Skip to content

Fix test failures by removing native dependencies and mocking strategies

8b62511
Select commit
Loading
Failed to load commit list.
Closed

Add comprehensive Android testing infrastructure and Fastlane F-Droid setup with root bypass strategy #184

Fix test failures by removing native dependencies and mocking strategies
8b62511
Select commit
Loading
Failed to load commit list.
GitHub Advanced Security / CodeQL completed Jul 17, 2025 in 2s

Error when processing the SARIF file

Warning: Code scanning may not have found all the alerts introduced by this pull request, because 1 configuration present on refs/heads/main was not found:

Default setup

  • ❓  /language:java-kotlin

New alerts in code changed by this pull request

Security Alerts:

  • 6 medium

See annotations below for details.

View all branch alerts.

Annotations

Check warning on line 52 in .github/workflows/android.yml

See this annotation in the file changed.

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}

Check warning on line 102 in .github/workflows/android.yml

See this annotation in the file changed.

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}

Check warning on line 67 in .github/workflows/android.yml

See this annotation in the file changed.

Code scanning / CodeQL

Unpinned tag for a non-immutable Action in workflow Medium

Unpinned 3rd party Action 'Android CI' step
Uses Step
uses 'ruby/setup-ruby' with ref 'v1', not a pinned commit hash

Check warning on line 165 in .github/workflows/android.yml

See this annotation in the file changed.

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}

Check warning on line 117 in .github/workflows/android.yml

See this annotation in the file changed.

Code scanning / CodeQL

Unpinned tag for a non-immutable Action in workflow Medium

Unpinned 3rd party Action 'Android CI' step
Uses Step
uses 'ruby/setup-ruby' with ref 'v1', not a pinned commit hash

Check warning on line 149 in .github/workflows/android.yml

See this annotation in the file changed.

Code scanning / CodeQL

Unpinned tag for a non-immutable Action in workflow Medium

Unpinned 3rd party Action 'Android CI' step
Uses Step
uses 'reactivecircus/android-emulator-runner' with ref 'v2', not a pinned commit hash