Release 8.0.1 - See CHANGELOG.md #55
build_push.yml
on: push
prepare
/
prepare
19s
Matrix: build / build
cleanup
/
remove_artifacts
4s
Annotations
72 warnings
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_VERSION")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_REPO_URL")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Default value for global ARG results in an empty or invalid base image name:
Containerfile#L10
InvalidDefaultArgInFrom: Default value for ARG ${BASE_IMAGE}:${DISTRO}_${DISTRO_VARIANT} results in empty or invalid base image name
More info: https://docs.docker.com/go/dockerfile/rule/invalid-default-arg-in-from/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_VERSION")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_REPO_URL")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Default value for global ARG results in an empty or invalid base image name:
Containerfile#L10
InvalidDefaultArgInFrom: Default value for ARG ${BASE_IMAGE}:${DISTRO}_${DISTRO_VARIANT} results in empty or invalid base image name
More info: https://docs.docker.com/go/dockerfile/rule/invalid-default-arg-in-from/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_VERSION")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_REPO_URL")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Default value for global ARG results in an empty or invalid base image name:
Containerfile#L10
InvalidDefaultArgInFrom: Default value for ARG ${BASE_IMAGE}:${DISTRO}_${DISTRO_VARIANT} results in empty or invalid base image name
More info: https://docs.docker.com/go/dockerfile/rule/invalid-default-arg-in-from/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_VERSION")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_REPO_URL")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Default value for global ARG results in an empty or invalid base image name:
Containerfile#L10
InvalidDefaultArgInFrom: Default value for ARG ${BASE_IMAGE}:${DISTRO}_${DISTRO_VARIANT} results in empty or invalid base image name
More info: https://docs.docker.com/go/dockerfile/rule/invalid-default-arg-in-from/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_REPO_URL")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Default value for global ARG results in an empty or invalid base image name:
Containerfile#L10
InvalidDefaultArgInFrom: Default value for ARG ${BASE_IMAGE}:${DISTRO}_${DISTRO_VARIANT} results in empty or invalid base image name
More info: https://docs.docker.com/go/dockerfile/rule/invalid-default-arg-in-from/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_VERSION")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_REPO_URL")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Default value for global ARG results in an empty or invalid base image name:
Containerfile#L10
InvalidDefaultArgInFrom: Default value for ARG ${BASE_IMAGE}:${DISTRO}_${DISTRO_VARIANT} results in empty or invalid base image name
More info: https://docs.docker.com/go/dockerfile/rule/invalid-default-arg-in-from/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_VERSION")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_VERSION")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_REPO_URL")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Default value for global ARG results in an empty or invalid base image name:
Containerfile#L10
InvalidDefaultArgInFrom: Default value for ARG ${BASE_IMAGE}:${DISTRO}_${DISTRO_VARIANT} results in empty or invalid base image name
More info: https://docs.docker.com/go/dockerfile/rule/invalid-default-arg-in-from/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_VERSION")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_REPO_URL")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Default value for global ARG results in an empty or invalid base image name:
Containerfile#L10
InvalidDefaultArgInFrom: Default value for ARG ${BASE_IMAGE}:${DISTRO}_${DISTRO_VARIANT} results in empty or invalid base image name
More info: https://docs.docker.com/go/dockerfile/rule/invalid-default-arg-in-from/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_REPO_URL")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Default value for global ARG results in an empty or invalid base image name:
Containerfile#L10
InvalidDefaultArgInFrom: Default value for ARG ${BASE_IMAGE}:${DISTRO}_${DISTRO_VARIANT} results in empty or invalid base image name
More info: https://docs.docker.com/go/dockerfile/rule/invalid-default-arg-in-from/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_VERSION")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_VERSION")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_REPO_URL")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Default value for global ARG results in an empty or invalid base image name:
Containerfile#L10
InvalidDefaultArgInFrom: Default value for ARG ${BASE_IMAGE}:${DISTRO}_${DISTRO_VARIANT} results in empty or invalid base image name
