gRPC - add ssl_server_fuzzer and remove options (#458)

* CC less people for gRPC issues

* Enable ssl_server_fuzzer and remove options
This commit is contained in:
matt-kwong 2017-03-15 14:43:36 -07:00 committed by Abhishek Arya
parent d40a0b471b
commit 6364c0f832
16 changed files with 16 additions and 53 deletions

View File

@ -36,4 +36,4 @@ RUN apt-get update && apt-get install -y bazel
RUN git clone --recursive https://github.com/grpc/grpc grpc
WORKDIR /src/grpc/
COPY build.sh *.options $SRC/
COPY build.sh $SRC/

View File

@ -1,3 +0,0 @@
[libfuzzer]
max_len = 2048
dict = api_fuzzer.dictionary

View File

@ -28,9 +28,8 @@ test/core/transport/chttp2/hpack_parser_fuzzer_test.c \
test/core/end2end/fuzzers/api_fuzzer.c \
test/core/end2end/fuzzers/client_fuzzer.c \
test/core/end2end/fuzzers/server_fuzzer.c \
test/core/security/ssl_server_fuzzer.c \
"
# TODO: enable ssl server corpus after Bazel fuzzer rules written
# test/core/security/ssl_server_fuzzer.c \
FUZZER_DICTIONARIES="\
test/core/end2end/fuzzers/api_fuzzer.dictionary \
@ -76,21 +75,20 @@ for dict in $FUZZER_DICTIONARIES; do
cp $dict $OUT/
done
cp $SRC/*.options $OUT/
cp $SRC/grpc/tools/fuzzer/options/*.options $OUT/
# We don't have a consistent naming convention between fuzzer files and corpus
# directories so we resort to hard coding zipping corpuses
zip $OUT/fuzzer_seed_corpus.zip test/core/json/corpus
zip $OUT/uri_fuzzer_test_seed_corpus.zip test/core/client_channel/uri_corpus
zip $OUT/request_fuzzer_seed_corpus.zip test/core/http/request_corpus
zip $OUT/response_fuzzer_seed_corpus.zip test/core/http/response_corpus
zip $OUT/fuzzer_response_seed_corpus.zip test/core/nanopb/corpus_response
zip $OUT/fuzzer_serverlist_seed_corpus.zip test/core/nanopb/corpus_serverlist
zip $OUT/percent_decode_fuzzer_seed_corpus.zip test/core/slice/percent_decode_corpus
zip $OUT/percent_encode_fuzzer_seed_corpus.zip test/core/slice/percent_encode_corpus
zip $OUT/hpack_parser_fuzzer_test_seed_corpus.zip test/core/transport/chttp2/hpack_parser_corpus
zip $OUT/api_fuzzer_seed_corpus.zip test/core/end2end/fuzzers/api_fuzzer_corpus
zip $OUT/client_fuzzer_seed_corpus.zip test/core/end2end/fuzzers/client_fuzzer_corpus
zip $OUT/server_fuzzer_seed_corpus.zip test/core/end2end/fuzzers/server_fuzzer_corpus
# TODO: zip ssl server corpus after Bazel fuzzer rules written
# test/core/security/corpus/ssl_server_corpus
zip $OUT/fuzzer_seed_corpus.zip test/core/json/corpus/*
zip $OUT/uri_fuzzer_test_seed_corpus.zip test/core/client_channel/uri_corpus/*
zip $OUT/request_fuzzer_seed_corpus.zip test/core/http/request_corpus/*
zip $OUT/response_fuzzer_seed_corpus.zip test/core/http/response_corpus/*
zip $OUT/fuzzer_response_seed_corpus.zip test/core/nanopb/corpus_response/*
zip $OUT/fuzzer_serverlist_seed_corpus.zip test/core/nanopb/corpus_serverlist/*
zip $OUT/percent_decode_fuzzer_seed_corpus.zip test/core/slice/percent_decode_corpus/*
zip $OUT/percent_encode_fuzzer_seed_corpus.zip test/core/slice/percent_encode_corpus/*
zip $OUT/hpack_parser_fuzzer_test_seed_corpus.zip test/core/transport/chttp2/hpack_parser_corpus/*
zip $OUT/api_fuzzer_seed_corpus.zip test/core/end2end/fuzzers/api_fuzzer_corpus/*
zip $OUT/client_fuzzer_seed_corpus.zip test/core/end2end/fuzzers/client_fuzzer_corpus/*
zip $OUT/server_fuzzer_seed_corpus.zip test/core/end2end/fuzzers/server_fuzzer_corpus/*
zip $OUT/ssl_server_fuzzer_seed_corpus.zip test/core/security/corpus/ssl_server_corpus/*

View File

@ -1,3 +0,0 @@
[libfuzzer]
max_len = 2048
dict = hpack.dictionary

View File

@ -1,2 +0,0 @@
[libfuzzer]
max_len = 512

View File

@ -1,2 +0,0 @@
[libfuzzer]
max_len = 128

View File

@ -1,2 +0,0 @@
[libfuzzer]
max_len = 128

View File

@ -1,3 +0,0 @@
[libfuzzer]
max_len = 512
dict = hpack.dictionary

View File

@ -1,2 +0,0 @@
[libfuzzer]
max_len = 32

View File

@ -1,2 +0,0 @@
[libfuzzer]
max_len = 32

View File

@ -1,11 +1,8 @@
homepage: "http://www.grpc.io/"
primary_contact: "mattkwong@google.com"
auto_ccs:
- "grpc-c-team@google.com"
- "ctiller@google.com"
- "dgq@google.com"
- "klempner@google.com"
- "jkolhe@google.com"
- "roth@google.com"
- "ncteisen@google.com"
- "nnoble@google.com"

View File

@ -1,3 +0,0 @@
[libfuzzer]
max_len = 2048

View File

@ -1,3 +0,0 @@
[libfuzzer]
max_len = 2048

View File

@ -1,3 +0,0 @@
[libfuzzer]
max_len = 2048
dict = hpack.dictionary

View File

@ -1,2 +0,0 @@
[libfuzzer]
max_len = 2048

View File

@ -1,2 +0,0 @@
[libfuzzer]
max_len = 128