[Staking] Bounded Slashing: Paginated Offence Processing & Slash Application #21314
Triggered via pull request
February 15, 2025 20:56
Status
Cancelled
Total duration
37m 39s
Artifacts
–
tests-linux-stable.yml
on: pull_request
preflight
/
preflight
46s
Matrix: test-linux-stable-no-try-runtime
Matrix: test-linux-stable
test-linux-stable-int
9m 51s
test-linux-stable-runtime-benchmarks
33m 45s
All tests passed
0s
Annotations
9 errors and 2 warnings
test-linux-stable (2/3, parity-large)
Process completed with exit code 1.
|
test-linux-stable (1/3, parity-large)
The run was canceled by @paritytech-workflow-stopper[bot].
|
test-linux-stable (1/3, parity-large)
The operation was canceled.
|
test-linux-stable-runtime-benchmarks
The run was canceled by @paritytech-workflow-stopper[bot].
|
test-linux-stable-runtime-benchmarks
The operation was canceled.
|
test-linux-stable-no-try-runtime (1/2)
The run was canceled by @paritytech-workflow-stopper[bot].
|
test-linux-stable-no-try-runtime (1/2)
The operation was canceled.
|
test-linux-stable (1/3, parity-oldlinux)
The run was canceled by @paritytech-workflow-stopper[bot].
|
test-linux-stable (1/3, parity-oldlinux)
The operation was canceled.
|
test-linux-stable (2/3, parity-large)
Unexpected input(s) 'ref', 'inputs', valid inputs are ['route', 'mediaType']
|
test-linux-stable (2/3, parity-large)
This job failure may be caused by using an out of date self-hosted runner. You are currently using runner version 2.321.0. Please update to the latest version 2.322.0
|