Skip to content

fix(application): avro-to-json handle JSON-string-encoded schema and Confluent wire format prefix #477

fix(application): avro-to-json handle JSON-string-encoded schema and Confluent wire format prefix

fix(application): avro-to-json handle JSON-string-encoded schema and Confluent wire format prefix #477

Triggered via pull request April 2, 2026 12:39
Status Success
Total duration 15m 52s
Artifacts 10

pr-validation.yml

on: pull_request
Documentation Automation  /  🔍 Validate Frontmatter
29s
Documentation Automation / 🔍 Validate Frontmatter
Dependency Scan
7s
Dependency Scan
Shell Lint  /  Shell Lint
20s
Shell Lint / Shell Lint
Terraform Lint  /  Terraform Lint
18s
Terraform Lint / Terraform Lint
Bicep Lint  /  Bicep Lint
9m 22s
Bicep Lint / Bicep Lint
Documentation Lint  /  Docs Lint
33s
Documentation Lint / Docs Lint
Code Quality Lint  /  Code Quality Lint
20s
Code Quality Lint / Code Quality Lint
PowerShell Lint  /  PowerShell Lint
40s
PowerShell Lint / PowerShell Lint
Security Scan  /  Security Scan
1m 33s
Security Scan / Security Scan
YAML Lint  /  YAML Lint
10s
YAML Lint / YAML Lint
Terraform Documentation Check  /  Terraform Documentation Compliance Check
25s
Terraform Documentation Check / Terraform Documentation Compliance Check
Bicep Documentation Check  /  Bicep Documentation Compliance Check
26s
Bicep Documentation Check / Bicep Documentation Compliance Check
AIO Version Check  /  Check AIO Component Versions
30s
AIO Version Check / Check AIO Component Versions
Rust Clippy Lint Check  /  Rust Clippy Lint Check
1m 27s
Rust Clippy Lint Check / Rust Clippy Lint Check
PowerShell Provider Tests  /  PowerShell Resource Provider Tests
13s
PowerShell Provider Tests / PowerShell Resource Provider Tests
Pester Tests
8s
Pester Tests
Matrix: CodeQL Analysis
Documentation Automation  /  🔗 Validate Documentation Links
1m 20s
Documentation Automation / 🔗 Validate Documentation Links
Detect Matrix Changes  /  detect-changes
10s
Detect Matrix Changes / detect-changes
Detect Matrix Changes  /  map-outputs
2s
Detect Matrix Changes / map-outputs
Application Matrix Builds  /  parse-configuration
Application Matrix Builds / parse-configuration
Terraform Variable Compliance  /  Check Terraform Variable Consistency
15s
Terraform Variable Compliance / Check Terraform Variable Consistency
Matrix: Terraform Module Tests
Waiting for pending jobs
Application Matrix Builds  /  prepare-builds
Application Matrix Builds / prepare-builds
Matrix: Application Matrix Builds / build-applications
Waiting for pending jobs
Application Matrix Builds  /  summarize-builds
Application Matrix Builds / summarize-builds
Fit to window
Zoom out
Zoom in

