aboutsummaryrefslogtreecommitdiff
path: root/Makefile.fuzz
diff options
context:
space:
mode:
authorGravatar Gabi Davar <grizzly.nyo@gmail.com> 2021-09-25 22:28:03 +0300
committerGravatar GitHub <noreply@github.com> 2021-09-25 12:28:03 -0700
commit46fa2a64cc47de5fab3ce85c442b44d7a6721eea (patch)
tree2fa6614990f8cb10b1bcd13236c7622af6041ae8 /Makefile.fuzz
parentbbd317cb22f673a7d9c756ecff13681535bf74c6 (diff)
downloadcoredns-46fa2a64cc47de5fab3ce85c442b44d7a6721eea.tar.gz
coredns-46fa2a64cc47de5fab3ce85c442b44d7a6721eea.tar.zst
coredns-46fa2a64cc47de5fab3ce85c442b44d7a6721eea.zip
Update badges, remove fuzzit leftovers. (#4886)
Diffstat (limited to 'Makefile.fuzz')
-rw-r--r--Makefile.fuzz58
1 files changed, 0 insertions, 58 deletions
diff --git a/Makefile.fuzz b/Makefile.fuzz
deleted file mode 100644
index 5f4c1be2c..000000000
--- a/Makefile.fuzz
+++ /dev/null
@@ -1,58 +0,0 @@
-# Makefile for fuzzing
-#
-# With https://app.fuzzit.dev/ we are continuously fuzzing CoreDNS.
-#
-# Use go-fuzz and needs the tools installed. For each fuzz.go in a plugin's directory
-# you can start the fuzzing with: make -f Makefile.fuzz <plugin>
-# e.g.
-#
-# make -f Makefile.fuzz forward
-#
-# Each plugin that wants to join the fuzzing fray only needs to add a fuzz.go that calls
-# the plugin's ServeDNS and used the plugin/pkg/fuzz for the Do function.
-#
-# Installing go-fuzz is very tricky because it does not support Go modules, see the `Makefile`
-# for the current trickery. The following may do the trick:
-#
-# GO111MODULE=off go get github.com/dvyukov/go-fuzz/go-fuzz-build
-
-REPO:="github.com/coredns/coredns"
-FUZZIT:=v2.4.35
-# set LIBFUZZER=YES to build libfuzzer compatible targets
-
-FUZZ:=$(dir $(wildcard plugin/*/fuzz.go)) # plugin/cache/
-PLUGINS:=$(foreach f,$(FUZZ),$(subst plugin, ,$(f:/=))) # > /cache
-PLUGINS:=$(foreach f,$(PLUGINS),$(subst /, ,$(f))) # > cache
-
-.PHONY: echo
-echo:
- @echo $(PLUGINS) corefile
-
-all: $(PLUGINS) corefile
-
-.PHONY: $(PLUGINS)
-$(PLUGINS): echo
-ifeq ($(LIBFUZZER), YES)
- go-fuzz-build -libfuzzer -o $(@).a ./plugin/$(@)
- clang -fsanitize=fuzzer $(@).a -o $(@)
-else
- go-fuzz-build $(REPO)/plugin/$(@)
- go-fuzz -bin=./$(@)-fuzz.zip -workdir=fuzz/$(@)
-endif
-
-.PHONY: corefile
-corefile:
-ifeq ($(LIBFUZZER), YES)
- go-fuzz-build -libfuzzer -o $(@).a ./test
- clang -fsanitize=fuzzer $(@).a -o $(@)
-else
- go-fuzz-build $(REPO)/test
- go-fuzz -bin=./test-fuzz.zip -workdir=fuzz/$(@)
-endif
-
-fuzzit:
- wget --quiet -O fuzzit https://github.com/fuzzitdev/fuzzit/releases/download/$(FUZZIT)/fuzzit_Linux_x86_64 && chmod +x fuzzit
-
-.PHONY: clean
-clean:
- rm *-fuzz.zip