Catena cyber
beee192ed3
Rust coverage: copy stdlib to the referenced directory ( #5776 )
...
using rustc commit-hash version
2021-05-16 14:32:33 -07:00
Abhishek Arya
b8a24cf949
Update project.yaml
2021-05-16 14:31:02 -07:00
Fabian Meumertzheim
88f76bc641
[infra] Make `targets_list` detect JVM/Python targets ( #5775 )
...
* [infra] Make `targets_list` detect JVM/Python targets
`targets_list` should not detect `jazzer_driver` and `jazzer_driver_asan` as fuzz targets, but should consider shell scripts that contain `LLVMFuzzerTestOneInput`.
@inferno-chromium This should fix https://github.com/google/oss-fuzz/pull/5770#issuecomment-841851786 .
* Fix
2021-05-16 18:37:55 +00:00
AdamKorcz
3895320c7f
[znc] Initial integration ( #5748 )
2021-05-15 19:16:47 +01:00
Douglas Bagnall
3641001014
samba: add David Mulder to auto_ccs ( #5771 )
...
* samba: add David Mulder to auto_ccs
* samba: add main_repo
2021-05-15 10:56:32 +01:00
AdamKorcz
1a19fbf2c2
[muduo] Initial integration ( #5714 )
2021-05-14 20:38:29 -07:00
DavidKorczynski
7d8e538e5b
unicode-rs: initial integration. ( #5413 )
...
* unicode-rs: initial integration.
* added an additional project to unicode-rs.
* refined unicode-rs integration.
* Updated the build script.
2021-05-14 20:33:34 -07:00
DavidKorczynski
f03549016c
sql-parser: initial integration ( #5276 )
...
* initial integration of sql-parser.
* fuzzer simplification.
* Updated sql-parse following maintainers accept.
* nit
2021-05-14 20:32:19 -07:00
Fabian Meumertzheim
fee51cc181
[infra] Run JVM coverage builds ( #5770 )
2021-05-14 17:07:48 -07:00
tsdgeos
31f0beb91e
poppler: Fix build ( #5769 )
2021-05-14 21:25:37 +01:00
Guido Vranken
3cc884e673
[bls-signatures] Build mcl with ubsan ( #5765 )
2021-05-13 10:08:05 -07:00
jonathanmetzman
8221561c34
Fix coverage script issues ( #5764 )
...
Make sure to install MarkupSafe==0.23 instead of >=0.23 which breaks.
Probably the solution is to upgrade Jinja upstream.
Fixes #5763
2021-05-13 15:32:42 +00:00
Catena cyber
a9fe789db7
Adds people to the javaparser project ( #5760 )
2021-05-13 07:02:55 -07:00
Tim Wojtulewicz
af9783113b
zeek: add extra configure option ( #5671 )
...
* zeek: add extra configure option
* zeek: Disable afl-fuzz
2021-05-12 20:23:30 +01:00
DavidKorczynski
62c7acc069
Duckdb: initial integration ( #5686 )
2021-05-12 12:14:32 -07:00
Roman Wagner
87eeb3aa86
[jsoup] initial integration ( #5720 )
2021-05-12 12:13:48 -07:00
AdamKorcz
aac200815a
[cfengine] Initial integration ( #5496 )
2021-05-12 12:08:33 -07:00
Mohammed Al Sahaf
44a3cdf6fc
caddy: add new project ( #5624 )
2021-05-12 12:08:09 -07:00
Bhargava Shastry
7cf8d930c1
Remove antlr deps ( #5701 )
...
* Remove antlr deps
* Update boost location.
2021-05-12 09:29:57 -07:00
Fabian Meumertzheim
a1b558719b
[infra] Verify JVM coverage builds in the CI ( #5752 )
2021-05-12 14:57:26 +00:00
AdamKorcz
ae86bc6075
[dgraph] Initial integration ( #5394 )
2021-05-12 07:50:48 -07:00
Catena cyber
9e4aad5acc
[javaparser] Initial Integration ( #5525 )
2021-05-12 14:46:13 +00:00
Catena cyber
90de0026df
[protoreflect] Initial integration ( #5652 )
2021-05-12 07:25:25 -07:00
Catena cyber
6d1ffd8452
[cel-go] Initial integration ( #5667 )
2021-05-12 07:23:32 -07:00
Fabian Meumertzheim
466787d4f5
[infra] Fix base-runner build ( #5756 )
...
Builds of base-runner fail as the Chromium coverage helper script has a
transitive dependency on MarkupSafe, which as of version 2.0 requires
additional python packaging tools to be installed.
This commit installs python3-setuptools and wheels, which fixes the
build.
2021-05-12 07:13:22 -07:00
Fabian Meumertzheim
10e888b561
[all] Make fuzz targets world executable ( #5751 )
...
Making fuzz targets only user executable as the root user makes them
non-executable outside the container, e.g. in the oss-fuzz/build/ dir.
2021-05-12 07:03:21 -07:00
Alexander
c447cfedf4
NJS: contact email addresses changed. ( #5753 )
...
* NJS: contact email addresses changed.
Current addresses are no longer linked to Google account.
