DavidKorczynski
f5cc525073
lcms: fix fuzz introspector builds ( #8031 )
...
Current build fails because of the use of linking to dynamically shared libaries in examples of lcms. This conflicts with fuzz introspector and I assume this is because the creation of the dynamially shared libraries makes the lto-compiled objects into binary executables. This fixes it by forcing static linking for all compiled examples in the lcms build process.
2022-07-19 18:39:20 -07:00
DavidKorczynski
f770567861
g-api-auth-library-python: refine set up ( #8029 )
...
Split the existing fuzzer. This adds significant speedup in one of the
code areas being tested. Also refines the setup to add more code paths
in the encoding logic.
2022-07-19 19:30:57 +01:00
DavidKorczynski
6208f4f98f
opencensus-cpp: fix build ( #8028 )
2022-07-19 15:33:10 +01:00
Benjamin Barenblat
4852a97e7e
mosh: fix code coverage ( #8025 )
...
Update Mosh’s build.sh to pass appropriate configure options when
coverage is requested, as well as to pass CXXFLAGS through to the
actual build. These fix ClusterFuzz code coverage reports.
Along the way, enable verbose build rules, since they’re useful for
debugging build failures.
2022-07-19 12:33:47 +01:00
Dmitry Volyntsev
34311a501f
Removed outdated contact from njs project. ( #8026 )
...
* [njs] removed auto_ccs contact
2022-07-19 12:31:46 +01:00
vargen
b5c16fe435
Initial commit [antlr4] ( #8019 )
...
Initial commit [antlr4-java]
2022-07-19 17:52:06 +10:00
Benjamin Barenblat
8af4ebe337
mosh: update email addresses for a couple of maintainers ( #8024 )
2022-07-18 16:26:22 -07:00
DavidKorczynski
2c4cb12425
g-api-auth-library: add google members ( #8023 )
...
Ref:
https://github.com/googleapis/google-auth-library-python/issues/1082#issuecomment-1188384851
2022-07-18 16:24:48 -07:00
Tim Wojtulewicz
a0eee8740c
zeek: Add two more team members to user list ( #8021 )
2022-07-18 12:57:15 -07:00
Thomas Van Lenten
ba315a9b5d
Add Cory to the access list. ( #8020 )
2022-07-18 17:04:29 +01:00
steadmon
930fa5780e
git: workaround new requirement to use common-main ( #7818 )
...
Due to upstream changes, the Git fuzzers must now link against
common-main.o; however, this breaks the build in two ways:
1) Linking with common-main.o causes main() to have multiple
definitions, one in common-main.o and one from the fuzzing engine.
2) To avoid #1 , the Git Makefile specifically excludes common-main.o
from the fuzzer build rule.
To work around these issues, we can override FUZZ_CXXFLAGS (add
"-Wl,--allow-multiple-definition" to fix #1 ) and LIB_FUZZING_ENGINE (add
"common-main.o" to fix #2 ).
Once we can get a Makefile fix into Git's upstream, we can remove the
override for LIB_FUZZING_ENGINE.
However, this change causes `check_build` to fail for honggfuzz, and we
have not yet been able to diagnose the reason. So for now, we also need
to limit our engines to afl and libfuzzer.
2022-07-17 00:46:23 +01:00
DavidKorczynski
aabda0f17f
psycopg2: broaden exceptions ( #8018 )
2022-07-16 18:48:57 +01:00
Arthur Chan
5405d3b6e0
GCloud Error Python: initial integration ( #7951 )
...
Create util fuzzer
Add project settings
2022-07-15 13:15:59 -07:00
DavidKorczynski
e9fda0e9d3
python-cloud-storage: initial integration ( #7999 )
2022-07-15 13:15:17 -07:00
DavidKorczynski
6f6c9416cb
google-auth-library-python: initial integration ( #8008 )
...
* google-auth-library-python: initial integration
Initial integration of
https://github.com/googleapis/google-auth-library-python
* nit
2022-07-15 13:14:13 -07:00
DavidKorczynski
6567e7eebf
python-cloud-core: initial integration ( #8010 )
...
* python-cloud-core: initial integration
Initial integration of https://github.com/googleapis/python-cloud-core
* nit
2022-07-15 13:12:57 -07:00
DavidKorczynski
e040ba1b75
google-resumable-media-python: initial integration ( #8011 )
...
Initial integration of
https://github.com/googleapis/google-resumable-media-python
2022-07-15 13:12:20 -07:00
Arthur Chan
b0b7a3c318
psycopg2: initial integration ( #7773 )
...
* psycopg2: initial integration
build initial fuzzer
* Fix Dockerfile
Fix error handling
* Fix data length
Fix formatting
* Fix fuzzer
* Fix project contact
2022-07-15 16:08:23 +02:00
DavidKorczynski
705ddb4a80
ostree: fix build ( #8016 )
...
Fixes: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46923
2022-07-14 23:09:33 +00:00
DavidKorczynski
a52ccc482c
abseil-cpp: fix build ( #8015 )
...
Fixes: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=48948
2022-07-14 23:59:27 +01:00
DavidKorczynski
a5352add98
ghostscript: add tiff fuzzer ( #8012 )
...
* ghostscript: add tiff fuzzer
Similar to all other devices with exception it writes to file instead of
/dev/null. This is needed because tiff writing requires seek abilities.
2022-07-14 23:59:09 +01:00
Nick Wellnhofer
4f4b411359
[libxml2] [libxslt] Readd myself as primary contact ( #8013 )
...
This reverts commit 4a13e59f3a
.
