Skip to content
This repository was archived by the owner on Jul 22, 2020. It is now read-only.

Commit a80bf99

Browse files
author
Yevgeny Pats
committed
Update to bionic in travis
1 parent 0035dc4 commit a80bf99

File tree

3 files changed

+18
-7
lines changed

3 files changed

+18
-7
lines changed

.travis.yml

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,4 @@
1+
dist: bionic
12
language: go
23
go:
34
- "1.12.x"
@@ -7,12 +8,12 @@ services:
78

89
env:
910
global:
10-
# This is FUZZIT_API_KEY created with https://docs.travis-ci.com/user/environment-variables/#encrypting-environment-variables
11+
# This is FUZZIT_API_KEY. see https://docs.travis-ci.com/user/environment-variables/#encrypting-environment-variables for how to create secrets in Travis.
1112
secure: "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"
1213

1314
jobs:
1415
include:
15-
- stage: Build & test
16+
- stage: Build, Unit-Tests & Fuzz-Tests
1617
go: 1.12.x
1718
script:
1819
- go build ./...

README.md

Lines changed: 13 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
[![Build Status](https://travis-ci.org/fuzzitdev/example-go.svg?branch=master)](https://travis-ci.org/fuzzitdev/example-go)
2-
![fuzzit](https://app.fuzzit.dev/badge?org_id=hP8u8bNAda91Cnj0mKPX&branch=master)
2+
[![fuzzit](https://app.fuzzit.dev/badge?org_id=hP8u8bNAda91Cnj0mKPX&branch=master)](https://fuzzit.dev)
33

44
# Continuous Fuzzing for Golang Example
55

@@ -140,13 +140,23 @@ Base64: RlVaWkk=
140140

141141
## Integrating with Fuzzit from CI
142142

143-
The best way to integrate with Fuzzit is by adding a stage in your Contintous Build system
144-
(like Travis CI or Circle CI). In that stage:
143+
The best way to integrate with Fuzzit is by adding a two stages in your Contintous Build system
144+
(like Travis CI or Circle CI).
145+
146+
Fuzzing stage:
147+
145148
* build a fuzz target
146149
* download `fuzzit` cli
147150
* authenticate with `fuzzit auth`
148151
* create a fuzzing job by uploading fuzz target
149152

153+
Sanity stage
154+
* build a fuzz target
155+
* download `fuzzit` cli
156+
* authenticate with `fuzzit auth`
157+
* create a local sanity fuzzing job - This will pull all the generated corpus and run them through
158+
the fuzzing binary. If new bugs are introduced this will fail the CI and alert
159+
150160
here is the relevant snippet from the [./ci/fuzzit.sh](https://github.com/fuzzitdev/example-go/blob/master/ci/fuzzit.sh)
151161
which is being run by [.travis.yml](https://github.com/fuzzitdev/example-go/blob/master/.travis.yml)
152162

ci/fuzzit.sh

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,12 +18,12 @@ go build ./...
1818
go-fuzz-build -libfuzzer -o fuzzer.a .
1919
clang -fsanitize=fuzzer fuzzer.a -o fuzzer
2020

21-
wget -q -O fuzzit https://github.com/fuzzitdev/fuzzit/releases/download/v2.4.1/fuzzit_Linux_x86_64
21+
wget -q -O fuzzit https://github.com/fuzzitdev/fuzzit/releases/download/v2.4.2/fuzzit_Linux_x86_64
2222
chmod a+x fuzzit
2323
./fuzzit auth ${FUZZIT_API_KEY}
2424

2525
if [ $1 == "fuzzing" ]; then
2626
./fuzzit create job --branch $TRAVIS_BRANCH --revision $TRAVIS_COMMIT parse-complex ./fuzzer
2727
else
2828
./fuzzit create job --local parse-complex ./fuzzer
29-
end
29+
fi

0 commit comments

Comments
 (0)