Commit Graph

9398 Commits

Author SHA1 Message Date
Arthur Chan 5b7f4f0317
zip4j: Add retry handler setting for maven build (#10429)
The Maven build process requires fetching dependency libraries from the
central repository with Apache Wagon. This fetching action will fail
because of an unstable connection or connection rest by the repository
server because there are too many fetching requests. By default, maven
build does not retry the fetching if it is not an error in the
request-sending methods. Thus these failing dependency fetching will
cause maven project fail to build randomly. This PR fixes the build
script to configure the maven wagon parameter to force it to retry when
failing and also increases the timeout and retry count to decrease the
chance of build failure from dependencies fetching failure cases.

Signed-off-by: Arthur Chan <arthur.chan@adalogics.com>
2023-05-31 15:56:45 +01:00
jonathanmetzman bf0e3eb336
[CIfuzz] Fix SARIF functionality. (#10349) 2023-05-31 09:33:58 -04:00
MacrabFalke 58ff523176
bitcoin-core: Temporarily disable LTO=1 (#10423)
LTO=1 temporarily disabled due to
https://github.com/google/oss-fuzz/pull/9461#issuecomment-1568189633

Also, avoid wasting storage space on a docker layer by merging the two
layers.

cc @dergoegge @fanquake
2023-05-30 15:53:49 +01:00
Khaled Yakdan 04369ed9c3
Do not install Jazzer.js in the compile_javascript_fuzzer script (#10381)
This causes issues in two cases:
1. using other package managers than npm, e.g., yarn.
2. fuzzing pure ECMAScript projects. In this case, we have to transform
those projects into CommonJS projects so that they can be instrumented
properly.
2023-05-30 17:08:41 +10:00
Evgeny Vereshchagin aac5ad86d6
[avahi] move the build script and fuzz targets upstream (#10412)
Now that https://github.com/lathiat/avahi/pull/460 is merged it should
be safe to point OSS-Fuzz upstream.
2023-05-30 17:01:36 +10:00
Holly Gong ab7169ba22
Update contact list for scarecrow project (#10420) 2023-05-30 16:28:43 +10:00
Holly Gong c28042e550
Modify scarecrow for pr helper testing (#10417) 2023-05-30 05:43:07 +00:00
Sergey Bronnikov 90c1170af5
[freerdp] initial integration (#4748)
Issue: https://github.com/FreeRDP/FreeRDP/issues/5063
How To Build:
https://github.com/awakecoding/FreeRDP-Manuals/blob/master/Developer/FreeRDP-Developer-Manual.markdown
2023-05-30 09:30:19 +10:00
RBRi 79e586a2e7
adjust patch for latest pom (#10411) 2023-05-29 17:14:12 +01:00
Kit Chan fb2c5e8748
Update project.yaml (#10410)
add new folks to CCS for trafficserver project
2023-05-29 17:09:24 +01:00
Sebastian Rasmussen e0d89187f3
jbig2dec: Re-add test suite files. (#10414)
These files moved recently due to a domain reorganization, and were
removed in #10401, but are still available in their new location.
2023-05-29 12:32:52 +01:00
Henry Lin b0bca701be
json-flattener: Initial integration (#10392)
Integrating json-flattener into OSS-Fuzz.
2023-05-27 21:23:52 -04:00
Henry Lin c3e92bac6d
univocity-parsers: Initial integration (#10391)
Integrating univocity-parsers into OSS-Fuzz
2023-05-27 21:23:27 -04:00
Riccardo Mori 5dd20138d1
[ntopng] Add options to the fuzzer (#10405)
Copy the `.options` file to be able to specify some options to the
fuzzer (as mentioned here
https://github.com/google/oss-fuzz/issues/10323#issuecomment-1560074310)
2023-05-27 21:22:57 -04:00
DavidKorczynski e8fc22f42b
dask: fix build (#10408)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-05-27 21:22:20 -04:00
MacrabFalke e9081194d4
bitcoin-core: Try to work around out-of-space error (#10388)
No idea, but this hopefully fixes
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=59309
2023-05-27 21:21:56 -04:00
DavidKorczynski a1605ce675
bluez: fix build (#10407)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-05-27 22:13:25 +01:00
DavidKorczynski cfdbdd15cb
openvpn: fix build (#10406)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-05-27 16:20:45 +01:00
DavidKorczynski 5e03073a59
ijson: enable fuzz introspector (#10403)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-05-27 12:46:05 +01:00
DavidKorczynski e7e16271d5
pycrypto: enable fuzz introspector (#10404)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-05-27 12:45:49 +01:00
DavidKorczynski 08f2dc4978
pistache: only build required library (#10402)
This enables fuzz introspector

Signed-off-by: David Korczynski <david@adalogics.com>
2023-05-26 21:47:50 +01:00
DavidKorczynski ed7bf55f17
jbig2dec: fix build and make introspector work (#10401)
.zip folders are no longer available.

Signed-off-by: David Korczynski <david@adalogics.com>
2023-05-26 19:51:12 +01:00
DavidKorczynski ee6066ee6f
cmake: fix up fuzz introspector build (#10400)
Only build the static library needed for the fuzzers.

