Coverity failures on github

Dr Paul Dale pauli at openssl.org
Fri Feb 4 02:15:04 UTC 2022


The CIs are trying to run on your fork of the main repository and you've 
not got a Coverity token set up.
To disable the run:

 1. Go to your fork of the repository
    (https://github.com/pprindeville/openssl)
 2. Click onto the "Actions" tab along the top
 3. Click the "Static Analysis" workflow on the bottom left.
 4. Click on the ellipsis button next to the search box (...)
 5. Select "Disable Workflow"



Pauli

On 4/2/22 12:44, Philip Prindeville wrote:
> I'm getting daily reports about static analysis failures:
>
> https://github.com/pprindeville/openssl/runs/5060866030?check_suite_focus=true
>
> Which says:
>
> Run wgethttps://scan.coverity.com/download/linux64  \
>    wgethttps://scan.coverity.com/download/linux64  \
>         --post-data "token=&project=openssl%2Fopenssl" \
>         --progress=dot:giga -O coverity_tool.tgz
>    shell: /usr/bin/bash -e {0}
> --2022-02-04 01:26:39--https://scan.coverity.com/download/linux64
> Resolving scan.coverity.com (scan.coverity.com)... 45.60.34.99
> Connecting to scan.coverity.com (scan.coverity.com)|45.60.34.99|:443... connected.
> HTTP request sent, awaiting response... 401 Unauthorized
>
> Username/Password Authentication Failed.
> Error: Process completed with exit code 6.
>
> Looks like there's an expired Coverity license, or the creds are incorrect?
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mta.openssl.org/pipermail/openssl-users/attachments/20220204/83b2429c/attachment.htm>


More information about the openssl-users mailing list