Skip to content

[Vulnerability Fix] Harden Docker images to run as non-root user #6629

[Vulnerability Fix] Harden Docker images to run as non-root user

[Vulnerability Fix] Harden Docker images to run as non-root user #6629

Re-run triggered January 29, 2026 08:46
Status Success
Total duration 24m 18s
Artifacts 1

e2e-k8s.yml

on: pull_request
build-docker-images
4m 54s
build-docker-images
Matrix: e2e-case
Matrix: e2e-storage
Fit to window
Zoom out
Zoom in

Annotations

3 warnings
Workflow syntax warning: .github/workflows/e2e-k8s.yml#L155
.github/workflows/e2e-k8s.yml (Line: 155, Col: 9): Conditional expression contains literal text outside replacement tokens. This will cause the expression to always evaluate to truthy. Did you mean to put the entire expression inside ${{ }}?
Workflow syntax warning: .github/workflows/e2e-k8s.yml#L239
.github/workflows/e2e-k8s.yml (Line: 239, Col: 9): Conditional expression contains literal text outside replacement tokens. This will cause the expression to always evaluate to truthy. Did you mean to put the entire expression inside ${{ }}?
build-docker-images
Cache save failed.

Artifacts

Produced during runtime
Name Size Digest
shenyu-images Expired
761 MB
sha256:20e99d2ed5fc3c03fcb0493a27a3067388c55540465c59c6c06f6da633b8e6ed