Skip to content

Move setting /NODEFAULTLIB:MSVCRT LinkerArg to windows-specific targets in Sentry.Native.targets #6056

Move setting /NODEFAULTLIB:MSVCRT LinkerArg to windows-specific targets in Sentry.Native.targets

Move setting /NODEFAULTLIB:MSVCRT LinkerArg to windows-specific targets in Sentry.Native.targets #6056

Workflow file for this run

name: List vulnerable packages
on:
workflow_dispatch:
# Currently broken on .net 8, see https://github.com/NuGet/Home/issues/12954
# schedule:
# - cron: "0 0 * * *" # once a day
# pull_request:
jobs:
list-vulnerable-packages:
name: List vulnerable packages
# Pin macos to get the version of XCode that we need: https://github.com/actions/runner-images/issues/10703
runs-on: macos-15
steps:
- name: Checkout
uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0
with:
submodules: recursive
- name: Setup Environment
uses: ./.github/actions/environment
# We only need to restore to check for vulnerable packages
- name: Restore .NET Dependencies
run: dotnet restore Sentry.sln --nologo
# The dotnet list package command doesn't change its exit code on detection, so tee to a file and scan it
# See https://github.com/NuGet/Home/issues/11315#issuecomment-1243055173
- name: List vulnerable packages
shell: bash
run: |
dotnet list ${{ github.workspace }}/Sentry.sln package --vulnerable --include-transitive | tee vulnerable.txt
# https://github.com/getsentry/sentry-dotnet/issues/2814
# ! grep 'has the following vulnerable packages' vulnerable.txt