Home
last modified time | relevance | path

Searched +full:oss +full:- +full:fuzz +full:- +full:project +full:- +full:name (Results 1 – 25 of 87) sorted by relevance

1234

/external/oss-fuzz/docs/getting-started/
Dcontinuous_integration.md1 ---
6 permalink: /getting-started/continuous-integration/
7 ---
11 OSS-Fuzz offers **CIFuzz**, a GitHub action/CI job that runs your fuzz targets
18 CIFuzz builds your project's fuzzers from the source at a particular
26 * If the crash does not occur on older OSS-Fuzz builds. Because if it does occur
30 If your project supports [OSS-Fuzz's code coverage]({{ site.baseurl }}/advanced-topics/code-coverag…
33 among all fuzzers in the project.
35 CIFuzz uses 30 day old/public regressions and corpora from OSS-Fuzz. This makes
40 1. Your project must be integrated with OSS-Fuzz.
[all …]
Dnew_project_guide.md1 ---
3 title: Setting up a new project
7 permalink: /getting-started/new-project-guide/
8 ---
10 # Setting up a new project
13 - TOC
15 ---
19 Before you can start setting up your new project for fuzzing, you must do the following:
21 - [Integrate]({{ site.baseurl }}/advanced-topics/ideal-integration/) one or more [fuzz targets]({{ …
22 with the project you want to fuzz.
[all …]
/external/oss-fuzz/infra/build/functions/
Dexpected_build_steps.json5 "https://github.com/google/oss-fuzz.git"
7 "name": "gcr.io/cloud-builders/git" string
10 "name": "gcr.io/cloud-builders/docker", string
13 "-t",
14 "gcr.io/oss-fuzz/test-project",
17 "dir": "oss-fuzz/projects/test-project"
20 "name": "gcr.io/oss-fuzz/test-project", string
23 "-c",
32 "name": "gcr.io/oss-fuzz-base/msan-libs-builder", string
35 "-c",
[all …]
Dexpected_coverage_build_steps.json5 "https://github.com/google/oss-fuzz.git"
7 "name": "gcr.io/cloud-builders/git" string
10 "name": "gcr.io/cloud-builders/docker", string
13 "-t",
14 "gcr.io/oss-fuzz/test-project",
17 "dir": "oss-fuzz/projects/test-project"
20 "name": "gcr.io/oss-fuzz/test-project", string
23 "-c",
32 "name": "gcr.io/oss-fuzz/test-project", string
41 "-c",
[all …]
Dproject_sync_test.py7 # http://www.apache.org/licenses/LICENSE-2.0
26 # pylint: disable=wrong-import-position
28 from datastore_entities import Project
35 # pylint: disable=no-member
38 # pylint: disable=too-few-public-methods
42 def __init__(self, name, file_type, path, contents=None): argument
44 self.name = name
47 self.decoded_content = b"name: test"
71 # pylint: disable=no-self-use
73 """Return project path."""
[all …]
/external/oss-fuzz/docs/getting-started/new-project-guide/
Dgo_lang.md1 ---
3 title: Integrating a Go project
4 parent: Setting up a new project
7 permalink: /getting-started/new-project-guide/go-lang/
8 ---
10 # Integrating a Go project
13 - TOC
15 ---
17 The process of integrating a project written in Go with OSS-Fuzz is very similar
19 [Setting up a new project]({{ site.baseurl }}/getting-started/new-project-guide/)
[all …]
Dpython_lang.md1 ---
3 title: Integrating a Python project
4 parent: Setting up a new project
7 permalink: /getting-started/new-project-guide/python-lang/
8 ---
10 # Integrating a Python project
13 - TOC
15 ---
18 The process of integrating a project written in Python with OSS-Fuzz is very
20 [Setting up a new project]({{ site.baseurl }}/getting-started/new-project-guide/)
[all …]
Djvm_lang.md1 ---
3 title: Integrating a Java/JVM project
4 parent: Setting up a new project
7 permalink: /getting-started/new-project-guide/jvm-lang/
8 ---
10 # Integrating a Java/JVM project
13 - TOC
15 ---
17 The process of integrating a project written in Java or any other language
18 running on the Java Virtual Machine (JVM) with OSS-Fuzz is very similar to the
[all …]
/external/oss-fuzz/infra/cifuzz/actions/run_fuzzers/
Daction.yml2 name: 'run-fuzzers'
3 description: 'Runs fuzz target binaries for a specified length of time.'
5 oss-fuzz-project-name:
6 description: 'The OSS-Fuzz project name.'
9 description: 'Programming language project is written in.'
12 fuzz-seconds:
16 dry-run:
22 build-integration-path:
23 description: "The path to the the project's build integration."
