github.com/TugasAkhir-QUIC/quic-go@v0.0.2-0.20240215011318-d20e25a9054c/.github/workflows/clusterfuzz-lite-pr.yml (about) 1 name: ClusterFuzzLite PR fuzzing 2 on: 3 pull_request: 4 paths: 5 - '**' 6 7 permissions: read-all 8 jobs: 9 PR: 10 runs-on: ${{ fromJSON(vars['CLUSTERFUZZ_LITE_RUNNER_UBUNTU'] || '"ubuntu-latest"') }} 11 concurrency: 12 group: ${{ github.workflow }}-${{ matrix.sanitizer }}-${{ github.ref }} 13 cancel-in-progress: true 14 strategy: 15 fail-fast: false 16 matrix: 17 sanitizer: 18 - address 19 steps: 20 - name: Build Fuzzers (${{ matrix.sanitizer }}) 21 id: build 22 uses: google/clusterfuzzlite/actions/build_fuzzers@v1 23 with: 24 language: go 25 github-token: ${{ secrets.GITHUB_TOKEN }} 26 sanitizer: ${{ matrix.sanitizer }} 27 # Optional but recommended: used to only run fuzzers that are affected 28 # by the PR. 29 # See later section on "Git repo for storage". 30 # storage-repo: https://${{ secrets.PERSONAL_ACCESS_TOKEN }}@github.com/OWNER/STORAGE-REPO-NAME.git 31 # storage-repo-branch: main # Optional. Defaults to "main" 32 # storage-repo-branch-coverage: gh-pages # Optional. Defaults to "gh-pages". 33 - name: Run Fuzzers (${{ matrix.sanitizer }}) 34 id: run 35 uses: google/clusterfuzzlite/actions/run_fuzzers@v1 36 with: 37 github-token: ${{ secrets.GITHUB_TOKEN }} 38 fuzz-seconds: 480 39 mode: 'code-change' 40 sanitizer: ${{ matrix.sanitizer }} 41 output-sarif: true 42 parallel-fuzzing: true 43 # Optional but recommended: used to download the corpus produced by 44 # batch fuzzing. 45 # See later section on "Git repo for storage". 46 # storage-repo: https://${{ secrets.PERSONAL_ACCESS_TOKEN }}@github.com/OWNER/STORAGE-REPO-NAME.git 47 # storage-repo-branch: main # Optional. Defaults to "main" 48 # storage-repo-branch-coverage: gh-pages # Optional. Defaults to "gh-pages".