mirror of https://github.com/google/oss-fuzz.git
[NFC][CIFuzz] Rename test_files to test_data and delete unneeded testcases directory (#5448)
This commit is contained in:
parent
2b4af8f24a
commit
5792e5c529
|
@ -1,11 +1,11 @@
|
|||
.git
|
||||
infra/cifuzz/test_data/*
|
||||
docs/*
|
||||
|
||||
# Copied from .gitignore.
|
||||
.vscode/
|
||||
*.pyc
|
||||
build
|
||||
*~
|
||||
.DS_Store
|
||||
*.swp
|
||||
infra/cifuzz/test_files/*
|
||||
docs/*
|
||||
infra/testcases/*
|
||||
*.swp
|
|
@ -1,2 +1,9 @@
|
|||
cifuzz/test_files/*
|
||||
testcases/*
|
||||
cifuzz/test_data/*
|
||||
|
||||
# Copied from .gitignore.
|
||||
.vscode/
|
||||
*.pyc
|
||||
build
|
||||
*~
|
||||
.DS_Store
|
||||
*.swp
|
|
@ -30,15 +30,15 @@ EXAMPLE_PROJECT = 'example'
|
|||
|
||||
EXAMPLE_FILE_CHANGED = 'test.txt'
|
||||
|
||||
TEST_FILES_PATH = os.path.join(os.path.dirname(os.path.abspath(__file__)),
|
||||
'test_files')
|
||||
TEST_DATA_PATH = os.path.join(os.path.dirname(os.path.abspath(__file__)),
|
||||
'test_data')
|
||||
|
||||
|
||||
class RemoveUnaffectedFuzzTargets(unittest.TestCase):
|
||||
"""Tests remove_unaffected_fuzzers."""
|
||||
|
||||
TEST_FUZZER_1 = os.path.join(TEST_FILES_PATH, 'out', 'example_crash_fuzzer')
|
||||
TEST_FUZZER_2 = os.path.join(TEST_FILES_PATH, 'out', 'example_nocrash_fuzzer')
|
||||
TEST_FUZZER_1 = os.path.join(TEST_DATA_PATH, 'out', 'example_crash_fuzzer')
|
||||
TEST_FUZZER_2 = os.path.join(TEST_DATA_PATH, 'out', 'example_nocrash_fuzzer')
|
||||
|
||||
# yapf: disable
|
||||
@parameterized.parameterized.expand([
|
||||
|
|
|
@ -36,9 +36,9 @@ import test_helpers
|
|||
# https://github.com/google/oss-fuzz/tree/master/projects/example project.
|
||||
EXAMPLE_PROJECT = 'example'
|
||||
|
||||
# Location of files used for testing.
|
||||
TEST_FILES_PATH = os.path.join(os.path.dirname(os.path.abspath(__file__)),
|
||||
'test_files')
|
||||
# Location of data used for testing.
|
||||
TEST_DATA_PATH = os.path.join(os.path.dirname(os.path.abspath(__file__)),
|
||||
'test_data')
|
||||
|
||||
# An example fuzzer that triggers an crash.
|
||||
# Binary is a copy of the example project's do_stuff_fuzzer and can be
|
||||
|
@ -257,7 +257,7 @@ class CheckFuzzerBuildTest(unittest.TestCase):
|
|||
def setUp(self):
|
||||
self.tmp_dir_obj = tempfile.TemporaryDirectory()
|
||||
self.test_files_path = os.path.join(self.tmp_dir_obj.name, 'test_files')
|
||||
shutil.copytree(TEST_FILES_PATH, self.test_files_path)
|
||||
shutil.copytree(TEST_DATA_PATH, self.test_files_path)
|
||||
|
||||
def tearDown(self):
|
||||
self.tmp_dir_obj.cleanup()
|
||||
|
@ -286,7 +286,7 @@ class CheckFuzzerBuildTest(unittest.TestCase):
|
|||
"""Tests that ALLOWED_BROKEN_TARGETS_PERCENTAGE is set when running
|
||||
docker if passed to check_fuzzer_build."""
