Skip to content
This repository was archived by the owner on Nov 1, 2023. It is now read-only.

Commit 3925618

Browse files
committed
gMerge branch 'user/noharper/registration-fix' of https://github.com/nharper285/onefuzz into user/noharper/registration-fix
2 parents 01c6da1 + acce21c commit 3925618

File tree

23 files changed

+529
-121
lines changed

23 files changed

+529
-121
lines changed

CHANGELOG.md

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,25 @@ All notable changes to this project will be documented in this file.
44
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
55
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).
66

7+
## 6.4.0
8+
9+
### Added
10+
* Deployment/CLI: OneFuzz Config refactored - `tenant_id`, `tenant_domain`, `multi_tenant_domain`, and `cli_client_id` are now required values in the config.json used during deployment and no longer required when running the config command. [#2771](https://github.com/microsoft/onefuzz/pull/2771), [#2811](https://github.com/microsoft/onefuzz/pull/2811)
11+
* Agent: Fully escape allowlist rules [#2784](https://github.com/microsoft/onefuzz/pull/2784)
12+
* Agent: Apply allowlist to all blocks within a function [#2785](https://github.com/microsoft/onefuzz/pull/2785)
13+
* CLI: Added a cli subcommand `onefuzz debug notification template` to validate scriban notification templates [#2800](https://github.com/microsoft/onefuzz/pull/2800)
14+
* Service: Added Notification failure webhook to communicate Notification failures [#2628](https://github.com/microsoft/onefuzz/pull/2628)
15+
### Changed
16+
* Service: Include `AssignedTo` when failing to create a work item due to an authentication exception [#2770](https://github.com/microsoft/onefuzz/pull/2770)
17+
18+
### Fixed
19+
* Agent: Fixes & improvements to `Expand` behavior [#2789](https://github.com/microsoft/onefuzz/pull/2789)
20+
* Agent: Triming whitespace in output from monitored process before printing [#2782](https://github.com/microsoft/onefuzz/pull/2782)
21+
* CLI: Fixed default value of analyzer_exe [#2797](https://github.com/microsoft/onefuzz/pull/2797)
22+
* CLI: Fixed missing `readonly_inputs` parameter in dotnet & dotnet_dll templates [#2740](https://github.com/microsoft/onefuzz/pull/2740)
23+
* Service: Fixed query to get the existing proxy [#2791](https://github.com/microsoft/onefuzz/pull/2791)
24+
* Service: Truncate webhooks message length for azure queue size compatibility [#2788](https://github.com/microsoft/onefuzz/pull/2788)
25+
726
## 6.3.0
827
### Added
928
* Service: Add Optional Analysis Task to Libfuzzer Template [#2748](https://github.com/microsoft/onefuzz/pull/2748)

CURRENT_VERSION

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
6.3.0
1+
6.4.0

docs/declarative-templates.md renamed to docs/deprecated/declarative-templates.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Declarative Job Templates
1+
# Declarative Job Templates -- Deprecated
22

33
Provide the ability to maintain job templates, akin to `onefuzz template
44
libfuzzer basic` at the service level. The templates include a job
@@ -94,7 +94,7 @@ TaskConfig(
9494

9595
## Hardcoded vs Runtime-specified Container Names
9696

97-
To support differentiating _always use "afl-linux" for tools_ vs _ask
97+
To support differentiating _always use "afl-linux" for tools_ vs _ask
9898
what container to use for setup_, if the container name is blank in the
9999
template, it will be provided as part of the `JobTemplateConfig` and in the
100100
resulting `JobTemplateRequest`.

docs/managing-templates.md renamed to docs/deprecated/managing-templates.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
1-
# Managing Declarative Job Templates
1+
# Managing Declarative Job Templates -- Deprecated
22

33
[Declarative Job Templates](declarative-templates.md), currently a preview
44
feature, allow a user to define a reusable fuzzing pipeline as a template.
55
Once saved, any user of the OneFuzz instance can create fuzzing jobs based on
66
the templates.
77

88
This is a walk-through guide for updating an existing job template, though
9-
the process is similar for creating templates from scratch.
9+
the process is similar for creating templates from scratch.
1010

