mirror of
https://github.com/OffchainLabs/prysm.git
synced 2026-01-09 15:37:56 -05:00
* Add AFL third_party libraries * add beacon state fuzzing, add afl fuzz bundle * rm fuzzing engine * fix and lint * Check for array out of bounds when calculating proposer delta * failing test * fix * Checkpoint progress * Add requirement that inclusion distance is not zero, add regression test * No need for HTR since that is covered in process slots * Removing some fuzzit logic, old fuzz tests * Add ssz encoder test and fix * Fuzzing checkpoint, adding fuzzing to the p2p layer * ignore some libfuzzer files * Full testing of p2p processing of blocks, with some mocked stuff * use tmpdir and always process blocks * use checkptr * Update ethereumapis * go mod tidy * benchmarks for ferran's fast ssz hash tree root * Update fastssz * fmt * gaz * goimports * Fix * fix ethereumapis * fix again * kafka * fix gen file * fix compute signing root * gofmt * checkpoint progress * progress * checkpoint * updates * updates * merge fix * WIP * merge * fix build * fix merge related issues * cleanup * revert unrelated * lint * lint * lint * manual tags for fuzz * Commentary on upload script * some import fixes, but not all * fix //fuzz:fuzz_tests * rm unused test * update generated ssz * Set // +build libfuzzer * remove debug code * A bit of refactoring ot explain why there is a committee_disabled file Co-authored-by: prylabs-bulldozer[bot] <58059840+prylabs-bulldozer[bot]@users.noreply.github.com>
93 lines
2.2 KiB
Python
93 lines
2.2 KiB
Python
load("@bazel_tools//tools/build_defs/pkg:pkg.bzl", "pkg_tar")
|
|
load("@io_bazel_rules_docker//contrib:passwd.bzl", "passwd_entry", "passwd_file")
|
|
load("@io_bazel_rules_docker//container:container.bzl", "container_image")
|
|
load("@io_bazel_rules_docker//cc:image.bzl", CC_DEFAULT_BASE = "DEFAULT_BASE")
|
|
load("@io_bazel_rules_docker//go:image.bzl", GO_DEFAULT_BASE = "DEFAULT_BASE")
|
|
load("//tools:build_settings.bzl", "base_image")
|
|
|
|
alias(
|
|
name = "kubesec",
|
|
actual = "@com_github_shyiko_kubesec//:kubesec",
|
|
visibility = ["//visibility:public"],
|
|
)
|
|
|
|
sh_binary(
|
|
name = "fuzz_wrapper",
|
|
srcs = ["fuzz_wrapper.sh"],
|
|
)
|
|
|
|
################################################################################
|
|
## Docker images as non-root user ##
|
|
################################################################################
|
|
|
|
# Create a passwd file with a root and nonroot user and uid.
|
|
passwd_entry(
|
|
name = "root_user",
|
|
gid = 0,
|
|
uid = 0,
|
|
username = "root",
|
|
)
|
|
|
|
passwd_entry(
|
|
name = "nonroot_user",
|
|
info = "nonroot",
|
|
uid = 1001,
|
|
username = "nonroot",
|
|
)
|
|
|
|
passwd_file(
|
|
name = "passwd",
|
|
entries = [
|
|
":root_user",
|
|
":nonroot_user",
|
|
],
|
|
)
|
|
|
|
# Create a tar file containing the created passwd file
|
|
pkg_tar(
|
|
name = "passwd_tar",
|
|
srcs = [":passwd"],
|
|
mode = "0o644",
|
|
package_dir = "etc",
|
|
)
|
|
|
|
# Include it in our base image as a tar.
|
|
container_image(
|
|
name = "cc_image",
|
|
base = CC_DEFAULT_BASE,
|
|
tars = [":passwd_tar"],
|
|
user = "root",
|
|
visibility = ["//visibility:public"],
|
|
)
|
|
|
|
container_image(
|
|
name = "go_image",
|
|
base = GO_DEFAULT_BASE,
|
|
tars = [":passwd_tar"],
|
|
user = "root",
|
|
visibility = ["//visibility:public"],
|
|
)
|
|
|
|
base_image(
|
|
name = "base_image",
|
|
build_setting_default = "cc_image",
|
|
)
|
|
|
|
config_setting(
|
|
name = "base_image_alpine",
|
|
flag_values = {"//tools:base_image": "alpine"},
|
|
)
|
|
|
|
config_setting(
|
|
name = "base_image_cc",
|
|
flag_values = {"//tools:base_image": "cc_image"},
|
|
)
|
|
|
|
container_image(
|
|
name = "alpine_cc_image",
|
|
base = "@alpine_cc_linux_amd64//image",
|
|
tars = [":passwd_tar"],
|
|
user = "root",
|
|
visibility = ["//visibility:public"],
|
|
)
|