aboutsummaryrefslogtreecommitdiffhomepage
path: root/projects/curl
Commit message (Collapse)AuthorAge
* Enable MSAN for curl, for real this time! (#2754)Gravatar Max Dymond2019-08-23
|
* Enable i386 for curl. (#2745)Gravatar Max Dymond2019-08-23
|
* [infra] Prevent mounting local checkout to $SRC + clean up Dockerfiles ↵Gravatar Max Moroz2018-08-09
| | | | (#1699). (#1700)
* curl: Download dependencies in Docker using the curl-fuzzer scripts (#1316)Gravatar Max Dymond2018-04-15
| | | | | curl-fuzzer would like to use a script to define the dependencies downloaded as part of oss-fuzz image generation, so that only one repository needs updating in order to get future fuzzing builds running.
* Ensure curl and curl-fuzzer are extracted to src (#875)Gravatar Max Dymond2017-10-02
| | | Fixes #874
* [curl] Move to using separated repository (#855)Gravatar Max Dymond2017-09-25
| | | | | The curl fuzzer has been moved into its own repository, http://github.com/curl/curl-fuzzer. For oss-fuzz this means it needs to check out two codebases and compile them.
* Update curl to take advantage of new native fuzzing (#810)Gravatar Max Dymond2017-09-02
| | | | | | | | | | | | curl is now moving towards having native fuzzing capabilities in line with https://github.com/google/oss-fuzz/blob/master/docs/ideal_integration.md. It now ticks a lot of the boxes: - It's maintained in Git - It's built with the rest of the tests in Travis - It has a seed corpus (currently quite basic) - It's continuously tested on the seed corpus with ASan - It's fast and has no OOMs
* Update project.yamlGravatar Oliver Chang2017-07-13
|
* Add Daniel's gmail id (#716)Gravatar Abhishek Arya2017-07-13
|
* Enable msan on some projects, disable experiment on others. (#590)Gravatar Abhishek Arya2017-05-10
|
* Enable MSan experimental on some projects. (#570)Gravatar Abhishek Arya2017-05-05
|
* Use apt-get update && apt-get install, per best practices: (#561)Gravatar Devin Jeanpierre2017-05-01
| | | | | | | | | | | | | | | | | | | https://docs.docker.com/engine/userguide/eng-image/dockerfile_best-practices/ I ran into this because I was getting errors locally, like: E: Failed to fetch http://archive.ubuntu.com/ubuntu/pool/main/d/dpkg/libdpkg-perl_1.18.4ubuntu1.1_all.deb 404 Not Found [IP: 91.189.88.149 80] It turns out you get these if you don't update, and the official best practices are to `run apt-get update && apt-get install`. In fact, running _any_ apt-get install command without the apt-get update && before it can result in unfortunate caching artifacts -- see "cache busting". (P.S. thanks to Peng on Freenode for helping me, I'm bad at Ubuntu.) So: sed -re \ 's/RUN apt-get ((-y )?(install|build-dep))/RUN apt-get update \&\& apt-get \1/' -i \ projects/**/Dockerfile I also manually fixed the cases that already ran apt-get update in their Dockerfile: dlplibs/Dockerfile grpc/Dockerfile libreoffice/Dockerfile
* oss-fuzz/BASE_IMAGE -> oss-fuzz-base/BASE_IMAGEGravatar Oliver Chang2017-03-22
|
* [infra] ossfuzz/IMAGE -> gcr.io/oss-fuzz/IMAGEGravatar Oliver Chang2017-03-15
|
* [infra] updating usages of base-libfuzzer (#142)Gravatar Mike Aizatsky2017-01-03
|
* Update project.yamlGravatar inferno-chromium2016-12-13
|
* Add seed corpus for curl fuzzer. Also update length for tests. (#172)Gravatar inferno-chromium2016-12-12
|
* [infra] using -lFuzzingEngine instead of -lfuzzerGravatar Mike Aizatsky2016-12-07
|
* [infra] making shallow git clones. fixes #42Gravatar Mike Aizatsky2016-11-29
|
* [infra] target.yaml -> project.yamlGravatar Mike Aizatsky2016-11-29
|
* [infra] renaming targets/ to projects/Gravatar Mike Aizatsky2016-11-29