25 run-fuzzers-mode:
[all …]
/external/oss-fuzz/infra/
Dhelper.py8 # http://www.apache.org/licenses/LICENSE-2.0
17 """Helper script for OSS-Fuzz users. Can do common tasks like building
36 'gcr.io/oss-fuzz-base/base-image',
37 'gcr.io/oss-fuzz-base/base-clang',
38 'gcr.io/oss-fuzz-base/base-builder',
39 'gcr.io/oss-fuzz-base/base-runner',
40 'gcr.io/oss-fuzz-base/base-runner-debug',
41 'gcr.io/oss-fuzz-base/base-sanitizer-libs-builder',
42 'gcr.io/oss-fuzz-base/msan-libs-builder',
45 VALID_PROJECT_NAME_REGEX = re.compile(r'^[a-zA-Z0-9_-]+$')
[all …]
Dbuild_specified_commit.py7 # http://www.apache.org/licenses/LICENSE-2.0
16 This module is allows each of the OSS Fuzz projects fuzzers to be built
45 """Repo of base-builder images."""
60 return self.digests[index - 1]
62 logging.error('Failed to find suitable base-builder.')
106 """Replace the base-builder digest in a Dockerfile."""
113 line = 'FROM gcr.io/oss-fuzz-base/base-builder@' + digest + '\n'
124 image_name = 'gcr.io/oss-fuzz/' + project_name
130 '-v',
134 '-r',
[all …]
/external/oss-fuzz/infra/cifuzz/actions/build_fuzzers/
Daction.yml2 name: 'build-fuzzers'
3 description: "Builds an OSS-Fuzz project's fuzzers."
5 oss-fuzz-project-name:
6 description: 'Name of the corresponding OSS-Fuzz project.'
9 description: 'Programming language project is written in.'
12 dry-run:
15 allowed-broken-targets-percentage:
21 project-src-path:
22 description: "The path to the project's source code checkout."
24 build-integration-path:
[all …]
/external/rust/crates/libz-sys/src/zlib-ng/.github/workflows/
Dfuzz.yml1 name: CI Fuzz
5 runs-on: ubuntu-latest
7 - name: Build Fuzzers
8 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
10 oss-fuzz-project-name: 'zlib-ng'
11 dry-run: false
12 - name: Run Fuzzers
13 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
15 oss-fuzz-project-name: 'zlib-ng'
16 fuzz-seconds: 600
[all …]
/external/capstone/.github/workflows/
Dfuzz.yml1 name: CIFuzz
5 runs-on: ubuntu-latest
7 - name: Build Fuzzers
8 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
10 oss-fuzz-project-name: 'capstone'
11 dry-run: false
12 - name: Run Fuzzers
13 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
15 oss-fuzz-project-name: 'capstone'
16 fuzz-seconds: 600
[all …]
/external/brotli/.github/workflows/
Dfuzz.yml1 name: CIFuzz
5 runs-on: ubuntu-latest
7 - name: Build Fuzzers
8 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
10 oss-fuzz-project-name: 'brotli'
11 dry-run: false
12 - name: Run Fuzzers
13 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
15 oss-fuzz-project-name: 'brotli'
16 fuzz-seconds: 600
[all …]
/external/oss-fuzz/infra/cifuzz/
Dexample_main.yml1 name: CIFuzz
5 runs-on: ubuntu-latest
7 - name: Build Fuzzers
9 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
11 oss-fuzz-project-name: 'example'
12 dry-run: false
13 - name: Run Fuzzers
14 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
16 oss-fuzz-project-name: 'example'
17 fuzz-seconds: 600
[all …]
Dcontinuous_integration.py7 # http://www.apache.org/licenses/LICENSE-2.0
21 # pylint: disable=wrong-import-position,import-error
29 # pylint: disable=too-few-public-methods
39 'git', 'symbolic-ref', 'refs/remotes/origin/HEAD',
53 fuzz."""
73 # Non-OSS-Fuzz projects must bring their own source and their own build
78 # Builds of OSS-Fuzz projects not hosted on Github must bring their own
79 # source since the checkout logic CIFuzz implements is github-specific.
80 # TODO(metzman): Consider moving Github-actions builds of OSS-Fuzz projects
121 """Class representing CI for an OSS-Fuzz project on Github Actions."""
[all …]
Dcoverage.py7 # http://www.apache.org/licenses/LICENSE-2.0
14 """Module for determining coverage of fuzz targets."""
22 # pylint: disable=wrong-import-position,import-error
26 # The path to get project's latest report json file.
27 LATEST_REPORT_INFO_PATH = 'oss-fuzz-coverage/latest_report_info/'
31 """Gets coverage data for a project from OSS-Fuzz."""
41 """Get the coverage report for a specific fuzz target.
44 target: The name of the fuzz target whose coverage is requested.
56 """Gets a list of source files covered by the specific fuzz target.
59 target: The name of the fuzz target whose coverage is requested.