Signed-off-by: David Korczynski <david@adalogics.com>
2023-05-26 18:43:57 +01:00
DavidKorczynski ee6d77e281
sqlite3: only build needed libraries (#10397)
This makes it work with Fuzz Intropector

Signed-off-by: David Korczynski <david@adalogics.com>
2023-05-26 16:59:42 +01:00
DavidKorczynski 5e5d6c1600
cmark: enable fuzz introspector (#10399)
Only build the static library required by the fuzzer

Signed-off-by: David Korczynski <david@adalogics.com>
2023-05-26 16:59:22 +01:00
DavidKorczynski 9afbc7068f
jsonnet: only build required libraries (#10398)
We only need to build the static library in jsonnet so am restricting
the build to do that. This enables Fuzz Introspector

Signed-off-by: David Korczynski <david@adalogics.com>
2023-05-26 16:11:47 +01:00
DavidKorczynski 0d87554295
libteken: fix build to work with introspector (#10396)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-05-26 13:32:31 +01:00
DavidKorczynski 1bd929950e
openh264: only build static library (#10394)
The dynamic library is not used and this will enable fuzz introspector
2023-05-25 23:58:44 +01:00
Sergey Bronnikov b352eb1b88
docs: add a list with available sanitizers (#10387)
It is not clear what sanitizers could be specified in `sanitizers` field
in project.yaml. Patch adds a list of available sanitizers to a "New
project guide".
2023-05-25 12:43:19 -04:00
van Hauser 10473b7448
Update AFL++ commit id (#9461)
minor fixes and enhancements. does not depend on the PR in clusterfuzz.

---------

Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com>
2023-05-25 01:21:55 -04:00
Andy Ross d2c2b3086e
projects/sound-open-firmware: Fix remote name to be "origin" (#10385)
The srcmap tool assumes that all git trees will have been pulled from a
remote named "origin", which is not true for west. Hack in a duplicate
remote to conform to convention.

Signed-off-by: Andy Ross <andyross@google.com>
2023-05-24 18:22:14 -04:00
jonathanmetzman d039e3f878
Fix ffms2 build (#10380)
You can't use /out as this does not exist in our production builds. Use
$OUT instead.
2023-05-24 08:23:30 -04:00
Henry Lin b6df54ce8f
ion-java: Initial integration (#10356)
Integrating ion-java to OSS-Fuzz.
2023-05-24 08:19:27 -04:00
Henry Lin fcbc0aa98f
Update several projects (#10357)
Fix several issues in yamlbeans, apache-cxf and spring-amqp.
2023-05-24 07:56:27 -04:00
DavidKorczynski bc22837a31
netty-tcnative: initial integration (#10374)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-05-24 07:55:57 -04:00
fanquake 66b35e840e
bitcoin-core: remove no-op cryptofuzz patch (#10377)
Patch no-longer applies to the source. Likely due to
0bc0c3b5b6.
2023-05-24 07:55:16 -04:00
Catena cyber 6187973a6c
Golang signal handler builds fixes (#10367)
Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=59153 :
ecc-diff-fuzzer: Fuzzing build failure
And https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=59157 cel-go:
Coverage build failure

 Fixes https://github.com/google/oss-fuzz/pull/10314 cc @Alan32Liu
2023-05-24 13:49:10 +10:00
DavidKorczynski 256349ccb1
quiche: initial integration (#10368)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-05-23 20:00:50 +01:00
Nathaniel Brough 21f5d1926a
rust-regex: Move build script upstream (#10369) 2023-05-23 14:48:20 -04:00
DavidKorczynski 3c213074cf
ffms2: initial integration (#10373)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-05-23 14:47:54 -04:00
Andy Ross b4d067d9b8
projects/sound-open-firmware: New fuzzing framework (#10342)
[First submission to oss-fuzz. Not sure if I'm checking all the correct
boxes to get this submitted successfully. Be gentle.]

SOF has a new fuzzing framework that leverages the underlying Zephyr
OS's native_posix integration to get a more complete build than just the
protocol layer. In theory all the non-hardware-specific code is
reachable from the fuzzer inputs.

Also adds support for the newer "IPC4" protocol as a separate target.

Signed-off-by: Andy Ross <andyross@google.com>
2023-05-23 10:30:05 +10:00
Fabian Meumertzheim b891e6abd1
[apache-commons-imaging] Fix build (#10364)
Also silences the highly verbose Maven download progress output.
2023-05-22 15:05:19 -04:00
MacrabFalke 4c63074ffc
bitcoin-core: enable LTO (take 3) (#10363)
take 3, along with a revival of a previous hack to run LTO only once
2023-05-22 15:04:59 -04:00
DavidKorczynski fc4525cc9d
flex: initial integration (#10365)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-05-22 15:04:40 -04:00
fanquake bd394d0e84
bitcoin-core: remove MSAN workaround (#10361)
This is no-longer required after project changes. See:
https://github.com/bitcoin/bitcoin/pull/27699.
2023-05-22 13:20:23 +01:00
DavidKorczynski 64bc035d08
opencensus-cpp: fix build (#10360)
Update to the latest `rules_fuzzing` set up
2023-05-22 11:11:33 +01:00
DavidKorczynski 4700b320f7
tensorflow-serving: initial integration (#10358)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-05-22 10:25:09 +01:00
DavidKorczynski 9fc1908fc1
pybind11: initial integration (#10355)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-05-22 10:24:51 +01:00
Eugene Kliuchnikov ca2a3dbf31
Migrate faad2 to Bazel build (#10353) 2023-05-20 20:21:04 +01:00
Paul Wankadia 84a7cdaf95
RE2 has taken a dependency on Abseil. (#10354) 2023-05-19 14:50:26 -04:00