75 lines
		
	
	
		
			2.4 KiB
		
	
	
	
		
			Bash
		
	
	
		
			Executable File
		
	
	
			
		
		
	
	
			75 lines
		
	
	
		
			2.4 KiB
		
	
	
	
		
			Bash
		
	
	
		
			Executable File
		
	
	
| #!/bin/bash -eu
 | |
| # Copyright 2019 Google Inc.
 | |
| #
 | |
| # Licensed under the Apache License, Version 2.0 (the "License");
 | |
| # you may not use this file except in compliance with the License.
 | |
| # You may obtain a copy of the License at
 | |
| #
 | |
| #      http://www.apache.org/licenses/LICENSE-2.0
 | |
| #
 | |
| # Unless required by applicable law or agreed to in writing, software
 | |
| # distributed under the License is distributed on an "AS IS" BASIS,
 | |
| # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| # See the License for the specific language governing permissions and
 | |
| # limitations under the License.
 | |
| #
 | |
| ################################################################################
 | |
| 
 | |
| # Ignore memory leaks from python scripts invoked in the build
 | |
| export ASAN_OPTIONS="detect_leaks=0"
 | |
| export MSAN_OPTIONS="halt_on_error=0:exitcode=0:report_umrs=0"
 | |
| 
 | |
| # Remove -pthread from CFLAGS, this trips up ./configure
 | |
| # which thinks pthreads are available without any CLI flags
 | |
| CFLAGS=${CFLAGS//"-pthread"/}
 | |
| 
 | |
| FLAGS=()
 | |
| case $SANITIZER in
 | |
|   address)
 | |
|     FLAGS+=("--with-address-sanitizer")
 | |
|     ;;
 | |
|   memory)
 | |
|     FLAGS+=("--with-memory-sanitizer")
 | |
|     # installing ensurepip takes a while with MSAN instrumentation, so
 | |
|     # we disable it here
 | |
|     FLAGS+=("--without-ensurepip")
 | |
|     # -msan-keep-going is needed to allow MSAN's halt_on_error to function
 | |
|     FLAGS+=("CFLAGS=-mllvm -msan-keep-going=1")
 | |
|     ;;
 | |
|   undefined)
 | |
|     FLAGS+=("--with-undefined-behavior-sanitizer")
 | |
|     ;;
 | |
| esac
 | |
| 
 | |
| export CPYTHON_INSTALL_PATH=$SRC/cpython-install
 | |
| rm -rf $CPYTHON_INSTALL_PATH
 | |
| mkdir $CPYTHON_INSTALL_PATH
 | |
| 
 | |
| tar zxf v3.8.7.tar.gz
 | |
| cd cpython-3.8.7/
 | |
| cp $SRC/django-fuzzers/python_coverage.h Python/
 | |
| 
 | |
| # Patch the interpreter to record code coverage
 | |
| sed -i '1 s/^.*$/#include "python_coverage.h"/g' Python/ceval.c
 | |
| sed -i 's/case TARGET\(.*\): {/\0\nfuzzer_record_code_coverage(f->f_code, f->f_lasti);/g' Python/ceval.c
 | |
| 
 | |
| ./configure "${FLAGS[@]:-}" --prefix=$CPYTHON_INSTALL_PATH
 | |
| make -j$(nproc)
 | |
| make install
 | |
| 
 | |
| cp -R $CPYTHON_INSTALL_PATH $OUT/
 | |
| 
 | |
| rm -rf $OUT/django-dependencies
 | |
| mkdir $OUT/django-dependencies
 | |
| $CPYTHON_INSTALL_PATH/bin/pip3 install asgiref pytz sqlparse backports.zoneinfo -t $OUT/django-dependencies
 | |
| 
 | |
| cd $SRC/django-fuzzers
 | |
| rm $CPYTHON_INSTALL_PATH/lib/python3.8/lib-dynload/_tkinter*.so
 | |
| make
 | |
| 
 | |
| cp -R $SRC/django/* $OUT/
 | |
| 
 | |
| cp $SRC/django-fuzzers/fuzzer-utils $OUT/
 | |
| cp $SRC/django-fuzzers/utils.py $OUT/
 | |
| zip -j $OUT/fuzzer-utils_seed_corpus.zip $SRC/django-fuzzers/corp-utils/*
 |