-
Notifications
You must be signed in to change notification settings - Fork 1.5k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
do not run the scheduled GitHub actions or CIFuzz on forks / some sma…
…ll cleanups (#6107)
- Loading branch information
Showing
10 changed files
with
28 additions
and
18 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
ed64e97
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@firewave hmm I am not sure about running CI fuzzer on pull requests. It's not deterministic is it?
Cppcheck is registered in the oss-fuzz platform I don't know if it might be better to review that fuzzing.
ed64e97
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If we would like to have a dedicated VM on AWS for fuzzing then please let me know I can probably provide it. I just don't know how we would publish the results..
ed64e97
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@danmar
CIFuzz is OSS-Fuzz. It is a n GitHub action to detect potential fuzzing failure within the scope of a commit/PR so the potential issue will never be merged in the first place.
No need for that because it is provided by the OSS-Fuzz project. They are publishing the results and they are visible to everybody.
We should fix our fuzzing though but I wanted to make sure the issues detected during simple local runs are fixed first because we pull the trigger on that so we do not get swamped with OSS-Fuzz reports immediate. I also lack the permissions to look at the actual payload attached to the reports so right you would be the one to transfer the detected issues into Trac.
ed64e97
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
ok. But well it is not deterministic right? Rerunning the fuzzer a second time could make it green. Or could expose a different bug.
I can transfer the reports but I think it would be best if others have the permission also.
I also lack the permissions to look at the actual payload attached to the reports so right you would be the one to transfer the detected issues into Trac.