Skip to content

chore: bump semantic-release from 25.0.2 to 25.0.3 #219

chore: bump semantic-release from 25.0.2 to 25.0.3

chore: bump semantic-release from 25.0.2 to 25.0.3 #219

Triggered via pull request February 4, 2026 18:05
Status Success
Total duration 2m 22s
Artifacts 1

test.yaml

on: pull_request
Docker Dev image
2m 11s
Docker Dev image
Semantic Release Dry Run
16s
Semantic Release Dry Run
Fit to window
Zoom out
Zoom in

Annotations

4 warnings
Default value for global ARG results in an empty or invalid base image name: Dockerfile#L6
InvalidDefaultArgInFrom: Default value for ARG us-docker.pkg.dev/palette-images/palette/spectro-registry:${PALETTE_REGISTRY_CLI_VERSION} results in empty or invalid base image name More info: https://docs.docker.com/go/dockerfile/rule/invalid-default-arg-in-from/
Sensitive data should not be used in the ARG or ENV commands: Dockerfile#L32
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "REGISTRY_AUTH_HTPASSWD_PATH") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: Dockerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "REGISTRY_AUTH_HTPASSWD_REALM") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: Dockerfile#L30
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "REGISTRY_AUTH") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/

Artifacts

Produced during runtime
Name Size Digest
spectrocloud~tutorials~PMYZ4K.dockerbuild
1.88 MB
sha256:aec57b0e5ed3d29e1321a54a179188c129b8f0e9ccc2b06192365a691d58f67e