aboutsummaryrefslogtreecommitdiff
path: root/docs
diff options
context:
space:
mode:
authorJay Berkenbilt <jberkenbilt@users.noreply.github.com>2019-06-13 16:57:22 -0400
committerAbhishek Arya <inferno@chromium.org>2019-06-13 13:57:22 -0700
commitbfc567dc3d51060228d64ea861e6a6779cce69fc (patch)
treebe1d85d4984893dc2906489437bb9c038c1c9d16 /docs
parent5d3b2f969df6b0da39e8e0bd2a28305c7f55a7b0 (diff)
downloadoss-fuzz-bfc567dc3d51060228d64ea861e6a6779cce69fc.tar.gz
Clarifications to the documentation (#2512)
This adds to the documentation information that I would have found helpful when I was doing my integration.
Diffstat (limited to 'docs')
-rw-r--r--docs/corpora.md4
-rw-r--r--docs/new_project_guide.md9
2 files changed, 11 insertions, 2 deletions
diff --git a/docs/corpora.md b/docs/corpora.md
index 5ce6e95cc..09abb28fa 100644
--- a/docs/corpora.md
+++ b/docs/corpora.md
@@ -2,6 +2,10 @@
If you would like to access the corpora that we are using for your fuzz targets (synthesized by the fuzzing engines), please follow these steps.
+## Obtain access
+
+In order to get access to a project's corpora, you must first be listed as the primary contact or an auto cc in the project's `project.yaml` file as described in the [New Project Guide](new_project_guide.md#projectyaml). If you don't do this, most of the links below won't work.
+
## Install Google Cloud SDK
The corpora for fuzz targets are stored on [Google Cloud Storage](https://cloud.google.com/storage/). To access them, you will need to [install](https://cloud.google.com/storage/docs/gsutil_install) the gsutil tool, which is part of the Google Cloud SDK.
diff --git a/docs/new_project_guide.md b/docs/new_project_guide.md
index a440d5bfa..8c7e3ff87 100644
--- a/docs/new_project_guide.md
+++ b/docs/new_project_guide.md
@@ -54,7 +54,8 @@ Project's homepage.
### primary_contact, auto_ccs
Primary contact and CCs list. These people get access to ClusterFuzz
which includes crash reports, fuzzer statistics, etc and are auto-cced on newly filed bugs in OSS-Fuzz
-tracker.
+tracker. To get full access to these artifacts, you should use a [Google account](https://support.google.com/accounts/answer/176347?hl=en)
+here ([why?](faq.md#why-do-you-require-a-google-account-for-authentication)).
### sanitizers (optional)
List of sanitizers to use. By default, it will use the default list of supported
@@ -292,7 +293,7 @@ of good sample inputs is one of the best ways to improve [fuzz target](glossary.
To provide a corpus for `my_fuzzer`, put `my_fuzzer_seed_corpus.zip` file next
to the [fuzz target](glossary.md#fuzz-target)'s binary in `$OUT` during the build. Individual files in this
-archive will be used as starting inputs for mutations. You can store the corpus
+archive will be used as starting inputs for mutations. The name of each file in the corpus is the sha1 checksum (which you can get using the `sha1sum` or `shasum` comand) of its contents. You can store the corpus
next to source files, generate during build or fetch it using curl or any other
tool of your choice.
(example: [boringssl](https://github.com/google/oss-fuzz/blob/master/projects/boringssl/build.sh#L41)).
@@ -301,6 +302,8 @@ Seed corpus files will be used for cross-mutations and portions of them might ap
in bug reports or be used for further security research. It is important that corpus
has an appropriate and consistent license.
+See also [Accessing Corpora](corpora.md) for information about getting access to the corpus we are currently using for your fuzz targets.
+
### Dictionaries
@@ -362,3 +365,5 @@ Use [ClusterFuzz](clusterfuzz.md) web interface [here](https://oss-fuzz.com/) to
* Code coverage statistics
* Fuzzer statistics
* Fuzzer performance analyzer (linked from fuzzer statistics)
+
+Note that your Google Account must be listed in [project.yaml](#projectyaml) for you to have access to the ClusterFuzz web interface.