* NJS: newline removed.
2021-05-12 10:36:18 +01:00
Alexander
893515a5c4
NJS: added main_repo value. ( #5755 )
2021-05-12 09:49:26 +01:00
DavidKorczynski
626a66d1d1
httplib2: fix build. ( #5754 )
2021-05-12 09:46:40 +01:00
Catena cyber
8a85802edd
Adds grpc-swift project ( #5630 )
2021-05-12 09:41:53 +10:00
olivekl
40def4aae7
Update accepting_new_projects.md ( #5750 )
...
Fix formatting in new project submission guidelines
2021-05-11 12:29:46 -07:00
Fabian Meumertzheim
124db941a7
[infra] Fix java coverage ( #5747 )
...
* Filter non-fuzz target binaries in coverage script
* Filter non-fuzz target binaries in helper.py
* Fix fuzz target executable bit check in helper.py
Python and JVM fuzz target executables created via the docs template
set the exectuable via `chmod u+x` as the root user, which means that
os.access checks in infra/helper.py don't see the exectuable bit if
not run as root locally.
With this commit, the check now looks for any of the three exectuable
bits.
2021-05-11 10:10:54 -07:00
David Bryant
774abe3bd3
[wavpack] fix issue #34149 (new configure script requires gettext) ( #5746 )
2021-05-11 09:43:02 +01:00
Fabian Meumertzheim
5cfb074ae5
Add Java coverage support ( #5733 )
...
Coverage is collected by running the fuzz targets with the JaCoCo agent
in Jazzer's no instrumentation mode.
Since JaCoCo does not support llvm-cov style coverage reports, a simple
Python helper creates it using the information contained in the JaCoCo
XML report.
As the Java build process does not maintain a mapping between source
files and build artifacts and JaCoCo needs to be passed the root folder
of the package tree, we use the Maven directory layout convention to
heuristically detect these roots.
2021-05-10 20:33:07 -07:00
rbehjati
a83b7c9d18
Enable fuzz testing of Rust code for project Oak ( #5719 )
2021-05-10 12:34:25 -04:00
Adi (Suissa) Peleg
980217b981
Granting kbaichoo@google.com Envoy fuzz tests access ( #5734 )
...
Signed-off-by: Adi Suissa-Peleg <adip@google.com>
2021-05-10 10:10:01 -04:00
Michael Niedermayer
8d08348d0e
[FFmpeg] Add small seed corpus for HEVC ( #5737 )
...
* [FFmpeg] Add small seed corpus for HEVC
Currently the HEVC coverage is relativly poor, this should improve it
Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
* [FFmpeg] Fix typo
Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
2021-05-10 13:31:57 +01:00
Sascha Brawer
ad25bc8767
Change contact emails for espeak-ng ( #5742 )
2021-05-10 10:50:55 +01:00
Michael Niedermayer
1777a33624
[FFmpeg] Only build first 2 targets of each kind for CI ( #5741 )
...
Based-on: 0da70e1c01
Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
2021-05-10 09:46:37 +01:00
Guido Vranken
6801fbd106
[libecc] Enable ECGDSA ( #5743 )
2021-05-10 09:43:22 +01:00
MarcoFalke
0da70e1c01
bitcoin-core: Only compile one fuzz target when OSS_FUZZ_CI ( #5738 )
2021-05-08 13:57:00 +01:00
Guido Vranken
41dcf822ef
[bls-signatures] Enable more operations ( #5739 )
2021-05-08 13:55:17 +01:00
DavidKorczynski
3a32125abb
oatpp: cleanup project. ( #5735 )
...
Fuzzer has been merged upstream
2021-05-07 14:30:10 -04:00
DavidKorczynski
c8c12960a9
libpg_query: clean up following upstream merge. ( #5736 )
2021-05-07 11:08:51 -07:00
Jonathan Behrens
f59d8d36b5
image-png: use buf_independent.rs fuzzer from upstream ( #5724 )
2021-05-07 18:39:50 +01:00
DavidKorczynski
ca53b90cd7
cleanup oss-fuzz. ( #5732 )
...
rustls: clean up artifacts from oss-fuzz
2021-05-07 12:02:48 -04:00
jonathanmetzman
033a858be0
[infra] Set OSS_FUZZ_CI=1 in CI so build scripts can know ( #5731 )
...
This will help bitcoin use CI to verify the build works, because
the last step is trivial (so testing not really needed) but will
fill up the disk.
2021-05-07 07:46:11 -07:00
MarcoFalke
f1cb756452
bitcoin-core: Unlock all fuzz targets ( #5730 )
...
* bitcoin-core: Unlock all fuzz targets
* bitcoin-core: Avoid out-of-disk in the CI
2021-05-07 07:38:13 -07:00
DavidKorczynski
6d65fecdb5
updated email for oatpp. ( #5728 )
2021-05-07 11:27:46 +01:00
MarcoFalke
988f13aa07
bitcoin-core: Fix coverage build ( #5718 )
...
* bitcoin-core: Cleanup build.sh
* bitcoin-core: Fix coverage report
2021-05-07 11:06:31 +01:00