disable fuzzing for now
This commit is contained in:
parent
4ef28e6c7e
commit
545fe5c376
12
.travis.yml
12
.travis.yml
|
@ -2,7 +2,7 @@
|
||||||
language: go
|
language: go
|
||||||
|
|
||||||
go:
|
go:
|
||||||
- tip
|
- tip
|
||||||
|
|
||||||
# this breaks building from PRs because go get over-writes checkout out
|
# this breaks building from PRs because go get over-writes checkout out
|
||||||
# code with the code from master branch
|
# code with the code from master branch
|
||||||
|
@ -12,13 +12,13 @@ go:
|
||||||
# - go get -d -t -v ./...
|
# - go get -d -t -v ./...
|
||||||
|
|
||||||
install:
|
install:
|
||||||
- go build -v ./...
|
- go build -v ./...
|
||||||
|
|
||||||
script:
|
script:
|
||||||
- go test -v ./...
|
- go test -v ./...
|
||||||
- go test -run=^$ -bench=BenchmarkReference -benchmem
|
- go test -run=^$ -bench=BenchmarkReference -benchmem
|
||||||
- ./s/test_with_codecoverage.sh
|
- ./s/test_with_codecoverage.sh
|
||||||
- ./s/ci_fuzzit.sh fuzzing
|
- ./s/ci_fuzzit.sh
|
||||||
|
|
||||||
after_success:
|
after_success:
|
||||||
- bash <(curl -s https://codecov.io/bash)
|
- bash <(curl -s https://codecov.io/bash)
|
||||||
|
|
|
@ -2,30 +2,16 @@ set -xe
|
||||||
|
|
||||||
export GO111MODULE="off"
|
export GO111MODULE="off"
|
||||||
|
|
||||||
## see our config, for debugging
|
## install go-fuzz
|
||||||
wd=`pwd`
|
|
||||||
echo "pwd: ${pwd}"
|
|
||||||
go env
|
|
||||||
|
|
||||||
if [ -z ${1+x} ]; then
|
|
||||||
echo "must call with job type as first argument e.g. 'fuzzing' or 'sanity'"
|
|
||||||
echo "see https://github.com/fuzzitdev/example-go/blob/master/.travis.yml"
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
|
|
||||||
## Install go-fuzz
|
|
||||||
go get -u github.com/dvyukov/go-fuzz/go-fuzz github.com/dvyukov/go-fuzz/go-fuzz-build
|
go get -u github.com/dvyukov/go-fuzz/go-fuzz github.com/dvyukov/go-fuzz/go-fuzz-build
|
||||||
|
|
||||||
## build and send to fuzzit
|
## build and send to fuzzit
|
||||||
go build ./...
|
|
||||||
go-fuzz-build -libfuzzer -o fuzzer.a .
|
go-fuzz-build -libfuzzer -o fuzzer.a .
|
||||||
clang -fsanitize=fuzzer fuzzer.a -o fuzzer
|
clang -fsanitize=fuzzer fuzzer.a -o fuzzer
|
||||||
|
|
||||||
wget -q -O fuzzit https://github.com/fuzzitdev/fuzzit/releases/download/v2.0.0/fuzzit_Linux_x86_64
|
wget -q -O fuzzit https://github.com/fuzzitdev/fuzzit/releases/download/v2.4.27/fuzzit_Linux_x86_64
|
||||||
chmod a+x fuzzit
|
chmod a+x fuzzit
|
||||||
./fuzzit auth ${FUZZIT_API_KEY}
|
|
||||||
export TARGET_ID=2n6hO2dQzylLxX5GGhRG
|
|
||||||
|
|
||||||
ls -lah
|
# TODO: create a target and re-enable
|
||||||
|
export TARGET=markdown
|
||||||
./fuzzit create job --type $1 --branch $TRAVIS_BRANCH --revision $TRAVIS_COMMIT $TARGET_ID ./fuzzer
|
# ./fuzzit create job --type fuzzing $TARGET ./fuzzer
|
||||||
|
|
Loading…
Reference in New Issue