Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remove cifuzz references #892

Merged
merged 1 commit into from
Jan 29, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
105 changes: 0 additions & 105 deletions .github/workflows/fuzzing-featured.yaml

This file was deleted.

97 changes: 0 additions & 97 deletions .github/workflows/fuzzing.yaml

This file was deleted.

8 changes: 0 additions & 8 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -88,14 +88,6 @@ class ParserTests {

A complete Maven example project can be found in [`examples/junit`](examples/junit).

### CI Fuzz

The open-source CLI tool [cifuzz](https://github.com/CodeIntelligenceTesting/cifuzz) makes
it easy to set up Maven and Gradle projects for fuzzing with Jazzer.
It provides a command-line UI for fuzzing runs, deduplicates and manages findings, and
provides coverage reports for fuzz tests. Moreover, you can use CI Fuzz to run your fuzz
tests at scale in the [CI App](https://app.code-intelligence.com).

### GitHub releases

You can also use GitHub release archives to run a standalone Jazzer binary that starts its own JVM configured for fuzzing:
Expand Down
2 changes: 1 addition & 1 deletion docs/common.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@
### Recommended JVM options

The following JVM settings are recommended for running Jazzer within JUnit.
Both `cifuzz` and the `jazzer` launcher binary set them automatically.
The `jazzer` launcher binary sets them automatically.

* `-XX:-OmitStackTraceInFastThrow` ensures that stack traces are emitted even on hot code paths.
This may hurt performance if your fuzz test frequently throws and catches exceptions, but also helps find flaky bugs.
Expand Down
2 changes: 1 addition & 1 deletion docs/junit-integration.md
Original file line number Diff line number Diff line change
Expand Up @@ -78,7 +78,7 @@ The tests from the resources directory are gathered by `walkInputs`. This will l
JUnit will use the file's name as the name of the test case for its reporting. It also accepts .jar files where it will
search with the given directory in the jar.

### CIFuzz Corpus
### Corpus

The corpus kept in `.cifuzz-corpus/<test class name>/<test method name>` holds any inputs that libfuzzer found worth
saving and not necessarily just inputs that caused a crash. Jazzer is able to set the directory but the contents of
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -190,8 +190,7 @@ private static Path addInputAndSeedDirs(
.toAbsolutePath();

// Use the specified corpus dir, if given, otherwise store the generated corpus in a per-class
// directory under the project root, just like cifuzz:
// https://github.com/CodeIntelligenceTesting/cifuzz/blob/bf410dcfbafbae2a73cf6c5fbed031cdfe234f2f/internal/cmd/run/run.go#L381
// directory under the project root.
// The path is specified relative to the current working directory, which with JUnit is the
// project directory.
Path generatedCorpusDir = baseDir.resolve(generatedCorpusPath(fuzzTestClass, fuzzTestMethod));
Expand Down
Loading