Skip to content

nerdctl: update from v2.2.2 to v2.3.1 #11485

nerdctl: update from v2.2.2 to v2.3.1

nerdctl: update from v2.2.2 to v2.3.1 #11485

Re-run triggered May 22, 2026 13:48
Status Failure
Total duration 19m 25s
Artifacts 3

test.yml

on: pull_request
Lints
1m 56s
Lints
Vulncheck
42s
Vulncheck
Windows tests (WSL2)
10m 54s
Windows tests (WSL2)
Windows tests (QEMU)
13m 33s
Windows tests (QEMU)
Integration tests (QEMU, macOS host)
16m 7s
Integration tests (QEMU, macOS host)
Integration tests (BATS)
19m 40s
Integration tests (BATS)
Colima tests (QEMU, Linux host)
4m 55s
Colima tests (QEMU, Linux host)
VMNet tests (QEMU)
15m 4s
VMNet tests (QEMU)
gomodjail (experimental; failures shall not block merging PRs)
12m 14s
gomodjail (experimental; failures shall not block merging PRs)
Cross-compile (NetBSD, DragonFlyBSD)
1m 15s
Cross-compile (NetBSD, DragonFlyBSD)
Smoke tests (QEMU, old Linux host)
5m 37s
Smoke tests (QEMU, old Linux host)
Matrix: Lint Go
Matrix: Integration tests (QEMU, Linux host)
Matrix: Unit tests
Matrix: Upgrade tests (QEMU, macOS host)
Matrix: Integration tests (vz)
Fit to window
Zoom out
Zoom in

Annotations

11 errors and 2 warnings
Vulncheck
portfwdserver.TunnelServer.Start calls tcpproxy.DialProxy.HandleConn, which eventually calls ssh.NewClientConn
Vulncheck
portfwdserver.TunnelServer.Start calls tcpproxy.DialProxy.HandleConn, which eventually calls ssh.mux.SendRequest
Vulncheck
portfwdserver.TunnelServer.Start calls tcpproxy.DialProxy.HandleConn, which eventually calls ssh.NewClientConn
Vulncheck
portfwdserver.TunnelServer.Start calls tcpproxy.DialProxy.HandleConn, which eventually calls ssh.ParsePrivateKeyWithPassphrase
Vulncheck
portfwdserver.TunnelServer.Start calls tcpproxy.DialProxy.HandleConn, which eventually calls ssh.ParsePrivateKey
Vulncheck
portfwdserver.TunnelServer.Start calls tcpproxy.DialProxy.HandleConn, which eventually calls ssh.ParseKnownHosts
Vulncheck
portfwdserver.TunnelServer.Start calls tcpproxy.DialProxy.HandleConn, which eventually calls ssh.NewClientConn
Vulncheck
portfwdserver.TunnelServer.Start calls tcpproxy.DialProxy.HandleConn, which eventually calls ssh.NewClientConn
Vulncheck
store.PrintInstances calls fmt.Fprintf, which calls ssh.channel.Write
Vulncheck
portfwdserver.TunnelServer.Start calls tcpproxy.DialProxy.HandleConn, which eventually calls ssh.NewClientConn
Integration tests (vz) (default.yaml)
Process completed with exit code 124.
Vulncheck
Node.js 20 actions are deprecated. The following actions are running on Node.js 20 and may not work as expected: actions/checkout@v4.1.1, actions/setup-go@v5.0.0. Actions will be forced to run with Node.js 24 by default starting June 2nd, 2026. Node.js 20 will be removed from the runner on September 16th, 2026. Please check if updated versions of these actions are available that support Node.js 24. To opt into Node.js 24 now, set the FORCE_JAVASCRIPT_ACTIONS_TO_NODE24=true environment variable on the runner or in your workflow file. Once Node.js 24 becomes the default, you can temporarily opt out by setting ACTIONS_ALLOW_USE_UNSECURE_NODE_VERSION=true. For more information see: https://github.blog/changelog/2025-09-19-deprecation-of-node-20-on-github-actions-runners/
Vulncheck
Failed to restore: Cache service responded with 400