WARNING: THIS SITE IS A MIRROR OF GITHUB.COM / IT CANNOT LOGIN OR REGISTER ACCOUNTS / THE CONTENTS ARE PROVIDED AS-IS / THIS SITE ASSUMES NO RESPONSIBILITY FOR ANY DISPLAYED CONTENT OR LINKS / IF YOU FOUND SOMETHING MAY NOT GOOD FOR EVERYONE, CONTACT ADMIN AT ilovescratch@foxmail.com
Skip to content

build(deps): update dependency esbuild to ~0.27.1 #429

build(deps): update dependency esbuild to ~0.27.1

build(deps): update dependency esbuild to ~0.27.1 #429

Workflow file for this run

name: Audit Codes 🔍
on:
push:
branches:
- main
- next
pull_request:
branches:
- '**'
paths-ignore:
- '**/*.md'
- '**/*.txt'
- '**/*.spec.ts'
jobs:
codeql-scan:
name: Scan Vulnerabilities with CodeQL (${{ matrix.language }}) 🛡️
runs-on: ubuntu-latest
permissions:
# required for all workflows
security-events: write
# required to fetch internal or private CodeQL packs
packages: read
# only required for workflows in private repositories
actions: read
contents: read
strategy:
fail-fast: false
matrix:
language: [actions, javascript-typescript]
steps:
- name: Checkout 🛎️
uses: actions/checkout@34e114876b0b11c390a56381ad16ebd13914f8d5 # v4
with:
fetch-depth: 20
fetch-tags: false
- name: Initialize CodeQL ⚙️
uses: github/codeql-action/init@497990dfed22177a82ba1bbab381bc8f6d27058f # v3
with:
languages: ${{ matrix.language }}
- name: Perform CodeQL Analysis 🔍
uses: github/codeql-action/analyze@497990dfed22177a82ba1bbab381bc8f6d27058f # v3
with:
category: '/language:${{ matrix.language }}'
osv-scan:
name: Scan Vulnerabilities with OSV 🛡️
uses: 'google/osv-scanner-action/.github/workflows/osv-scanner-reusable-pr.yml@b77c075a1235514558f0eb88dbd31e22c45e0cd2' # v2.3.0
permissions:
# Required to upload SARIF file to CodeQL. See: https://github.com/github/codeql-action/issues/2117
actions: read
# Require writing security events to upload SARIF file to security tab
security-events: write
# Only need to read contents
contents: read
with:
# Start the scan from the root of the repository and scan subdirectories recursively.
scan-args: |-
--lockfile=package-lock.json
--lockfile=website/package-lock.json
-r
./