Skip to content
This repository was archived by the owner on Jul 22, 2020. It is now read-only.

Commit 7dde899

Browse files
author
Yevgeny Pats
committed
Update
1 parent 521b0f5 commit 7dde899

File tree

1 file changed

+9
-6
lines changed

1 file changed

+9
-6
lines changed

README.md

+9-6
Original file line numberDiff line numberDiff line change
@@ -145,14 +145,17 @@ The best way to integrate with Fuzzit is by adding a two stages in your Continuo
145145

146146
Fuzzing stage:
147147

148-
* build a fuzzing target
149-
* download `fuzzit` cli
150-
* create a fuzzing job by uploading the fuzzing target
148+
* Build a fuzzing target
149+
* Download `fuzzit` cli
150+
* Authenticate via passing `FUZZIT_API_KEY` environment variable
151+
* Create a fuzzing job by uploading the fuzzing target
151152

152153
Regression stage
153-
* build a fuzzing target
154-
* download `fuzzit` cli
155-
* create a local regression fuzzing job - This will pull all the generated corpuses and run them through
154+
* Build a fuzzing target
155+
* Download `fuzzit` cli
156+
* Authenticate via passing `FUZZIT_API_KEY` environment variable OR defining the corpus as public. This way
157+
No authentication would be require and regression can be used for [forked PRs](https://docs.travis-ci.com/user/pull-requests#pull-requests-and-security-restrictions) as well
158+
* Create a local regression fuzzing job - This will pull all the generated corpuses and run them through
156159
the fuzzing binary. If new bugs are introduced this will fail the CI and alert
157160

158161
Here is the relevant snippet from the [fuzzit.sh](https://github.com/fuzzitdev/example-go/blob/master/fuzzit.sh)

0 commit comments

Comments
 (0)