-
Notifications
You must be signed in to change notification settings - Fork 14
Issues: MozillaSecurity/orion
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Author
Label
Projects
Milestones
Assignee
Sort
Issues list
Disabled pools should be deleted
enhancement
fuzzing-decision
#507
opened Sep 11, 2024 by
jschwartzentruber
Add support for custom taskcluster notifications
enhancement
fuzzing-decision
#487
opened Aug 14, 2024 by
pyoor
Use market prices to determine regions to run in.
enhancement
fuzzing-decision
#449
opened Jun 7, 2024 by
jschwartzentruber
apply_to should be allowed to specify heterogenous pools
bug
fuzzing-decision
#218
opened Nov 10, 2022 by
jschwartzentruber
fuzzing-decision
should enforce uniqueness of pool names
bug
fuzzing-decision
#196
opened Jul 15, 2022 by
jschwartzentruber
Manually triggered decisions should use schedule when setting deadlines
enhancement
fuzzing-decision
#137
opened Jul 7, 2021 by
jschwartzentruber
Taskboot fails to checkout PR from a fork.
bug
orion-builder
#128
opened May 26, 2021 by
jschwartzentruber
Workers should be divided by spec, not fuzzing target
enhancement
fuzzing-decision
#84
opened Jan 25, 2021 by
jschwartzentruber
Changes to the config repository should not trigger everything
enhancement
fuzzing-decision
#86
opened Jul 10, 2020 by
jschwartzentruber
Use a fuzzing specific
schedulerId
enhancement
fuzzing-decision
#85
opened Jul 10, 2020 by
jschwartzentruber
oss-fuzz/infra/helper.py exits with 1 on successfully downloading corpus
bug
libfuzzer
#58
opened Apr 29, 2020 by
choller
ProTip!
Mix and match filters to narrow down what you’re looking for.