Commit graph

11 commits

Author SHA1 Message Date
dependabot[bot]
d8360cf89a
test(fuzz)(deps): update tikv-jemallocator requirement in /fuzz
Updates the requirements on [tikv-jemallocator](https://github.com/tikv/jemallocator) to permit the latest version.
- [Release notes](https://github.com/tikv/jemallocator/releases)
- [Changelog](https://github.com/tikv/jemallocator/blob/main/CHANGELOG.md)
- [Commits](https://github.com/tikv/jemallocator/commits)

---
updated-dependencies:
- dependency-name: tikv-jemallocator
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
2024-07-15 10:41:06 +00:00
Chris Hennick
4facc3ab54
test(fuzz): Use jemalloc for fuzz tests 2024-07-04 10:52:04 -07:00
Chris Hennick
b9469063c7 Update to 1.3.2 2024-06-13 03:40:40 +00:00
Chris Hennick
f2b55a1f59
chore: Update fuzz_write to use replace_with 2024-05-05 20:09:23 -07:00
Chris Hennick
174825229c
Change crate name to "zip" per https://github.com/zip-rs/zip/issues/446#issuecomment-2063837388 2024-04-19 18:50:27 -07:00
Chris Hennick
e49577a151 Bug fix for fuzzing without default features 2024-03-04 11:48:37 -08:00
Chris Hennick
04654fdbe3
Revert large-file test: impractical 2023-05-01 17:06:37 -07:00
Chris Hennick
09d1ef2e3b
Make large files more compressible 2023-05-01 14:59:04 -07:00
Chris Hennick
90b89b5460
WIP: Write fuzzing 2023-04-29 21:19:31 -07:00
Chris Hennick
2f1d73851c
Fix fuzz dependency 2023-04-23 15:03:17 -07:00
Nick Babcock
b7966a8538 Add read fuzzing module
As someone who has personal projects that take untrusted zips as input,
it is important to me to be able to fuzz the zip project to simulate
possible inputs and to ensure the projects are not vulnerable.

This commit adds a cargo fuzz module for reading and extracting input.

The `fuzz` directory was scaffolded with a `cargo fuzz init`

I added a CI step to guard against the fuzz module decaying over time.
2022-04-25 20:08:53 -05:00