Skip to content

[GHSA-78xj-cgh5-2h22] NPM IP package vulnerable to Server-Side Request Forgery (SSRF) attacks #3090

[GHSA-78xj-cgh5-2h22] NPM IP package vulnerable to Server-Side Request Forgery (SSRF) attacks

[GHSA-78xj-cgh5-2h22] NPM IP package vulnerable to Server-Side Request Forgery (SSRF) attacks #3090

name: Delete PR staging and head branches
on:
pull_request_target:
branches: ["*/advisory-improvement-*"]
types: [closed]
paths:
- "advisories/**"
workflow_dispatch:
jobs:
delete-staging-and-head-branches:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v2
- name: Delete staging and head branches
env:
STAGING_BRANCH: ${{ github.event.pull_request.base.ref }}
HEAD_BRANCH: ${{ github.event.pull_request.head.ref }}
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
run: |
set -xeo pipefail
git push origin --delete --force $STAGING_BRANCH
git push origin --delete --force $HEAD_BRANCH