|
||||
mocked_docker_run.return_value = 0
|
||||
test_fuzzer_dir = os.path.join(TEST_FILES_PATH, 'out')
|
||||
test_fuzzer_dir = os.path.join(TEST_DATA_PATH, 'out')
|
||||
build_fuzzers.check_fuzzer_build(test_fuzzer_dir,
|
||||
self.SANITIZER,
|
||||
self.LANGUAGE,
|
||||
|
|
|
@ -21,8 +21,8 @@ import coverage
|
|||
|
||||
# pylint: disable=protected-access
|
||||
|
||||
TEST_FILES_PATH = os.path.join(os.path.dirname(os.path.abspath(__file__)),
|
||||
'test_files')
|
||||
TEST_DATA_PATH = os.path.join(os.path.dirname(os.path.abspath(__file__)),
|
||||
'test_data')
|
||||
|
||||
PROJECT_NAME = 'curl'
|
||||
REPO_PATH = '/src/curl'
|
||||
|
@ -31,7 +31,7 @@ PROJECT_COV_JSON_FILENAME = 'example_curl_cov.json'
|
|||
FUZZ_TARGET_COV_JSON_FILENAME = 'example_curl_fuzzer_cov.json'
|
||||
INVALID_TARGET = 'not-a-fuzz-target'
|
||||
|
||||
with open(os.path.join(TEST_FILES_PATH,
|
||||
with open(os.path.join(TEST_DATA_PATH,
|
||||
PROJECT_COV_JSON_FILENAME),) as cov_file_handle:
|
||||
PROJECT_COV_INFO = json.loads(cov_file_handle.read())
|
||||
|
||||
|
@ -107,7 +107,7 @@ class GetFilesCoveredByTargetTest(unittest.TestCase):
|
|||
|
||||
def test_valid_target(self):
|
||||
"""Tests that covered files can be retrieved from a coverage report."""
|
||||
with open(os.path.join(TEST_FILES_PATH,
|
||||
with open(os.path.join(TEST_DATA_PATH,
|
||||
FUZZ_TARGET_COV_JSON_FILENAME),) as file_handle:
|
||||
fuzzer_cov_info = json.loads(file_handle.read())
|
||||
|
||||
|
@ -115,7 +115,7 @@ class GetFilesCoveredByTargetTest(unittest.TestCase):
|
|||
return_value=fuzzer_cov_info):
|
||||
file_list = self.coverage_getter.get_files_covered_by_target(FUZZ_TARGET)
|
||||
|
||||
curl_files_list_path = os.path.join(TEST_FILES_PATH,
|
||||
curl_files_list_path = os.path.join(TEST_DATA_PATH,
|
||||
'example_curl_file_list.json')
|
||||
with open(curl_files_list_path) as file_handle:
|
||||
expected_file_list = json.loads(file_handle.read())
|
||||
|
|
|
@ -148,8 +148,7 @@ class GetTestCaseTest(unittest.TestCase):
|
|||
def test_valid_error_string(self):
|
||||
"""Tests that get_testcase returns the correct testcase give an error."""
|
||||
testcase_path = os.path.join(os.path.dirname(os.path.abspath(__file__)),
|
||||
'test_files',
|
||||
'example_crash_fuzzer_output.txt')
|
||||
'test_data', 'example_crash_fuzzer_output.txt')
|
||||
with open(testcase_path, 'rb') as test_fuzz_output:
|
||||
parsed_testcase = self.test_target.get_testcase(test_fuzz_output.read())
|
||||
self.assertEqual(
|
||||
|
|
|
@ -37,13 +37,13 @@ import test_helpers
|
|||
EXAMPLE_PROJECT = 'example'
|
||||
|
||||
# Location of files used for testing.
|
||||
TEST_FILES_PATH = os.path.join(os.path.dirname(os.path.abspath(__file__)),
|
||||
'test_files')
|
||||
TEST_DATA_PATH = os.path.join(os.path.dirname(os.path.abspath(__file__)),
|
||||
'test_data')
|
||||
|
||||
MEMORY_FUZZER_DIR = os.path.join(TEST_FILES_PATH, 'memory')
|
||||
MEMORY_FUZZER_DIR = os.path.join(TEST_DATA_PATH, 'memory')
|
||||
MEMORY_FUZZER = 'curl_fuzzer_memory'
|
||||
|
||||
UNDEFINED_FUZZER_DIR = os.path.join(TEST_FILES_PATH, 'undefined')
|
||||
UNDEFINED_FUZZER_DIR = os.path.join(TEST_DATA_PATH, 'undefined')
|
||||
UNDEFINED_FUZZER = 'curl_fuzzer_undefined'
|
||||
|
||||
FUZZ_SECONDS = 10
|
||||
|
@ -335,7 +335,7 @@ class RunAddressFuzzersIntegrationTest(RunFuzzerIntegrationTestMixin,
|
|||
side_effect=[True, False]):
|
||||
with tempfile.TemporaryDirectory() as tmp_dir:
|
||||
workspace = os.path.join(tmp_dir, 'workspace')
|
||||
shutil.copytree(TEST_FILES_PATH, workspace)
|
||||
shutil.copytree(TEST_DATA_PATH, workspace)
|
||||
config = _create_config(fuzz_seconds=FUZZ_SECONDS,
|
||||
workspace=workspace,
|
||||
project_name=EXAMPLE_PROJECT)
|
||||
|
@ -351,17 +351,17 @@ class RunAddressFuzzersIntegrationTest(RunFuzzerIntegrationTestMixin,
|
|||
def test_old_bug_found(self, _):
|
||||
"""Tests run_fuzzers with a bug found in OSS-Fuzz before."""
