Port Docker Compose examples #1
Annotations
10 errors
|
.github/workflows/promql-to-dd-go_build-publish.yaml#L32
the runner of "docker/metadata-action@v4" action is too old to run on GitHub Actions. update the action's version to fix this issue
|
|
.github/workflows/promql-to-dd-go_build-publish.yaml#L24
the runner of "docker/setup-buildx-action@v2" action is too old to run on GitHub Actions. update the action's version to fix this issue
|
|
.github/workflows/promql-to-dd-go_build-publish.yaml#L21
the runner of "docker/setup-qemu-action@v2" action is too old to run on GitHub Actions. update the action's version to fix this issue
|
|
.github/workflows/promql-to-dd-go_build-publish.yaml#L18
the runner of "actions/checkout@v3" action is too old to run on GitHub Actions. update the action's version to fix this issue
|
|
.github/workflows/extensibility.yaml#L18
the runner of "actions/checkout@v2" action is too old to run on GitHub Actions. update the action's version to fix this issue
|
|
.github/workflows/extensibility.yaml#L17
"github.head_ref" is potentially untrusted. avoid using it directly in inline scripts. instead, pass it through an environment variable. see https://docs.github.com/en/actions/reference/security/secure-use#good-practices-for-mitigating-script-injection-attacks for more details
|
|
.github/workflows/compose.yaml#L165
"github.head_ref" is potentially untrusted. avoid using it directly in inline scripts. instead, pass it through an environment variable. see https://docs.github.com/en/actions/reference/security/secure-use#good-practices-for-mitigating-script-injection-attacks for more details
|
|
.github/workflows/compose.yaml#L109
shellcheck reported issue in this script: SC2086:info:3:45: Double quote to prevent globbing and word splitting
|
|
.github/workflows/compose.yaml#L103
"github.head_ref" is potentially untrusted. avoid using it directly in inline scripts. instead, pass it through an environment variable. see https://docs.github.com/en/actions/reference/security/secure-use#good-practices-for-mitigating-script-injection-attacks for more details
|
|
.github/workflows/compose.yaml#L46
"github.head_ref" is potentially untrusted. avoid using it directly in inline scripts. instead, pass it through an environment variable. see https://docs.github.com/en/actions/reference/security/secure-use#good-practices-for-mitigating-script-injection-attacks for more details
|
The logs for this run have expired and are no longer available.
Loading