Skip to content

5.2.35

5.2.35 #107

Triggered via release January 22, 2025 08:41
@abnegateabnegate
published 5.2.35
Status Success
Total duration 2m 46s
Artifacts 3

publish.yml

on: release
publish-cloud
2m 37s
publish-cloud
publish-cloud-stage
2m 16s
publish-cloud-stage
publish-self-hosted
2m 36s
publish-self-hosted
Fit to window
Zoom out
Zoom in

Annotations

9 warnings
publish-cloud-stage
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
Sensitive data should not be used in the ARG or ENV commands: Dockerfile#L25
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "SENTRY_AUTH_TOKEN") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: Dockerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "SENTRY_AUTH_TOKEN") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
publish-self-hosted
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
Sensitive data should not be used in the ARG or ENV commands: Dockerfile#L25
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "SENTRY_AUTH_TOKEN") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: Dockerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "SENTRY_AUTH_TOKEN") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
publish-cloud
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
Sensitive data should not be used in the ARG or ENV commands: Dockerfile#L25
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "SENTRY_AUTH_TOKEN") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: Dockerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "SENTRY_AUTH_TOKEN") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/

Artifacts

Produced during runtime
Name Size Digest
appwrite~console~PFI1T3.dockerbuild Expired
144 KB
sha256:8505dba10263c7f908f9cdb6cf82cb127f9fcbcffdab024ab77c6627621bf25d
appwrite~console~XHT6Y1.dockerbuild Expired
198 KB
sha256:ce28806e4dd200488699da717d54469ec233e1b88de50672b27e20ef3fdf7876
appwrite~console~YNKHRI.dockerbuild Expired
144 KB
sha256:55fb82fbff178fb657ba091b0a05c9382b15472637f41d68d10848c3c35ef27b