Merge pull request #11151 from neinteractiveliterature/notification-t… #22738
ci.yml
on: push
TypeScript check
40s
Build containers
4m 7s
Build doc site
3m 0s
Test coverage report
29s
Update release draft
11s
Annotations
16 warnings
|
Default value for global ARG results in an empty or invalid base image name:
Dockerfile.assets#L3
InvalidDefaultArgInFrom: Default value for ARG ${BASEIMAGE} results in empty or invalid base image name
More info: https://docs.docker.com/go/dockerfile/rule/invalid-default-arg-in-from/
|
|
The 'as' keyword should match the case of the 'from' keyword:
Dockerfile.assets#L3
FromAsCasing: 'as' and 'FROM' keywords' casing do not match
More info: https://docs.docker.com/go/dockerfile/rule/from-as-casing/
|
|
Legacy key/value format with whitespace separator should not be used:
Dockerfile#L39
LegacyKeyValueFormat: "ENV key=value" should be used instead of legacy "ENV key value" format
More info: https://docs.docker.com/go/dockerfile/rule/legacy-key-value-format/
|
|
Legacy key/value format with whitespace separator should not be used:
Dockerfile#L38
LegacyKeyValueFormat: "ENV key=value" should be used instead of legacy "ENV key value" format
More info: https://docs.docker.com/go/dockerfile/rule/legacy-key-value-format/
|
|
The 'as' keyword should match the case of the 'from' keyword:
Dockerfile#L47
FromAsCasing: 'as' and 'FROM' keywords' casing do not match
More info: https://docs.docker.com/go/dockerfile/rule/from-as-casing/
|
|
The 'as' keyword should match the case of the 'from' keyword:
Dockerfile#L6
FromAsCasing: 'as' and 'FROM' keywords' casing do not match
More info: https://docs.docker.com/go/dockerfile/rule/from-as-casing/
|
|
JSON arguments recommended for ENTRYPOINT/CMD to prevent unintended behavior related to OS signals:
Dockerfile#L96
JSONArgsRecommended: JSON arguments recommended for CMD to prevent unintended behavior related to OS signals
More info: https://docs.docker.com/go/dockerfile/rule/json-args-recommended/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Dockerfile#L38
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "AWS_ACCESS_KEY_ID")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
The 'as' keyword should match the case of the 'from' keyword:
Dockerfile#L55
FromAsCasing: 'as' and 'FROM' keywords' casing do not match
More info: https://docs.docker.com/go/dockerfile/rule/from-as-casing/
|
|
Legacy key/value format with whitespace separator should not be used:
Dockerfile#L62
LegacyKeyValueFormat: "ENV key=value" should be used instead of legacy "ENV key value" format
More info: https://docs.docker.com/go/dockerfile/rule/legacy-key-value-format/
|
|
Legacy key/value format with whitespace separator should not be used:
Dockerfile#L37
LegacyKeyValueFormat: "ENV key=value" should be used instead of legacy "ENV key value" format
More info: https://docs.docker.com/go/dockerfile/rule/legacy-key-value-format/
|
|
Legacy key/value format with whitespace separator should not be used:
Dockerfile#L36
LegacyKeyValueFormat: "ENV key=value" should be used instead of legacy "ENV key value" format
More info: https://docs.docker.com/go/dockerfile/rule/legacy-key-value-format/
|
|
Update release draft
"pull_request_target.edited" is not a known webhook name (https://developer.github.com/v3/activity/events/types/)
|
|
Update release draft
"pull_request_target.synchronize" is not a known webhook name (https://developer.github.com/v3/activity/events/types/)
|
|
Update release draft
"pull_request_target.reopened" is not a known webhook name (https://developer.github.com/v3/activity/events/types/)
|
|
Update release draft
"pull_request_target.opened" is not a known webhook name (https://developer.github.com/v3/activity/events/types/)
|
Artifacts
Produced during runtime
| Name | Size | Digest | |
|---|---|---|---|
|
coverage-main
|
156 KB |
sha256:b036466eb660d3993c434089b12518b65dfd0f67045aac4dfaf47c40b26f8742
|
|
|
doc-site
|
6.14 MB |
sha256:a2facac77f5227437f7f962f822719da833e555573cc9da3085f5d322c380520
|
|
|
minitest-coverage
|
48.4 KB |
sha256:a2d81feb2dee917c6521b303ed51fb360bd4de741632d290c896da3072d59b1b
|
|
|
minitest-reports
|
26 KB |
sha256:49f6b32e28f07a6fe27f0dcc37ab8b51f1218bc1a502a4a368d1dffa05ac4027
|
|
|
minitest-system-coverage
|
30.9 KB |
sha256:773711d1436b2cfd14e4e9a46c05d619ccb1085cc9e371128408724d8a22409c
|
|
|
minitest-system-reports
|
974 Bytes |
sha256:7a91a342febc975c3a6406d131e9584c333dd8bbe0f9ed067ec6acf86ce53796
|
|
|
neinteractiveliterature~intercode~4J08CB.dockerbuild
|
49.1 KB |
sha256:26108b92cbbd5ac4f4935f2d27614c4d31f1d2922de0d39032b6782c4bbb1497
|
|
|
neinteractiveliterature~intercode~TDMZLN.dockerbuild
|
140 KB |
sha256:d2177e219eb548b6371067da2b8ca53a180b1d1034fa21667d8c5ee8dd28eff2
|
|
|
vitest-coverage
|
90 KB |
sha256:abd7ba4edbaf9cf40c5ecedc1f7dc28eb37df1a3fb261965209a072af2a9e303
|
|
|
vitest-reports
|
546 KB |
sha256:4720d5654c54bb8c16e56b098e48db9f92b2334a8e2f841698c1150a90c48ac5
|
|