...
1name: ClusterFuzzLite PR fuzzing
2on:
3 pull_request:
4 paths:
5 - '**'
6permissions: read-all
7jobs:
8 PR:
9 runs-on: ubuntu-latest
10 concurrency:
11 group: ${{ github.workflow }}-${{ matrix.sanitizer }}-${{ github.ref }}
12 cancel-in-progress: true
13 strategy:
14 fail-fast: false
15 matrix:
16 sanitizer:
17 - address
18 # Override this with the sanitizers you want.
19 # - undefined
20 # - memory
21 steps:
22 - name: Build Fuzzers (${{ matrix.sanitizer }})
23 id: build
24 uses: google/clusterfuzzlite/actions/build_fuzzers@1e163f06cba7820da5154ac9fe1a32d7fe6f73a3 # v1
25 with:
26 language: go
27 github-token: ${{ secrets.GITHUB_TOKEN }}
28 sanitizer: ${{ matrix.sanitizer }}
29 # Optional but recommended: used to only run fuzzers that are affected
30 # by the PR.
31 # See later section on "Git repo for storage".
32 # storage-repo: https://${{ secrets.PERSONAL_ACCESS_TOKEN }}@github.com/OWNER/STORAGE-REPO-NAME.git
33 # storage-repo-branch: main # Optional. Defaults to "main"
34 # storage-repo-branch-coverage: gh-pages # Optional. Defaults to "gh-pages".
35 - name: Run Fuzzers (${{ matrix.sanitizer }})
36 id: run
37 uses: google/clusterfuzzlite/actions/run_fuzzers@1e163f06cba7820da5154ac9fe1a32d7fe6f73a3 # v1
38 with:
39 github-token: ${{ secrets.GITHUB_TOKEN }}
40 fuzz-seconds: 600
41 mode: 'code-change'
42 sanitizer: ${{ matrix.sanitizer }}
43 # Optional but recommended: used to download the corpus produced by
44 # batch fuzzing.
45 # See later section on "Git repo for storage".
46 # storage-repo: https://${{ secrets.PERSONAL_ACCESS_TOKEN }}@github.com/OWNER/STORAGE-REPO-NAME.git
47 # storage-repo-branch: main # Optional. Defaults to "main"
48 # storage-repo-branch-coverage: gh-pages # Optional. Defaults to "gh-pages".
View as plain text