More info: https://docs.docker.com/go/dockerfile/rule/invalid-default-arg-in-from/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_VERSION")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_REPO_URL")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Default value for global ARG results in an empty or invalid base image name:
Containerfile#L10
InvalidDefaultArgInFrom: Default value for ARG ${BASE_IMAGE}:${DISTRO}_${DISTRO_VARIANT} results in empty or invalid base image name
More info: https://docs.docker.com/go/dockerfile/rule/invalid-default-arg-in-from/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_VERSION")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_REPO_URL")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Default value for global ARG results in an empty or invalid base image name:
Containerfile#L10
InvalidDefaultArgInFrom: Default value for ARG ${BASE_IMAGE}:${DISTRO}_${DISTRO_VARIANT} results in empty or invalid base image name
More info: https://docs.docker.com/go/dockerfile/rule/invalid-default-arg-in-from/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_VERSION")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_REPO_URL")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Default value for global ARG results in an empty or invalid base image name:
Containerfile#L10
InvalidDefaultArgInFrom: Default value for ARG ${BASE_IMAGE}:${DISTRO}_${DISTRO_VARIANT} results in empty or invalid base image name
More info: https://docs.docker.com/go/dockerfile/rule/invalid-default-arg-in-from/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_VERSION")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_REPO_URL")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Default value for global ARG results in an empty or invalid base image name:
Containerfile#L10
InvalidDefaultArgInFrom: Default value for ARG ${BASE_IMAGE}:${DISTRO}_${DISTRO_VARIANT} results in empty or invalid base image name
More info: https://docs.docker.com/go/dockerfile/rule/invalid-default-arg-in-from/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_VERSION")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_REPO_URL")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Default value for global ARG results in an empty or invalid base image name:
Containerfile#L10
InvalidDefaultArgInFrom: Default value for ARG ${BASE_IMAGE}:${DISTRO}_${DISTRO_VARIANT} results in empty or invalid base image name
More info: https://docs.docker.com/go/dockerfile/rule/invalid-default-arg-in-from/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_VERSION")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_REPO_URL")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Default value for global ARG results in an empty or invalid base image name:
Containerfile#L10
InvalidDefaultArgInFrom: Default value for ARG ${BASE_IMAGE}:${DISTRO}_${DISTRO_VARIANT} results in empty or invalid base image name
More info: https://docs.docker.com/go/dockerfile/rule/invalid-default-arg-in-from/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_VERSION")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_REPO_URL")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Default value for global ARG results in an empty or invalid base image name:
Containerfile#L10
InvalidDefaultArgInFrom: Default value for ARG ${BASE_IMAGE}:${DISTRO}_${DISTRO_VARIANT} results in empty or invalid base image name
More info: https://docs.docker.com/go/dockerfile/rule/invalid-default-arg-in-from/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_VERSION")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_REPO_URL")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Default value for global ARG results in an empty or invalid base image name:
Containerfile#L10
InvalidDefaultArgInFrom: Default value for ARG ${BASE_IMAGE}:${DISTRO}_${DISTRO_VARIANT} results in empty or invalid base image name
More info: https://docs.docker.com/go/dockerfile/rule/invalid-default-arg-in-from/
|
|
Default value for global ARG results in an empty or invalid base image name:
Containerfile#L10
InvalidDefaultArgInFrom: Default value for ARG ${BASE_IMAGE}:${DISTRO}_${DISTRO_VARIANT} results in empty or invalid base image name
More info: https://docs.docker.com/go/dockerfile/rule/invalid-default-arg-in-from/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_VERSION")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_REPO_URL")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_VERSION")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_REPO_URL")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Default value for global ARG results in an empty or invalid base image name:
Containerfile#L10
InvalidDefaultArgInFrom: Default value for ARG ${BASE_IMAGE}:${DISTRO}_${DISTRO_VARIANT} results in empty or invalid base image name
More info: https://docs.docker.com/go/dockerfile/rule/invalid-default-arg-in-from/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_VERSION")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_REPO_URL")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Default value for global ARG results in an empty or invalid base image name:
Containerfile#L10
InvalidDefaultArgInFrom: Default value for ARG ${BASE_IMAGE}:${DISTRO}_${DISTRO_VARIANT} results in empty or invalid base image name