1111
This process demonstrates adding [Microsoft Teams
1212
notifications](notifications/teams.md) for new unique crash reports to an existing
@@ -27,9 +27,9 @@ notifications](notifications/teams.md) for new unique crash reports to an existi
2727
onefuzz job_templates manage get libfuzzer_linux > libfuzzer_linux.json
2828
```
2929
3. With your preferred text editor, add the following to the `notifications` list:
30-
```json
30+
```json
3131
{
32-
"container_type": "unique_reports",
32+
"container_type": "unique_reports",
3333
"notification": {
3434
"config": {
3535
"url": "https://contoso.com/webhook-url-here"
@@ -120,7 +120,7 @@ Now let's make use of our new template.
120120
"job_id": "d3259dfe-fdad-45a0-bf90-a381b8dc1ee8",
121121
"state": "init"
122122
}
123-
$
123+
$
124124
```
125125
3. Verify a notification was set up for the unique reports container
126126
```
@@ -160,7 +160,7 @@ This example will demonstrate setting the following:
160160
onefuzz job_templates manage get libfuzzer_linux > libfuzzer_linux_ado_areapath.json
161161
```
162162
3. With your preferred text editor, add the following to the `notifications` list:
163-
```json
163+
```json
164164
{
165165
"container_type": "unique_reports",
166166
"notification": {
@@ -234,7 +234,7 @@ This example will demonstrate setting the following:
234234
onefuzz job_templates refresh
235235
```
236236
237-
Using `--help`, we can see the new optional and required arguments.
237+
Using `--help`, we can see the new optional and required arguments.
238238
```
239239
$ onefuzz job_templates submit libfuzzer_linux_ado_areapath --help
240240
usage: onefuzz job_templates submit libfuzzer_linux_ado_areapath [-h] [-v] [--format {json,raw}] [--query QUERY]

docs/unmnaged-nodes.md

Lines changed: 31 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,4 +87,34 @@ onefuzz nodes get <machine_guid>
8787
```
8888

8989
This should return one entry. Verify that the `pool_name` matched the pool name created earlier.
90-
From here you will be able to schedule jobs on that pool and they will be running.
90+
From here you will be able to schedule jobs on that pool and they will be running.
91+
92+
93+
## Troubleshooting
94+
95+
### increase the verbosity of the logs
96+
It can help when investigating issues to increase the log verbosity. you will need to set the [RUST_LOG](https://docs.rs/env_logger/latest/env_logger/#enabling-logging) environment variable when starting docker
97+
98+
```
99+
docker run --rm --env RUST_LOG=<log_level> <image_name> --machine_id <machine_id>
100+
```
101+
log_level can be any of
102+
- error
103+
- warn
104+
- info
105+
- debug
106+
- trace
107+
108+
109+
### use the container interactively
110+
you can use the container interactively by with the following command
111+
112+
windows
113+
```
114+
docker run --it --rm --entrypoint powershell <image_name>
115+
```
116+
117+
linux
118+
```
119+
docker run --it --rm --entrypoint bash <image_name>
120+
```

src/ApiService/ApiService/onefuzzlib/Config.cs

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -320,10 +320,6 @@ public async Async.Task<ResultVoid<TaskConfigError>> CheckConfig(TaskConfig conf
320320
return ResultVoid<TaskConfigError>.Error(new TaskConfigError($"invalid pool: {config.Pool.PoolName}"));
321321
}
322322

323-
if ((config.Task.RebootAfterSetup ?? false) && !pool.OkV.Managed) {
324-
return ResultVoid<TaskConfigError>.Error(new TaskConfigError("reboot_after_setup is not supported for unmanaged pools"));
325-
}
326-
327323
var checkTarget = await CheckTargetExe(config, definition);
328324
if (!checkTarget.IsOk) {
329325
return checkTarget;

src/agent/Cargo.lock

Lines changed: 10 additions & 10 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

src/agent/cobertura/Cargo.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,4 +6,4 @@ license = "MIT"
66

77
[dependencies]
88
anyhow = "1.0"
9-
quick-xml = "0.26.0"
9+
quick-xml = "0.27.1"

src/agent/coverage-legacy/Cargo.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ serde = { version = "1.0", features = ["derive"] }
2727
symbolic = { version = "8.8", features = ["debuginfo", "demangle", "symcache"] }
2828
uuid = { version = "0.8", features = ["guid"] }
2929
win-util = { path = "../win-util" }
30-
quick-xml = "0.26"
30+
quick-xml = "0.27"
3131

3232
[target.'cfg(target_os = "windows")'.dependencies]
3333
pdb = "0.7"

src/agent/coverage/src/binary.rs

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -144,7 +144,6 @@ pub fn find_coverage_sites(
144144
offsets.insert(block.offset);
145145
}
146146
}
147-
println!();
148147
}
149148
}
150149

0 commit comments

Comments
 (0)