Skip to content

[V3] Add support for Alpine 3.23 #6483

[V3] Add support for Alpine 3.23

[V3] Add support for Alpine 3.23 #6483

Triggered via pull request December 11, 2025 11:07
Status Failure
Total duration 12m 39s
Artifacts 3

ci.yml

on: pull_request
Build Unsigned Snapshot
3m 30s
Build Unsigned Snapshot
Cache Dependencies
0s
Cache Dependencies
Lint
2m 22s
Lint
Vulnerability Scan  /  Vulnerability Check
1m 12s
Vulnerability Scan / Vulnerability Check
Unit Tests
2m 57s
Unit Tests
Unit tests with race condition detection
3m 36s
Unit tests with race condition detection
Matrix: Integration Tests
Matrix: Integration Tests - Official OSS Images
Matrix: Integration Tests - Official Plus Images
Matrix: Metrics Integration Tests - Official OSS Images
Matrix: Metrics Integration Tests - Official Plus Images
Matrix: Upgrade Tests
Fit to window
Zoom out
Zoom in

Annotations

7 errors and 6 warnings
Integration Tests - Official Plus Images (debian, bookworm, r35, debian, /nginx-plus/agent)
The strategy configuration was canceled because "official-plus-image-integration-tests.debian_bookworm_r34_debia" failed
Integration Tests - Official Plus Images (alpine, 3.22, r35, alpine, /nginx-plus/agent)
The strategy configuration was canceled because "official-plus-image-integration-tests.debian_bookworm_r34_debia" failed
Integration Tests - Official Plus Images (alpine, 3.21, r34, alpine, /nginx-plus/agent)
The strategy configuration was canceled because "official-plus-image-integration-tests.debian_bookworm_r34_debia" failed
Vulnerability Scan / Vulnerability Check
Failed to save: <h2>Our services aren't available right now</h2><p>We're working to restore all services as soon as possible. Please check back soon.</p>0R6Y6aQAAAACrEx1WnOZtRKWgskpVyrvXUEFPRURHRTA1MTQARWRnZQ==
Vulnerability Scan / Vulnerability Check
Failed to restore: Cache service responded with 400
JSON arguments recommended for ENTRYPOINT/CMD to prevent unintended behavior related to OS signals: test/docker/load/Dockerfile#L76
JSONArgsRecommended: JSON arguments recommended for CMD to prevent unintended behavior related to OS signals More info: https://docs.docker.com/go/dockerfile/rule/json-args-recommended/
JSON arguments recommended for ENTRYPOINT/CMD to prevent unintended behavior related to OS signals: test/docker/load/Dockerfile#L54
JSONArgsRecommended: JSON arguments recommended for CMD to prevent unintended behavior related to OS signals More info: https://docs.docker.com/go/dockerfile/rule/json-args-recommended/
The 'as' keyword should match the case of the 'from' keyword: test/docker/load/Dockerfile#L78
FromAsCasing: 'as' and 'FROM' keywords' casing do not match More info: https://docs.docker.com/go/dockerfile/rule/from-as-casing/
The 'as' keyword should match the case of the 'from' keyword: test/docker/load/Dockerfile#L56
FromAsCasing: 'as' and 'FROM' keywords' casing do not match More info: https://docs.docker.com/go/dockerfile/rule/from-as-casing/

Artifacts

Produced during runtime
Name Size Digest
load-test-results
385 Bytes
sha256:750ec52519c8056a1eaf9654a64a2de86350356f98730c26fb9addad7020b0b7
nginx-agent-unsigned-snapshots Expired
72.8 MB
sha256:e5f76a4383e8322ab9bf1f80d5f500962716c7f735077719e18955c79247c912
nginx~agent~1RC8S1.dockerbuild
300 KB
sha256:7e0408271249c3a10c222047e2c4e48dcc6489c3d598d32dfe90963dcbfe23d3