Skip to content

5.2.38

5.2.38 #112

Triggered via release January 23, 2025 16:06
@ArmanNikArmanNik
published 5.2.38
Status Success
Total duration 2m 44s
Artifacts 3

publish.yml

on: release
publish-cloud
2m 35s
publish-cloud
publish-cloud-stage
2m 33s
publish-cloud-stage
publish-self-hosted
2m 34s
publish-self-hosted
Fit to window
Zoom out
Zoom in

Annotations

9 warnings
publish-cloud-stage
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
Sensitive data should not be used in the ARG or ENV commands: Dockerfile#L25
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "SENTRY_AUTH_TOKEN") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: Dockerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "SENTRY_AUTH_TOKEN") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
publish-self-hosted
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
Sensitive data should not be used in the ARG or ENV commands: Dockerfile#L25
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "SENTRY_AUTH_TOKEN") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: Dockerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "SENTRY_AUTH_TOKEN") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
publish-cloud
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
Sensitive data should not be used in the ARG or ENV commands: Dockerfile#L25
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "SENTRY_AUTH_TOKEN") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: Dockerfile#L31
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "SENTRY_AUTH_TOKEN") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/

Artifacts

Produced during runtime
Name Size Digest
appwrite~console~J8A8T7.dockerbuild Expired
144 KB
sha256:73045def910c6cd925d02987ec836c3d2b9827e3fbcaff5a7973bdda1c8dec2b
appwrite~console~MVTNNI.dockerbuild Expired
196 KB
sha256:1641c2ad88f255d16c72b7c4bd0b74a6a81ff079f16d502d1303f969532c047e
appwrite~console~VYQA6V.dockerbuild Expired
145 KB
sha256:8e64c21e58a4ee785666fe806ff4c90f42356028a2f14e7969e7d699cfffa7e6