Annotations

1 error and 27 warnings
Documentation Automation / 🔗 Validate Documentation Links
Process completed with exit code 123.
Dependency Scan
Node.js 20 actions are deprecated. The following actions are running on Node.js 20 and may not work as expected: actions/dependency-review-action@2031cfc080254a8a887f58cffee85186f0e49e48. Actions will be forced to run with Node.js 24 by default starting June 2nd, 2026. Node.js 20 will be removed from the runner on September 16th, 2026. Please check if updated versions of these actions are available that support Node.js 24. To opt into Node.js 24 now, set the FORCE_JAVASCRIPT_ACTIONS_TO_NODE24=true environment variable on the runner or in your workflow file. Once Node.js 24 becomes the default, you can temporarily opt out by setting ACTIONS_ALLOW_USE_UNSECURE_NODE_VERSION=true. For more information see: https://github.blog/changelog/2025-09-19-deprecation-of-node-20-on-github-actions-runners/
Pester Tests
No files were found with the provided path: test-results/. No artifacts will be uploaded.
Code Quality Lint / Code Quality Lint
Code quality lint violations found (soft-fail enabled)
AIO Version Check / Check AIO Component Versions: ./src/100-edge/110-iot-ops/bicep/types.bicep#L0
AIO component version/train mismatch for azure-iot-operations in bicep file: ./src/100-edge/110-iot-ops/bicep/types.bicep
AIO Version Check / Check AIO Component Versions: ./src/100-edge/110-iot-ops/bicep/types.bicep#L0
AIO component version/train mismatch for secret_sync_controller in bicep file: ./src/100-edge/110-iot-ops/bicep/types.bicep
PowerShell Lint / PowerShell Lint
No files were found with the provided path: lint-results/. No artifacts will be uploaded.
CodeQL Analysis (python)
Starting April 2026, the CodeQL Action will skip computing file coverage information on pull requests to improve analysis performance. File coverage information will still be computed on non-PR analyses. To opt out of this change, set the `CODEQL_ACTION_FILE_COVERAGE_ON_PRS` environment variable to `true`. Alternatively, create a custom repository property with the name `github-codeql-file-coverage-on-prs` and the type "True/false", then set this property to `true` in the repository's settings.
CodeQL Analysis (python)
2 issues were detected with this workflow: CodeQL language 'javascript' is referenced by more than one entry in the 'language' matrix parameter for job 'codeql-analysis'. This may result in duplicate alerts. Please edit the 'language' matrix parameter to keep only one of the following: 'javascript', 'typescript'. Please specify an on.push hook to analyze and see code scanning alerts from the default branch on the Security tab.
CodeQL Analysis (csharp)
Starting April 2026, the CodeQL Action will skip computing file coverage information on pull requests to improve analysis performance. File coverage information will still be computed on non-PR analyses. To opt out of this change, set the `CODEQL_ACTION_FILE_COVERAGE_ON_PRS` environment variable to `true`. Alternatively, create a custom repository property with the name `github-codeql-file-coverage-on-prs` and the type "True/false", then set this property to `true` in the repository's settings.
CodeQL Analysis (csharp)
2 issues were detected with this workflow: CodeQL language 'javascript' is referenced by more than one entry in the 'language' matrix parameter for job 'codeql-analysis'. This may result in duplicate alerts. Please edit the 'language' matrix parameter to keep only one of the following: 'javascript', 'typescript'. Please specify an on.push hook to analyze and see code scanning alerts from the default branch on the Security tab.
CodeQL Analysis (javascript)
Starting April 2026, the CodeQL Action will skip computing file coverage information on pull requests to improve analysis performance. File coverage information will still be computed on non-PR analyses. To opt out of this change, set the `CODEQL_ACTION_FILE_COVERAGE_ON_PRS` environment variable to `true`. Alternatively, create a custom repository property with the name `github-codeql-file-coverage-on-prs` and the type "True/false", then set this property to `true` in the repository's settings.
CodeQL Analysis (javascript)
2 issues were detected with this workflow: CodeQL language 'javascript' is referenced by more than one entry in the 'language' matrix parameter for job 'codeql-analysis'. This may result in duplicate alerts. Please edit the 'language' matrix parameter to keep only one of the following: 'javascript', 'typescript'. Please specify an on.push hook to analyze and see code scanning alerts from the default branch on the Security tab.
CodeQL Analysis (typescript)
Starting April 2026, the CodeQL Action will skip computing file coverage information on pull requests to improve analysis performance. File coverage information will still be computed on non-PR analyses. To opt out of this change, set the `CODEQL_ACTION_FILE_COVERAGE_ON_PRS` environment variable to `true`. Alternatively, create a custom repository property with the name `github-codeql-file-coverage-on-prs` and the type "True/false", then set this property to `true` in the repository's settings.
CodeQL Analysis (typescript)
2 issues were detected with this workflow: CodeQL language 'javascript' is referenced by more than one entry in the 'language' matrix parameter for job 'codeql-analysis'. This may result in duplicate alerts. Please edit the 'language' matrix parameter to keep only one of the following: 'javascript', 'typescript'. Please specify an on.push hook to analyze and see code scanning alerts from the default branch on the Security tab.
Terraform Variable Compliance / Check Terraform Variable Consistency
No files were found with the provided path: **/terraform-docs-output*.json **/variable-compliance-results*.json. No artifacts will be uploaded.
Terraform Variable Compliance / Check Terraform Variable Consistency
"/home/runner/work/edge-ai/edge-ai/blueprints/full-multi-node-cluster/terraform",
Terraform Variable Compliance / Check Terraform Variable Consistency
"/home/runner/work/edge-ai/edge-ai/blueprints/full-single-node-cluster/terraform",
Terraform Variable Compliance / Check Terraform Variable Consistency
"Whether to enable private cluster for AKS"
Terraform Variable Compliance / Check Terraform Variable Consistency
"Whether to enable private cluster mode for AKS",
Terraform Variable Compliance / Check Terraform Variable Consistency
"variable": "aks_should_enable_private_cluster",
CodeQL Analysis (rust)
Starting April 2026, the CodeQL Action will skip computing file coverage information on pull requests to improve analysis performance. File coverage information will still be computed on non-PR analyses. To opt out of this change, set the `CODEQL_ACTION_FILE_COVERAGE_ON_PRS` environment variable to `true`. Alternatively, create a custom repository property with the name `github-codeql-file-coverage-on-prs` and the type "True/false", then set this property to `true` in the repository's settings.
CodeQL Analysis (rust)
2 issues were detected with this workflow: CodeQL language 'javascript' is referenced by more than one entry in the 'language' matrix parameter for job 'codeql-analysis'. This may result in duplicate alerts. Please edit the 'language' matrix parameter to keep only one of the following: 'javascript', 'typescript'. Please specify an on.push hook to analyze and see code scanning alerts from the default branch on the Security tab.

