Skip to content

Port Docker Compose examples #1

Port Docker Compose examples

Port Docker Compose examples #1

Triggered via pull request December 16, 2025 17:21
Status Failure
Total duration 10s
Artifacts

compose.yaml

on: pull_request
Lint GitHub Actions workflows
6s
Lint GitHub Actions workflows
Test docker-compose-tls.yml
0s
Test docker-compose-tls.yml
Test docker-compose-multirole.yaml
0s
Test docker-compose-multirole.yaml
Matrix: compose-test
Fit to window
Zoom out
Zoom in

Annotations

10 errors
Lint GitHub Actions workflows: .github/workflows/promql-to-dd-go_build-publish.yaml#L32
the runner of "docker/metadata-action@v4" action is too old to run on GitHub Actions. update the action's version to fix this issue
Lint GitHub Actions workflows: .github/workflows/promql-to-dd-go_build-publish.yaml#L24
the runner of "docker/setup-buildx-action@v2" action is too old to run on GitHub Actions. update the action's version to fix this issue
Lint GitHub Actions workflows: .github/workflows/promql-to-dd-go_build-publish.yaml#L21
the runner of "docker/setup-qemu-action@v2" action is too old to run on GitHub Actions. update the action's version to fix this issue
Lint GitHub Actions workflows: .github/workflows/promql-to-dd-go_build-publish.yaml#L18
the runner of "actions/checkout@v3" action is too old to run on GitHub Actions. update the action's version to fix this issue
Lint GitHub Actions workflows: .github/workflows/extensibility.yaml#L18
the runner of "actions/checkout@v2" action is too old to run on GitHub Actions. update the action's version to fix this issue
Lint GitHub Actions workflows: .github/workflows/extensibility.yaml#L17
"github.head_ref" is potentially untrusted. avoid using it directly in inline scripts. instead, pass it through an environment variable. see https://docs.github.com/en/actions/reference/security/secure-use#good-practices-for-mitigating-script-injection-attacks for more details
Lint GitHub Actions workflows: .github/workflows/compose.yaml#L165
"github.head_ref" is potentially untrusted. avoid using it directly in inline scripts. instead, pass it through an environment variable. see https://docs.github.com/en/actions/reference/security/secure-use#good-practices-for-mitigating-script-injection-attacks for more details
Lint GitHub Actions workflows: .github/workflows/compose.yaml#L109
shellcheck reported issue in this script: SC2086:info:3:45: Double quote to prevent globbing and word splitting
Lint GitHub Actions workflows: .github/workflows/compose.yaml#L103
"github.head_ref" is potentially untrusted. avoid using it directly in inline scripts. instead, pass it through an environment variable. see https://docs.github.com/en/actions/reference/security/secure-use#good-practices-for-mitigating-script-injection-attacks for more details
Lint GitHub Actions workflows: .github/workflows/compose.yaml#L46
"github.head_ref" is potentially untrusted. avoid using it directly in inline scripts. instead, pass it through an environment variable. see https://docs.github.com/en/actions/reference/security/secure-use#good-practices-for-mitigating-script-injection-attacks for more details