You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Jul 22, 2020. It is now read-only.
Copy file name to clipboardexpand all lines: README.md
+9-6
Original file line number
Diff line number
Diff line change
@@ -145,14 +145,17 @@ The best way to integrate with Fuzzit is by adding a two stages in your Continuo
145
145
146
146
Fuzzing stage:
147
147
148
-
* build a fuzzing target
149
-
* download `fuzzit` cli
150
-
* create a fuzzing job by uploading the fuzzing target
148
+
* Build a fuzzing target
149
+
* Download `fuzzit` cli
150
+
* Authenticate via passing `FUZZIT_API_KEY` environment variable
151
+
* Create a fuzzing job by uploading the fuzzing target
151
152
152
153
Regression stage
153
-
* build a fuzzing target
154
-
* download `fuzzit` cli
155
-
* create a local regression fuzzing job - This will pull all the generated corpuses and run them through
154
+
* Build a fuzzing target
155
+
* Download `fuzzit` cli
156
+
* Authenticate via passing `FUZZIT_API_KEY` environment variable OR defining the corpus as public. This way
157
+
No authentication would be require and regression can be used for [forked PRs](https://docs.travis-ci.com/user/pull-requests#pull-requests-and-security-restrictions) as well
158
+
* Create a local regression fuzzing job - This will pull all the generated corpuses and run them through
156
159
the fuzzing binary. If new bugs are introduced this will fail the CI and alert
157
160
158
161
Here is the relevant snippet from the [fuzzit.sh](https://github.com/fuzzitdev/example-go/blob/master/fuzzit.sh)
0 commit comments