)]}'
{
  "log": [
    {
      "commit": "a63c5f0a90a33de161321cde8e2f042967a3df82",
      "tree": "cc880e49c27021e8a1223fb9b7d149dd55a39799",
      "parents": [
        "e7abea66216d564f3d105b7637c19c4991920c27"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Mon Apr 20 09:54:53 2026 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Mon Apr 20 09:54:53 2026 +0200"
      },
      "message": "Clean up bazelbuild org references (#291)"
    },
    {
      "commit": "e7abea66216d564f3d105b7637c19c4991920c27",
      "tree": "d06db103e461cf9c16c3ccda564d582735059d59",
      "parents": [
        "6e294e4ee59d3e5a50a7ed7932036737a86961d3"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Fri Mar 20 14:08:09 2026 +0100"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Fri Mar 20 14:08:09 2026 +0100"
      },
      "message": "Support for using honggfuzz with gcc (#288)\n\nThis allows running honggfuzz with a gcc toolchain which can be useful\nfor code bases that don\u0027t compile with clang or where no clang toolchain\nis available.\n\n\nExample usage:\n\n```\nbazel run //examples:re2_fuzz_test --config asan-honggfuzz\n```\n\n---------\n\nCo-authored-by: Simon Resch \u003csimon.resch@code-intelligence.de\u003e\nCo-authored-by: Markus Zoppelt \u003cmarkus@zoppelt.net\u003e\nCo-authored-by: Markus Zoppelt \u003cmarkus.zoppelt@code-intelligence.com\u003e"
    },
    {
      "commit": "6e294e4ee59d3e5a50a7ed7932036737a86961d3",
      "tree": "ea41d807e21e9db0c8c89c014521311a678356e0",
      "parents": [
        "b175627bd90ea83910b93b9ec79901c722e2b7a0"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Mon Mar 16 22:14:34 2026 +0100"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Mon Mar 16 21:14:34 2026 +0000"
      },
      "message": "Update deps and bump Python versions (#286)\n\nAlso mark honggfuzz as Linux-only."
    },
    {
      "commit": "b175627bd90ea83910b93b9ec79901c722e2b7a0",
      "tree": "e8d875ef7c90133d42f229127bf91cdaace9747a",
      "parents": [
        "7a7159c2952e3eddfaae3fc273c8d0e7b0423151"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Mon Mar 16 11:35:57 2026 +0100"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Mon Mar 16 11:35:57 2026 +0100"
      },
      "message": "Update Bazel to 9.0.1 (#287)\n\n- Updates `.bazelversion` from 8.4.2 to 9.0.1\n- Handles `symlinks` and `root_symlink` in `runfiles` to support the new\nBash runfiles library location\n\n---------\n\nCo-authored-by: Claude Opus 4.6 \u003cnoreply@anthropic.com\u003e"
    },
    {
      "commit": "7a7159c2952e3eddfaae3fc273c8d0e7b0423151",
      "tree": "43c281f7dcfc793fcfd83e7dedc4ec2b1f987717",
      "parents": [
        "b485f1403243da450cf4b9df83077bfbc161b629"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Mon Dec 08 12:59:35 2025 +0100"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Mon Dec 08 12:59:35 2025 +0100"
      },
      "message": "Update Jazzer to v0.28.0 (#283)\n\n"
    },
    {
      "commit": "b485f1403243da450cf4b9df83077bfbc161b629",
      "tree": "a8ad7810fbefddf68d42ba2d5147b2a3a504420a",
      "parents": [
        "c5414371f70aaf817c67142a24ade4f9830e5cbd"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Thu Nov 20 09:25:00 2025 +0100"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Thu Nov 20 09:25:00 2025 +0100"
      },
      "message": "Fix and test Bazel 9 support (#282)\n\n"
    },
    {
      "commit": "c5414371f70aaf817c67142a24ade4f9830e5cbd",
      "tree": "8b02aad343e5090fc9da3d9fba1add6b32a3e304",
      "parents": [
        "02a87c0e422e2aef3b4dbf38de89d73ccbc64240"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Mon Sep 22 22:10:22 2025 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Mon Sep 22 22:10:22 2025 +0200"
      },
      "message": "Drop C++14 flag (#281)\n\nBazel already sets a suitable default."
