Translations update from Hosted Weblate #129
ci.yml
on: pull_request
Annotations
1 error
test (cockroachdb)
compose up failed {"exitCode":1,"err":"Creating network \"tests_integration_default\" with the default driver\nPulling db (cockroachdb/cockroach:v23.1.2)...\nCreating tests_integration_db_1 ... \r\nCreating tests_integration_db_1 ... done\r\nCreating tests_integration_spoolman_1 ... \r\nCreating tests_integration_spoolman_1 ... done\r\nCreating tests_integration_tester_1 ... \r\nCreating tests_integration_tester_1 ... done\r\nStopping tests_integration_spoolman_1 ... \r\nStopping tests_integration_db_1 ... \r\nStopping tests_integration_spoolman_1 ... done\r\nStopping tests_integration_db_1 ... done\r\n1\n","out":"v23.1.2: Pulling from cockroachdb/cockroach\nDigest: sha256:4af8155069ac08fc48d55fb342e881652d60f8571b011effc868e48c27949220\nStatus: Downloaded newer image for cockroachdb/cockroach:v23.1.2\nAttaching to tests_integration_db_1, tests_integration_spoolman_1, tests_integration_tester_1\n\u001b[36mdb_1 |\u001b[0m ls: cannot access 'cockroach-data': No such file or directory\n\u001b[36mdb_1 |\u001b[0m certificate dir \"certs\" is successfully set up\n\u001b[36mdb_1 |\u001b[0m starting node for the initialization process. This could take a couple seconds...\n\u001b[36mdb_1 |\u001b[0m *\n\u001b[36mdb_1 |\u001b[0m * WARNING: ALL SECURITY CONTROLS HAVE BEEN DISABLED!\n\u001b[36mdb_1 |\u001b[0m * \n\u001b[36mdb_1 |\u001b[0m * This mode is intended for non-production testing only.\n\u001b[36mdb_1 |\u001b[0m * \n\u001b[36mdb_1 |\u001b[0m * In this mode:\n\u001b[36mdb_1 |\u001b[0m * - Your cluster is open to any client that can access any of your IP addresses.\n\u001b[36mdb_1 |\u001b[0m * - Intruders with access to your machine or network can observe client-server traffic.\n\u001b[36mdb_1 |\u001b[0m * - Intruders can log in without password and read or write any data in the cluster.\n\u001b[36mdb_1 |\u001b[0m * - Intruders can consume all your server's resources and cause unavailability.\n\u001b[36mdb_1 |\u001b[0m *\n\u001b[36mdb_1 |\u001b[0m *\n\u001b[36mdb_1 |\u001b[0m * INFO: To start a secure server without mandating TLS for clients,\n\u001b[36mdb_1 |\u001b[0m * consider --accept-sql-without-tls instead. For other options, see:\n\u001b[36mdb_1 |\u001b[0m * \n\u001b[36mdb_1 |\u001b[0m * - https://go.crdb.dev/issue-v/53404/v23.1\n\u001b[36mdb_1 |\u001b[0m * - https://www.cockroachlabs.com/docs/v23.1/secure-a-cluster.html\n\u001b[36mdb_1 |\u001b[0m *\n\u001b[36mdb_1 |\u001b[0m *\n\u001b[36mdb_1 |\u001b[0m * WARNING: Running a server without --sql-addr, with a combined RPC/SQL listener, is deprecated.\n\u001b[36mdb_1 |\u001b[0m * This feature will be removed in the next version of CockroachDB.\n\u001b[36mdb_1 |\u001b[0m *\n\u001b[36mdb_1 |\u001b[0m *\n\u001b[36mdb_1 |\u001b[0m * WARNING: neither --listen-addr nor --advertise-addr was specified.\n\u001b[36mdb_1 |\u001b[0m * The server will advertise \"127.0.0.1\" to other nodes, is this routable?\n\u001b[36mdb_1 |\u001b[0m * \n\u001b[36mdb_1 |\u001b[0m * Consider using:\n\u001b[36mdb_1 |\u001b[0m * - for local-only servers: --listen-addr=localhost:36257 --sql-addr=localhost:26257\n\u001b[36mdb_1 |\u001b[0m * - for multi-node clusters: --listen-addr=:36257 --sql-addr=:26257 --advertise-addr=<host/IP addr>\n\u001b[36mdb_1 |\u001b[0m * \n\u001b[36mdb_1 |\u001b[0m *\n\u001b[36mdb_1 |\u001b[0m init node successfully started\n\u001b[36mdb_1 |\u001b[0m CockroachDB node starting at 2023-09-25 13:28:24.093441519 +0000 UTC m=+2.275594029 (took 1.7s)\n\u001b[36mdb_1 |\u001b[0m build: CCL v23.1.2 @ 2023/05/25 15:51:13 (go1.19.4)\n\u001b[36mdb_1 |\u001b[0m webui: http://127.0.0.1:8080\n\u001b[36mdb_1 |\u001b[0m sql: postgresql://root@127.0.0.1:26257/defaultdb?sslmode=disable\n\u001b[36mdb_1 |\u001b[0m sql (JDBC): jdbc:postgresql://127.0.0.1:2
|
Artifacts
Produced during runtime
Name | Size | |
---|---|---|
spoolman
Expired
|
41 MB |
|
spoolman-tester
Expired
|
25.7 MB |
|