This repository was archived by the owner on Jul 22, 2020. It is now read-only.
File tree Expand file tree Collapse file tree 3 files changed +18
-7
lines changed
Expand file tree Collapse file tree 3 files changed +18
-7
lines changed Original file line number Diff line number Diff line change 1+ dist : bionic
12language : go
23go :
34 - " 1.12.x"
@@ -7,12 +8,12 @@ services:
78
89env :
910 global :
10- # This is FUZZIT_API_KEY created with https://docs.travis-ci.com/user/environment-variables/#encrypting-environment-variables
11+ # This is FUZZIT_API_KEY. see https://docs.travis-ci.com/user/environment-variables/#encrypting-environment-variables for how to create secrets in Travis.
1112 secure : " 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"
1213
1314jobs :
1415 include :
15- - stage : Build & test
16+ - stage : Build, Unit-Tests & Fuzz-Tests
1617 go : 1.12.x
1718 script :
1819 - go build ./...
Original file line number Diff line number Diff line change 11[ ![ Build Status] ( https://travis-ci.org/fuzzitdev/example-go.svg?branch=master )] ( https://travis-ci.org/fuzzitdev/example-go )
2- ![ fuzzit] ( https://app.fuzzit.dev/badge?org_id=hP8u8bNAda91Cnj0mKPX&branch=master )
2+ [ ![ fuzzit] ( https://app.fuzzit.dev/badge?org_id=hP8u8bNAda91Cnj0mKPX&branch=master )] ( https://fuzzit.dev )
33
44# Continuous Fuzzing for Golang Example
55
@@ -140,13 +140,23 @@ Base64: RlVaWkk=
140140
141141## Integrating with Fuzzit from CI
142142
143- The best way to integrate with Fuzzit is by adding a stage in your Contintous Build system
144- (like Travis CI or Circle CI). In that stage:
143+ The best way to integrate with Fuzzit is by adding a two stages in your Contintous Build system
144+ (like Travis CI or Circle CI).
145+
146+ Fuzzing stage:
147+
145148* build a fuzz target
146149* download ` fuzzit ` cli
147150* authenticate with ` fuzzit auth `
148151* create a fuzzing job by uploading fuzz target
149152
153+ Sanity stage
154+ * build a fuzz target
155+ * download ` fuzzit ` cli
156+ * authenticate with ` fuzzit auth `
157+ * create a local sanity fuzzing job - This will pull all the generated corpus and run them through
158+ the fuzzing binary. If new bugs are introduced this will fail the CI and alert
159+
150160here is the relevant snippet from the [ ./ci/fuzzit.sh] ( https://github.com/fuzzitdev/example-go/blob/master/ci/fuzzit.sh )
151161which is being run by [ .travis.yml] ( https://github.com/fuzzitdev/example-go/blob/master/.travis.yml )
152162
Original file line number Diff line number Diff line change @@ -18,12 +18,12 @@ go build ./...
1818go-fuzz-build -libfuzzer -o fuzzer.a .
1919clang -fsanitize=fuzzer fuzzer.a -o fuzzer
2020
21- wget -q -O fuzzit https://github.com/fuzzitdev/fuzzit/releases/download/v2.4.1 /fuzzit_Linux_x86_64
21+ wget -q -O fuzzit https://github.com/fuzzitdev/fuzzit/releases/download/v2.4.2 /fuzzit_Linux_x86_64
2222chmod a+x fuzzit
2323./fuzzit auth ${FUZZIT_API_KEY}
2424
2525if [ $1 == " fuzzing" ]; then
2626 ./fuzzit create job --branch $TRAVIS_BRANCH --revision $TRAVIS_COMMIT parse-complex ./fuzzer
2727else
2828 ./fuzzit create job --local parse-complex ./fuzzer
29- end
29+ fi
You can’t perform that action at this time.
0 commit comments