104 lines
3.6 KiB
Python
104 lines
3.6 KiB
Python
# Copyright 2021 Code Intelligence GmbH
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
def java_fuzz_target_test(
|
|
name,
|
|
target_class = None,
|
|
deps = [],
|
|
hook_classes = [],
|
|
data = [],
|
|
sanitizer = None,
|
|
visibility = None,
|
|
tags = [],
|
|
fuzzer_args = [],
|
|
srcs = [],
|
|
size = None,
|
|
timeout = None,
|
|
env = None,
|
|
verify_crash_input = True,
|
|
verify_crash_reproducer = True,
|
|
expect_crash = True,
|
|
# Default is that the reproducer does not throw any exception.
|
|
expected_findings = [],
|
|
**kwargs):
|
|
target_name = name + "_target"
|
|
deploy_manifest_lines = []
|
|
if target_class:
|
|
deploy_manifest_lines.append("Jazzer-Fuzz-Target-Class: %s" % target_class)
|
|
if hook_classes:
|
|
deploy_manifest_lines.append("Jazzer-Hook-Classes: %s" % ":".join(hook_classes))
|
|
|
|
# Deps can only be specified on java_binary targets with sources, which
|
|
# excludes e.g. Kotlin libraries wrapped into java_binary via runtime_deps.
|
|
target_deps = deps + ["//agent:jazzer_api_compile_only"] if srcs else []
|
|
native.java_binary(
|
|
name = target_name,
|
|
srcs = srcs,
|
|
visibility = ["//visibility:private"],
|
|
create_executable = False,
|
|
deploy_manifest_lines = deploy_manifest_lines,
|
|
deps = target_deps,
|
|
testonly = True,
|
|
**kwargs
|
|
)
|
|
|
|
if sanitizer == None:
|
|
driver = "//driver:jazzer_driver"
|
|
elif sanitizer == "address":
|
|
driver = "//driver:jazzer_driver_asan"
|
|
elif sanitizer == "undefined":
|
|
driver = "//driver:jazzer_driver_ubsan"
|
|
else:
|
|
fail("Invalid sanitizer: " + sanitizer)
|
|
|
|
native.java_test(
|
|
name = name,
|
|
runtime_deps = [
|
|
"//bazel/tools/java:fuzz_target_test_wrapper",
|
|
"//agent:jazzer_api_deploy.jar",
|
|
":%s_deploy.jar" % target_name,
|
|
],
|
|
jvm_flags = [
|
|
# Use the same memory settings for reproducers as those suggested by Jazzer when
|
|
# encountering an OutOfMemoryError.
|
|
"-Xmx1620m",
|
|
# Ensure that reproducers can be compiled even if they contain UTF-8 characters.
|
|
"-Dfile.encoding=UTF-8",
|
|
],
|
|
size = size or "enormous",
|
|
timeout = timeout or "moderate",
|
|
args = [
|
|
"$(rootpath %s)" % driver,
|
|
"$(rootpath //agent:jazzer_api_deploy.jar)",
|
|
"$(rootpath :%s_deploy.jar)" % target_name,
|
|
str(verify_crash_input),
|
|
str(verify_crash_reproducer),
|
|
str(expect_crash),
|
|
# args are shell tokenized and thus quotes are required in the case where
|
|
# expected_findings is empty.
|
|
"'" + ",".join(expected_findings) + "'",
|
|
] + fuzzer_args,
|
|
data = [
|
|
":%s_deploy.jar" % target_name,
|
|
"//agent:jazzer_agent_deploy",
|
|
"//agent:jazzer_api_deploy.jar",
|
|
driver,
|
|
] + data,
|
|
env = env,
|
|
main_class = "com.code_intelligence.jazzer.tools.FuzzTargetTestWrapper",
|
|
use_testrunner = False,
|
|
tags = tags,
|
|
visibility = visibility,
|
|
)
|