-
Notifications
You must be signed in to change notification settings - Fork 287
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fuzzing MVP #149
Fuzzing MVP #149
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Let's wait for one more reviewer to do a pass.
@jmichelp The binary seems to not be reproducible anymore. Is this related to this pull request? I'd propose to squash and merge on this one, and investigate later? |
Should be fixed by #153 |
be4b308
to
e854cc0
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Let's give @gendx a chance to take a look next week. Otherwise LGTM.
I'm concerned that removing the |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Now that #156 is merged, the changes in src/
and third_party/
shouldn't be needed anymore, and the fuzzing
feature can be removed. The std
and ram_storage
features should be sufficient.
Note: cargo fuzz
requires cargo install cargo-fuzz
. This should be added to either setup.sh
or a fuzz-setup.sh
script.
fuzz/Cargo.toml
Outdated
|
||
[dependencies.ctap2] | ||
path = ".." | ||
features = ['std', 'ram_storage', 'fuzzing'] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is inconsistent with the other imports. It would be clearer to add a line in [dependencies]
:
ctap2 = { path = "..", features = [ ... ] }
fa17505
to
8707580
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It would be great to add a GitHub workflow that does cargo fuzz build
to make sure this doesn't break in the future.
d611323
to
e467026
Compare
No questions left from me. I'll leave it to @kaczmarczyck to merge this pull request. |
MVP of OpenSK HID fuzzing with dependencies and linking errors fixed.