Artifacts

Produced during runtime
Name Size Digest
bicep-lint-results-23900797244
217 Bytes
sha256:9f4f2eefe2d6253ca10b48d08305939a5827dbc595085172151466f8ad8c5d19
code-quality-lint-results
7.8 KB
sha256:f16d85134c4e27fc06db829a55e88c58584d329acb01e43a21d6c2b313b4152b
docs-lint-results-23900797244
537 Bytes
sha256:702d08c557449cd15064679e20eed7196806cd9a37bf578592716e4f3c2c81cd
docs-validation-results-23900797244 Expired
715 Bytes
sha256:5fbccad971a38703cf85ff9076111c559fd498feb2a7210c9a5a2c4d7c9c1381
documentation-health-report
639 Bytes
sha256:0b3b292afb978f0ad0157c2ba7947dd6dadcef8e1b4bdf1e05d14a78b56ad8bd
rp-pester-test-results
1.33 KB
sha256:be1574e4d1fcb0c4b480c66840274ba88f848b75c65fd7106e1c4e860cab2f5f
security-scan-results
7.3 KB
sha256:bb1230917d087fc4581ecd889cf1ad7fa01c7482bee926115f1e7a032dac838d
shell-lint-results
3.53 KB
sha256:da504716798780af34a1b02524603bd4c97b8d05d5b3e52e183ca84f101715ef
terraform-lint-results
1.95 KB
sha256:ca2a2ad2ffa604fce76a1d7a3e826e5350a9484f941170828b081a0ad9dff771
yaml-lint-results
960 Bytes
sha256:14d92afb833f144e4e74c65809804dd274ccedea8b3c69123da3194688fcf852