Skip to content

chore(ci): Update resourcing and add network policies for successful deploy. #426

chore(ci): Update resourcing and add network policies for successful deploy.

chore(ci): Update resourcing and add network policies for successful deploy. #426

Triggered via pull request October 17, 2024 22:28
Status Cancelled
Total duration 14m 53s
Artifacts 3

pr-open.yml

on: pull_request
Matrix: Builds
Deploy  /  Initialize
13s
Deploy / Initialize
Deploy  /  Database
15s
Deploy / Database
Fit to window
Zoom out
Zoom in

Annotations

1 error and 11 warnings
Deploy / Frontend
The run was canceled by @PaulGarewal.
Sensitive data should not be used in the ARG or ENV commands: backend/Dockerfile#L19
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "MINIO_ACCESS_KEY") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: backend/Dockerfile#L20
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "MINIO_SECRET_KEY") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: backend/Dockerfile#L27
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "SSO_AUTH_HOST") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: backend/Dockerfile#L39
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "S3_PUBLIC_ACCESS_KEY") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: backend/Dockerfile#L40
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "S3_PUBLIC_SECRET_KEY") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
JSON arguments recommended for ENTRYPOINT/CMD to prevent unintended behavior related to OS signals: backend/Dockerfile#L78
JSONArgsRecommended: JSON arguments recommended for CMD to prevent unintended behavior related to OS signals More info: https://docs.docker.com/go/dockerfile/rule/json-args-recommended/
Sensitive data should not be used in the ARG or ENV commands: backend/Dockerfile#L10
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "DATABASE_PASSWORD") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: backend/Dockerfile#L14
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "DJANGO_SECRET_KEY") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Deploy / Initialize
Multiple files were found for oc that matched the current OS and architecture: openshift-client-linux-4.14.37.tar.gz, openshift-client-linux-arm64-4.14.37.tar.gz, openshift-client-linux-ppc64le-4.14.37.tar.gz. Selecting the first one.
Deploy / Database
Multiple files were found for oc that matched the current OS and architecture: openshift-client-linux-4.14.37.tar.gz, openshift-client-linux-arm64-4.14.37.tar.gz, openshift-client-linux-ppc64le-4.14.37.tar.gz. Selecting the first one.
Deploy / Backend
Multiple files were found for oc that matched the current OS and architecture: openshift-client-linux-4.14.37.tar.gz, openshift-client-linux-arm64-4.14.37.tar.gz, openshift-client-linux-ppc64le-4.14.37.tar.gz. Selecting the first one.

Artifacts

Produced during runtime
Name Size
bcgov~nr-gwells~AC5AHZ.dockerbuild
50.5 KB
bcgov~nr-gwells~LK0IFB.dockerbuild
108 KB
bcgov~nr-gwells~NGJ2I8.dockerbuild
48.3 KB