Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Enhance threat intelligence queries in YAML #8

Enhance threat intelligence queries in YAML

Enhance threat intelligence queries in YAML #8

Workflow file for this run

name: Deploy Static Docs
on:
push:
branches: ["main"]
workflow_dispatch:
permissions:
contents: read
pages: write
id-token: write
concurrency:
group: "pages"
cancel-in-progress: false
jobs:
deploy:
environment:
name: github-pages
url: ${{ steps.deployment.outputs.page_url }}
runs-on: ubuntu-latest
steps:
- name: Checkout
uses: actions/checkout@v4
- name: Ensure .nojekyll exists
run: touch docs/_build/html/.nojekyll
- name: Upload artifact
uses: actions/upload-pages-artifact@v3
with:
path: docs/_build/html
- name: Deploy to GitHub Pages
id: deployment
uses: actions/deploy-pages@v4