More info: https://docs.docker.com/go/dockerfile/rule/invalid-default-arg-in-from/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_VERSION")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_REPO_URL")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Default value for global ARG results in an empty or invalid base image name:
Containerfile#L10
InvalidDefaultArgInFrom: Default value for ARG ${BASE_IMAGE}:${DISTRO}_${DISTRO_VARIANT} results in empty or invalid base image name
More info: https://docs.docker.com/go/dockerfile/rule/invalid-default-arg-in-from/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_VERSION")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_REPO_URL")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Default value for global ARG results in an empty or invalid base image name:
Containerfile#L10
InvalidDefaultArgInFrom: Default value for ARG ${BASE_IMAGE}:${DISTRO}_${DISTRO_VARIANT} results in empty or invalid base image name
More info: https://docs.docker.com/go/dockerfile/rule/invalid-default-arg-in-from/
|
|
Default value for global ARG results in an empty or invalid base image name:
Containerfile#L10
InvalidDefaultArgInFrom: Default value for ARG ${BASE_IMAGE}:${DISTRO}_${DISTRO_VARIANT} results in empty or invalid base image name
More info: https://docs.docker.com/go/dockerfile/rule/invalid-default-arg-in-from/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_VERSION")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Sensitive data should not be used in the ARG or ENV commands:
Containerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "NGINX_MODULE_AUTH_LDAP_REPO_URL")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
Artifacts
Produced during runtime
| Name | Size | Digest | |
|---|---|---|---|
|
encrypted-artifacts
|
14.2 KB |
sha256:30e1b214a6a4974ae8b7808ea9cfde0fc3989db039e782cca84bf1fa84d0ec9e
|
|
|
nfrastack~container-nginx~0824UZ.dockerbuild
|
295 KB |
sha256:981c9661e76b61716e0d41cd47d9fea4a84ca3133dce79d8710e931e766d5e23
|
|
|
nfrastack~container-nginx~0FGUZN.dockerbuild
|
281 KB |
sha256:621810ab1ca297584a9eba01aa917e612ad65c22b3a7b1bf007c8d3395618cee
|
|
|
nfrastack~container-nginx~689VS9.dockerbuild
|
266 KB |
sha256:5b7299568ac383801aebd8c2820bbc1a2b0d317a60e70ec42db265c0ff4f3af6
|
|
|
nfrastack~container-nginx~8APUS5.dockerbuild
|
292 KB |
sha256:086afff9d77a582aade315f81ed025be84783edf5e55f9d2df9b9640f2c0e7ce
|
|
|
nfrastack~container-nginx~8ZS17Q.dockerbuild
|
273 KB |
sha256:fc19bc33a631456af06df7893cf745de51567c9325200f25a2a7dc4b4f24ab1d
|
|
|
nfrastack~container-nginx~BNR5K3.dockerbuild
|
265 KB |
sha256:1d60ab7edd23d8f6b98f7e999ddae0baf498125a8a92605e5e11c139c9588cd7
|
|
|
nfrastack~container-nginx~CDU2AU.dockerbuild
|
260 KB |
sha256:3601801d0b88baadfd36a7621388ea8bc881dcec4aba7fc00b6fb2f75e8f985a
|
|
|
nfrastack~container-nginx~EIU2R4.dockerbuild
|
296 KB |
sha256:ed094fcf5cdc3696802a2e5709abc55671f6be870c3bfa14afb3269700af0c59
|
|
|
nfrastack~container-nginx~FDGA0Z.dockerbuild
|
259 KB |
sha256:5da463b7c89900e0986d738270076b701b5edda9fdb4e3fd8d0b282302c3a221
|
|
|
nfrastack~container-nginx~FSGXU2.dockerbuild
|
308 KB |
sha256:2acfc585b9500f70a60379eec061d66fc5d41a396243d9e4f3c33e13cdda6f78
|
|
|
nfrastack~container-nginx~IYGDOZ.dockerbuild
|
278 KB |
sha256:0d7bb610f9837a6201b2e5819e45e5c770fd3328a83f665558e644faafdd894d
|
|
|
nfrastack~container-nginx~J4ASDM.dockerbuild
|
291 KB |
sha256:8042bd1cf2e0bdef1859340019da05489e3e3f45931e78b0ba532c7b9ed15ca3
|
|
|
nfrastack~container-nginx~K23PHK.dockerbuild
|
303 KB |
sha256:284bbdfec5aa98107d3f9d4e35d0fea19a081b7c3ef637c7a6ab22c3ea9a7489
|
|
|
nfrastack~container-nginx~KGNES3.dockerbuild
|
288 KB |
sha256:c16f8b2975a744a2f22915100e0d1fdf45caf79d61c0a0241523d4276f61bab8
|
|
|
nfrastack~container-nginx~NIAV53.dockerbuild
|
344 KB |
sha256:c960824a5f3aed75af34c320a735bf4be5de25e640e4954df3a535e6bf3d4d1f
|
|
|
nfrastack~container-nginx~QNFYZH.dockerbuild
|
265 KB |
sha256:849ecb8427f55279d4929e924c69671adc3fe7731300c2cb364d4eca5c3655da
|
|
|
nfrastack~container-nginx~R5VFTU.dockerbuild
|
263 KB |
sha256:e644d3661f5b9c5b99e24c8698e41525ed216e0a63435a02f160e145f3eae1ff
|
|
|
nfrastack~container-nginx~TVX4NH.dockerbuild
|
327 KB |
sha256:fe061cae7c8950342fc1a2cef1c2abf73867e57c486da7cd76efb9a003bc0cd7
|
|
|
nfrastack~container-nginx~V20ZV2.dockerbuild
|
336 KB |
sha256:b7c86ce29ab037e87d198d7b87895d7582b4d65b7d71aa3f7736a557a4885ad3
|
|
|
nfrastack~container-nginx~WD60JL.dockerbuild
|
276 KB |
sha256:dc751c0e542c72c08886dcb135df042111ca6cf49a2b793d0fc44738034c09f1
|
|
|
nfrastack~container-nginx~WOP1BO.dockerbuild
|
274 KB |
sha256:d408f67c6714590a666a2710926bad90a18d5d61b6a67e8f35d08308e490a635
|
|
|
nfrastack~container-nginx~Y4T0WP.dockerbuild
|
286 KB |
sha256:d4db9f1d4abda40d538d19565a10f8f723ea5618e6372b34e85a548b3632dfb2
|
|
|
nfrastack~container-nginx~Y5XNSP.dockerbuild
|
266 KB |
sha256:a3a691986d78fcd73f5513b30dfce570da58defead62015524cc4c3f0230a013
|
|
|
nfrastack~container-nginx~ZZZFNI.dockerbuild
|
265 KB |
sha256:4c3b7334f0f354d87b152e2405f1e1ac00746d1692dbeafae520d8e2c750dfa7
|
|