commit | 4fbb42e28799e8ef039995cecb36b3cd52d20226 | [log] [tgz] |
---|---|---|
author | Jonathan Amsterdam <jba@google.com> | Fri Jan 07 11:06:11 2022 -0500 |
committer | Jonathan Amsterdam <jba@google.com> | Fri Jan 07 17:22:02 2022 +0000 |
tree | 79c6c6ba12b75456225e3b13a10f105d707623ee | |
parent | 77392fc97f250face486940ecfbc30c50bfe1e2e [diff] |
devtools/curl_worker.sh: use impersonate service account For curling the prod worker, use a new service account set up in the go-vuln project. Change-Id: I95a8c6584792cc137b9f3e55e24e6a5e9b148c0f Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/376297 Trust: Jonathan Amsterdam <jba@google.com> Run-TryBot: Jonathan Amsterdam <jba@google.com> TryBot-Result: Gopher Robot <gobot@golang.org> Reviewed-by: Julie Qiu <julie@golang.org>
This repository contains the reports for the Go Vulnerability Database.
If you are interested accessing data from the Go Vulnerability Database, see x/vuln for information. This repository is only used for adding new vulnerabilities.
We are not accepting new vulnerability reports at this time. We will update this README.md once we are ready to receive reports.
Unless otherwise noted, the Go source files are distributed under the BSD-style license found in the LICENSE file.
Database entries are distributed under the terms of the CC-BY 4.0 license. See x/vuln for information on how to access these entries.