layout: default
title: Integrating a Bazel project
parent: Setting up a new project
grand_parent: Getting started
nav_order: 5
permalink: /getting-started/new-project-guide/bazel/
Integrating a Bazel project
{: .no_toc}
- TOC {:toc}
Bazel projects
The process of integrating a project using the Bazel build system with OSS-Fuzz is very similar to the general [Setting up a new project]({{ site.baseurl }}/getting-started/new-project-guide/) process. The key specifics of integrating a Bazel project are outlined below.
Fuzzing support in Bazel
For Bazel-based projects, we recommend using the
rules_fuzzing extension library
for defining fuzz tests. rules_fuzzing provides support for building and running
fuzz tests under
multiple sanitizer and fuzzing engine configurations.
It also supports specifying corpora and dictionaries as part of the fuzz test
definition.
The fuzzing rules provide out-of-the-box support for building and packaging fuzz
test artifacts in the OSS-Fuzz format. Each //path/to:fuzz_test fuzz test
target automatically has a //path/to:fuzz_test_oss_fuzz packaging target that
(a) builds the fuzz test using the instrumentation and engine library specified
in the OSS-Fuzz environment variables, and (b) generates an archive containing
the binary and its associated artifacts (corpus, dictionary, etc.). Moreover,
OSS-Fuzz provides a standard tool to automatically process these targets,
substantially simplifying the build.sh script (see below).
Project files
This section explains how to integrate the fuzz tests written using the
rules_fuzzing library with OSS-Fuzz. You can also see a complete example in the
bazel-rules-fuzzing-test
project.
The structure of the project directory in the OSS-Fuzz repository does not differ for Bazel-based projects. The project files have the following specific aspects.
project.yaml
Only C++ projects are currently supported.
Since the OSS-Fuzz target builds the fuzz test using the instrumentation and
engine specified in the OSS-Fuzz environment variables, all the engine and
sanitizer configurations supported in the project.yaml file are automatically
supported by the fuzzing rules.
Dockerfile
There is no need to install Bazel in your Docker image. The OSS-Fuzz builder
image provides the bazel executable through the
Bazelisk launcher, which will fetch
and use the latest Bazel release. If your project requires a particular Bazel
version, create a
.bazelversion
file in your repository root with the desired version string.
build.sh
Your build.sh script essentially needs to perform three steps: (1) selecting
which fuzz tests to build, (2) building their OSS-Fuzz package targets in the
right configuration, and (3) copying the build artifacts to the ${OUT}/
destination.
OSS-Fuzz provides a
bazel_build_fuzz_tests
tool that implements these steps in a standard way, so in most cases your
build script only needs to invoke this command with no arguments.
If necessary, the behavior of the tool can be customized through a set of environment variables. The most common are:
BAZEL_EXTRA_BUILD_FLAGSare extra build flags passed on the Bazel command line.BAZEL_FUZZ_TEST_TAGandBAZEL_FUZZ_TEST_EXCLUDE_TAGcan be overridden to specify which target tags to use when determining what fuzz tests to include. By default, the tool selects all the fuzz tests except for those tagged as"no-oss-fuzz".BAZEL_FUZZ_TEST_QUERYoverrides the Bazel query the tool uses to identify the fuzz tests to build, if the tag-based approach is not sufficient.