diff --git a/.code-intelligence/build.sh b/.code-intelligence/build.sh deleted file mode 100644 index 22ded55..0000000 --- a/.code-intelligence/build.sh +++ /dev/null @@ -1 +0,0 @@ -: \ No newline at end of file diff --git a/.code-intelligence/fuzz_targets/config_validation.cpp b/.code-intelligence/fuzz_targets/config_validation.cpp deleted file mode 100644 index c2f3aa1..0000000 --- a/.code-intelligence/fuzz_targets/config_validation.cpp +++ /dev/null @@ -1,29 +0,0 @@ -#include -#include - -#include - -// extern "C" int FUZZ_INIT_WITH_ARGS(int *argc, char ***argv) { -extern "C" int FUZZ_INIT() -{ - // Add global setup code here - called once before fuzzing starts - - return 0; // Non-zero return values are reserved for future use. -} - -extern "C" int FUZZ( const char* data, size_t size ) -{ - // process fuzzer input (*data) and setup local objects necessary to call the function under test - - try { - (void)tao::config::from_string( data, size, "FUZZ" ); - } - catch( const tao::pegtl::parse_error& e ) { - } - catch( const std::runtime_error& ) { - } - - // reset state and free all locally allocated resources - - return 0; // Non-zero return values are reserved for future use. -} diff --git a/.code-intelligence/fuzz_targets/config_validation.cpp.yaml b/.code-intelligence/fuzz_targets/config_validation.cpp.yaml deleted file mode 100644 index 234235c..0000000 --- a/.code-intelligence/fuzz_targets/config_validation.cpp.yaml +++ /dev/null @@ -1,25 +0,0 @@ -## The fuzz target type. If unspecified, the type is deduced from the -## extension of the fuzz target source file. -type: "c++" - -## If set to true, do not use the generic input corpus for this -## fuzz target. -# no_initial_corpus: false - -## Additional arguments to pass to the compiler during build -compiler_extra_args: - - "-Iinclude" - - "-Iexternal/json/include" - - "-Iexternal/json/external/PEGTL/include" - - "-std=c++17" - -## Additional arguments to pass to the fuzz target when it is executed -# run_extra_args: - -##### This section is only for Java fuzz targets ##### - -## Package filters to apply when instrumenting the source code. -# instrumentation_filters: - -## List of jar dependencies needed by the fuzz target -# jars: diff --git a/.code-intelligence/project.yaml b/.code-intelligence/project.yaml deleted file mode 100644 index 2c76554..0000000 --- a/.code-intelligence/project.yaml +++ /dev/null @@ -1,36 +0,0 @@ -## The name of the container image used for building the fuzz tests -build_container: "gcr.io/code-intelligence/pegtl-builder-v2" - -## The name of the container image used for running the fuzz tests. If -## unspecified, the image of the build container is used. -run_container: "gcr.io/code-intelligence/pegtl-builder-v2" - -## A relative path to the build script that executes inside the container -## and builds the project. Relative to the project root directory. -# build_script: ".code-intelligence/build.sh" - -## Paths to the fuzz tests belonging to this test collection -fuzz_tests: - - .code-intelligence/fuzz_targets/config_validation.cpp - -## The sanitizers to use for the fuzz tests in this collection. -## By default, only address sanitizer is used. -# sanitizers: -# - address - -## The fuzzing engines to use for the fuzz tests in this collection. -## By default, only libfuzzer is used. Note that because Java and Go -## are only supported by libfuzzer, libfuzzer will always be used for -## Java and Go fuzz tests, independent of this setting. -# engines: -# - libfuzzer - -## The run time after which the fuzz tests are cancelled and -## considered as having passed. Default value is 30 minutes. -runtime: "30m0s" - -## The number of parallel executions per fuzz test -# parallel_executions: 1 - -## If true, do not initialize the seed corpus of the fuzz tests. -# skip_initial_corpus: false diff --git a/.github/workflows/fuzzing.yml b/.github/workflows/fuzzing.yml deleted file mode 100644 index 6465adf..0000000 --- a/.github/workflows/fuzzing.yml +++ /dev/null @@ -1,56 +0,0 @@ -name: Code Intelligence Fuzzing - -on: - push: - branches: [ main ] - paths-ignore: - - 'README.md' - - 'doc/**' - pull_request: - branches: [ main ] - paths-ignore: - - 'README.md' - - 'doc/**' - -env: - FUZZING_SERVER_ADDRESS: taocpp.app.code-intelligence.com:6773 - WEB_APP_ADDRESS: https://taocpp.app.code-intelligence.com - -jobs: - fuzz_tests: - runs-on: ubuntu-latest - steps: - - id: start-fuzzing - name: Build and Instrument - uses: CodeIntelligenceTesting/github-actions/start-fuzzing@dev - with: - ci_fuzz_api_token: ${{ secrets.CI_FUZZ_API_TOKEN }} - project: "projects/organizations_9ebb593abaa9ec32_config_git-48b6b783" - git_reference: ${{ github.sha }} - fuzzing_server_address: ${{ env.FUZZING_SERVER_ADDRESS }} - - id: monitor-fuzzing - name: Fuzzing - uses: CodeIntelligenceTesting/github-actions/monitor-fuzzing@dev - with: - ci_fuzz_api_token: ${{ secrets.CI_FUZZ_API_TOKEN }} - test_collection_run: ${{ steps.start-fuzzing.outputs.test_collection_run }} - github_token: ${{ secrets.GITHUB_TOKEN }} - pull_request_number: ${{ github.event.pull_request.number }} - owner: ${{ github.event.repository.owner.login }} - repository: ${{ github.event.repository.name }} - fuzzing_server_address: ${{ env.FUZZING_SERVER_ADDRESS }} - dashboard_address: ${{ env.WEB_APP_ADDRESS }} - - id: report-coverage - name: Report Coverage - uses: CodeIntelligenceTesting/github-actions/report-coverage@dev - if: ${{ github.event_name == 'pull_request' && (success() || failure()) }} - with: - ci_fuzz_api_token: ${{ secrets.CI_FUZZ_API_TOKEN }} - test_collection_run: ${{ steps.start-fuzzing.outputs.test_collection_run }} - github_token: ${{ secrets.GITHUB_TOKEN }} - pull_request_number: ${{ github.event.pull_request.number }} - owner: ${{ github.event.repository.owner.login }} - repository: ${{ github.event.repository.name }} - git_reference: ${{ github.sha }} - fuzzing_server_address: ${{ env.FUZZING_SERVER_ADDRESS }} - dashboard_address: ${{ env.WEB_APP_ADDRESS }}