Skip to content

Update module github.com/tidwall/gjson to v1.17.3 #2036

Update module github.com/tidwall/gjson to v1.17.3

Update module github.com/tidwall/gjson to v1.17.3 #2036

Triggered via pull request August 19, 2024 11:13
Status Success
Total duration 2m 57s
Artifacts 1

push-pr-lint.yaml

on: pull_request
Fit to window
Zoom out
Zoom in

Annotations

7 warnings
lint-test
Unexpected input(s) 'acs-report-enable', valid inputs are ['image', 'path', 'sbom', 'fail-build', 'output-format', 'severity-cutoff', 'only-fixed', 'add-cpes-if-none', 'by-cve', 'grype-version', 'vex']
lint-test
Failed minimum severity level. Found vulnerabilities with level 'medium' or higher
The 'as' keyword should match the case of the 'from' keyword: Dockerfile#L27
FromAsCasing: 'as' and 'FROM' keywords' casing do not match More info: https://docs.docker.com/go/dockerfile/rule/from-as-casing/
Sensitive data should not be used in the ARG or ENV commands: Dockerfile#L112
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "ACCESS_KEY") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: Dockerfile#L113
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "ACCESS_KEY") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: Dockerfile#L115
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "SECRET_KEY") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: Dockerfile#L116
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "SECRET_KEY") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/

Artifacts

Produced during runtime
Name Size
metal-toolbox~ironlib~WSXIZX.dockerbuild
50.6 KB