aboutsummaryrefslogtreecommitdiffhomepage
Commit message (Collapse)AuthorAge
* Use Google accounts for espeak-ng email (#5786)Gravatar Sascha Brawer2021-05-17
| | | | Apparently, aliases to Google accounts do not work, even when they are registered with Google and can be used to log in on Google sites.
* protoreflect contact: change to gmail account (#5785)Gravatar Joshua Humphries2021-05-17
|
* [infra][jvm] Create per-target summary.json (#5778)Gravatar Fabian Meumertzheim2021-05-17
|
* Geos: use github if main git server is failing (#5781)Gravatar Catena cyber2021-05-17
|
* cel-go: relax assertion in fuzz target (#5782)Gravatar Catena cyber2021-05-17
|
* [systemd]: pull in jinja2 (#5779)Gravatar Zbigniew Jędrzejewski-Szmek2021-05-17
| | | | For https://github.com/systemd/systemd/pull/19630: m4 is being replaced by jinja2. Let's pull in both until the dust settles.
* Rust coverage: copy stdlib to the referenced directory (#5776)Gravatar Catena cyber2021-05-16
| | | using rustc commit-hash version
* Update project.yamlGravatar Abhishek Arya2021-05-16
|
* [infra] Make `targets_list` detect JVM/Python targets (#5775)Gravatar Fabian Meumertzheim2021-05-16
| | | | | | | | | * [infra] Make `targets_list` detect JVM/Python targets `targets_list` should not detect `jazzer_driver` and `jazzer_driver_asan` as fuzz targets, but should consider shell scripts that contain `LLVMFuzzerTestOneInput`. @inferno-chromium This should fix https://github.com/google/oss-fuzz/pull/5770#issuecomment-841851786. * Fix
* [znc] Initial integration (#5748)Gravatar AdamKorcz2021-05-15
|
* samba: add David Mulder to auto_ccs (#5771)Gravatar Douglas Bagnall2021-05-15
| | | | | * samba: add David Mulder to auto_ccs * samba: add main_repo
* [muduo] Initial integration (#5714)Gravatar AdamKorcz2021-05-14
|
* unicode-rs: initial integration. (#5413)Gravatar DavidKorczynski2021-05-14
| | | | | | | | | * unicode-rs: initial integration. * added an additional project to unicode-rs. * refined unicode-rs integration. * Updated the build script.
* sql-parser: initial integration (#5276)Gravatar DavidKorczynski2021-05-14
| | | | | | | | | * initial integration of sql-parser. * fuzzer simplification. * Updated sql-parse following maintainers accept. * nit
* [infra] Run JVM coverage builds (#5770)Gravatar Fabian Meumertzheim2021-05-14
|
* poppler: Fix build (#5769)Gravatar tsdgeos2021-05-14
|
* [bls-signatures] Build mcl with ubsan (#5765)Gravatar Guido Vranken2021-05-13
|
* Fix coverage script issues (#5764)Gravatar jonathanmetzman2021-05-13
| | | | | Make sure to install MarkupSafe==0.23 instead of >=0.23 which breaks. Probably the solution is to upgrade Jinja upstream. Fixes #5763
* Adds people to the javaparser project (#5760)Gravatar Catena cyber2021-05-13
|
* zeek: add extra configure option (#5671)Gravatar Tim Wojtulewicz2021-05-12
| | | | | * zeek: add extra configure option * zeek: Disable afl-fuzz
* Duckdb: initial integration (#5686)Gravatar DavidKorczynski2021-05-12
|
* [jsoup] initial integration (#5720)Gravatar Roman Wagner2021-05-12
|
* [cfengine] Initial integration (#5496)Gravatar AdamKorcz2021-05-12
|
* caddy: add new project (#5624)Gravatar Mohammed Al Sahaf2021-05-12
|
* Remove antlr deps (#5701)Gravatar Bhargava Shastry2021-05-12
| | | | | * Remove antlr deps * Update boost location.
