Skip to content

⏰ Scheduled build #103

⏰ Scheduled build

⏰ Scheduled build #103

Triggered via schedule February 2, 2025 01:44
Status Failure
Total duration 2h 30m 15s
Artifacts 20

package.yml

on: schedule
Matrix: ubuntu_debian
Matrix: fedora
Matrix: debian_armv6
Fit to window
Zoom out
Zoom in

Annotations

1 error and 13 warnings
🐧 Debian 11.x (Bullseye) Qt 6
buildx failed with: ERROR: failed to solve: process "/bin/sh -c $APT_INSTALL devscripts fakeroot debhelper libdistro-info-perl git curl python3-dev build-essential ninja-build libusb-1.0-0-dev libcec-dev libp8-platform-dev libudev-dev libavahi-core-dev libavahi-compat-libdnssd-dev zlib1g-dev libasound2-dev libjpeg-dev libturbojpeg0-dev libmbedtls-dev libftdi1-dev libssl-dev libglib2.0-dev" did not complete successfully: exit code: 100
Sensitive data should not be used in the ARG or ENV commands: ubuntu_debian#L27
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "APT_KEY_DONT_WARN_ON_DANGEROUS_USAGE") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: ubuntu_debian#L27
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "APT_KEY_DONT_WARN_ON_DANGEROUS_USAGE") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: ubuntu_debian#L27
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "APT_KEY_DONT_WARN_ON_DANGEROUS_USAGE") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: ubuntu_debian#L27
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "APT_KEY_DONT_WARN_ON_DANGEROUS_USAGE") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: ubuntu_debian#L27
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "APT_KEY_DONT_WARN_ON_DANGEROUS_USAGE") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: ubuntu_debian#L27
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "APT_KEY_DONT_WARN_ON_DANGEROUS_USAGE") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: ubuntu_debian#L27
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "APT_KEY_DONT_WARN_ON_DANGEROUS_USAGE") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: ubuntu_debian#L27
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "APT_KEY_DONT_WARN_ON_DANGEROUS_USAGE") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: ubuntu_debian#L27
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "APT_KEY_DONT_WARN_ON_DANGEROUS_USAGE") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: ubuntu_debian#L27
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "APT_KEY_DONT_WARN_ON_DANGEROUS_USAGE") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: ubuntu_debian#L27
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "APT_KEY_DONT_WARN_ON_DANGEROUS_USAGE") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: ubuntu_debian#L27
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "APT_KEY_DONT_WARN_ON_DANGEROUS_USAGE") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: ubuntu_debian#L27
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "APT_KEY_DONT_WARN_ON_DANGEROUS_USAGE") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/

Artifacts

Produced during runtime
Name Size
hyperion-project~hyperion.docker-ci~0UAGH5.dockerbuild
203 KB
hyperion-project~hyperion.docker-ci~1K2YVT.dockerbuild
492 KB
hyperion-project~hyperion.docker-ci~2051U0.dockerbuild
360 KB
hyperion-project~hyperion.docker-ci~37GG9H.dockerbuild
164 KB
hyperion-project~hyperion.docker-ci~6T7HGC.dockerbuild
211 KB
hyperion-project~hyperion.docker-ci~6XD3JU.dockerbuild
390 KB
hyperion-project~hyperion.docker-ci~8ZK2G8.dockerbuild
369 KB
hyperion-project~hyperion.docker-ci~9Z1GHV.dockerbuild
179 KB
hyperion-project~hyperion.docker-ci~C4JIYG.dockerbuild
449 KB
hyperion-project~hyperion.docker-ci~CN12DX.dockerbuild
397 KB
hyperion-project~hyperion.docker-ci~DH0OD1.dockerbuild
219 KB
hyperion-project~hyperion.docker-ci~KMO8H0.dockerbuild
386 KB
hyperion-project~hyperion.docker-ci~NLS6R5.dockerbuild
193 KB
hyperion-project~hyperion.docker-ci~O193ZW.dockerbuild
195 KB
hyperion-project~hyperion.docker-ci~OCU9XQ.dockerbuild
364 KB
hyperion-project~hyperion.docker-ci~Q0UMRM.dockerbuild
387 KB
hyperion-project~hyperion.docker-ci~QBPRCX.dockerbuild
430 KB
hyperion-project~hyperion.docker-ci~UJBUU0.dockerbuild
359 KB
hyperion-project~hyperion.docker-ci~VK41LM.dockerbuild
366 KB
hyperion-project~hyperion.docker-ci~ZIVXG3.dockerbuild
403 KB