pwninit 3.3.2

automate starting binary exploit challenges
Documentation
name: checks

on: [push, pull_request]

jobs:
  test:
    name: cargo test
    runs-on: ubuntu-latest
    steps:
      - name: Pull source
        uses: actions/checkout@v2
      - run: sudo apt -y install pkg-config libssl-dev liblzma-dev
      - name: Run cargo test
        run: cargo test
        env:
          # Deny compile warnings
          RUSTFLAGS: -D warnings

  fmt:
    name: cargo fmt
    runs-on: ubuntu-latest
    steps:
      - name: Pull source
        uses: actions/checkout@v2
      - name: Run cargo fmt
        run: cargo fmt --all -- --check

  clippy:
    name: cargo clippy
    runs-on: ubuntu-latest
    steps:
      - name: Pull source
        uses: actions/checkout@v2
      - run: sudo apt -y install pkg-config libssl-dev liblzma-dev
      - name: Run cargo clippy
        run: cargo clippy
        env:
          # Deny warnings
          RUSTFLAGS: -D warnings

  static-musl-build:
    name: Build statically-linked musl binary
    runs-on: ubuntu-latest
    steps:
      - name: Pull source
        uses: actions/checkout@v2
      - name: Set permissions
        run: chmod --recursive 777 .
      - run: docker run --mount type=bind,source="$(pwd)",target=/home/rust/src io12/rust-musl-builder-lzma cargo build --release