-
Notifications
You must be signed in to change notification settings - Fork 2.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Upgrade to Go 1.22 #11677
Upgrade to Go 1.22 #11677
Conversation
justindhillon is a new contributor to projects/cryptofuzz. The PR must be approved by known contributors before it can be merged. The past contributors are: gilles-peskine-arm, skrah, guidovranken, DonggeLiu, jschwartzentruber |
/gcbrun trial_build.py go --engine libfuzzer --sanitizer address |
I'm sorry, what does this mean? |
It's something internal to do testing on the infrastructure (please don't type the commands as one needs permissions) |
/gcbrun trial_build.py go --fuzzing-engines libfuzzer --sanitizers coverage address |
I think this introduces a build error in cryptofuzz but otherwise looks OK to merge. |
/gcbrun trial_build.py golang litmuschaos --fuzzing-engines libfuzzer --sanitizers coverage address |
/gcbrun trial_build.py golang litmuschaos --fuzzing-engines libfuzzer --sanitizers coverage address |
@catenacyber @guidovranken @AdamKorcz Could one of you PTAL at the golang failures caused by this PR? It's the only project that is failing. |
Sure, but I can also fix the build right after this PR lands if golang is the only project that fails. |
Most fuzzers build just fine. It looks like an easy fix that does not need to block this PR. |
Ref #11677 (comment) Signed-off-by: Adam Korczynski <Adam@adalogics.com>
New version of Go came out, so I have upgrade the version used in this project from 1.21 --> 1.22.
This PR is very similar to #10920
This fixes #11661