Skip to content

ci: template consistency #853

ci: template consistency

ci: template consistency #853

Triggered via pull request December 13, 2024 16:13
Status Failure
Total duration 5m 31s
Artifacts 4

pr-open.yml

on: pull_request
Matrix: Builds
Deploy  /  Initialize
17s
Deploy / Initialize
Deploy  /  Backend
0s
Deploy / Backend
Deploy  /  Frontend
0s
Deploy / Frontend
Tests  /  Tests
Tests / Tests
PR Results
0s
PR Results
Fit to window
Zoom out
Zoom in

Annotations

1 error and 10 warnings
Deploy / Initialize
Process completed with exit code 1.
Builds (frontend)
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
Builds (minio)
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
Builds (database)
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
Sensitive data should not be used in the ARG or ENV commands: backend/Dockerfile#L10
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "DATABASE_PASSWORD") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: backend/Dockerfile#L14
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "DJANGO_SECRET_KEY") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: backend/Dockerfile#L19
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "MINIO_ACCESS_KEY") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: backend/Dockerfile#L20
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "MINIO_SECRET_KEY") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: backend/Dockerfile#L27
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "SSO_AUTH_HOST") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
JSON arguments recommended for ENTRYPOINT/CMD to prevent unintended behavior related to OS signals: backend/Dockerfile#L77
JSONArgsRecommended: JSON arguments recommended for CMD to prevent unintended behavior related to OS signals More info: https://docs.docker.com/go/dockerfile/rule/json-args-recommended/
Deploy / Initialize
Multiple files were found for oc that matched the current OS and architecture: openshift-client-linux-4.14.37.tar.gz, openshift-client-linux-arm64-4.14.37.tar.gz, openshift-client-linux-ppc64le-4.14.37.tar.gz. Selecting the first one.

Artifacts

Produced during runtime
Name Size
bcgov~nr-gwells~5EFE22.dockerbuild
29.2 KB
bcgov~nr-gwells~5GZUIT.dockerbuild
110 KB
bcgov~nr-gwells~NMG0RN.dockerbuild
40.8 KB
bcgov~nr-gwells~Z9XO8H.dockerbuild
52.9 KB