Home
last modified time | relevance | path

Searched full:cifuzz (Results 1 – 25 of 72) sorted by relevance

123

/external/oss-fuzz/docs/getting-started/
Dcontinuous_integration.md11 OSS-Fuzz offers **CIFuzz**, a GitHub action/CI job that runs your fuzz targets
12 on pull requests. This works similarly to running unit tests in CI. CIFuzz helps
14 Currently, CIFuzz only supports projects hosted on GitHub.
18 CIFuzz builds your project's fuzzers from the source at a particular
19 pull request or commit. Then CIFuzz runs the fuzzers for a short amount of time.
20 If CIFuzz finds a crash, CIFuzz reports the stacktrace, makes the crashing
23 If CIFuzz doesn't find a crash during the allotted time, the CI test passes
24 (green check). If CIFuzz finds a crash, it reports the crash only if both of following are true:
31 CIFuzz only runs the fuzzers affected by a pull request/commit.
35 CIFuzz uses 30 day old/public regressions and corpora from OSS-Fuzz. This makes
[all …]
/external/oss-fuzz/infra/cifuzz/
Dcloudbuild.yaml6 - gcr.io/oss-fuzz-base/cifuzz-base
8 - gcr.io/oss-fuzz-base/cifuzz-base:v1
10 - infra/cifuzz/cifuzz-base/Dockerfile
16 - gcr.io/oss-fuzz-base/cifuzz-build-fuzzers
18 - gcr.io/oss-fuzz-base/cifuzz-build-fuzzers:v1
26 - gcr.io/oss-fuzz-base/cifuzz-run-fuzzers
28 - gcr.io/oss-fuzz-base/cifuzz-run-fuzzers:v1
33 - gcr.io/oss-fuzz-base/cifuzz-base
34 - gcr.io/oss-fuzz-base/cifuzz-base:v1
35 - gcr.io/oss-fuzz-base/cifuzz-run-fuzzers
[all …]
Dworkspace_utils.py14 """Module for representing the workspace directory which CIFuzz uses."""
55 return os.path.join(self.workspace, 'cifuzz-prev-build')
60 return os.path.join(self.workspace, 'cifuzz-prev-coverage')
64 """The directory where coverage reports generated by cifuzz are put."""
65 return os.path.join(self.workspace, 'cifuzz-coverage')
70 return os.path.join(self.workspace, 'cifuzz-corpus')
75 return os.path.join(self.workspace, 'cifuzz-pruned-corpus')
Drun_cifuzz.py14 """Script for running CIFuzz end-to-end. This is meant to work outside any
15 docker image. This cannot depend on any CIFuzz code or third party packages."""
35 """Runs a CIFuzz docker container with |name|."""
52 """Builds the CIFuzz |image|. Only suitable for building CIFuzz images."""
61 """Builds and runs fuzzers using CIFuzz."""
Dbuild_fuzzers_test.py14 """Tests the functionality of the cifuzz module."""
68 """Tests that the CIFUZZ env var is set."""
89 self.assertTrue(command_has_env_var_arg(docker_run_command, 'CIFUZZ=True'))
176 git_url = 'https://github.com/jonathanmetzman/cifuzz-external-example.git'
178 # github.com/jonathanmetzman/cifuzz-external-example.
192 project_repo_name = 'cifuzz-external-example'
193 git_url = 'https://github.com/jonathanmetzman/cifuzz-external-example.git'
195 # github.com/jonathanmetzman/cifuzz-external-example.
197 'https://github.com/jonathanmetzman/cifuzz-external-example',
288 """Tests the check_fuzzer_build function in the cifuzz module."""
Dconfig_utils.py14 """Module for getting the configuration CIFuzz needs to run."""
37 # and others beyond CIFuzz's control. Thus, you should be careful about using
175 """Object containing constant configuration for CIFuzz."""
178 """Enum representing the different platforms CIFuzz runs on."""
246 """Returns the platform CIFuzz is runnning on."""
258 """Returns True if this CIFuzz run (building fuzzers and running them) for
277 """Class containing constant configuration for running fuzzers in CIFuzz."""
308 """Class containing constant configuration for building fuzzers in CIFuzz."""
325 """Get the configuration from CIFuzz from the environment. These variables
Dexample_main.yml1 name: CIFuzz
9 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
