Skip to content

[GHSA-x9vc-6hfv-hg8c] Npgsql vulnerable to SQL Injection via Protocol Message Size Overflow #3892

[GHSA-x9vc-6hfv-hg8c] Npgsql vulnerable to SQL Injection via Protocol Message Size Overflow

[GHSA-x9vc-6hfv-hg8c] Npgsql vulnerable to SQL Injection via Protocol Message Size Overflow #3892

name: Delete PR staging and head branches
on:
pull_request_target:
branches: ["*/advisory-improvement-*"]
types: [closed]
paths:
- "advisories/**"
workflow_dispatch:
jobs:
delete-staging-and-head-branches:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v2
- name: Delete staging and head branches
env:
STAGING_BRANCH: ${{ github.event.pull_request.base.ref }}
HEAD_BRANCH: ${{ github.event.pull_request.head.ref }}
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
run: |
set -xeo pipefail
git push origin --delete --force $STAGING_BRANCH
git push origin --delete --force $HEAD_BRANCH