Thanks to the Google Patch Rewards Program for supporting my work on
libxml2 and libxslt!
2022-07-14 12:29:43 -07:00
szabadka
a2bcce783c
Update build.sh for libjxl ( #8007 )
2022-07-14 12:50:18 +01:00
Alberto
a22ccfcc4f
Update project.yaml for libpng ( #7938 )
...
Update project.yaml
Add new `auto_ccs`
Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com>
2022-07-13 17:30:29 -04:00
Alex Crichton
76b4b0422f
Add another cc for the Wasmtime project ( #8002 )
...
Replaces #7954
2022-07-13 12:50:17 -04:00
AdamKorcz
060f02a8da
crossplane: Move fuzzer to cncf-fuzzing ( #8003 )
...
Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-07-13 12:49:52 -04:00
Guy Harris
65b562e175
libpcap: change my email address in project.yaml. ( #8001 )
...
This is now the email address for my Google account; I changed it a
while ago.
2022-07-13 13:23:46 +01:00
AdamKorcz
eac26e48ee
[crossplane] Initial integration ( #5422 )
...
* [crossplane] Initial integration
Signed-off-by: AdamKorcz <adam@adalogics.com>
* Update Dockerfile
* Update build.sh
* Update fuzz.go
Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com>
2022-07-12 13:54:40 +00:00
jonathanmetzman
0975cbfc0a
Remove build support for dataflow sanitizer. ( #7972 )
...
Related: #7964
2022-07-12 15:51:03 +02:00
jonathanmetzman
6e39f856ab
[CFL] Give docker images unique names to support parallel fuzzing ( #7911 )
...
* Add a unique suffix so that parallel fuzzing is supported
* Fix
* fix tests
* Fix
* fix
* Fix
* Update docker.py
2022-07-12 15:50:10 +02:00
Joachim Metz
3d6474cf52
Work-around for recent libyal project autoconf and gettext updates ( #7993 )
...
Work-around for recent libyal project updates
2022-07-12 10:13:21 +01:00
Martijn van Beurden
828f5cef07
[flac] Disable _FORTIFY_SOURCE for all sanitizers ( #7997 )
2022-07-12 10:12:43 +01:00
Benjamin Barenblat
f44e7b364a
mosh: enable fuzzers ( #7995 )
2022-07-12 10:11:56 +01:00
Arthur Chan
259f3e87d7
google-cloud-logger-python: initial integration ( #7936 )
...
* google-cloud-logger-python: initial integration
Create initial integration
Create fuzzers
* google-cloud-logger-python: fix folder name
- Remove "google" from folder name
2022-07-12 10:09:16 +01:00
DavidKorczynski
3066f97b88
g-apis-py-core: initial integration ( #7943 )
...
* g-apis-py-core: initial integration
Initial integration of https://github.com/googleapis/python-api-core
* expand fuzzer
2022-07-12 10:08:03 +01:00
DavidKorczynski
dc4d35eb69
g-api-python-client: initial integration ( #7946 )
2022-07-12 10:07:37 +01:00
DavidKorczynski
2a96be863d
g-api-py-api-common-protos: initial integration ( #7949 )
2022-07-12 10:06:46 +01:00
Kevin Lubick
c73a3e897b
[skia] Add user to auto-cc ( #7991 )
2022-07-11 16:56:16 +01:00
Andy Green
daa879e5fe
projects: libwebsockets: change primary_contact ( #7990 )
...
Google requires the primary_contact is not the alternate email on a google
account.
https://github.com/google/oss-fuzz/issues/7985
2022-07-11 13:57:13 +01:00
DavidKorczynski
b4ba42d58e
flask: fix build ( #7989 )
...
Builds Werkzeug from latest, which is also needed for proper fuzzing.
Fixes: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=49025
2022-07-11 13:30:53 +01:00
jonathanmetzman
54e2b96603
Remove build-infra support for DFSan. ( #7971 )
...
Related: #7964
2022-07-11 11:43:50 +02:00
Oliver Chang
70dd8b4c95
execSan: Send SIGABRT signal to initial (main thread). ( #7988 )
2022-07-11 06:03:51 +00:00
DavidKorczynski
e9c42d0ed5
libphonenumber: fix build ( #7986 )
...
Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=48949
2022-07-09 21:11:09 +01:00
DavidKorczynski
3c04a4fab3
ghostscript: add three new devices fuzzers ( #7981 )
...
* ghostscript: add three new devices fuzzers
* nits
* simplify build
2022-07-09 21:10:48 +01:00
Tatsuhiro Tsujikawa
de0466fb49
nghttp2: Update auto_ccs ( #7984 )
2022-07-09 14:40:45 +01:00
Guido Vranken
72fb3573d4
[cryptofuzz] Disable special ECDH ( #7982 )
2022-07-09 14:40:29 +01:00
Guido Vranken
d0f3e654a4
[flac] Remove myself from project ( #7983 )
2022-07-09 14:39:54 +01:00
AdamKorcz
1209ec013e
cilium: add fuzzers from cncf-fuzzing ( #7979 )
...
Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-07-08 14:44:01 +01:00
Catena cyber
557956d2d0
gonids: use out dir with env variable ( #7978 )
2022-07-08 13:02:36 +02:00
afosscontact
865bd604be
libwebsockets: Add fuzzer for lws-upng ( #7977 )
...
* libwebsockets: Add fuzzer for lws-upng
* Add License
* Fix sanitzer config
* Fix fuzzing_engine config
* Update Dockerfile
* Update build.sh
Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com>
2022-07-08 08:34:34 +02:00