Skip to content

ESP32: Add OTA function for thread border router device #117230

ESP32: Add OTA function for thread border router device

ESP32: Add OTA function for thread border router device #117230

Triggered via pull request March 20, 2025 02:16
Status Success
Total duration 56m 54s
Artifacts 5

build.yaml

on: pull_request
Build on Linux (gcc_debug)
56m 16s
Build on Linux (gcc_debug)
Build on Linux (fake, gcc_release, clang, simulated)
54m 44s
Build on Linux (fake, gcc_release, clang, simulated)
Build on Linux (python_lib)
23m 26s
Build on Linux (python_lib)
Build on Linux (python lighting-app)
9m 56s
Build on Linux (python lighting-app)
Build on Darwin (clang, simulated)
50m 19s
Build on Darwin (clang, simulated)
Build on Linux (coverage)
23m 58s
Build on Linux (coverage)
Fit to window
Zoom out
Zoom in

Annotations

11 warnings
Build on Linux (python lighting-app)
`pre` execution is not supported for local action from './.github/actions/checkout-submodules-and-bootstrap'
Build on Linux (python lighting-app)
Volume mount /:/runner-root-volume is going to mount '/' into the container which may cause file ownership change in the entire file system and cause Actions Runner to lose permission to access the disk.
Build on Linux (python_lib)
Volume mount /:/runner-root-volume is going to mount '/' into the container which may cause file ownership change in the entire file system and cause Actions Runner to lose permission to access the disk.
Build on Linux (python_lib)
`pre` execution is not supported for local action from './.github/actions/checkout-submodules-and-bootstrap'
Build on Linux (coverage)
`pre` execution is not supported for local action from './.github/actions/checkout-submodules-and-bootstrap'
Build on Darwin (clang, simulated)
`pre` execution is not supported for local action from './.github/actions/checkout-submodules-and-bootstrap'
Build on Linux (fake, gcc_release, clang, simulated)
`pre` execution is not supported for local action from './.github/actions/checkout-submodules-and-bootstrap'
Build on Linux (fake, gcc_release, clang, simulated)
Unexpected input(s) 'files-ignore', valid inputs are ['separator', 'include_all_old_new_renamed_files', 'old_new_separator', 'old_new_files_separator', 'files_from_source_file', 'files_from_source_file_separator', 'files', 'files_separator', 'files_yaml', 'files_yaml_from_source_file', 'files_yaml_from_source_file_separator', 'files_ignore_yaml', 'files_ignore_yaml_from_source_file', 'files_ignore_yaml_from_source_file_separator', 'files_ignore', 'files_ignore_separator', 'files_ignore_from_source_file', 'files_ignore_from_source_file_separator', 'sha', 'base_sha', 'since', 'until', 'path', 'quotepath', 'diff_relative', 'dir_names', 'dir_names_max_depth', 'dir_names_exclude_current_dir', 'dir_names_include_files', 'dir_names_include_files_separator', 'dir_names_deleted_files_include_only_deleted_dirs', 'json', 'escape_json', 'safe_output', 'fetch_depth', 'skip_initial_fetch', 'fetch_additional_submodule_history', 'since_last_remote_commit', 'write_output_files', 'output_dir', 'output_renamed_files_as_deleted_and_added', 'recover_deleted_files', 'recover_deleted_files_to_destination', 'recover_files', 'recover_files_separator', 'recover_files_ignore', 'recover_files_ignore_separator', 'token', 'api_url', 'use_rest_api', 'fail_on_initial_diff_error', 'fail_on_submodule_diff_error', 'negation_patterns_first', 'matrix', 'exclude_submodules', 'fetch_missing_history_max_retries', 'use_posix_path_separator', 'tags_pattern', 'tags_ignore_pattern']
Build on Linux (fake, gcc_release, clang, simulated)
Volume mount /:/runner-root-volume is going to mount '/' into the container which may cause file ownership change in the entire file system and cause Actions Runner to lose permission to access the disk.
Build on Linux (gcc_debug)
`pre` execution is not supported for local action from './.github/actions/checkout-submodules-and-bootstrap'
Build on Linux (gcc_debug)
Volume mount /:/runner-root-volume is going to mount '/' into the container which may cause file ownership change in the entire file system and cause Actions Runner to lose permission to access the disk.

Artifacts

Produced during runtime
Name Size Digest
bootstrap-logs-build_linux
185 KB
sha256:98b6b77e7ff3f22ef2114399b7c8403c878480e4bb8d753b1328ede2d7f2e227
bootstrap-logs-build_linux_gcc_debug
185 KB
sha256:a9a3d90b6049047aeadf45dff5ae6936e6b119485007b67a5a938e225bd761f2
bootstrap-logs-build_linux_python_lib
185 KB
sha256:3421ed05991162f0133ca47def612035ef27a407ad414388816716eca4bdb93d
bootstrap-logs-build_linux_python_lighting_device
185 KB
sha256:92788a82273cd5ce672141f5ef09766f14bd4252dd22c1c6774c934eb6184832
bootstrap-logs-linux-
185 KB
sha256:5aeefdd8f400c275ed27fb535134c4b12794a873cef565740f3c5b93fdbd93e4