From 807f9a170035c46406973d4df2ac1833105c699a Mon Sep 17 00:00:00 2001 From: Evgeny Vereshchagin Date: Thu, 12 Sep 2019 10:34:26 +0000 Subject: fuzzit: export the API key instead of using `auth` "We removed some cahing related code that auth used and caused problems" --- travis-ci/managers/fuzzit.sh | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) (limited to 'travis-ci') diff --git a/travis-ci/managers/fuzzit.sh b/travis-ci/managers/fuzzit.sh index 0c168fde85..45fd784a39 100755 --- a/travis-ci/managers/fuzzit.sh +++ b/travis-ci/managers/fuzzit.sh @@ -36,7 +36,7 @@ fi # Because we want Fuzzit to run on every pull-request and Travis/Azure doesnt support encrypted keys # on pull-request we use a write-only key which is ok for now. maybe there will be a better solution in the future -FUZZIT_API_KEY=af6992074353998676713818cc6435ef4a750439932dab58b51e9354d6742c54d740a3cd9fc1fc001db82f51734a24bc +export FUZZIT_API_KEY=af6992074353998676713818cc6435ef4a750439932dab58b51e9354d6742c54d740a3cd9fc1fc001db82f51734a24bc FUZZIT_ADDITIONAL_FILES="./out/src/shared/libsystemd-shared-*.so" # ASan options are borrowed almost verbatim from OSS-Fuzz @@ -46,8 +46,6 @@ FUZZIT_ARGS="--type ${FUZZING_TYPE} --branch ${FUZZIT_BRANCH} --revision ${TRAVI wget -O fuzzit https://github.com/fuzzitdev/fuzzit/releases/latest/download/fuzzit_Linux_x86_64 chmod +x fuzzit -./fuzzit auth ${FUZZIT_API_KEY} - find out/ -maxdepth 1 -name 'fuzz-*' -executable -type f -exec basename '{}' \; | xargs --verbose -n1 -I%FUZZER% ./fuzzit create job ${FUZZIT_ARGS} %FUZZER%-asan-ubsan out/%FUZZER% ${FUZZIT_ADDITIONAL_FILES} export SANITIZER="memory -fsanitize-memory-track-origins" -- cgit v1.2.1