mirror of https://github.com/google/oss-fuzz.git
122 lines
5.0 KiB
Docker
Executable File
122 lines
5.0 KiB
Docker
Executable File
# Copyright 2016 Google Inc.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
#
|
|
################################################################################
|
|
|
|
# Build rust stuff in its own image. We only need the resulting binaries.
|
|
# Keeping the rust toolchain in the image wastes 1 GB.
|
|
FROM gcr.io/oss-fuzz-base/base-image as temp-runner-binary-builder
|
|
|
|
RUN apt-get update && apt-get install -y cargo
|
|
RUN cargo install rustfilt
|
|
|
|
# Using multi-stage build to copy some LLVM binaries needed in the runner image.
|
|
FROM gcr.io/oss-fuzz-base/base-clang AS base-clang
|
|
|
|
# Real image that will be used later.
|
|
FROM gcr.io/oss-fuzz-base/base-image
|
|
|
|
COPY --from=temp-runner-binary-builder /root/.cargo/bin/rustfilt /usr/local/bin
|
|
|
|
# Copy the binaries needed for code coverage and crash symbolization.
|
|
COPY --from=base-clang /usr/local/bin/llvm-cov \
|
|
/usr/local/bin/llvm-profdata \
|
|
/usr/local/bin/llvm-symbolizer \
|
|
/usr/local/bin/
|
|
|
|
RUN apt-get update && apt-get install -y \
|
|
binutils \
|
|
file \
|
|
fonts-dejavu \
|
|
git \
|
|
lib32gcc1 \
|
|
libc6-i386 \
|
|
libcap2 \
|
|
python3 \
|
|
python3-pip \
|
|
python3-setuptools \
|
|
unzip \
|
|
wget \
|
|
zip --no-install-recommends
|
|
|
|
RUN git clone https://chromium.googlesource.com/chromium/src/tools/code_coverage /opt/code_coverage && \
|
|
pip3 install wheel && \
|
|
pip3 install -r /opt/code_coverage/requirements.txt && \
|
|
pip3 install MarkupSafe==0.23
|
|
|
|
# Default environment options for various sanitizers.
|
|
# Note that these match the settings used in ClusterFuzz and
|
|
# shouldn't be changed unless a corresponding change is made on
|
|
# ClusterFuzz side as well.
|
|
ENV ASAN_OPTIONS="alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3"
|
|
ENV MSAN_OPTIONS="print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3"
|
|
ENV UBSAN_OPTIONS="print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3"
|
|
ENV FUZZER_ARGS="-rss_limit_mb=2560 -timeout=25"
|
|
ENV AFL_FUZZER_ARGS="-m none"
|
|
|
|
# Download and install the latest stable Go.
|
|
ADD https://storage.googleapis.com/golang/getgo/installer_linux $SRC/
|
|
RUN chmod +x $SRC/installer_linux && \
|
|
SHELL="bash" $SRC/installer_linux && \
|
|
rm $SRC/installer_linux
|
|
|
|
# Set up Golang environment variables (copied from /root/.bash_profile).
|
|
ENV GOPATH /root/go
|
|
|
|
# /root/.go/bin is for the standard Go binaries (i.e. go, gofmt, etc).
|
|
# $GOPATH/bin is for the binaries from the dependencies installed via "go get".
|
|
ENV PATH $PATH:/root/.go/bin:$GOPATH/bin
|
|
|
|
# Set up Golang coverage modules.
|
|
COPY gocoverage $GOPATH/gocoverage
|
|
RUN cd $GOPATH/gocoverage && go install ./...
|
|
|
|
# Install OpenJDK 15 and trim its size by removing unused components.
|
|
ENV JAVA_HOME=/usr/lib/jvm/java-15-openjdk-amd64
|
|
ENV JVM_LD_LIBRARY_PATH=$JAVA_HOME/lib/server
|
|
ENV PATH=$PATH:$JAVA_HOME/bin
|
|
|
|
RUN wget https://download.java.net/java/GA/jdk15.0.2/0d1cfde4252546c6931946de8db48ee2/7/GPL/openjdk-15.0.2_linux-x64_bin.tar.gz -O /tmp/openjdk-15.0.2_linux-x64_bin.tar.gz && \
|
|
cd /tmp && \
|
|
mkdir -p $JAVA_HOME && \
|
|
tar -xzv --strip-components=1 -f openjdk-15.0.2_linux-x64_bin.tar.gz --directory $JAVA_HOME && \
|
|
rm -f openjdk-15.0.2_linux-x64_bin.tar.gz && \
|
|
rm -rf $JAVA_HOME/jmods $JAVA_HOME/lib/src.zip
|
|
|
|
# Install Java AWT dependencies.
|
|
RUN apt-get install libxext-dev -y
|
|
|
|
# Install JaCoCo for JVM coverage.
|
|
RUN wget https://repo1.maven.org/maven2/org/jacoco/org.jacoco.cli/0.8.7/org.jacoco.cli-0.8.7-nodeps.jar -O /opt/jacoco-cli.jar && \
|
|
wget https://repo1.maven.org/maven2/org/jacoco/org.jacoco.agent/0.8.7/org.jacoco.agent-0.8.7-runtime.jar -O /opt/jacoco-agent.jar && \
|
|
echo "37df187b76888101ecd745282e9cd1ad4ea508d6 /opt/jacoco-agent.jar" | shasum --check && \
|
|
echo "c1814e7bba5fd8786224b09b43c84fd6156db690 /opt/jacoco-cli.jar" | shasum --check
|
|
|
|
# Do this last to make developing these files easier/faster due to caching.
|
|
COPY bad_build_check \
|
|
collect_dft \
|
|
coverage \
|
|
coverage_helper \
|
|
dataflow_tracer.py \
|
|
download_corpus \
|
|
jacoco_report_converter.py \
|
|
rcfilt \
|
|
reproduce \
|
|
run_fuzzer \
|
|
parse_options.py \
|
|
targets_list \
|
|
test_all.py \
|
|
test_one.py \
|
|
/usr/local/bin/
|