summaryrefslogtreecommitdiffstats
path: root/travis-ci/managers (follow)
Commit message (Collapse)AuthorAgeFilesLines
* travis: compile with -O1 with clangFrantisek Sumsal2020-07-201-1/+2
| | | | | | | | | | libc in the Debian container got updated to 2.31, which in combination with clang-9 triggers systemd/systemd#14865. This has been fixed by https://reviews.llvm.org/D74712 which is (to my knowledge) included in clang-10. To mitigate this without upgrading to clang-10 we can compile with -O1 which works around it as well, see https://bugzilla.redhat.com/show_bug.cgi?id=1803203.
* coverity: install systemdEvgeny Vereshchagin2020-07-131-2/+2
| | | | | | | | | | | Apparently systemd is no longer installed in fedora containers by default ``` docker: Error response from daemon: OCI runtime create failed: container_linux.go:348: starting container process caused "exec: \"/sbin/init\": stat /sbin/init: no such file or directory": unknown. The command "$CI_MANAGERS/fedora.sh SETUP" failed and exited with 127 during . ```
* travis: install missing deps for the Coverity runFrantisek Sumsal2020-07-061-2/+6
| | | | | | | Let's install libzstd & libfido2 to cover two recently added features. In case of libfido2 this should also get rid of the 'dead code' issues found by Coverity, like CID#1430168, CID#1430167, CID#1430166, or CID#1430165.
* ci: free up some resources on PipelinesEvgeny Vereshchagin2020-06-251-16/+1
| | | | | Now that CIFuzz supports all the sanitizers we use and ALLOWED_BROKEN_TARGETS_PERCENTAGE we no longer need that bash script.
* travis: sort dependenciesFrantisek Sumsal2020-06-162-24/+28
|
* travis: drop stuff moved to GH ActionsFrantisek Sumsal2020-06-161-48/+0
|
* travis: use a matrix for similar jobsFrantisek Sumsal2020-06-162-9/+9
|
* turn off fuzzit part 2Evgeny Vereshchagin2020-06-111-73/+0
| | | | it's just a follow-up to https://github.com/systemd/systemd/pull/16064
* ci: move the build check script to workflows directoryFrantisek Sumsal2020-06-111-114/+0
|
* ci: do the compiler-detection magic in the test scriptFrantisek Sumsal2020-06-111-16/+37
| | | | so we have all PPA definitions at one place.
* ci: add homed/zstd dependenciesFrantisek Sumsal2020-06-111-1/+10
| | | | Also, sort the whole list when we're at it.
* github: move the clang/gcc build check to GH ActionsFrantisek Sumsal2020-06-111-0/+84
| | | | | Travis CI is getting overloaded, so let's move some load over to GitHub Actions.
* travis: check build with various compiler optionsFrantisek Sumsal2020-06-091-6/+70
| | | | | | | In the past we occasionally stumbled upon a build issue which could be reproduced only with specific optimization level or other compilation option. Let's try to build the current revision with several most common compiler options causing such issues to catch them early.
* fuzzit: switch to -fundefinedEvgeny Vereshchagin2020-05-271-4/+1
| | | | | | Now that https://github.com/systemd/systemd/issues/15907 is gone, we can simply use "undefined" instead of listing all the possible checks explicitly.
* travis: enable fuzzer regression tests under sanitizersFrantisek Sumsal2020-05-221-1/+4
|
* fuzzit: turn on the pointer-overflow checkEvgeny Vereshchagin2020-05-201-3/+2
| | | | | Now that https://github.com/systemd/systemd/issues/15583 is gone, it should be safe to turn it on.
* ci: install fdisk on DebianEvgeny Vereshchagin2020-05-141-0/+1
| | | | | | | To judge from https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947134 and https://salsa.debian.org/debian/util-linux/-/commit/44ec91ef110e7131d8a0467374797bc2e0f30e51, `util-linux` no longer depends on `fdisk` so it seems it should be installed manually.
