Home - Waterfall Grid T-Grid Console Builders Recent Builds Buildslaves Changesources - JSON API - About

Builder curl-threaded-solaris10-sparc Build #2787

Results:

Build successful

SourceStamp:

Projectcurl
Repositoryhttps://github.com/curl/curl.git
Branchmaster
Revisione522f47986bb72f194636e155191d7dccdc2d4fc
Got Revisione522f47986bb72f194636e155191d7dccdc2d4fc
Changes7 changes

BuildSlave:

unstable10s

Reason:

The SingleBranchScheduler scheduler named 'schedule-curl-threaded-solaris10-sparc' triggered this build

Steps and Logfiles:

  1. git update ( 39 secs )
    1. stdio
  2. Runtest './tests/testcurl.pl --nogitpull ...' ( 3 hrs, 54 mins, 41 secs )
    1. stdio
    2. resultlog
  3. Mail result 'cat resultlog ...' ( 0 secs )
    1. stdio

Build Properties:

NameValueSource
branch master Build
builddir /export/home/buildbot-unstable10s/slave/curl-threaded-solaris10-sparc slave
buildername curl-threaded-solaris10-sparc Builder
buildnumber 2787 Build
codebase Build
got_revision e522f47986bb72f194636e155191d7dccdc2d4fc Git
osplatform SPARC SetPropertyFromCommand Step
osrelease 10 SetPropertyFromCommand Step
project curl Build
repository https://github.com/curl/curl.git Build
revision e522f47986bb72f194636e155191d7dccdc2d4fc Build
scheduler schedule-curl-threaded-solaris10-sparc Scheduler
slavename unstable10s BuildSlave
workdir /export/home/buildbot-unstable10s/slave/curl-threaded-solaris10-sparc slave (deprecated)

Forced Build Properties:

NameLabelValue

Responsible Users:

  1. Daniel Stenberg
  2. Stefan Eissing
  3. Viktor Szakats

Timing:

StartThu May 8 02:17:23 2025
EndThu May 8 13:39:03 2025
Elapsed11 hrs, 21 mins, 40 secs

All Changes:

:

  1. Change #229163

    Category curl
    Changed by Daniel Stenberg <danielohnoyoudont@haxx.se>
    Changed at Wed 07 May 2025 14:39:18
    Repository https://github.com/curl/curl.git
    Project curl
    Branch master
    Revision bc46ff2d2b94d7952a89cc75af41fae96dd658e0

    Comments

    RELEASE-PROCEDURE: update the coming release dates

    Changed files

    • docs/RELEASE-PROCEDURE.md
  2. Change #229169

    Category curl
    Changed by Stefan Eissing <stefanohnoyoudont@eissing.org>
    Changed at Wed 07 May 2025 16:01:05
    Repository https://github.com/curl/curl.git
    Project curl
    Branch master
    Revision 7b928446399aa2310b92ed60c3daa4e3935c3c82

    Comments

    smtp: use easy handle/connectin meta for proto structs
    Move `struct smtp_conn` and `struct STMP` into the meta data at easy
    handle/connection. Remove it from the unions at connectdata and request.
    
    Closes #17257

    Changed files

    • lib/pingpong.h
    • lib/request.h
    • lib/smtp.c
    • lib/smtp.h
    • lib/urldata.h
  3. Change #229179

    Category curl
    Changed by Daniel Stenberg <danielohnoyoudont@haxx.se>
    Changed at Wed 07 May 2025 17:08:06
    Repository https://github.com/curl/curl.git
    Project curl
    Branch master
    Revision 3a2689712afb0c8e2b489bf17d17cbd392c6aa7b

    Comments

    vtls: avoid NULL deref on bad PEM input
    Spotted by Coverity
    
    Closes #17274

    Changed files

    • lib/vtls/vtls.c
  4. Change #229181

    Category curl
    Changed by Stefan Eissing <stefanohnoyoudont@eissing.org>
    Changed at Wed 07 May 2025 17:13:03
    Repository https://github.com/curl/curl.git
    Project curl
    Branch master
    Revision 412d3c3dc90c9815ea45cd5a8c1d5fb67144c6e0

    Comments

    ldap: move easy handle protocol struct into meta hash
    Removing the member of data->req.p
    
    Closes #17269

    Changed files

    • lib/openldap.c
    • lib/request.h
  5. Change #229182

    Category curl
    Changed by Daniel Stenberg <danielohnoyoudont@haxx.se>
    Changed at Wed 07 May 2025 17:15:39
    Repository https://github.com/curl/curl.git
    Project curl
    Branch master
    Revision 613436dbbb309690e4bb09b3bc58ddfdfe7ed1e7

    Comments

    netrc: avoid NULL deref on weird input
    A dynbuf that never gets populated might return a NULL, and Coverity
    could find a way through like that.
    
    Closes #17275

    Changed files

    • lib/netrc.c
  6. Change #229204

    Category curl
    Changed by Viktor Szakats <commitohnoyoudont@vsz.me>
    Changed at Wed 07 May 2025 19:14:46
    Repository https://github.com/curl/curl.git
    Project curl
    Branch master
    Revision 283ad5c4320fa1d733e60a0dbe216ee36e3924fb

    Comments

    GHA/windows: set `persist-credentials: false` where missing
    Found by zizmor.
    
    Closes #17277

    Changed files

    • .github/workflows/windows.yml
  7. Change #229213

    Category curl
    Changed by Viktor Szakats <commitohnoyoudont@vsz.me>
    Changed at Wed 07 May 2025 23:11:09
    Repository https://github.com/curl/curl.git
    Project curl
    Branch master
    Revision e522f47986bb72f194636e155191d7dccdc2d4fc

    Comments

    GHA/checksrc: check GHA rules with zizmor
    The pedantic level is experimental. If it causes issues, we may just
    disable it alongside the ignore comments.
    
    Also:
    - silence error:
      ```
       INFO audit: zizmor: completed label.yml
      error[dangerous-triggers]: use of fundamentally insecure workflow trigger
        --> label.yml:13:1
         |
      13 | 'on': [pull_request_target]
         | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ pull_request_target is almost always used insecurely
         |
         = note: audit confidence -> Medium
      ```
    - fix pedantic warning:
      ```
       INFO audit: zizmor: completed label.yml
      warning[excessive-permissions]: overly broad permissions
        --> label.yml:1:1
      ...  |
      24 | |         with:
      25 | |           repo-token: '${{ secrets.GITHUB_TOKEN }}'
         | |____________________________________________________- default permissions used due to no permissions: block
         |
         = note: audit confidence -> Medium
      ```
    - silence `template-injection` false positives like:
      ```
      - note: ${{ matrix.build.torture && 'test-torture' || 'test-ci' }} may expand into attacker-controllable code
      - note: ${{ contains(matrix.build.install_steps, 'pytest') && 'caddy httpd vsftpd' || '' }} may expand into attacker-controllable code
      ```
      It doesn't seem like these could be controlled by an attacker.
      Let me know if I'm missing something.
    
    Closes #17278

    Changed files

    • .github/workflows/checksrc.yml
    • .github/workflows/label.yml
    • .github/workflows/linux.yml
    • .github/workflows/macos.yml
    • .github/workflows/windows.yml