-
Notifications
You must be signed in to change notification settings - Fork 30
39 lines (30 loc) · 1.27 KB
/
miri.yml
File metadata and controls
39 lines (30 loc) · 1.27 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
name: Miri (Scheduled)
on:
workflow_dispatch: {}
schedule:
- cron: '0 5 * * 1'
env:
CARGO_TERM_COLOR: always
RUST_BACKTRACE: 1
MIRIFLAGS: -Zmiri-strict-provenance
jobs:
miri-curated:
name: Miri Curated Security Tests
runs-on: ubuntu-latest
timeout-minutes: 60
steps:
- uses: actions/checkout@v6
- name: Install Rust nightly + miri
uses: dtolnay/rust-toolchain@nightly
with:
components: miri
- name: Set up Miri
run: cargo +nightly miri setup
- name: Run policy depth regression under Miri
run: cargo +nightly miri test -p clawdstrike policy_extends_depth_limit_enforced -- --exact
- name: Run IRM fs traversal regression under Miri
run: cargo +nightly miri test -p clawdstrike irm::fs::tests::filesystem_irm_denies_traversal_when_path_is_in_nonfirst_object_arg -- --exact
- name: Run IRM net spoof regression under Miri
run: cargo +nightly miri test -p clawdstrike irm::net::tests::test_userinfo_spoof_url_uses_actual_host_and_is_denied -- --exact
- name: Run async runtime cap regression under Miri
run: cargo +nightly miri test -p clawdstrike --test security_regressions security_regression_async_background_guards_enforce_inflight_limit -- --exact