Commit Graph

5722 Commits

Author SHA1 Message Date
Catena cyber beee192ed3
Rust coverage: copy stdlib to the referenced directory (#5776)
using rustc commit-hash version
2021-05-16 14:32:33 -07:00
Abhishek Arya b8a24cf949
Update project.yaml 2021-05-16 14:31:02 -07:00
Fabian Meumertzheim 88f76bc641
[infra] Make `targets_list` detect JVM/Python targets (#5775)
* [infra] Make `targets_list` detect JVM/Python targets

`targets_list` should not detect `jazzer_driver` and `jazzer_driver_asan` as fuzz targets, but should consider shell scripts that contain `LLVMFuzzerTestOneInput`.

@inferno-chromium This should fix https://github.com/google/oss-fuzz/pull/5770#issuecomment-841851786.

* Fix
2021-05-16 18:37:55 +00:00
AdamKorcz 3895320c7f
[znc] Initial integration (#5748) 2021-05-15 19:16:47 +01:00
Douglas Bagnall 3641001014
samba: add David Mulder to auto_ccs (#5771)
* samba: add David Mulder to auto_ccs

* samba: add main_repo
2021-05-15 10:56:32 +01:00
AdamKorcz 1a19fbf2c2
[muduo] Initial integration (#5714) 2021-05-14 20:38:29 -07:00
DavidKorczynski 7d8e538e5b
unicode-rs: initial integration. (#5413)
* unicode-rs: initial integration.

* added an additional project to unicode-rs.

* refined unicode-rs integration.

* Updated the build script.
2021-05-14 20:33:34 -07:00
DavidKorczynski f03549016c
sql-parser: initial integration (#5276)
* initial integration of sql-parser.

* fuzzer simplification.

* Updated sql-parse following maintainers accept.

* nit
2021-05-14 20:32:19 -07:00
Fabian Meumertzheim fee51cc181
[infra] Run JVM coverage builds (#5770) 2021-05-14 17:07:48 -07:00
tsdgeos 31f0beb91e
poppler: Fix build (#5769) 2021-05-14 21:25:37 +01:00
Guido Vranken 3cc884e673
[bls-signatures] Build mcl with ubsan (#5765) 2021-05-13 10:08:05 -07:00
jonathanmetzman 8221561c34
Fix coverage script issues (#5764)
Make sure to install MarkupSafe==0.23 instead of >=0.23 which breaks.
Probably the solution is to upgrade Jinja upstream.
Fixes #5763
2021-05-13 15:32:42 +00:00
Catena cyber a9fe789db7
Adds people to the javaparser project (#5760) 2021-05-13 07:02:55 -07:00
Tim Wojtulewicz af9783113b
zeek: add extra configure option (#5671)
* zeek: add extra configure option

* zeek: Disable afl-fuzz
2021-05-12 20:23:30 +01:00
DavidKorczynski 62c7acc069
Duckdb: initial integration (#5686) 2021-05-12 12:14:32 -07:00
Roman Wagner 87eeb3aa86
[jsoup] initial integration (#5720) 2021-05-12 12:13:48 -07:00
AdamKorcz aac200815a
[cfengine] Initial integration (#5496) 2021-05-12 12:08:33 -07:00
Mohammed Al Sahaf 44a3cdf6fc
caddy: add new project (#5624) 2021-05-12 12:08:09 -07:00
Bhargava Shastry 7cf8d930c1
Remove antlr deps (#5701)
* Remove antlr deps

* Update boost location.
2021-05-12 09:29:57 -07:00
Fabian Meumertzheim a1b558719b
[infra] Verify JVM coverage builds in the CI (#5752) 2021-05-12 14:57:26 +00:00
AdamKorcz ae86bc6075
[dgraph] Initial integration (#5394) 2021-05-12 07:50:48 -07:00
Catena cyber 9e4aad5acc
[javaparser] Initial Integration (#5525) 2021-05-12 14:46:13 +00:00
Catena cyber 90de0026df
[protoreflect] Initial integration (#5652) 2021-05-12 07:25:25 -07:00
Catena cyber 6d1ffd8452
[cel-go] Initial integration (#5667) 2021-05-12 07:23:32 -07:00
Fabian Meumertzheim 466787d4f5
[infra] Fix base-runner build (#5756)
Builds of base-runner fail as the Chromium coverage helper script has a
transitive dependency on MarkupSafe, which as of version 2.0 requires
additional python packaging tools to be installed.

This commit installs python3-setuptools and wheels, which fixes the
build.
2021-05-12 07:13:22 -07:00
Fabian Meumertzheim 10e888b561
[all] Make fuzz targets world executable (#5751)
Making fuzz targets only user executable as the root user makes them
non-executable outside the container, e.g. in the oss-fuzz/build/ dir.
2021-05-12 07:03:21 -07:00
Alexander c447cfedf4
NJS: contact email addresses changed. (#5753)
* NJS: contact email addresses changed.

Current addresses are no longer linked to Google account.

