Skip to content

templates: update #11486

templates: update

templates: update #11486

Triggered via pull request May 22, 2026 13:53
Status Failure
Total duration 30m 59s
Artifacts 2

test.yml

on: pull_request
Lints
1m 59s
Lints
Vulncheck
49s
Vulncheck
Windows tests (WSL2)
10m 41s
Windows tests (WSL2)
Windows tests (QEMU)
17m 7s
Windows tests (QEMU)
Integration tests (QEMU, macOS host)
16m 46s
Integration tests (QEMU, macOS host)
Integration tests (BATS)
20m 54s
Integration tests (BATS)
Colima tests (QEMU, Linux host)
4m 47s
Colima tests (QEMU, Linux host)
VMNet tests (QEMU)
15m 3s
VMNet tests (QEMU)
gomodjail (experimental; failures shall not block merging PRs)
12m 53s
gomodjail (experimental; failures shall not block merging PRs)
Cross-compile (NetBSD, DragonFlyBSD)
1m 45s
Cross-compile (NetBSD, DragonFlyBSD)
Smoke tests (QEMU, old Linux host)
5m 48s
Smoke tests (QEMU, old Linux host)
Matrix: Lint Go
Matrix: Integration tests (QEMU, Linux host)
Matrix: Unit tests
Matrix: Upgrade tests (QEMU, macOS host)
Matrix: Integration tests (vz)
Fit to window
Zoom out
Zoom in

Annotations

10 errors, 5 warnings, and 4 notices
Vulncheck
portfwdserver.TunnelServer.Start calls tcpproxy.DialProxy.HandleConn, which eventually calls ssh.NewClientConn
Vulncheck
portfwdserver.TunnelServer.Start calls tcpproxy.DialProxy.HandleConn, which eventually calls ssh.mux.SendRequest
Vulncheck
portfwdserver.TunnelServer.Start calls tcpproxy.DialProxy.HandleConn, which eventually calls ssh.NewClientConn
Vulncheck
portfwdserver.TunnelServer.Start calls tcpproxy.DialProxy.HandleConn, which eventually calls ssh.ParsePrivateKeyWithPassphrase
Vulncheck
portfwdserver.TunnelServer.Start calls tcpproxy.DialProxy.HandleConn, which eventually calls ssh.ParsePrivateKey
Vulncheck
portfwdserver.TunnelServer.Start calls tcpproxy.DialProxy.HandleConn, which eventually calls ssh.ParseKnownHosts
Vulncheck
portfwdserver.TunnelServer.Start calls tcpproxy.DialProxy.HandleConn, which eventually calls ssh.NewClientConn
Vulncheck
portfwdserver.TunnelServer.Start calls tcpproxy.DialProxy.HandleConn, which eventually calls ssh.NewClientConn
Vulncheck
store.PrintInstances calls fmt.Fprintf, which calls ssh.channel.Write
Vulncheck
portfwdserver.TunnelServer.Start calls tcpproxy.DialProxy.HandleConn, which eventually calls ssh.NewClientConn
Vulncheck
Node.js 20 actions are deprecated. The following actions are running on Node.js 20 and may not work as expected: actions/checkout@v4.1.1, actions/setup-go@v5.0.0. Actions will be forced to run with Node.js 24 by default starting June 2nd, 2026. Node.js 20 will be removed from the runner on September 16th, 2026. Please check if updated versions of these actions are available that support Node.js 24. To opt into Node.js 24 now, set the FORCE_JAVASCRIPT_ACTIONS_TO_NODE24=true environment variable on the runner or in your workflow file. Once Node.js 24 becomes the default, you can temporarily opt out by setting ACTIONS_ALLOW_USE_UNSECURE_NODE_VERSION=true. For more information see: https://github.blog/changelog/2025-09-19-deprecation-of-node-20-on-github-actions-runners/
Vulncheck
Failed to restore: Cache service responded with 400
Lints
Node.js 20 actions are deprecated. The following actions are running on Node.js 20 and may not work as expected: ls-lint/action@02e380fe8733d499cbfc9e22276de5085508a5bd. Actions will be forced to run with Node.js 24 by default starting June 2nd, 2026. Node.js 20 will be removed from the runner on September 16th, 2026. Please check if updated versions of these actions are available that support Node.js 24. To opt into Node.js 24 now, set the FORCE_JAVASCRIPT_ACTIONS_TO_NODE24=true environment variable on the runner or in your workflow file. Once Node.js 24 becomes the default, you can temporarily opt out by setting ACTIONS_ALLOW_USE_UNSECURE_NODE_VERSION=true. For more information see: https://github.blog/changelog/2025-09-19-deprecation-of-node-20-on-github-actions-runners/
Integration tests (QEMU, Linux host) (docker.yaml)
Attempt 2 failed. Reason: Child_process exited with error code 1
Integration tests (QEMU, Linux host) (docker.yaml)
Attempt 1 failed. Reason: Child_process exited with error code 1
Lint Go (windows-2025)
NOTICE: windows-2025 requests are being redirected to windows-2025-vs2026 by June 15, 2026
Windows tests (WSL2)
NOTICE: windows-2025 requests are being redirected to windows-2025-vs2026 by June 15, 2026
Windows tests (QEMU)
NOTICE: windows-2025 requests are being redirected to windows-2025-vs2026 by June 15, 2026

Artifacts

Produced during runtime
Name Size Digest
failure-logs-qemu-linux-docker_yaml
112 KB
sha256:d013ed642334af666f7d6bc07f830ef7b4ce091f705de5511a37842c984e0aee
failure-logs-upgrade
39.5 KB
sha256:6c2ba52d05f2e7a3ec34a582e3ad3ba575a02877c4a9e0fe38276750f5477a71