* [infra] Verify JVM coverage builds in the CI (#5752)Gravatar Fabian Meumertzheim2021-05-12
|
* [dgraph] Initial integration (#5394)Gravatar AdamKorcz2021-05-12
|
* [javaparser] Initial Integration (#5525)Gravatar Catena cyber2021-05-12
|
* [protoreflect] Initial integration (#5652)Gravatar Catena cyber2021-05-12
|
* [cel-go] Initial integration (#5667)Gravatar Catena cyber2021-05-12
|
* [infra] Fix base-runner build (#5756)Gravatar Fabian Meumertzheim2021-05-12
| | | | | | | | Builds of base-runner fail as the Chromium coverage helper script has a transitive dependency on MarkupSafe, which as of version 2.0 requires additional python packaging tools to be installed. This commit installs python3-setuptools and wheels, which fixes the build.
* [all] Make fuzz targets world executable (#5751)Gravatar Fabian Meumertzheim2021-05-12
| | | | Making fuzz targets only user executable as the root user makes them non-executable outside the container, e.g. in the oss-fuzz/build/ dir.
* NJS: contact email addresses changed. (#5753)Gravatar Alexander2021-05-12
| | | | | | | * NJS: contact email addresses changed. Current addresses are no longer linked to Google account. * NJS: newline removed.
* NJS: added main_repo value. (#5755)Gravatar Alexander2021-05-12
|
* httplib2: fix build. (#5754)Gravatar DavidKorczynski2021-05-12
|
* Adds grpc-swift project (#5630)Gravatar Catena cyber2021-05-12
|
* Update accepting_new_projects.md (#5750)Gravatar olivekl2021-05-11
| | | Fix formatting in new project submission guidelines
* [infra] Fix java coverage (#5747)Gravatar Fabian Meumertzheim2021-05-11
| | | | | | | | | | | | | | | * Filter non-fuzz target binaries in coverage script * Filter non-fuzz target binaries in helper.py * Fix fuzz target executable bit check in helper.py Python and JVM fuzz target executables created via the docs template set the exectuable via `chmod u+x` as the root user, which means that os.access checks in infra/helper.py don't see the exectuable bit if not run as root locally. With this commit, the check now looks for any of the three exectuable bits.
* [wavpack] fix issue #34149 (new configure script requires gettext) (#5746)Gravatar David Bryant2021-05-11
|
* Add Java coverage support (#5733)Gravatar Fabian Meumertzheim2021-05-10
| | | | | | | | | | | | | Coverage is collected by running the fuzz targets with the JaCoCo agent in Jazzer's no instrumentation mode. Since JaCoCo does not support llvm-cov style coverage reports, a simple Python helper creates it using the information contained in the JaCoCo XML report. As the Java build process does not maintain a mapping between source files and build artifacts and JaCoCo needs to be passed the root folder of the package tree, we use the Maven directory layout convention to heuristically detect these roots.
* Enable fuzz testing of Rust code for project Oak (#5719)Gravatar rbehjati2021-05-10
|
* Granting kbaichoo@google.com Envoy fuzz tests access (#5734)Gravatar Adi (Suissa) Peleg2021-05-10
| | | Signed-off-by: Adi Suissa-Peleg <adip@google.com>
* [FFmpeg] Add small seed corpus for HEVC (#5737)Gravatar Michael Niedermayer2021-05-10
| | | | | | | | | | | * [FFmpeg] Add small seed corpus for HEVC Currently the HEVC coverage is relativly poor, this should improve it Signed-off-by: Michael Niedermayer <michaelni@gmx.at> * [FFmpeg] Fix typo Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
* Change contact emails for espeak-ng (#5742)Gravatar Sascha Brawer2021-05-10
|
* [FFmpeg] Only build first 2 targets of each kind for CI (#5741)Gravatar Michael Niedermayer2021-05-10
| | | | Based-on: 0da70e1c01e9f14d0792e0d7b64c433cdc2dbbaf Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
* [libecc] Enable ECGDSA (#5743)Gravatar Guido Vranken2021-05-10
|
* bitcoin-core: Only compile one fuzz target when OSS_FUZZ_CI (#5738)Gravatar MarcoFalke2021-05-08
|
* [bls-signatures] Enable more operations (#5739)Gravatar Guido Vranken2021-05-08
|
* oatpp: cleanup project. (#5735)Gravatar DavidKorczynski2021-05-07
| | | Fuzzer has been merged upstream
* libpg_query: clean up following upstream merge. (#5736)Gravatar DavidKorczynski2021-05-07
|