* NJS: newline removed.
2021-05-12 10:36:18 +01:00
Alexander 893515a5c4
NJS: added main_repo value. (#5755) 2021-05-12 09:49:26 +01:00
DavidKorczynski 626a66d1d1
httplib2: fix build. (#5754) 2021-05-12 09:46:40 +01:00
Catena cyber 8a85802edd
Adds grpc-swift project (#5630) 2021-05-12 09:41:53 +10:00
olivekl 40def4aae7
Update accepting_new_projects.md (#5750)
Fix formatting in new project submission guidelines
2021-05-11 12:29:46 -07:00
Fabian Meumertzheim 124db941a7
[infra] Fix java coverage (#5747)
* Filter non-fuzz target binaries in coverage script

* Filter non-fuzz target binaries in helper.py

* Fix fuzz target executable bit check in helper.py

Python and JVM fuzz target executables created via the docs template
set the exectuable via `chmod u+x` as the root user, which means that
os.access checks in infra/helper.py don't see the exectuable bit if
not run as root locally.

With this commit, the check now looks for any of the three exectuable
bits.
2021-05-11 10:10:54 -07:00
David Bryant 774abe3bd3
[wavpack] fix issue #34149 (new configure script requires gettext) (#5746) 2021-05-11 09:43:02 +01:00
Fabian Meumertzheim 5cfb074ae5
Add Java coverage support (#5733)
Coverage is collected by running the fuzz targets with the JaCoCo agent
in Jazzer's no instrumentation mode.

Since JaCoCo does not support llvm-cov style coverage reports, a simple
Python helper creates it using the information contained in the JaCoCo
XML report.

As the Java build process does not maintain a mapping between source
files and build artifacts and JaCoCo needs to be passed the root folder
of the package tree, we use the Maven directory layout convention to
heuristically detect these roots.
2021-05-10 20:33:07 -07:00
rbehjati a83b7c9d18
Enable fuzz testing of Rust code for project Oak (#5719) 2021-05-10 12:34:25 -04:00
Adi (Suissa) Peleg 980217b981
Granting kbaichoo@google.com Envoy fuzz tests access (#5734)
Signed-off-by: Adi Suissa-Peleg <adip@google.com>
2021-05-10 10:10:01 -04:00
Michael Niedermayer 8d08348d0e
[FFmpeg] Add small seed corpus for HEVC (#5737)
* [FFmpeg] Add small seed corpus for HEVC

Currently the HEVC coverage is relativly poor, this should improve it

Signed-off-by: Michael Niedermayer <michaelni@gmx.at>

* [FFmpeg] Fix typo

Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
2021-05-10 13:31:57 +01:00
Sascha Brawer ad25bc8767
Change contact emails for espeak-ng (#5742) 2021-05-10 10:50:55 +01:00
Michael Niedermayer 1777a33624
[FFmpeg] Only build first 2 targets of each kind for CI (#5741)
Based-on: 0da70e1c01
Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
2021-05-10 09:46:37 +01:00
Guido Vranken 6801fbd106
[libecc] Enable ECGDSA (#5743) 2021-05-10 09:43:22 +01:00
MarcoFalke 0da70e1c01
bitcoin-core: Only compile one fuzz target when OSS_FUZZ_CI (#5738) 2021-05-08 13:57:00 +01:00
Guido Vranken 41dcf822ef
[bls-signatures] Enable more operations (#5739) 2021-05-08 13:55:17 +01:00
DavidKorczynski 3a32125abb
oatpp: cleanup project. (#5735)
Fuzzer has been merged upstream
2021-05-07 14:30:10 -04:00
DavidKorczynski c8c12960a9
libpg_query: clean up following upstream merge. (#5736) 2021-05-07 11:08:51 -07:00
Jonathan Behrens f59d8d36b5
image-png: use buf_independent.rs fuzzer from upstream (#5724) 2021-05-07 18:39:50 +01:00
DavidKorczynski ca53b90cd7
cleanup oss-fuzz. (#5732)
rustls: clean up artifacts from oss-fuzz
2021-05-07 12:02:48 -04:00
jonathanmetzman 033a858be0
[infra] Set OSS_FUZZ_CI=1 in CI so build scripts can know (#5731)
This will help bitcoin use CI to verify the build works, because
the last step is trivial (so testing not really needed) but will
fill up the disk.
2021-05-07 07:46:11 -07:00
MarcoFalke f1cb756452
bitcoin-core: Unlock all fuzz targets (#5730)
* bitcoin-core: Unlock all fuzz targets

* bitcoin-core: Avoid out-of-disk in the CI
2021-05-07 07:38:13 -07:00
DavidKorczynski 6d65fecdb5
updated email for oatpp. (#5728) 2021-05-07 11:27:46 +01:00
MarcoFalke 988f13aa07
bitcoin-core: Fix coverage build (#5718)
* bitcoin-core: Cleanup build.sh

* bitcoin-core: Fix coverage report
2021-05-07 11:06:31 +01:00