[all …]
Dbuild_fuzzers_test.py7 # http://www.apache.org/licenses/LICENSE-2.0
24 # pylint: disable=wrong-import-position
36 # https://github.com/google/oss-fuzz/tree/master/projects/example project.
44 # Binary is a copy of the example project's do_stuff_fuzzer and can be
49 # Binary is a modified version of example project's do_stuff_fuzzer. It is
56 # pylint: disable=no-self-use,protected-access,too-few-public-methods
99 if element == env_var_arg and command[idx - 1] == '-e':
107 """Tests for building OSS-Fuzz projects on GitHub actions."""
131 build_image_and_checkout_src. Specifically, we want the name of the
132 directory the repo is in to match the name used in the docker
[all …]
Dbuild_fuzzers_entrypoint.py7 # http://www.apache.org/licenses/LICENSE-2.0
14 """Builds a specific OSS-Fuzz project's fuzzers for CI tools."""
22 # pylint: disable=c-extension-no-member
27 format='%(asctime)s - %(name)s - %(levelname)s - %(message)s',
32 """Build OSS-Fuzz project's fuzzers for CI tools.
35 any OSS-Fuzz project's workflow that uses Github.
41 OSS_FUZZ_PROJECT_NAME: The name of OSS-Fuzz project.
42 GITHUB_REPOSITORY: The name of the Github repo that called this script.
44 GITHUB_EVENT_NAME: The name of the hook event that triggered this script.
47 …lp.github.com/en/actions/reference/virtual-environments-for-github-hosted-runners#filesystems-on-g…
[all …]
Drun_fuzzers_entrypoint.py7 # http://www.apache.org/licenses/LICENSE-2.0
14 """Runs a specific OSS-Fuzz project's fuzzers for CI tools."""
22 # pylint: disable=c-extension-no-member
26 format='%(asctime)s - %(name)s - %(levelname)s - %(message)s',
46 """Runs OSS-Fuzz project's fuzzers for CI tools.
48 This action can be added to any OSS-Fuzz project's workflow that uses Github.
51 directory in order for this action to be used. This action will only fuzz the
57 This can be used in parallel with the upload-artifact action to surface the
64 OSS_FUZZ_PROJECT_NAME: The name of the relevant OSS-Fuzz project.
82 # Run the specified project's fuzzers from the build.
Ddocker.py7 # http://www.apache.org/licenses/LICENSE-2.0
18 # pylint: disable=wrong-import-position,import-error
23 BASE_BUILDER_TAG = 'gcr.io/oss-fuzz-base/base-builder'
24 BASE_RUNNER_TAG = 'gcr.io/oss-fuzz-base/base-runner'
25 MSAN_LIBS_BUILDER_TAG = 'gcr.io/oss-fuzz-base/msan-libs-builder'
26 PROJECT_TAG_PREFIX = 'gcr.io/oss-fuzz/'
29 def get_project_image_name(project): argument
30 """Returns the name of the project builder image for |project_name|."""
31 return PROJECT_TAG_PREFIX + project
36 command = ['docker', 'rmi', '-f'] + images
[all …]
Dclusterfuzz_deployment.py7 # http://www.apache.org/licenses/LICENSE-2.0
24 # pylint: disable=wrong-import-position,import-error
32 CORPUS_DIR_NAME = 'cifuzz-corpus'
33 BUILD_DIR_NAME = 'cifuzz-latest-build'
42 A path to where the OSS-Fuzz build was stored, or None if it wasn't.
50 A path to where the OSS-Fuzz build was stored, or None if it wasn't.
66 """The OSS-Fuzz ClusterFuzz deployment."""
69 CLUSTERFUZZ_BUILDS = 'clusterfuzz-builds'
71 # Format string for the latest version of a project's build.
72 VERSION_STRING = '{project_name}-{sanitizer}-latest.version'
[all …]
/external/zstd/.github/workflows/
Dmain.yml1 name: CIFuzz
5 runs-on: ubuntu-latest
7 fail-fast: false
11 - name: Build Fuzzers (${{ matrix.sanitizer }})
13 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
15 oss-fuzz-project-name: 'zstd'
16 dry-run: false
18 - name: Run Fuzzers (${{ matrix.sanitizer }})
19 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
21 oss-fuzz-project-name: 'zstd'
[all …]
/external/python/cpython3/Modules/_xxtestfuzz/
DREADME.rst1 Fuzz Tests for CPython
4 These fuzz tests are designed to be included in Google's `oss-fuzz`_ project.
6 oss-fuzz works against a library exposing a function of the form
9 some toy values -- no fuzzing occurs in Python's test suite.
11 oss-fuzz will regularly pull from CPython, discover all the tests in
12 ``fuzz_tests.txt``, and run them -- so adding a new test here means it will
13 automatically be run in oss-fuzz, while also being smoke-tested as part of
16 Adding a new fuzz test
17 ----------------------
19 Add the test name on a new line in ``fuzz_tests.txt``.
[all …]

1234