chore(master): release 0.1.0 (#17) #6
docker-deploy-branch.yaml
on: push
build-and-push-image
1m 38s
Annotations
5 warnings
Sensitive data should not be used in the ARG or ENV commands:
Dockerfile#L3
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "CRAWL_DNS_SIGNING_KEY")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
Sensitive data should not be used in the ARG or ENV commands:
Dockerfile#L3
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "AWS_ACCESS_KEY_ID")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
Sensitive data should not be used in the ARG or ENV commands:
Dockerfile#L3
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "AWS_SECRET_ACCESS_KEY")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
Sensitive data should not be used in the ARG or ENV commands:
Dockerfile#L3
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "CLOUDFLARE_API_TOKEN")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
Sensitive data should not be used in the ARG or ENV commands:
Dockerfile#L3
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "INFLUXDB_PASSWORD")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
Artifacts
Produced during runtime
Name | Size | |
---|---|---|
ethereum~discv4-crawl~18OVRP.dockerbuild
|
66.7 KB |
|