Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update actions/upload-artifact action to v4.5.0 #1017

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

chore(deps): update actions/upload-artifact action to v4.5.0

6b5ac71
Select commit
Loading
Failed to load commit list.
Sign in for the full log view
Open

chore(deps): update actions/upload-artifact action to v4.5.0 #1017

chore(deps): update actions/upload-artifact action to v4.5.0
6b5ac71
Select commit
Loading
Failed to load commit list.
GitHub Actions / e2e-report failed Dec 18, 2024 in 0s

12 tests run, 11 passed, 0 skipped, 1 failed.

Annotations

Check failure on line 1 in e2e/node_modules/bats/man/bats.1

See this annotation in the file changed.

@github-actions github-actions / e2e-report

bats.Given an existing Restic repository, When creating a Restore (mTLS), Then Restore to S3 (mTLS) - using self-signed issuer

(from function `verify_value' in file ./lib/detik.bash, line 252,
 from function `verify' in file ./lib/detik.bash, line 161,
Raw output
(from function `verify_value' in file ./lib/detik.bash, line 252,
 from function `verify' in file ./lib/detik.bash, line 161,
 from function `given_an_existing_mtls_backup' in file ./lib/k8up.bash, line 343,
 in test file ./test-10-restore-self-signed-tls.bats, line 22)
  `given_an_existing_mtls_backup "${expected_filename}" "${expected_content}"' failed with status 102
release "k8up" uninstalled
Release "k8up" does not exist. Installing it now.
NAME: k8up
LAST DEPLOYED: Wed Dec 18 02:09:27 2024
NAMESPACE: k8up-system
STATUS: deployed
REVISION: 1
TEST SUITE: None
NOTES:
#####################
! Attention !
#####################

This Helm chart does not include CRDs.
Please make sure you have installed or upgraded the necessary CRDs as instructed in the Chart README.

#####################
  A running operator is ready
namespace "k8up-e2e-subject" deleted
removed directory './debug/data/pvc-subject'
namespace/k8up-e2e-subject created
  The namespace 'k8up-e2e-subject' is ready.
namespace/cert-manager created
customresourcedefinition.apiextensions.k8s.io/certificaterequests.cert-manager.io created
customresourcedefinition.apiextensions.k8s.io/certificates.cert-manager.io created
customresourcedefinition.apiextensions.k8s.io/challenges.acme.cert-manager.io created
customresourcedefinition.apiextensions.k8s.io/clusterissuers.cert-manager.io created
customresourcedefinition.apiextensions.k8s.io/issuers.cert-manager.io created
customresourcedefinition.apiextensions.k8s.io/orders.acme.cert-manager.io created
serviceaccount/cert-manager-cainjector created
serviceaccount/cert-manager created
serviceaccount/cert-manager-webhook created
clusterrole.rbac.authorization.k8s.io/cert-manager-cainjector created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-issuers created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificates created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-orders created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-challenges created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim created
clusterrole.rbac.authorization.k8s.io/cert-manager-cluster-view created
clusterrole.rbac.authorization.k8s.io/cert-manager-view created
clusterrole.rbac.authorization.k8s.io/cert-manager-edit created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests created
clusterrole.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-cainjector created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-issuers created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificates created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-orders created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-challenges created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews created
role.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection created
role.rbac.authorization.k8s.io/cert-manager:leaderelection created
role.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving created
rolebinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection created
rolebinding.rbac.authorization.k8s.io/cert-manager:leaderelection created
rolebinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving created
service/cert-manager created
service/cert-manager-webhook created
deployment.apps/cert-manager-cainjector created
deployment.apps/cert-manager created
deployment.apps/cert-manager-webhook created
mutatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook created
validatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook created
The cert-manager API is ready
deployment.apps/cert-manager-webhook condition met
issuer.cert-manager.io/selfsigned-issuer created
certificate.cert-manager.io/minio-root-ca created
issuer.cert-manager.io/minio-intermediate-ca created
certificate.cert-manager.io/minio-server-tls created
certificate.cert-manager.io/minio-server-mtls created
certificate.cert-manager.io/minio-client-mtls created
configmap/nginx-conf created
deployment.apps/nginx created
service/minio-tls created
service/minio-mtls created
certificate.cert-manager.io/minio-server-tls condition met
secret/minio-ca-tls created
certificate.cert-manager.io/minio-client-mtls condition met
secret/minio-client-mtls created
persistentvolumeclaim/subject-pvc created
deployment.apps/subject-deployment created
deployment.apps/subject-deployment condition met
  The subject is ready
secret/backup-credentials created
secret/backup-repo created
backup.k8up.io/k8up-backup-mtls created
Waiting for 'backup/k8up-backup-mtls' in namespace 'k8up-e2e-subject' to become 'completed' ...
backup.k8up.io/k8up-backup-mtls condition met
Valid expression. Verification in progress...
Current value for k8up-backup-mtls is failed...