diff --git a/.github/workflows/datadog.yaml b/.github/workflows/datadog.yaml deleted file mode 100644 index a9bdc4671..000000000 --- a/.github/workflows/datadog.yaml +++ /dev/null @@ -1,25 +0,0 @@ -name: Datadog Event - -on: - release: - types: [published] - -jobs: - send-release-event: - runs-on: ubuntu-22.04 - steps: - - name: Send Release Event - run: | - curl -sX POST "https://api.datadoghq.eu/api/v1/events" \ - -H "Accept: application/json" \ - -H "Content-Type: application/json" \ - -H "DD-API-KEY: ${{ secrets.DATADOG_API_KEY }}" \ - --data-raw '{ - "title": "Jazzer has been released", - "text": "%%% \nJazzer has been released with version **${{ github.event.release.tag_name }}**\n %%%", - "tags": [ - "repo:${{ github.repository }}", - "project:Jazzer", - "version:${{ github.event.release.tag_name }}" - ] - }' diff --git a/.github/workflows/prerelease.yaml b/.github/workflows/prerelease.yaml index d3297dc07..8930c9df8 100644 --- a/.github/workflows/prerelease.yaml +++ b/.github/workflows/prerelease.yaml @@ -16,7 +16,7 @@ jobs: name: linux - os: macos-14 name: macos - - os: windows-2019 + - os: windows-2022 name: windows steps: @@ -28,6 +28,12 @@ jobs: distribution: zulu java-version: 21 + - name: Install Clang on Windows + if: matrix.os == 'windows-2022' + run: | + choco install llvm --version=19.1.0 --force + echo "C:\Program Files\LLVM\bin" | Out-File -FilePath $env:GITHUB_PATH -Encoding utf8 -Append + - name: Append build settings to .bazelrc shell: bash run: | diff --git a/.github/workflows/run-all-tests-main.yml b/.github/workflows/run-all-tests-main.yml index 072b72388..c93b36f22 100644 --- a/.github/workflows/run-all-tests-main.yml +++ b/.github/workflows/run-all-tests-main.yml @@ -36,14 +36,14 @@ jobs: name: Build & Test strategy: matrix: - os: [ macos-14, windows-2019 ] + os: [ macos-14, windows-2022 ] # Test JDK 8 on Windows and mac only on main. jdk: [8] include: - os: macos-14 arch: "macos-arm64" bazel_args: "--xcode_version_config=//.github:host_xcodes" - - os: windows-2019 + - os: windows-2022 arch: "windows" steps: @@ -55,6 +55,12 @@ jobs: distribution: zulu java-version: 21 + - name: Install Clang on Windows + if: matrix.os == 'windows-2022' + run: | + choco install llvm --version=19.1.0 --force + echo "C:\Program Files\LLVM\bin" | Out-File -FilePath $env:GITHUB_PATH -Encoding utf8 -Append + - name: Set Build Buddy config run: .github/scripts/echoBuildBuddyConfig.sh ${{ secrets.BUILDBUDDY_API_KEY }} >> $GITHUB_ENV shell: bash diff --git a/.github/workflows/run-all-tests-pr.yml b/.github/workflows/run-all-tests-pr.yml index fcbfc725c..42f50b42b 100644 --- a/.github/workflows/run-all-tests-pr.yml +++ b/.github/workflows/run-all-tests-pr.yml @@ -17,7 +17,7 @@ jobs: name: Build & Test strategy: matrix: - os: [ubuntu-22.04, windows-2019, macos-14] + os: [ubuntu-22.04, windows-2022, macos-14] jdk: [21] include: - jdk: 21 @@ -32,7 +32,7 @@ jobs: - os: macos-14 arch: "macos-arm64" bazel_args: "--xcode_version_config=//.github:host_xcodes" - - os: windows-2019 + - os: windows-2022 arch: "windows" steps: @@ -48,6 +48,12 @@ jobs: run: .github/scripts/echoBuildBuddyConfig.sh ${{ secrets.BUILDBUDDY_API_KEY }} >> $GITHUB_ENV shell: bash + - name: Install Clang on Windows + if: matrix.os == 'windows-2022' + run: | + choco install llvm --version=19.1.0 --force + echo "C:\Program Files\LLVM\bin" | Out-File -FilePath $env:GITHUB_PATH -Encoding utf8 -Append + - name: Build & Test run: bazelisk test ${{env.BUILD_BUDDY_CONFIG}} --java_runtime_version=remotejdk_${{ matrix.jdk }} ${{ matrix.bazel_args }} ${{ matrix.extra_bazel_args }} --build_tag_filters="-no-${{ matrix.arch }},-no-${{ matrix.arch }}-jdk${{ matrix.jdk }},-no-jdk${{ matrix.jdk }}" --test_tag_filters="-no-${{ matrix.arch }},-no-${{ matrix.arch }}-jdk${{ matrix.jdk }},-no-jdk${{ matrix.jdk }}" //... diff --git a/sanitizers/src/main/java/com/code_intelligence/jazzer/sanitizers/FilePathTraversal.java b/sanitizers/src/main/java/com/code_intelligence/jazzer/sanitizers/FilePathTraversal.java index 44ae2bfbd..507a65753 100644 --- a/sanitizers/src/main/java/com/code_intelligence/jazzer/sanitizers/FilePathTraversal.java +++ b/sanitizers/src/main/java/com/code_intelligence/jazzer/sanitizers/FilePathTraversal.java @@ -342,7 +342,14 @@ private static void check(Path p) { return; } - if (p.toAbsolutePath().normalize().equals(ABSOLUTE_TARGET)) { + // catch all exceptions that might be thrown by the sanitizer + Path normalized; + try { + normalized = p.toAbsolutePath().normalize(); + } catch (Throwable e) { + return; + } + if (normalized.equals(ABSOLUTE_TARGET)) { Jazzer.reportFindingFromHook(new FuzzerSecurityIssueCritical("File path traversal: " + p)); } }