2020-01-13 23:25:12 +00:00
|
|
|
# Copyright 2020 Google LLC
|
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
2021-01-20 21:23:55 +00:00
|
|
|
"""Builds a specific OSS-Fuzz project's fuzzers for CI tools."""
|
2020-01-29 19:03:43 +00:00
|
|
|
import logging
|
2020-01-13 23:25:12 +00:00
|
|
|
import sys
|
|
|
|
|
2021-02-04 14:52:22 +00:00
|
|
|
import build_fuzzers
|
2021-01-28 20:10:57 +00:00
|
|
|
import config_utils
|
2021-06-30 14:34:42 +00:00
|
|
|
import docker
|
2020-01-29 19:03:43 +00:00
|
|
|
|
2021-01-20 21:29:47 +00:00
|
|
|
# pylint: disable=c-extension-no-member
|
|
|
|
# pylint gets confused because of the relative import of cifuzz.
|
|
|
|
|
2020-01-29 19:03:43 +00:00
|
|
|
# TODO: Turn default logging to INFO when CIFuzz is stable
|
|
|
|
logging.basicConfig(
|
|
|
|
format='%(asctime)s - %(name)s - %(levelname)s - %(message)s',
|
|
|
|
level=logging.DEBUG)
|
|
|
|
|
2020-01-13 23:25:12 +00:00
|
|
|
|
|
|
|
def main():
|
2020-02-06 21:39:43 +00:00
|
|
|
"""Build OSS-Fuzz project's fuzzers for CI tools.
|
2020-01-29 19:03:43 +00:00
|
|
|
This script is used to kick off the Github Actions CI tool. It is the
|
2020-02-06 21:39:43 +00:00
|
|
|
entrypoint of the Dockerfile in this directory. This action can be added to
|
2020-01-29 19:03:43 +00:00
|
|
|
any OSS-Fuzz project's workflow that uses Github.
|
|
|
|
|
2020-02-06 21:39:43 +00:00
|
|
|
Note: The resulting clusterfuzz binaries of this build are placed in
|
|
|
|
the directory: ${GITHUB_WORKSPACE}/out
|
|
|
|
|
2020-01-29 19:03:43 +00:00
|
|
|
Required environment variables:
|
2020-02-19 23:32:30 +00:00
|
|
|
OSS_FUZZ_PROJECT_NAME: The name of OSS-Fuzz project.
|
2020-01-29 19:03:43 +00:00
|
|
|
GITHUB_REPOSITORY: The name of the Github repo that called this script.
|
|
|
|
GITHUB_SHA: The commit SHA that triggered this script.
|
2020-01-31 23:31:18 +00:00
|
|
|
GITHUB_EVENT_NAME: The name of the hook event that triggered this script.
|
2020-05-19 01:37:39 +00:00
|
|
|
GITHUB_EVENT_PATH:
|
|
|
|
The path to the file containing the POST payload of the webhook:
|
|
|
|
https://help.github.com/en/actions/reference/virtual-environments-for-github-hosted-runners#filesystems-on-github-hosted-runners
|
2020-02-06 21:39:43 +00:00
|
|
|
GITHUB_WORKSPACE: The shared volume directory where input artifacts are.
|
2020-06-12 01:27:01 +00:00
|
|
|
DRY_RUN: If true, no failures will surface.
|
|
|
|
SANITIZER: The sanitizer to use when running fuzzers.
|
2020-01-29 19:03:43 +00:00
|
|
|
|
|
|
|
Returns:
|
2020-11-17 21:39:57 +00:00
|
|
|
0 on success or 1 on failure.
|
2020-01-29 19:03:43 +00:00
|
|
|
"""
|
2021-01-28 22:49:03 +00:00
|
|
|
config = config_utils.BuildFuzzersConfig()
|
2020-02-03 23:35:04 +00:00
|
|
|
|
2021-01-28 20:10:57 +00:00
|
|
|
if config.dry_run:
|
2020-02-03 23:35:04 +00:00
|
|
|
# Sets the default return code on error to success.
|
2020-02-28 17:41:44 +00:00
|
|
|
returncode = 0
|
2020-12-07 18:50:11 +00:00
|
|
|
else:
|
|
|
|
# The default return code when an error occurs.
|
|
|
|
returncode = 1
|
2020-02-03 23:35:04 +00:00
|
|
|
|
2021-01-28 20:10:57 +00:00
|
|
|
if not config.workspace:
|
2020-12-07 18:50:11 +00:00
|
|
|
logging.error('This script needs to be run within Github actions.')
|
2020-02-28 17:41:44 +00:00
|
|
|
return returncode
|
2020-06-12 01:27:01 +00:00
|
|
|
|
2021-02-04 14:52:22 +00:00
|
|
|
if not build_fuzzers.build_fuzzers(config):
|
2020-12-07 18:50:11 +00:00
|
|
|
logging.error(
|
|
|
|
'Error building fuzzers for project %s (commit: %s, pr_ref: %s).',
|
2021-01-28 20:10:57 +00:00
|
|
|
config.project_name, config.commit_sha, config.pr_ref)
|
2020-12-07 18:50:11 +00:00
|
|
|
return returncode
|
2020-06-12 01:27:01 +00:00
|
|
|
|
2021-03-23 16:22:53 +00:00
|
|
|
if not config.bad_build_check:
|
|
|
|
# If we've gotten to this point and we don't need to do bad_build_check,
|
|
|
|
# then the build has succeeded.
|
|
|
|
returncode = 0
|
2021-02-04 14:52:22 +00:00
|
|
|
# yapf: disable
|
2021-03-23 16:22:53 +00:00
|
|
|
elif build_fuzzers.check_fuzzer_build(
|
2021-06-30 14:34:42 +00:00
|
|
|
docker.Workspace(config),
|
2021-02-19 19:54:15 +00:00
|
|
|
config.sanitizer,
|
|
|
|
config.language,
|
2021-02-04 14:52:22 +00:00
|
|
|
allowed_broken_targets_percentage=config.allowed_broken_targets_percentage
|
|
|
|
):
|
|
|
|
# yapf: enable
|
2020-08-06 21:33:08 +00:00
|
|
|
returncode = 0
|
|
|
|
|
2020-02-28 17:41:44 +00:00
|
|
|
return returncode
|
2020-01-13 23:25:12 +00:00
|
|
|
|
|
|
|
|
|
|
|
if __name__ == '__main__':
|
|
|
|
sys.exit(main())
|