14 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
Dgenerate_coverage_report_test.py45 'CIFUZZ': 'True',
66 mock.call('fuzzer1', '/workspace/cifuzz-corpus/fuzzer1'),
67 mock.call('fuzzer2', '/workspace/cifuzz-corpus/fuzzer2')
Ddocker_test.py76 'CIFUZZ=True',
97 'ARCHITECTURE=x86_64', '-e', 'CIFUZZ=True', '-e',
118 'CIFUZZ=True', '-e', f'SANITIZER={SANITIZER}', '-e',
/external/oss-fuzz/infra/
Dbuild_fuzzers.Dockerfile16 # Docker image to run fuzzers for CIFuzz (the run_fuzzers action on GitHub
19 FROM gcr.io/oss-fuzz-base/cifuzz-base
24 ENTRYPOINT ["python3", "/opt/oss-fuzz/infra/cifuzz/build_fuzzers_entrypoint.py"]
31 RUN python3 -m pip install -r ${OSS_FUZZ_ROOT}/infra/cifuzz/requirements.txt
Drun_fuzzers.Dockerfile16 # Docker image for running fuzzers on CIFuzz (the run_fuzzers action on GitHub
19 FROM gcr.io/oss-fuzz-base/cifuzz-base
24 ENTRYPOINT ["python3", "/opt/oss-fuzz/infra/cifuzz/run_fuzzers_entrypoint.py"]
31 RUN python3 -m pip install -r ${OSS_FUZZ_ROOT}/infra/cifuzz/requirements.txt
/external/brotli/.github/workflows/
Dfuzz.yml1 name: CIFuzz
8 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
13 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
/external/capstone/.github/workflows/
Dfuzz.yml1 name: CIFuzz
8 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
13 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
/external/libavc/.github/workflows/
Dcifuzz.yml1 name: CIFuzz
9 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
14 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
/external/pcre/.github/workflows/
Dcifuzz.yml1 name: CIFuzz
9 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
14 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
/external/harfbuzz_ng/.github/workflows/
Dcifuzz.yml1 name: CIFuzz
9 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
14 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
/external/gson/.github/workflows/
Dcifuzz.yml1 name: CIFuzz
9 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
15 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
/external/libusb/.github/
Dcifuzz.yml1 name: CIFuzz
9 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
15 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
/external/flac/.github/workflows/
Dcifuzz.yml1 name: CIFuzz
18 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
24 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
/external/selinux/.github/workflows/
Dcifuzz.yml2 name: CIFuzz
21 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
28 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
/external/libbpf/.github/workflows/
Dcifuzz.yml3 name: CIFuzz
22 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
29 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
/external/oss-fuzz/infra/cifuzz/cifuzz-base/
DDockerfile27 RUN python3 -m pip install -r ${OSS_FUZZ_ROOT}/infra/cifuzz/requirements.txt
28 RUN npm install ${OSS_FUZZ_ROOT}/infra/cifuzz
33 ENTRYPOINT ["python3", "/opt/oss-fuzz/infra/cifuzz/cifuzz_combined_entrypoint.py"]
/external/openthread/.github/workflows/
Dfuzz.yml29 name: CIFuzz
36 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
41 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
/external/oss-fuzz/infra/cifuzz/filestore/github_actions/
Dgithub_actions_test.py78 'cifuzz-build-' + name)
93 'cifuzz-corpus-' + name)
163 expected_artifact_name = 'cifuzz-' + expected_artifact_name
195 archive_path = os.path.join(temp_dir, 'cifuzz-corpus.tar')
216 mock_find_artifact.assert_called_with('cifuzz-corpus')
/external/oss-fuzz/docs/clusterfuzzlite/
Drunning_clusterfuzzlite.md34 TODO(metzman): Work on a generic name for CIFuzz/PR fuzzing.
42 If you are familiar with OSS-Fuzz's CIFuzz, this task is similar to CIFuzz.

123