* install libzstd-dev for CI buildsNorbert Lange2020-05-041-1/+3
|
* fuzzit: make the submit phase a bit more robustFrantisek Sumsal2020-04-241-2/+22
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The submit phase of the Fuzzit Travis job has been spuriously failing for some time with various (and usually pretty hidden) errors, like: ``` ./fuzzit create job --type regression ... 2020/04/23 17:02:12 please set env variable FUZZIT_API_KEY or pass --api-key. API Key for you account: ... ``` ``` ./fuzzit create job --type regression ... 2020/04/23 11:36:53 Creating job... 2020/04/23 11:36:54 Uploading fuzzer... 2020/04/23 11:36:54 Job created successfully 2020/04/23 11:36:54 Get https://...&action=create: read tcp x.x.x.x:39674->x.x.x.x:443: read: connection reset by peer ``` ``` ./fuzzit create job --type regression ... 2020/04/22 18:09:15 Creating job... 2020/04/22 18:09:16 Uploading fuzzer... 2020/04/22 18:09:37 Job created successfully 2020/04/22 18:09:37 500 Internal Server Error ``` etc. Let's retry each submit job up to three times to (hopefully) mitigate this.
* tree-wide: fix spelling errorsFrantisek Sumsal2020-04-211-1/+1
| | | | | | Based on a report from Fossies.org using Codespell. Followup to #15436
* ci: turn off FuzzBuzzEvgeny Vereshchagin2020-03-301-5/+0
| | | | I don't think anyone uses it.
* travis: install ninja with pipEvgeny Vereshchagin2020-03-301-2/+2
| | | | | https://mesonbuild.com/Release-notes-for-0-54-0.html#ninja-version-requirement-bumped-to-17 https://github.com/mesonbuild/meson/issues/6867
* ci: pass max_total_time to libFuzzerEvgeny Vereshchagin2020-02-181-1/+1
| | | | | Since clang was updated to 9.0.1 libFuzzer has been exiting with 72 when it's run with timeout. Let's pass -max_total_time to it instead.
* ci: add new dependencies to CILennart Poettering2020-01-284-2/+4
|
* test: unpin meson from v0.52.1Frantisek Sumsal2020-01-252-6/+2
| | | | | | | | The compatibility issue in meson v0.53 has been fixed in v0.53.1, which is already available through pip, so let's remove the pin for meson introduced before. Reverts: 514793658c499821383bdc8bbf1d33048c18dd40
* ci: add dependencies for repart + cryptsetup's pkcs#11 supportLennart Poettering2020-01-204-2/+12
| | | | | | Let's make sure we can test systemd-repart properly (And while we are at it, also test cryptsetup-pkcs#11)
* test: pin meson to 0.52.1 for fuzzit/fuzzbuzzFrantisek Sumsal2020-01-082-2/+6
| | | | | | | | Latest meson doesn't work with older python 3.5, which is present on Ubuntu 16.04. Let's pin in to the latest working version (0.52.1) until we properly bump all necessary Ubuntu images to 18.04. See: https://github.com/mesonbuild/meson/issues/6427
* travis: wait for the container to fully boot upFrantisek Sumsal2019-12-312-2/+8
| | | | | | | This avoids nasty race conditions between dnf/apt-get and unfinished population of /tmp (among other things), as `docker exec` allows commands to run before the system is fully booted (i.e. initializing/starting state reported by `systemctl is-system-running`).
* coverity: replace python with jqEvgeny Vereshchagin2019-10-301-1/+1
| | | | | | | | Judging by https://travis-ci.org/systemd/systemd/jobs/604425785 (where the script failed with "tools/coverity.sh: line 45: python: command not found") python-unversioned-command is no longer installed by default with python2. Given that it's not the first time python has vanished and it's not clear what exactly should be installed to make sure it's there, let's just use jq instead.
* fuzzit: export the API key instead of using `auth`Evgeny Vereshchagin2019-09-121-3/+1
| | | | "We removed some cahing related code that auth used and caused problems"
* travis: switch to the latest version of the fuzzit CLIEvgeny Vereshchagin2019-09-061-5/+5
| | | | | | | I was informed that fuzzit-1.1 is going to be deprecated soon. Generally the latest version isn't recommened because it's still in beta and theoretically might be backwards incompatible but let's try rolling forward to avoid PRs like this going forward. We can always roll it back :-)
* travis: protect the systemd organization on Fuzzit from forksv243.1Evgeny Vereshchagin2019-09-061-1/+5
| | | | | | | | Now that v243 is out, the script has been pulled by forks that are activated on Travis CI. As a result, all those forks have started to send their fuzzers to Fuzzit inadvertantly consuming our CPUs along the way. Let's prevent this by bailing out early if the script is run outside of the systemd repository.
* fuzzit: get MSan to track originsEvgeny Vereshchagin2019-08-091-1/+1
| | | | | | | | It's just a follow-up to https://github.com/systemd/systemd/pull/13281 that should make it a little bit easier to make sense of MSan reports. https://clang.llvm.org/docs/MemorySanitizer.html#origin-tracking
* fuzzit: collapse a series of commandsEvgeny Vereshchagin2019-08-081-64/+2
| | | | | Now that the ids are gone, we can generate commands simply using names as we go
* fuzzit: switch to a new organizationEvgeny Vereshchagin2019-08-081-32/+32
|
* fuzzit: unleash MSan on all the fuzzersEvgeny Vereshchagin2019-08-081-1/+38
|
* fuzzit: ignore library versionYu Watanabe2019-07-231-1/+1
|
* Free up some resources on Azure PipelinesEvgeny Vereshchagin2019-07-171-59/+0
| | | | | Let's drop the tests we also run on CentOS CI to free up some resources for something more useful.
* tests: run TEST-01-BASIC under ASAN+UBSan againEvgeny Vereshchagin2019-07-161-3/+1
| | | | | Not that `journalctl --flush` is no longer flaky, it should be safe to bring the test back.
* tests: turn on the "object-size" UBSan check on FuzzitEvgeny Vereshchagin2019-07-111-2/+2
| | | | Now that 2eb1c19881678851a7e is merged it should be safe.
* test: install missing dependencies for CIsFrantisek Sumsal2019-07-082-1/+2
|
* travis: turn on all default UBSan checks except for pointer-overflow, ↵Evgeny Vereshchagin2019-06-171-5/+4
| | | | object-size and float-cast-overflow
* fuzzit: sort UBSan checks alphabeticallyEvgeny Vereshchagin2019-06-171-1/+1
| | | | to make it easier to make sense of them
* travis: turn on nonnull-attribute on FuzzitEvgeny Vereshchagin2019-06-151-1/+1
|
* travis: add more ASan optionsEvgeny Vereshchagin2019-06-151-1/+3
|
* travis: clean up bash variables a bitEvgeny Vereshchagin2019-06-151-6/+8
| | | | in preparation for adding more ASan options
* travis: use UBSan checks from OSS-FuzzEvgeny Vereshchagin2019-06-151-2/+9
| | | | | | This should help to silence UBSan reports mentioned in https://github.com/systemd/systemd/pull/12771#issuecomment-502139157 for now.
* travis: turn on UBSan on FuzzitEvgeny Vereshchagin2019-06-151-1/+1
|
* travis: add 5 more fuzz targetsEvgeny Vereshchagin2019-06-141-2/+10
|
* Continuous Fuzzing Integration with FuzzitJeka Pats2019-06-141-0/+60
| | | | | | | | | | includes two travis ci steps: 1) Every pull-request/push all fuzzing targets will do a quick sanity run on the generated corpus and crashes (via Fuzzit) 2) On a daily basis the fuzzing targets will be compiled (from master) and will and their respectible fuzzing job on Fuzzit will be updated to the new binary.