forked from google/oss-fuzz
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
vscode: bump introspector and add command for getting optimal targets (…
…google#12942) Signed-off-by: David Korczynski <[email protected]>
- Loading branch information
1 parent
c42856e
commit 63b0232
Showing
6 changed files
with
155 additions
and
69 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
21 changes: 21 additions & 0 deletions
21
tools/vscode-extension/src/commands/cmdFIGetOptimalTargets.ts
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,21 @@ | ||
// Copyright 2025 Google LLC | ||
// | ||
// Licensed under the Apache License, Version 2.0 (the "License"); | ||
// you may not use this file except in compliance with the License. | ||
// You may obtain a copy of the License at | ||
// | ||
// http://www.apache.org/licenses/LICENSE-2.0 | ||
// | ||
// Unless required by applicable law or agreed to in writing, software | ||
// distributed under the License is distributed on an "AS IS" BASIS, | ||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||
// See the License for the specific language governing permissions and | ||
// limitations under the License. | ||
// | ||
//////////////////////////////////////////////////////////////////////////////// | ||
|
||
import {getOptimalTargetsFromIntrospector} from '../fuzzIntrospectorHelper'; | ||
|
||
export async function runGetOptimalTargetsHandler() { | ||
getOptimalTargetsFromIntrospector(); | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,117 @@ | ||
// Copyright 2025 Google LLC | ||
// | ||
// Licensed under the Apache License, Version 2.0 (the "License"); | ||
// you may not use this file except in compliance with the License. | ||
// You may obtain a copy of the License at | ||
// | ||
// http://www.apache.org/licenses/LICENSE-2.0 | ||
// | ||
// Unless required by applicable law or agreed to in writing, software | ||
// distributed under the License is distributed on an "AS IS" BASIS, | ||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||
// See the License for the specific language governing permissions and | ||
// limitations under the License. | ||
// | ||
//////////////////////////////////////////////////////////////////////////////// | ||
|
||
import * as vscode from 'vscode'; | ||
|
||
import {println} from './logger'; | ||
import {extensionConfig} from './config'; | ||
import {isPathValidOssFuzzPath} from './ossfuzzWrappers'; | ||
import {systemSync} from './utils'; | ||
|
||
const fs = require('fs'); | ||
|
||
export async function setUpFuzzIntrospector() { | ||
println('Setting up oss-fuzz in /tmp/'); | ||
|
||
// First check if we already have Fuzz Introspector installed. | ||
const tmpOssFuzzRepositoryPath = '/tmp/fi-tmp-env'; | ||
|
||
if ((await isPathValidOssFuzzPath(tmpOssFuzzRepositoryPath)) === true) { | ||
println('Fuzz Introspector virtual env already exists in /tmp/fi-tmp-env'); | ||
extensionConfig.ossFuzzPepositoryWorkPath = tmpOssFuzzRepositoryPath; | ||
return; | ||
} | ||
|
||
const cmdToExec = 'python3.11'; | ||
const args: Array<string> = ['-m', 'virtualenv', tmpOssFuzzRepositoryPath]; | ||
const [res, output] = await systemSync(cmdToExec, args); | ||
if (res === false) { | ||
println('Failed to create virtual environment'); | ||
println(output); | ||
return; | ||
} | ||
|
||
const cmdToExec2 = '/tmp/fi-tmp-env/bin/python3.11'; | ||
const args2: Array<string> = [ | ||
'-m', | ||
'pip', | ||
'install', | ||
'fuzz-introspector==0.1.6', | ||
]; | ||
const [res2, output2] = await systemSync(cmdToExec2, args2); | ||
if (res2 === false) { | ||
println('Failed to create virtual environment'); | ||
println(output2); | ||
return; | ||
} | ||
} | ||
|
||
export async function runFuzzIntrospector() { | ||
println('Setting up oss-fuzz in /tmp/'); | ||
|
||
const workspaceFolder = vscode.workspace.workspaceFolders; | ||
if (!workspaceFolder) { | ||
return; | ||
} | ||
const pathOfLocal = workspaceFolder[0].uri.fsPath; | ||
println('path of local: ' + pathOfLocal); | ||
|
||
// First check if we already have Fuzz Introspector installed. | ||
const tmpOssFuzzRepositoryPath = '/tmp/fi-tmp-env'; | ||
|
||
if ((await isPathValidOssFuzzPath(tmpOssFuzzRepositoryPath)) === true) { | ||
println('Fuzz Introspector virtual env already exists in /tmp/fi-tmp-env'); | ||
extensionConfig.ossFuzzPepositoryWorkPath = tmpOssFuzzRepositoryPath; | ||
return; | ||
} | ||
|
||
await systemSync('mkdir', ['-p', '/tmp/out-fi/']); | ||
|
||
const cmdToExec = '/tmp/fi-tmp-env/bin/fuzz-introspector'; | ||
const args: Array<string> = [ | ||
'full', | ||
'--target_dir=' + pathOfLocal, | ||
'--out-dir=/tmp/out-fi', | ||
]; | ||
const [res, output] = await systemSync(cmdToExec, args); | ||
if (res === false) { | ||
println('Failed run FI'); | ||
println(output); | ||
return; | ||
} | ||
} | ||
|
||
export async function getOptimalTargetsFromIntrospector() { | ||
if (!fs.existsSync('/tmp/out-fi/summary.json')) { | ||
println('There are no introspector reports. Please run introspector first'); | ||
} | ||
const json_data = fs.readFileSync('/tmp/out-fi/summary.json'); | ||
// println(json_data); | ||
|
||
const jsonCodeCoverage = JSON.parse(json_data); | ||
|
||
println('Optimal targets'); | ||
Object.entries(jsonCodeCoverage['analyses']['OptimalTargets']).forEach( | ||
entry => { | ||
const [key, value] = entry; | ||
const objectDictionary: any = value as any; | ||
println(JSON.stringify(objectDictionary, null, 2)); | ||
} | ||
); | ||
println('--------------------------'); | ||
|
||
return; | ||
} |