chore(ci): deploy frontend #363
pr-open.yml
on: pull_request
Annotations
12 warnings
Sensitive data should not be used in the ARG or ENV commands:
backend/Dockerfile#L19
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "MINIO_ACCESS_KEY")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
Sensitive data should not be used in the ARG or ENV commands:
backend/Dockerfile#L20
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "MINIO_SECRET_KEY")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
Sensitive data should not be used in the ARG or ENV commands:
backend/Dockerfile#L27
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "SSO_AUTH_HOST")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
Sensitive data should not be used in the ARG or ENV commands:
backend/Dockerfile#L39
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "S3_PUBLIC_ACCESS_KEY")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
Sensitive data should not be used in the ARG or ENV commands:
backend/Dockerfile#L40
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "S3_PUBLIC_SECRET_KEY")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
JSON arguments recommended for ENTRYPOINT/CMD to prevent unintended behavior related to OS signals:
backend/Dockerfile#L78
JSONArgsRecommended: JSON arguments recommended for CMD to prevent unintended behavior related to OS signals
More info: https://docs.docker.com/go/dockerfile/rule/json-args-recommended/
|
Sensitive data should not be used in the ARG or ENV commands:
backend/Dockerfile#L10
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "DATABASE_PASSWORD")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
Sensitive data should not be used in the ARG or ENV commands:
backend/Dockerfile#L14
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "DJANGO_SECRET_KEY")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
Deploy / Initialize
Multiple files were found for oc that matched the current OS and architecture: openshift-client-linux-4.14.37.tar.gz, openshift-client-linux-arm64-4.14.37.tar.gz, openshift-client-linux-ppc64le-4.14.37.tar.gz. Selecting the first one.
|
Deploy / Database
Multiple files were found for oc that matched the current OS and architecture: openshift-client-linux-4.14.37.tar.gz, openshift-client-linux-arm64-4.14.37.tar.gz, openshift-client-linux-ppc64le-4.14.37.tar.gz. Selecting the first one.
|
Deploy / Backend
Multiple files were found for oc that matched the current OS and architecture: openshift-client-linux-4.14.37.tar.gz, openshift-client-linux-arm64-4.14.37.tar.gz, openshift-client-linux-ppc64le-4.14.37.tar.gz. Selecting the first one.
|
Deploy / Frontend
Multiple files were found for oc that matched the current OS and architecture: openshift-client-linux-4.14.30.tar.gz, openshift-client-linux-arm64-4.14.30.tar.gz, openshift-client-linux-ppc64le-4.14.30.tar.gz. Selecting the first one.
|
Artifacts
Produced during runtime
Name | Size | |
---|---|---|
bcgov~nr-gwells~KURYF4.dockerbuild
Expired
|
51.5 KB |
|
bcgov~nr-gwells~Q2AP7Q.dockerbuild
Expired
|
70.4 KB |
|
bcgov~nr-gwells~T2YT91.dockerbuild
Expired
|
61.6 KB |
|