pingora request smuggling and cache poisoning #3850
Workflow file for this run
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: Validate | |
on: | |
pull_request: {} | |
push: | |
branches: main | |
jobs: | |
lint: | |
name: Lint advisories | |
runs-on: ubuntu-latest | |
steps: | |
- uses: actions/checkout@v4 | |
- name: Cache cargo bin | |
id: admin-cache | |
uses: actions/cache@v4 | |
with: | |
path: ~/.cargo/bin | |
key: rustsec-admin-b7c69254bda9b8f4c94bc5eaef47e5bb3a97d8cd | |
- name: Install rustsec-admin | |
if: steps.admin-cache.outputs.cache-hit != 'true' | |
run: cargo install --git https://github.com/rustsec/rustsec rustsec-admin --rev b7c69254bda9b8f4c94bc5eaef47e5bb3a97d8cd | |
- name: Lint advisories | |
run: rustsec-admin lint --skip-namecheck rustdecimal,vec-const |