Implement atomic conditional puts for azureblob-sdk #883
Annotations
5 warnings
Sensitive data should not be used in the ARG or ENV commands:
Dockerfile#L15
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "S3PROXY_ENCRYPTED_BLOBSTORE_PASSWORD")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
Sensitive data should not be used in the ARG or ENV commands:
Dockerfile#L15
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "S3PROXY_CORS_ALLOW_CREDENTIAL")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
Sensitive data should not be used in the ARG or ENV commands:
Dockerfile#L15
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "S3PROXY_KEYSTORE_PASSWORD")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
Sensitive data should not be used in the ARG or ENV commands:
Dockerfile#L15
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "S3PROXY_CREDENTIAL")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
Sensitive data should not be used in the ARG or ENV commands:
Dockerfile#L15
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "JCLOUDS_CREDENTIAL")
More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
|
Artifacts
Produced during runtime
Name | Size | Digest | |
---|---|---|---|
gaul~s3proxy~T5IFHG.dockerbuild
|
40.9 KB |
sha256:ae6e11d111964d905a056047134241c30a8cc430c017ad866337c40704798b88
|
|
pom
|
3.37 KB |
sha256:4122abc144d2cb0a805b264b900a64b630779d0eb57b0a43ec02254b167112a1
|
|
s3proxy
|
35.5 MB |
sha256:3879179de491898f37232f4b8bba430cde33f721f4ccbb6887869c760462ec5b
|
|