|
||||
config = _create_config(fuzz_seconds=FUZZ_SECONDS,
|
||||
workspace=TEST_FILES_PATH,
|
||||
workspace=TEST_DATA_PATH,
|
||||
project_name=EXAMPLE_PROJECT)
|
||||
with tempfile.TemporaryDirectory() as tmp_dir:
|
||||
workspace = os.path.join(tmp_dir, 'workspace')
|
||||
shutil.copytree(TEST_FILES_PATH, workspace)
|
||||
shutil.copytree(TEST_DATA_PATH, workspace)
|
||||
config = _create_config(fuzz_seconds=FUZZ_SECONDS,
|
||||
workspace=TEST_FILES_PATH,
|
||||
workspace=TEST_DATA_PATH,
|
||||
project_name=EXAMPLE_PROJECT)
|
||||
result = run_fuzzers.run_fuzzers(config)
|
||||
self.assertEqual(result, run_fuzzers.RunFuzzersResult.NO_BUG_FOUND)
|
||||
build_dir = os.path.join(TEST_FILES_PATH, 'out', self.BUILD_DIR_NAME)
|
||||
build_dir = os.path.join(TEST_DATA_PATH, 'out', self.BUILD_DIR_NAME)
|
||||
self.assertTrue(os.path.exists(build_dir))
|
||||
self.assertNotEqual(0, len(os.listdir(build_dir)))
|
||||
|
||||
|
|
|
@ -25,9 +25,9 @@ import stack_parser
|
|||
# https://github.com/google/oss-fuzz/tree/master/projects/example project.
|
||||
EXAMPLE_PROJECT = 'example'
|
||||
|
||||
# Location of files used for testing.
|
||||
TEST_FILES_PATH = os.path.join(os.path.dirname(os.path.abspath(__file__)),
|
||||
'test_files')
|
||||
# Location of data used for testing.
|
||||
TEST_DATA_PATH = os.path.join(os.path.dirname(os.path.abspath(__file__)),
|
||||
'test_data')
|
||||
|
||||
|
||||
class ParseOutputTest(fake_filesystem_unittest.TestCase):
|
||||
|
@ -44,7 +44,7 @@ class ParseOutputTest(fake_filesystem_unittest.TestCase):
|
|||
def test_parse_valid_output(self, fuzzer_output_file, bug_summary_file):
|
||||
"""Checks that the parse fuzzer output can correctly parse output."""
|
||||
# Read the fuzzer output from disk.
|
||||
fuzzer_output_path = os.path.join(TEST_FILES_PATH, fuzzer_output_file)
|
||||
fuzzer_output_path = os.path.join(TEST_DATA_PATH, fuzzer_output_file)
|
||||
self.fs.add_real_file(fuzzer_output_path)
|
||||
with open(fuzzer_output_path, 'rb') as fuzzer_output_handle:
|
||||
fuzzer_output = fuzzer_output_handle.read()
|
||||
|
@ -57,7 +57,7 @@ class ParseOutputTest(fake_filesystem_unittest.TestCase):
|
|||
bug_summary = bug_summary_handle.read()
|
||||
|
||||
# Compare the bug to the expected one.
|
||||
expected_bug_summary_path = os.path.join(TEST_FILES_PATH, bug_summary_file)
|
||||
expected_bug_summary_path = os.path.join(TEST_DATA_PATH, bug_summary_file)
|
||||
self.fs.add_real_file(expected_bug_summary_path)
|
||||
with open(expected_bug_summary_path) as expected_bug_summary_handle:
|
||||
expected_bug_summary = expected_bug_summary_handle.read()
|
||||
|
|
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
|
@ -1 +0,0 @@
|
|||
rule N{condition:for 1r in r(r
|
|
@ -24,7 +24,7 @@ import helper
|
|||
EXAMPLE_PROJECT = 'example'
|
||||
|
||||
TEST_OUT_DIR = os.path.join(os.path.dirname(os.path.abspath(__file__)),
|
||||
'cifuzz', 'test_files', 'out')
|
||||
'cifuzz', 'test_data', 'out')
|
||||
|
||||
|
||||
class IsFuzzTargetLocalTest(unittest.TestCase):
|
||||
|
|
Loading…
Reference in New Issue