You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Let's say a user runs a Nextflow pipeline. They don't know Nextflow, they're just following instructions on how to run the pipeline, so they're not aware of what package manager is being used to solve software dependencies or what conda channels were picked. If the pipeline is set to use Wave to build a container image based on a dockerfile, conda recipe, or conda process directives, Wave during the build could warn the user that the defaults anaconda channel is being used.
The text was updated successfully, but these errors were encountered:
Wave already does security checking with Trivy. Based on that, it would be nice if Wave could perform additional checks.
Let's say a user runs a Nextflow pipeline. They don't know Nextflow, they're just following instructions on how to run the pipeline, so they're not aware of what package manager is being used to solve software dependencies or what conda channels were picked. If the pipeline is set to use Wave to build a container image based on a dockerfile, conda recipe, or conda process directives, Wave during the build could warn the user that the defaults anaconda channel is being used.
The text was updated successfully, but these errors were encountered: