123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640 |
- # Copyright 2021-2024 The OpenSSL Project Authors. All Rights Reserved.
- #
- # Licensed under the Apache License 2.0 (the "License"). You may not use
- # this file except in compliance with the License. You can obtain a copy
- # in the file LICENSE in the source distribution or at
- # https://www.openssl.org/source/license.html
- name: GitHub CI
- on: [pull_request, push]
- # for some reason, this does not work:
- # variables:
- # BUILDOPTS: "-j4"
- # HARNESS_JOBS: "${HARNESS_JOBS:-4}"
- # for some reason, this does not work:
- # before_script:
- # - make="make -s"
- permissions:
- contents: read
- env:
- OSSL_RUN_CI_TESTS: 1
- jobs:
- check_update:
- runs-on: ${{ github.server_url == 'https://github.com' && 'ubuntu-latest' || 'ubuntu-22.04-self-hosted' }}
- steps:
- - name: install unifdef
- run: |
- sudo apt-get update
- sudo apt-get -yq --no-install-suggests --no-install-recommends --force-yes install unifdef
- - uses: actions/checkout@v4
- with:
- fetch-depth: 0
- - name: config
- run: ./config --banner=Configured --strict-warnings enable-fips && perl configdata.pm --dump
- - name: make build_generated
- run: make -s build_generated
- - name: make update
- run: make update
- - name: git diff
- run: git diff --exit-code
- check_docs:
- runs-on: ${{ github.server_url == 'https://github.com' && 'ubuntu-latest' || 'ubuntu-22.04-self-hosted' }}
- steps:
- - uses: actions/checkout@v4
- - name: config
- run: ./config --banner=Configured --strict-warnings enable-fips && perl configdata.pm --dump
- - name: make build_generated
- run: make -s build_generated
- - name: make doc-nits
- run: make doc-nits
- - name: make help
- run: make help
- - name: make md-nits
- run: |
- sudo gem install mdl
- make md-nits
- # This checks that we use ANSI C language syntax and semantics.
- # We are not as strict with libraries, but rather adapt to what's
- # expected to be available in a certain version of each platform.
- check-ansi:
- runs-on: ${{ github.server_url == 'https://github.com' && 'ubuntu-latest' || 'ubuntu-22.04-self-hosted' }}
- steps:
- - uses: actions/checkout@v4
- - name: config
- run: CPPFLAGS='-ansi -D_XOPEN_SOURCE=1 -D_POSIX_C_SOURCE=200809L' ./config --banner=Configured no-asm no-secure-memory no-makedepend enable-buildtest-c++ enable-fips --strict-warnings && perl configdata.pm --dump
- - name: make
- run: make -s -j4
- basic_gcc:
- runs-on: ${{ github.server_url == 'https://github.com' && 'ubuntu-latest' || 'ubuntu-22.04-self-hosted' }}
- steps:
- - uses: actions/checkout@v4
- - name: checkout fuzz/corpora submodule
- run: git submodule update --init --depth 1 fuzz/corpora
- - name: localegen
- run: sudo locale-gen tr_TR.UTF-8
- - name: config
- # enable-quic is on by default, but we leave it here to check we're testing the explicit enable somewhere
- run: CC=gcc ./config --banner=Configured enable-demos enable-h3demo enable-fips enable-quic --strict-warnings && perl configdata.pm --dump
- - name: make
- run: make -s -j4
- - name: get cpu info
- run: |
- cat /proc/cpuinfo
- ./util/opensslwrap.sh version -c
- - name: make test
- run: .github/workflows/make-test
- - name: save artifacts
- uses: actions/upload-artifact@v3
- with:
- name: "ci@basic-gcc"
- path: artifacts.tar.gz
- basic_clang:
- runs-on: ${{ github.server_url == 'https://github.com' && 'ubuntu-latest' || 'ubuntu-22.04-self-hosted' }}
- steps:
- - uses: actions/checkout@v4
- - name: checkout fuzz/corpora submodule
- run: git submodule update --init --depth 1 fuzz/corpora
- - name: config
- run: CC=clang ./config --banner=Configured enable-demos enable-h3demo no-fips --strict-warnings && perl configdata.pm --dump
- - name: make
- run: make -s -j4
- - name: get cpu info
- run: |
- cat /proc/cpuinfo
- ./util/opensslwrap.sh version -c
- - name: make test
- run: .github/workflows/make-test
- - name: save artifacts
- uses: actions/upload-artifact@v3
- with:
- name: "ci@basic-clang"
- path: artifacts.tar.gz
- self-hosted:
- if: github.repository == 'openssl/openssl'
- strategy:
- matrix:
- os: [freebsd-13.2, ubuntu-arm64-22.04]
- runs-on: ${{ matrix.os }}-self-hosted
- continue-on-error: true
- steps:
- - uses: actions/checkout@v4
- - name: config
- run: ./config enable-demos enable-fips enable-ec_nistp_64_gcc_128 enable-md2 enable-rc5 enable-ssl3 enable-ssl3-method enable-trace
- - name: config dump
- run: ./configdata.pm --dump
- - name: make
- run: make -j4
- - name: get cpu info
- run: ./util/opensslwrap.sh version -c
- - name: make test
- run: .github/workflows/make-test
- - name: save artifacts
- uses: actions/upload-artifact@v3
- with:
- name: "ci@self-hosted-${{ matrix.os }}"
- path: artifacts.tar.gz
- minimal:
- runs-on: ${{ github.server_url == 'https://github.com' && 'ubuntu-latest' || 'ubuntu-22.04-self-hosted' }}
- steps:
- - uses: actions/checkout@v4
- - name: checkout fuzz/corpora submodule
- run: git submodule update --init --depth 1 fuzz/corpora
- - name: config
- run: ./config --banner=Configured --strict-warnings enable-demos enable-h3demo no-bulk no-pic no-asm -DOPENSSL_NO_SECURE_MEMORY -DOPENSSL_SMALL_FOOTPRINT && perl configdata.pm --dump
- - name: make
- run: make -j4 # verbose, so no -s here
- - name: get cpu info
- run: |
- cat /proc/cpuinfo
- ./util/opensslwrap.sh version -c
- - name: make test
- run: .github/workflows/make-test
- - name: save artifacts
- uses: actions/upload-artifact@v3
- with:
- name: "ci@minimal"
- path: artifacts.tar.gz
- no-deprecated:
- runs-on: ${{ github.server_url == 'https://github.com' && 'ubuntu-latest' || 'ubuntu-22.04-self-hosted' }}
- steps:
- - uses: actions/checkout@v4
- - name: checkout fuzz/corpora submodule
- run: git submodule update --init --depth 1 fuzz/corpora
- - name: config
- run: ./config --banner=Configured --strict-warnings enable-demos enable-h3demo no-deprecated enable-fips && perl configdata.pm --dump
- - name: make
- run: make -s -j4
- - name: get cpu info
- run: |
- cat /proc/cpuinfo
- ./util/opensslwrap.sh version -c
- - name: make test
- run: .github/workflows/make-test
- - name: save artifacts
- uses: actions/upload-artifact@v3
- with:
- name: "ci@no-deprecated"
- path: artifacts.tar.gz
- no-shared-ubuntu:
- runs-on: ${{ github.server_url == 'https://github.com' && 'ubuntu-latest' || 'ubuntu-22.04-self-hosted' }}
- steps:
- - uses: actions/checkout@v4
- - name: checkout fuzz/corpora submodule
- run: git submodule update --init --depth 1 fuzz/corpora
- - name: config
- run: ./config --banner=Configured --strict-warnings enable-demos enable-h3demo no-shared no-fips && perl configdata.pm --dump
- - name: make
- run: make -s -j4
- - name: get cpu info
- run: |
- cat /proc/cpuinfo
- ./util/opensslwrap.sh version -c
- - name: make test
- run: .github/workflows/make-test
- - name: save artifacts
- uses: actions/upload-artifact@v3
- with:
- name: "ci@no-shared-ubuntu"
- path: artifacts.tar.gz
- no-shared-macos:
- strategy:
- fail-fast: false
- matrix:
- os: [macos-13, macos-14]
- if: github.server_url == 'https://github.com'
- runs-on: ${{ matrix.os }}
- steps:
- - uses: actions/checkout@v4
- - name: checkout fuzz/corpora submodule
- run: git submodule update --init --depth 1 fuzz/corpora
- - name: config
- run: ./config --banner=Configured --strict-warnings enable-demos enable-h3demo no-shared no-fips && perl configdata.pm --dump
- - name: make
- run: make -s -j4
- - name: get cpu info
- run: |
- sysctl machdep.cpu
- ./util/opensslwrap.sh version -c
- - name: make test
- run: .github/workflows/make-test
- - name: save artifacts
- uses: actions/upload-artifact@v3
- with:
- name: "ci@no-shared-${{ matrix.os }}"
- path: artifacts.tar.gz
- non-caching:
- runs-on: ${{ github.server_url == 'https://github.com' && 'ubuntu-latest' || 'ubuntu-22.04-self-hosted' }}
- steps:
- - uses: actions/checkout@v4
- - name: checkout fuzz/corpora submodule
- run: git submodule update --init --depth 1 fuzz/corpora
- - name: Adjust ASLR for sanitizer
- run: |
- sudo cat /proc/sys/vm/mmap_rnd_bits
- sudo sysctl -w vm.mmap_rnd_bits=28
- - name: config
- run: ./config --banner=Configured --debug enable-demos enable-h3demo enable-asan enable-ubsan no-cached-fetch no-fips no-dtls no-tls1 no-tls1-method no-tls1_1 no-tls1_1-method no-async && perl configdata.pm --dump
- - name: make
- run: make -s -j4
- - name: get cpu info
- run: |
- cat /proc/cpuinfo
- ./util/opensslwrap.sh version -c
- - name: make test
- run: .github/workflows/make-test OPENSSL_TEST_RAND_ORDER=0 TESTS="-test_fuzz* -test_ssl_* -test_sslapi -test_evp -test_cmp_http -test_verify -test_cms -test_store -test_enc -[01][0-9]"
- - name: save artifacts
- uses: actions/upload-artifact@v3
- with:
- name: "ci@non-caching"
- path: artifacts.tar.gz
- address_ub_sanitizer:
- runs-on: ${{ github.server_url == 'https://github.com' && 'ubuntu-latest' || 'ubuntu-22.04-self-hosted' }}
- steps:
- - uses: actions/checkout@v4
- - name: checkout fuzz/corpora submodule
- run: git submodule update --init --depth 1 fuzz/corpora
- - name: Adjust ASLR for sanitizer
- run: |
- sudo cat /proc/sys/vm/mmap_rnd_bits
- sudo sysctl -w vm.mmap_rnd_bits=28
- - name: config
- run: ./config --banner=Configured --debug enable-demos enable-h3demo enable-asan enable-ubsan enable-rc5 enable-md2 enable-ec_nistp_64_gcc_128 enable-fips && perl configdata.pm --dump
- - name: make
- run: make -s -j4
- - name: get cpu info
- run: |
- cat /proc/cpuinfo
- ./util/opensslwrap.sh version -c
- - name: make test
- run: .github/workflows/make-test OPENSSL_TEST_RAND_ORDER=0
- - name: save artifacts
- uses: actions/upload-artifact@v3
- with:
- name: "ci@address_ub_sanitizer"
- path: artifacts.tar.gz
- fuzz_tests:
- runs-on: ${{ github.server_url == 'https://github.com' && 'ubuntu-latest' || 'ubuntu-22.04-self-hosted' }}
- steps:
- - uses: actions/checkout@v4
- - name: checkout fuzz/corpora submodule
- run: git submodule update --init --depth 1 fuzz/corpora
- - name: Adjust ASLR for sanitizer
- run: |
- sudo cat /proc/sys/vm/mmap_rnd_bits
- sudo sysctl -w vm.mmap_rnd_bits=28
- - name: config
- run: ./config --banner=Configured --debug -DPEDANTIC -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION enable-asan enable-ubsan enable-rc5 enable-md2 enable-ec_nistp_64_gcc_128 enable-weak-ssl-ciphers enable-ssl3 enable-ssl3-method enable-nextprotoneg && perl configdata.pm --dump
- - name: make
- run: make -s -j4
- - name: get cpu info
- run: |
- cat /proc/cpuinfo
- ./util/opensslwrap.sh version -c
- - name: make test
- run: .github/workflows/make-test OPENSSL_TEST_RAND_ORDER=0 TESTS="test_fuzz*"
- - name: save artifacts
- uses: actions/upload-artifact@v3
- with:
- name: "ci@fuzz_tests"
- path: artifacts.tar.gz
- if-no-files-found: ignore
- memory_sanitizer:
- runs-on: ${{ github.server_url == 'https://github.com' && 'ubuntu-latest' || 'ubuntu-22.04-self-hosted' }}
- steps:
- - uses: actions/checkout@v4
- - name: checkout fuzz/corpora submodule
- run: git submodule update --init --depth 1 fuzz/corpora
- - name: Adjust ASLR for sanitizer
- run: |
- sudo cat /proc/sys/vm/mmap_rnd_bits
- sudo sysctl -w vm.mmap_rnd_bits=28
- - name: config
- # --debug -O1 is to produce a debug build that runs in a reasonable amount of time
- run: CC=clang ./config --banner=Configured --debug -O1 -fsanitize=memory -DOSSL_SANITIZE_MEMORY -fno-optimize-sibling-calls enable-rc5 enable-md2 enable-ec_nistp_64_gcc_128 enable-fips && perl configdata.pm --dump
- - name: make
- run: make -s -j4
- - name: get cpu info
- run: |
- cat /proc/cpuinfo
- ./util/opensslwrap.sh version -c
- - name: make test
- run: .github/workflows/make-test OPENSSL_TEST_RAND_ORDER=0
- - name: save artifacts
- uses: actions/upload-artifact@v3
- with:
- name: "ci@memory_sanitizer"
- path: artifacts.tar.gz
- threads_sanitizer:
- runs-on: ${{ github.server_url == 'https://github.com' && 'ubuntu-latest' || 'ubuntu-22.04-self-hosted' }}
- steps:
- - uses: actions/checkout@v4
- - name: checkout fuzz/corpora submodule
- run: git submodule update --init --depth 1 fuzz/corpora
- - name: Adjust ASLR for sanitizer
- run: |
- sudo cat /proc/sys/vm/mmap_rnd_bits
- sudo sysctl -w vm.mmap_rnd_bits=28
- - name: config
- run: CC=clang ./config --banner=Configured no-fips --strict-warnings -fsanitize=thread && perl configdata.pm --dump
- - name: make
- run: make -s -j4
- - name: get cpu info
- run: |
- cat /proc/cpuinfo
- ./util/opensslwrap.sh version -c
- - name: make test
- run: .github/workflows/make-test V=1 TESTS="test_threads test_internal_provider test_provfetch test_provider test_pbe test_evp_kdf test_pkcs12 test_store test_evp test_quic*"
- - name: save artifacts
- uses: actions/upload-artifact@v3
- with:
- name: "ci@threads_sanitizer"
- path: artifacts.tar.gz
- enable_non-default_options:
- runs-on: ${{ github.server_url == 'https://github.com' && 'ubuntu-latest' || 'ubuntu-22.04-self-hosted' }}
- steps:
- - uses: actions/checkout@v4
- - name: checkout fuzz/corpora submodule
- run: git submodule update --init --depth 1 fuzz/corpora
- - name: modprobe tls
- run: sudo modprobe tls
- - name: config
- run: ./config --banner=Configured --strict-warnings enable-demos enable-h3demo no-ec enable-ssl-trace enable-zlib enable-zlib-dynamic enable-crypto-mdebug enable-egd enable-ktls enable-fips no-threads && perl configdata.pm --dump
- - name: make
- run: make -s -j4
- - name: get cpu info
- run: |
- cat /proc/cpuinfo
- ./util/opensslwrap.sh version -c
- - name: make test
- run: .github/workflows/make-test
- - name: save artifacts
- uses: actions/upload-artifact@v3
- with:
- name: "ci@enable_non-default_options"
- path: artifacts.tar.gz
- full_featured:
- runs-on: ${{ github.server_url == 'https://github.com' && 'ubuntu-latest' || 'ubuntu-22.04-self-hosted' }}
- steps:
- - uses: actions/checkout@v4
- - name: checkout fuzz/corpora submodule
- run: git submodule update --init --depth 1 fuzz/corpora
- - name: modprobe tls
- run: sudo modprobe tls
- - name: Enable sctp
- run: sudo modprobe sctp
- - name: Enable auth in sctp
- run: sudo sysctl -w net.sctp.auth_enable=1
- - name: install extra config support
- run: sudo apt-get -y install libsctp-dev abigail-tools libzstd-dev zstd
- - name: config
- run: ./config --banner=Configured --strict-warnings enable-demos enable-h3demo enable-ktls enable-fips enable-egd enable-ec_nistp_64_gcc_128 enable-md2 enable-rc5 enable-sctp enable-ssl3 enable-ssl3-method enable-trace enable-zlib enable-zstd && perl configdata.pm --dump
- - name: make
- run: make -s -j4
- - name: get cpu info
- run: |
- cat /proc/cpuinfo
- ./util/opensslwrap.sh version -c
- - name: make test
- run: .github/workflows/make-test
- - name: save artifacts
- uses: actions/upload-artifact@v3
- with:
- name: "ci@full_featured"
- path: artifacts.tar.gz
- no-legacy:
- runs-on: ${{ github.server_url == 'https://github.com' && 'ubuntu-latest' || 'ubuntu-22.04-self-hosted' }}
- steps:
- - uses: actions/checkout@v4
- - name: checkout fuzz/corpora submodule
- run: git submodule update --init --depth 1 fuzz/corpora
- - name: config
- run: ./config --banner=Configured --strict-warnings enable-demos enable-h3demo no-legacy enable-fips && perl configdata.pm --dump
- - name: make
- run: make -s -j4
- - name: get cpu info
- run: |
- cat /proc/cpuinfo
- ./util/opensslwrap.sh version -c
- - name: make test
- run: .github/workflows/make-test
- - name: save artifacts
- uses: actions/upload-artifact@v3
- with:
- name: "ci@no-legacy"
- path: artifacts.tar.gz
- legacy:
- runs-on: ${{ github.server_url == 'https://github.com' && 'ubuntu-latest' || 'ubuntu-22.04-self-hosted' }}
- steps:
- - uses: actions/checkout@v4
- - name: checkout fuzz/corpora submodule
- run: git submodule update --init --depth 1 fuzz/corpora
- - name: config
- run: ./config --banner=Configured -Werror --debug no-afalgeng enable-demos enable-h3demo no-shared enable-crypto-mdebug enable-rc5 enable-md2 enable-ssl3 enable-ssl3-method enable-weak-ssl-ciphers enable-zlib enable-ec_nistp_64_gcc_128 no-fips && perl configdata.pm --dump
- - name: make
- run: make -s -j4
- - name: get cpu info
- run: |
- cat /proc/cpuinfo
- ./util/opensslwrap.sh version -c
- - name: make test
- run: .github/workflows/make-test
- - name: save artifacts
- uses: actions/upload-artifact@v3
- with:
- name: "ci@legacy"
- path: artifacts.tar.gz
- # out-of-source-and-install checks multiple things at the same time:
- # - That building, testing and installing works from an out-of-source
- # build tree
- # - That building, testing and installing works with a read-only source
- # tree
- out-of-readonly-source-and-install-ubuntu:
- runs-on: ${{ github.server_url == 'https://github.com' && 'ubuntu-latest' || 'ubuntu-22.04-self-hosted' }}
- steps:
- - uses: actions/checkout@v4
- with:
- path: ./source
- - name: checkout fuzz/corpora submodule
- run: git submodule update --init --depth 1 fuzz/corpora
- working-directory: ./source
- - name: make source read-only
- run: chmod -R a-w ./source
- - name: create build and install directories
- run: |
- mkdir ./build
- mkdir ./install
- - name: config
- run: |
- ../source/config --banner=Configured enable-demos enable-h3demo enable-fips enable-quic enable-acvp-tests --strict-warnings --prefix=$(cd ../install; pwd)
- perl configdata.pm --dump
- working-directory: ./build
- - name: make
- run: make -s -j4
- working-directory: ./build
- - name: get cpu info
- run: |
- cat /proc/cpuinfo
- ./util/opensslwrap.sh version -c
- working-directory: ./build
- - name: make test
- run: ../source/.github/workflows/make-test
- working-directory: ./build
- - name: save artifacts
- uses: actions/upload-artifact@v3
- with:
- name: "ci@out-of-readonly-source-and-install-ubuntu"
- path: build/artifacts.tar.gz
- - name: make install
- run: make install
- working-directory: ./build
- out-of-readonly-source-and-install-macos:
- strategy:
- fail-fast: false
- matrix:
- os: [macos-13, macos-14]
- runs-on: ${{ matrix.os }}
- if: github.server_url == 'https://github.com'
- steps:
- - uses: actions/checkout@v4
- with:
- path: ./source
- - name: checkout fuzz/corpora submodule
- run: git submodule update --init --depth 1 fuzz/corpora
- working-directory: ./source
- - name: make source read-only
- run: chmod -R a-w ./source
- - name: create build and install directories
- run: |
- mkdir ./build
- mkdir ./install
- - name: config
- run: |
- ../source/config --banner=Configured enable-fips enable-demos enable-h3demo enable-quic enable-acvp-tests --strict-warnings --prefix=$(cd ../install; pwd)
- perl configdata.pm --dump
- working-directory: ./build
- - name: make
- run: make -s -j4
- working-directory: ./build
- - name: get cpu info
- run: |
- sysctl machdep.cpu
- ./util/opensslwrap.sh version -c
- working-directory: ./build
- - name: make test
- run: ../source/.github/workflows/make-test
- working-directory: ./build
- - name: save artifacts
- uses: actions/upload-artifact@v3
- with:
- name: "ci@out-of-readonly-source-and-install-${{ matrix.os }}"
- path: build/artifacts.tar.gz
- - name: make install
- run: make install
- working-directory: ./build
- external-tests:
- runs-on: ${{ github.server_url == 'https://github.com' && 'ubuntu-latest' || 'ubuntu-22.04-self-hosted' }}
- steps:
- - uses: actions/checkout@v4
- with:
- submodules: recursive
- - name: package installs
- run: |
- sudo apt-get update
- sudo apt-get -yq install bison gettext keyutils ldap-utils libldap2-dev libkeyutils-dev python3 python3-paste python3-pyrad slapd tcsh python3-virtualenv virtualenv python3-kdcproxy
- - name: install cpanm and Test2::V0 for gost_engine testing
- uses: perl-actions/install-with-cpanm@stable
- with:
- install: Test2::V0
- - name: setup hostname workaround
- run: sudo hostname localhost
- - name: config
- run: ./config --banner=Configured --strict-warnings --debug no-afalgeng enable-rc5 enable-md2 enable-ssl3 enable-ssl3-method enable-weak-ssl-ciphers enable-zlib enable-ec_nistp_64_gcc_128 enable-external-tests no-fips && perl configdata.pm --dump
- - name: make
- run: make -s -j4
- - name: get cpu info
- run: |
- cat /proc/cpuinfo
- ./util/opensslwrap.sh version -c
- - name: test external gost-engine
- run: make test TESTS="test_external_gost_engine"
- - name: test external krb5
- run: make test TESTS="test_external_krb5"
- - name: test external_tlsfuzzer
- run: make test TESTS="test_external_tlsfuzzer"
- - name: test external oqs-provider
- run: make test TESTS="test_external_oqsprovider"
- external-test-pyca:
- runs-on: ${{ github.server_url == 'https://github.com' && 'ubuntu-latest' || 'ubuntu-22.04-self-hosted' }}
- strategy:
- matrix:
- RUST:
- - 1.51.0
- PYTHON:
- - 3.9
- steps:
- - uses: actions/checkout@v4
- with:
- submodules: recursive
- - name: Configure OpenSSL
- run: ./config --banner=Configured --strict-warnings --debug enable-external-tests && perl configdata.pm --dump
- - name: make
- run: make -s -j4
- - name: Setup Python
- uses: actions/setup-python@v5.1.0
- with:
- python-version: ${{ matrix.PYTHON }}
- - uses: dtolnay/rust-toolchain@master
- with:
- toolchain: ${{ matrix.RUST }}
- - name: get cpu info
- run: |
- cat /proc/cpuinfo
- ./util/opensslwrap.sh version -c
- - name: test external pyca
- run: make test TESTS="test_external_pyca" VERBOSE=1
- external-test-cf-quiche:
- runs-on: ${{ github.server_url == 'https://github.com' && 'ubuntu-latest' || 'ubuntu-22.04-self-hosted' }}
- steps:
- - uses: actions/checkout@v4
- with:
- submodules: recursive
- - name: Configure OpenSSL
- run: ./config --banner=Configured --strict-warnings enable-external-tests && perl configdata.pm --dump
- - name: make
- run: make -s -j4
- - uses: dtolnay/rust-toolchain@stable
- - name: get cpu info
- run: |
- cat /proc/cpuinfo
- ./util/opensslwrap.sh version -c
- - name: test external Cloudflare quiche
- run: make test TESTS="test_external_cf_quiche" VERBOSE=1
|