Skip to content

Update module golang.org/x/net to v0.28.0 #100

Update module golang.org/x/net to v0.28.0

Update module golang.org/x/net to v0.28.0 #100

Triggered via push August 19, 2024 11:11
Status Success
Total duration 5m 54s
Artifacts 1
build, release, sign
5m 43s
build, release, sign
Fit to window
Zoom out
Zoom in

Annotations

7 warnings
build, release, sign
Unexpected input(s) 'acs-report-enable', valid inputs are ['image', 'path', 'sbom', 'fail-build', 'output-format', 'severity-cutoff', 'only-fixed', 'add-cpes-if-none', 'by-cve', 'grype-version', 'vex']
build, release, sign
Failed minimum severity level. Found vulnerabilities with level 'medium' or higher
Sensitive data should not be used in the ARG or ENV commands: Dockerfile#L116
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "SECRET_KEY") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
The 'as' keyword should match the case of the 'from' keyword: Dockerfile#L27
FromAsCasing: 'as' and 'FROM' keywords' casing do not match More info: https://docs.docker.com/go/dockerfile/rule/from-as-casing/
Sensitive data should not be used in the ARG or ENV commands: Dockerfile#L112
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "ACCESS_KEY") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: Dockerfile#L113
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "ACCESS_KEY") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: Dockerfile#L115
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "SECRET_KEY") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/

Artifacts

Produced during runtime
Name Size
metal-toolbox~ironlib~GYYXQT.dockerbuild Expired
96.4 KB