File: cifuzz.yml

package info (click to toggle)
liblouis 3.37.0-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 86,484 kB
  • sloc: ansic: 37,425; makefile: 1,308; python: 772; lisp: 390; sh: 353; perl: 221; cpp: 21
file content (56 lines) | stat: -rw-r--r-- 2,017 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
# CIFuzz action for OSS-Fuzz set up of Liblouis.
# CIFuzz documentation:
# - https://google.github.io/oss-fuzz/getting-started/continuous-integration
# Liblouis OSS-Fuzz project:
# - https://github.com/google/oss-fuzz/blob/master/projects/liblouis
# This CI action will build the fuzzers using the Dockerfile and build.sh
# script from the Liblouis OSS-Fuzz project folder. It runs on GitHub's
# servers.

# NOTE: This fuzzer tests both table loading and translation of input. Only the
# translation deals with untrusted input, so only issues reported from the translation
# code are critical, see also SECURITY.md

# NOTE: For now this workflow is disabled (via the github user interface) because
# the fuzzing is run on the OSS-Fuzz infrastructure. It seems of little use to
# run the same thing twice.

name: CIFuzz
on:
  pull_request:
    branches: [ master ]
    paths:
      - '**.h'
      - '**.c'
      - 'liblouis/liblouis/liblouis.h.in'

permissions:  # added using https://github.com/step-security/secure-workflows
  contents: read

jobs:
  Fuzzing:
    runs-on: ubuntu-latest
    steps:
    - name: Harden Runner
      uses: step-security/harden-runner@20cf305ff2072d973412fa9b1e3a4f227bda3c76 # v2.14.0
      with:
        egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs

    - name: Build Fuzzers
      id: build
      uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@027c5886032f59e952af751069dcb3d4cb134c73 # master
      with:
        oss-fuzz-project-name: 'liblouis'
        language: c
    - name: Run Fuzzers
      uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@027c5886032f59e952af751069dcb3d4cb134c73 # master
      with:
        oss-fuzz-project-name: 'liblouis'
        fuzz-seconds: 300
        language: c
    - name: Upload Crash
      uses: actions/upload-artifact@b7c566a772e6b6bfb58ed0dc250532a479d7789f # v6.0.0
      if: failure() && steps.build.outcome == 'success'
      with:
        name: artifacts
        path: ./out/artifacts