Skip to content

Disable UPX for binaries shipped in images #5277

Disable UPX for binaries shipped in images

Disable UPX for binaries shipped in images #5277

Triggered via pull request February 25, 2025 19:29
Status Success
Total duration 4m 30s
Artifacts

linting.yml

on: pull_request
No "Apply suggestions from code review" Commits
2s
No "Apply suggestions from code review" Commits
Check branch dependencies
26s
Check branch dependencies
Submariner K8s API Code Generation
1m 20s
Submariner K8s API Code Generation
Protobuf Code Generation
38s
Protobuf Code Generation
Commit Message(s)
11s
Commit Message(s)
Go
3m 53s
Go
Dependency Licenses
2m 36s
Dependency Licenses
Markdown Links (modified files)
10s
Markdown Links (modified files)
Markdown
9s
Markdown
Package Documentation
1m 15s
Package Documentation
Shell
10s
Shell
Variant Analysis
4m 18s
Variant Analysis
Vulnerability Scanning
29s
Vulnerability Scanning
YAML
10s
YAML
Fit to window
Zoom out
Zoom in

Annotations

4 warnings
Variant Analysis
This run of the CodeQL Action does not have permission to access Code Scanning API endpoints. As a result, it will not be opted into any experimental features. This could be because the Action is running on a pull request from a fork. If not, please ensure the Action has the 'security-events: write' permission. Details: Resource not accessible by integration
Variant Analysis
Feature flags do not specify a default CLI version. Falling back to the CLI version shipped with the Action. This is 2.20.4.
Variant Analysis
1 issue was detected with this workflow: Please specify an on.push hook to analyze and see code scanning alerts from the default branch on the Security tab.
Variant Analysis
Unable to validate code scanning workflow: MissingPushHook