    },
    {
      "commit": "02a87c0e422e2aef3b4dbf38de89d73ccbc64240",
      "tree": "fc28e2a98d452329f7610ae0db6c66324d9ef26b",
      "parents": [
        "e6a9720d7bfa8d7c01df1151722fd9377d306bab"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Tue Jul 22 15:17:44 2025 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Tue Jul 22 15:17:44 2025 +0200"
      },
      "message": "Sync back BCR config (#280)\n\nTaken from edits made to\nhttps://github.com/bazelbuild/bazel-central-registry/pull/5240\n\n---------\n\nCo-authored-by: Simon Resch \u003csimon.resch@code-intelligence.de\u003e"
    },
    {
      "commit": "e6a9720d7bfa8d7c01df1151722fd9377d306bab",
      "tree": "bfe13102ea5023b6c72904a8168794e686a46544",
      "parents": [
        "e566ea932c1c54521a627152c65beee6924e2bfc"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Fri Jul 18 11:04:00 2025 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Fri Jul 18 11:04:00 2025 +0200"
      },
      "message": "Improve workflow triggers (#279)\n\nThe linters aren\u0027t pinned and thus can start to fail on commits that\ndon\u0027t touch any files they apply to.\n\nAlso don\u0027t run all workflows twice for a PR."
    },
    {
      "commit": "e566ea932c1c54521a627152c65beee6924e2bfc",
      "tree": "27e91420ce48cfa6b643165d70c2178a9cd2affd",
      "parents": [
        "ff684b428d5821a8dfa291d503306f1815e9bafd"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Fri Jul 18 10:36:11 2025 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Fri Jul 18 08:36:11 2025 +0000"
      },
      "message": "Fix source.template.json again (#278)\n\nAdd a strip_prefix to fix\nhttps://github.com/bazel-contrib/rules_fuzzing/actions/runs/16363893709/job/46237275734#step:6:25."
    },
    {
      "commit": "ff684b428d5821a8dfa291d503306f1815e9bafd",
      "tree": "e474c1654311e1680e2f7e85cae4410c20690dfb",
      "parents": [
        "061f429695d2a844a04f9f0417849f940d32818b"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Fri Jul 18 08:20:44 2025 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Fri Jul 18 08:20:44 2025 +0200"
      },
      "message": "Fix source.template.json (#277)\n\nThe release job creates an archive with the `v`-prefixed tag in the\nname, which caused the publish job to fail as it expected the name\nwithout the `v`.\n\n\nhttps://github.com/bazel-contrib/rules_fuzzing/actions/runs/16354558276/job/46210158348#step:6:24"
    },
    {
      "commit": "061f429695d2a844a04f9f0417849f940d32818b",
      "tree": "7de088f1577ce3035bef29064fff2d909238053c",
      "parents": [
        "d43a2c126d7c071ea51227f1265d3ff14b038bed"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Thu Jul 17 21:44:47 2025 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Thu Jul 17 21:44:47 2025 +0200"
      },
      "message": "Fix release_prep.sh (#276)\n\n"
    },
    {
      "commit": "d43a2c126d7c071ea51227f1265d3ff14b038bed",
      "tree": "7533a909bb83a892402655bdd43ba6ca2a1d069a",
      "parents": [
        "84ce696ec742ac857b703e30af67c7ab4091d6a0"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Thu Jul 17 19:09:28 2025 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Thu Jul 17 19:09:28 2025 +0200"
      },
      "message": "Add BCR publishing workflow (#275)\n\nBased on https://github.com/bazel-contrib/rules-template"
    },
    {
      "commit": "84ce696ec742ac857b703e30af67c7ab4091d6a0",
      "tree": "95293ee47d1fa6da3a6a69edb5f0051aad491100",
      "parents": [
        "ccbb99f50ce0186e537d26af1409ec6248c7221a"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Thu Jul 17 14:35:22 2025 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Thu Jul 17 14:35:22 2025 +0200"
      },
      "message": "Add `@simonresch` to CODEOWNERS (#274)\n\n"
    },
    {
      "commit": "ccbb99f50ce0186e537d26af1409ec6248c7221a",
      "tree": "a15c49c94539b5d8ee620b5cf9142d153d0b2a71",
      "parents": [
        "33b6ccaf70f673fb0b69d2557782356e5f409e99"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Mon Jul 07 11:06:54 2025 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Mon Jul 07 09:06:54 2025 +0000"
