Skip to content

Bump DavidAnson/markdownlint-cli2-action from 16 to 17 #515

Bump DavidAnson/markdownlint-cli2-action from 16 to 17

Bump DavidAnson/markdownlint-cli2-action from 16 to 17 #515

Triggered via pull request September 16, 2024 03:22
Status Success
Total duration 6m 30s
Artifacts 2

unit-test.yml

on: pull_request
Docker - Test (amd64)
2m 40s
Docker - Test (amd64)
Docker - Test (arm64)
6m 20s
Docker - Test (arm64)
Fit to window
Zoom out
Zoom in

Annotations

4 warnings
Sensitive data should not be used in the ARG or ENV commands: Dockerfile#L89
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "SERVER_PASSWORD") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: Dockerfile#L89
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "ADMIN_PASSWORD") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: Dockerfile#L89
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "SERVER_PASSWORD") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: Dockerfile#L89
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "ADMIN_PASSWORD") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/

Artifacts

Produced during runtime
Name Size
thijsvanloef~palworld-server-docker~GUUX05.dockerbuild
55.2 KB
thijsvanloef~palworld-server-docker~PNRX7I.dockerbuild
59.6 KB