("PKSA-5jz8-6tcw-pbk4", "PKSA-z3gr-8qht-p93v"). Go to https://packagist.org/security-advisories/ to find advisory details. To ignore the advisories, add them to the audit "ignore" config. To turn the feature off entirely, you can set "block-insecure" to false in your "audit" config.
- pestphp/pest[v2.18.2, ..., v2.19.0] require phpunit/phpunit ^10.3.4 -> found phpunit/phpunit[10.3.4, ..., 10.5.63] but these were not loaded, because they are affected by security advisories ("PKSA-5jz8-6tcw-pbk4", "PKSA-z3gr-8qht-p93v"). Go to https://packagist.org/security-advisories/ to find advisory details. To ignore the advisories, add them to the audit "ignore" config. To turn the feature off entirely, you can set "block-insecure" to false in your "audit" config.
- pestphp/pest[v2.19.1, ..
|
|
ubuntu-latest - P8.4 - prefer-stable
Node.js 20 actions are deprecated. The following actions are running on Node.js 20 and may not work as expected: actions/cache@v4, actions/checkout@v4. Actions will be forced to run with Node.js 24 by default starting June 2nd, 2026. Node.js 20 will be removed from the runner on September 16th, 2026. Please check if updated versions of these actions are available that support Node.js 24. To opt into Node.js 24 now, set the FORCE_JAVASCRIPT_ACTIONS_TO_NODE24=true environment variable on the runner or in your workflow file. Once Node.js 24 becomes the default, you can temporarily opt out by setting ACTIONS_ALLOW_USE_UNSECURE_NODE_VERSION=true. For more information see: https://github.blog/changelog/2025-09-19-deprecation-of-node-20-on-github-actions-runners/
|
|
ubuntu-latest - P8.2 - prefer-stable
Node.js 20 actions are deprecated. The following actions are running on Node.js 20 and may not work as expected: actions/cache@v4, actions/checkout@v4. Actions will be forced to run with Node.js 24 by default starting June 2nd, 2026. Node.js 20 will be removed from the runner on September 16th, 2026. Please check if updated versions of these actions are available that support Node.js 24. To opt into Node.js 24 now, set the FORCE_JAVASCRIPT_ACTIONS_TO_NODE24=true environment variable on the runner or in your workflow file. Once Node.js 24 becomes the default, you can temporarily opt out by setting ACTIONS_ALLOW_USE_UNSECURE_NODE_VERSION=true. For more information see: https://github.blog/changelog/2025-09-19-deprecation-of-node-20-on-github-actions-runners/
|
|
ubuntu-latest - P8.3 - prefer-stable
Node.js 20 actions are deprecated. The following actions are running on Node.js 20 and may not work as expected: actions/cache@v4, actions/checkout@v4. Actions will be forced to run with Node.js 24 by default starting June 2nd, 2026. Node.js 20 will be removed from the runner on September 16th, 2026. Please check if updated versions of these actions are available that support Node.js 24. To opt into Node.js 24 now, set the FORCE_JAVASCRIPT_ACTIONS_TO_NODE24=true environment variable on the runner or in your workflow file. Once Node.js 24 becomes the default, you can temporarily opt out by setting ACTIONS_ALLOW_USE_UNSECURE_NODE_VERSION=true. For more information see: https://github.blog/changelog/2025-09-19-deprecation-of-node-20-on-github-actions-runners/
|
|
ubuntu-latest - P8.5 - prefer-stable
Node.js 20 actions are deprecated. The following actions are running on Node.js 20 and may not work as expected: actions/cache@v4, actions/checkout@v4. Actions will be forced to run with Node.js 24 by default starting June 2nd, 2026. Node.js 20 will be removed from the runner on September 16th, 2026. Please check if updated versions of these actions are available that support Node.js 24. To opt into Node.js 24 now, set the FORCE_JAVASCRIPT_ACTIONS_TO_NODE24=true environment variable on the runner or in your workflow file. Once Node.js 24 becomes the default, you can temporarily opt out by setting ACTIONS_ALLOW_USE_UNSECURE_NODE_VERSION=true. For more information see: https://github.blog/changelog/2025-09-19-deprecation-of-node-20-on-github-actions-runners/
|