feat(docker): unified multi-target Dockerfile with GHCR pre-built images #1
Annotations
5 warnings
|
Sensitive data should not be used in the ARG or ENV commands:
docker/Dockerfile#L56
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "VITE_TOKEN_API_URI")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Sensitive data should not be used in the ARG or ENV commands:
docker/Dockerfile#L53
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "VITE_TOKEN_API_URI")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
JSON arguments recommended for ENTRYPOINT/CMD to prevent unintended behavior related to OS signals:
docker/Dockerfile#L46
JSONArgsRecommended: JSON arguments recommended for CMD to prevent unintended behavior related to OS signals
More info: https://docs.docker.com/go/dockerfile/rule/json-args-recommended/
|
|
Sensitive data should not be used in the ARG or ENV commands:
docker/Dockerfile#L37
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "VITE_CLERK_PUBLISHABLE_KEY")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
|
Sensitive data should not be used in the ARG or ENV commands:
docker/Dockerfile#L36
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "VITE_CLERK_PUBLISHABLE_KEY")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
Artifacts
Produced during runtime
| Name | Size | Digest | |
|---|---|---|---|
|
fireproof-storage~fireproof~HW3YZF.dockerbuild
|
54.1 KB |
sha256:2ed262fddf08c0d018fcc38b07b1397b943b8994fe8ce691b976820dc4734c35
|
|
|
fireproof-storage~fireproof~M6QN43.dockerbuild
|
69 KB |
sha256:6ebb71594b5134985c69692d318888ad8eedd479f6e2752da34c62a795b344a3
|
|
|
fireproof-storage~fireproof~OHHX4T.dockerbuild
|
64.1 KB |
sha256:2037c403efe305a04b5009efc8a395f1538d4aa047bedffbffb6d469d912f3ea
|
|