AIXCC-C-Challenge
/
local-test-freerdp-delta-01
/fuzz-tooling
/docs
/getting-started
/new-project-guide
/rust_lang.md
| layout: default | |
| title: Integrating a Rust project | |
| parent: Setting up a new project | |
| grand_parent: Getting started | |
| nav_order: 2 | |
| permalink: /getting-started/new-project-guide/rust-lang/ | |
| # Integrating a Rust project | |
| {: .no_toc} | |
| - TOC | |
| {:toc} | |
| --- | |
| The process of integrating a project written in Rust with OSS-Fuzz is very | |
| similar to the general [Setting up a new project]({{ site.baseurl | |
| }}/getting-started/new-project-guide/) process. The key specifics of integrating | |
| a Rust project are outlined below. | |
| ## cargo-fuzz support | |
| Rust integration with OSS-Fuzz is expected to use [`cargo | |
| fuzz`](https://github.com/rust-fuzz/cargo-fuzz) to build fuzzers. The `cargo | |
| fuzz` tool will build code with required compiler flags as well as link to the | |
| correct libFuzzer on OSS-Fuzz itself. Note that using `cargo fuzz` also makes it | |
| quite easy to run the fuzzers locally yourself if you get a failing test case! | |
| ## Project files | |
| First you'll want to follow the [setup instructions for `cargo fuzz` | |
| itself](https://rust-fuzz.github.io/book/). Afterwards your project should have: | |
| * A top-level `fuzz` directory. | |
| * A `fuzz/Cargo.toml` manifest which pulls in necessary dependencies to fuzz. | |
| * Some `fuzz/fuzz_targets/*.rs` files which are the fuzz targets that will be | |
| compiled and run on OSS-Fuzz. | |
| Note that you can customize this layout as well, but you'll need to edit some | |
| the scripts below to integrate into OSS-Fuzz. | |
| ### project.yaml | |
| The `language` attribute must be specified. | |
| ```yaml | |
| language: rust | |
| ``` | |
| The only supported fuzzing engine and sanitizer are `libfuzzer` and `address`, | |
| respectively. | |
| [Example](https://github.com/google/oss-fuzz/blob/12ef3654b3e9adfd20b5a6afdde54819ba71493d/projects/serde_json/project.yaml#L3-L6) | |
| ```yaml | |
| sanitizers: | |
| - address | |
| fuzzing_engines: | |
| - libfuzzer | |
| ``` | |
| ### Dockerfile | |
| The Dockerfile should start by `FROM gcr.io/oss-fuzz-base/base-builder-rust` | |
| The OSS-Fuzz builder image has the latest nightly release of Rust as well as | |
| `cargo fuzz` pre-installed and in `PATH`. In the `Dockerfile` for your project | |
| all you'll need to do is fetch the latest copy of your code and install any | |
| system dependencies necessary to build your project. | |
| [Example](https://github.com/google/oss-fuzz/blob/12ef3654b3e9adfd20b5a6afdde54819ba71493d/projects/serde_json/Dockerfile#L18-L20) | |
| ```dockerfile | |
| RUN git clone --depth 1 https://github.com/serde-rs/json json | |
| ``` | |
| ### build.sh | |
| Here it's expected that you'll build the fuzz targets for your project and then | |
| copy the final binaries into the output directory. | |
| [Example](https://github.com/google/oss-fuzz/blob/12ef3654b3e9adfd20b5a6afdde54819ba71493d/projects/serde_json/build.sh#L20): | |
| ```sh | |
| cd $SRC/json | |
| cargo fuzz build -O | |
| cp fuzz/target/x86_64-unknown-linux-gnu/release/from_slice $OUT/ | |
| ``` | |
| Note that you likely want to pass the `-O` flag to `cargo fuzz build` which | |
| builds fuzzers in release mode. You may also want to pass the | |
| `--debug-assertions` flag to enable more checks while fuzzing. In this example | |
| the `from_slice` binary is the fuzz target. | |
| With some bash-fu you can also automatically copy over all fuzz targets into | |
| the output directory so when you add a fuzz target to your project it's | |
| automatically integrated into OSS-Fuzz: | |
| ```sh | |
| FUZZ_TARGET_OUTPUT_DIR=target/x86_64-unknown-linux-gnu/release | |
| for f in fuzz/fuzz_targets/*.rs | |
| do | |
| FUZZ_TARGET_NAME=$(basename ${f%.*}) | |
| cp $FUZZ_TARGET_OUTPUT_DIR/$FUZZ_TARGET_NAME $OUT/ | |
| done | |
| ``` | |
| ## Writing fuzzers using a test-style strategy | |
| In Rust you will often have tests written in a way so they are only | |
| compiled into the final binary when build in test-mode. This is, achieved by | |
| wrapping your test code in `cfg(test)`, e.g. | |
| ```rust | |
| #[cfg(test)] | |
| mod tests { | |
| use super::*; | |
| ... | |
| ``` | |
| Cargo-fuzz automatically enables the `fuzzing` feature, which means you can | |
| follow a similar strategy to writing fuzzers as you do when writing tests. | |
| Specifically, you can create modules wrapped in the `fuzzing` feature: | |
| ```rust | |
| #[cfg(fuzzing)] | |
| pub mod fuzz_logic { | |
| use super::*; | |
| ... | |
| ``` | |
| and then call the logic within `fuzz_logic` from your fuzzer. | |
| Furthermore, within your `.toml` files, you can then specify fuzzing-specific | |
| dependencies by wrapping them as follows: | |
| ``` | |
| [target.'cfg(fuzzing)'.dependencies] | |
| ``` | |
| similar to how you wrap test-dependencies as follows: | |
| ``` | |
| [dev-dependencies] | |
| ``` | |
| Finally, you can also combine the testing logic you have and the fuzz logic. This | |
| can be achieved simply by using | |
| ```rust | |
| #[cfg(any(test, fuzzing))] | |
| ``` | |
| A project that follows this structure is Linkerd2-proxy and the project files can be | |
| seen [here](https://github.com/google/oss-fuzz/tree/master/projects/linkerd2-proxy). | |