Skip to content

chore(ci): deploy frontend #277

chore(ci): deploy frontend

chore(ci): deploy frontend #277

Triggered via pull request September 26, 2024 18:46
Status Failure
Total duration 5m 44s
Artifacts 3

pr-open.yml

on: pull_request
Deploy  /  Initialize
18s
Deploy / Initialize
Matrix: Builds
Deploy  /  Database
29s
Deploy / Database
Deploy  /  Frontend
11s
Deploy / Frontend
Fit to window
Zoom out
Zoom in

Annotations

1 error and 11 warnings
Deploy / Frontend
Process completed with exit code 1.
JSON arguments recommended for ENTRYPOINT/CMD to prevent unintended behavior related to OS signals: frontend/Dockerfile#L25
JSONArgsRecommended: JSON arguments recommended for CMD to prevent unintended behavior related to OS signals More info: https://docs.docker.com/go/dockerfile/rule/json-args-recommended/
Deploy / Frontend
Unexpected input(s) 'with', valid inputs are ['file', 'oc_namespace', 'oc_server', 'oc_token', 'overwrite', 'oc_version', 'parameters', 'post_rollout', 'timeout', 'triggers', 'verification_path', 'delete_completed', 'diff_branch', 'repository', 'verification_retry_attempts', 'verification_retry_seconds', 'penetration_test']
Deploy / Frontend
Unexpected input(s) 'with', valid inputs are ['file', 'oc_namespace', 'oc_server', 'oc_token', 'overwrite', 'oc_version', 'parameters', 'post_rollout', 'timeout', 'triggers', 'verification_path', 'delete_completed', 'diff_branch', 'repository', 'verification_retry_attempts', 'verification_retry_seconds', 'penetration_test']
JSON arguments recommended for ENTRYPOINT/CMD to prevent unintended behavior related to OS signals: backend/Dockerfile#L78
JSONArgsRecommended: JSON arguments recommended for CMD to prevent unintended behavior related to OS signals More info: https://docs.docker.com/go/dockerfile/rule/json-args-recommended/
Sensitive data should not be used in the ARG or ENV commands: backend/Dockerfile#L10
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "DATABASE_PASSWORD") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: backend/Dockerfile#L14
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "DJANGO_SECRET_KEY") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: backend/Dockerfile#L19
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "MINIO_ACCESS_KEY") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: backend/Dockerfile#L20
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "MINIO_SECRET_KEY") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: backend/Dockerfile#L27
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "SSO_AUTH_HOST") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: backend/Dockerfile#L39
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "S3_PUBLIC_ACCESS_KEY") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: backend/Dockerfile#L40
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "S3_PUBLIC_SECRET_KEY") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/

Artifacts

Produced during runtime
Name Size
bcgov~nr-gwells~TBTL6P.dockerbuild
34.5 KB
bcgov~nr-gwells~VRFQUX.dockerbuild
114 KB
bcgov~nr-gwells~ZC6M7P.dockerbuild
14.8 KB