      },
      "message": "Fix \"undefined variable\" error if `JAVA_HOME` is undefined (#265)\n\n"
    },
    {
      "commit": "33b6ccaf70f673fb0b69d2557782356e5f409e99",
      "tree": "282694de58002cce8063053cdfa46413d5adec82",
      "parents": [
        "76c7e7c1a23586526464de2a1961f8dc17622e9b"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Mon Jul 07 10:58:16 2025 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Mon Jul 07 08:58:16 2025 +0000"
      },
      "message": "Disable renovate (#273)\n\n"
    },
    {
      "commit": "76c7e7c1a23586526464de2a1961f8dc17622e9b",
      "tree": "e8d08a34fa785a81d3b0ffe15399ae707830b8dd",
      "parents": [
        "f8b0e656eb573c975200cd91cd55aed5742903ff"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Mon Jul 07 10:44:12 2025 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Mon Jul 07 08:44:12 2025 +0000"
      },
      "message": "Update Bazel and runners (#272)\n\n"
    },
    {
      "commit": "f8b0e656eb573c975200cd91cd55aed5742903ff",
      "tree": "ba459690c82760f640d0f7e33046d47fbbe28ece",
      "parents": [
        "d76d2b90e51deb813b9b094950be70864e2668c2"
      ],
      "author": {
        "name": "renovate[bot]",
        "email": "29139614+renovate[bot]@users.noreply.github.com",
        "time": "Mon Jul 07 00:27:52 2025 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Mon Jul 07 00:27:52 2025 +0200"
      },
      "message": "chore: Configure Renovate (#256)\n\nWelcome to [Renovate](https://redirect.github.com/renovatebot/renovate)!\nThis is an onboarding PR to help you understand and configure settings\nbefore regular Pull Requests begin.\n\n🚦 To activate Renovate, merge this Pull Request. To disable Renovate,\nsimply close this Pull Request unmerged.\n\n\n\n---\n### Detected Package Files\n\n * `WORKSPACE` (bazel)\n * `fuzzing/repositories.bzl` (bazel)\n * `MODULE.bazel` (bazel-module)\n * `.bazelversion` (bazelisk)\n * `.github/workflows/bazel_lint.yml` (github-actions)\n * `.github/workflows/bazel_test.yml` (github-actions)\n * `.github/workflows/cpp_lint.yml` (github-actions)\n * `.github/workflows/oss_fuzz.yml` (github-actions)\n\n### Configuration Summary\n\nBased on the default config\u0027s presets, Renovate will:\n\n  - Start dependency updates only once this onboarding PR is merged\n  - Hopefully safe environment variables to allow users to configure.\n  - Show all Merge Confidence badges for pull requests.\n  - Enable Renovate Dependency Dashboard creation.\n- Use semantic commit type `fix` for dependencies and `chore` for all\nothers if semantic commits are in use.\n- Ignore `node_modules`, `bower_components`, `vendor` and various\ntest/tests (except for nuget) directories.\n  - Group known monorepo packages together.\n  - Use curated list of recommended non-monorepo package groupings.\n- Show only the Age and Confidence Merge Confidence badges for pull\nrequests.\n  - Apply crowd-sourced package replacement rules.\n  - Apply crowd-sourced workarounds for known problems with packages.\n\n🔡 Do you want to change how Renovate upgrades your dependencies? Add\nyour custom config to `renovate.json` in this branch. Renovate will\nupdate the Pull Request description the next time it runs.\n\n---\n\n### What to Expect\n\nWith your current configuration, Renovate will create 20 Pull Requests:\n\n\u003cdetails\u003e\n\u003csummary\u003echore(deps): update io_bazel_stardoc digest to\nee7f828\u003c/summary\u003e\n\n  - Schedule: [\"at any time\"]\n  - Branch name: `renovate/io_bazel_stardoc-digest`\n  - Merge into: `master`\n- Upgrade io_bazel_stardoc to `ee7f82841a96fc9a88cee42ff9d18719d51a792f`\n\n\n\u003c/details\u003e\n\n\u003cdetails\u003e\n\u003csummary\u003echore(deps): update dependency platforms to v0.0.11\u003c/summary\u003e\n\n  - Schedule: [\"at any time\"]\n  - Branch name: `renovate/platforms-0.x`\n  - Merge into: `master`\n- Upgrade [platforms](https://redirect.github.com/bazelbuild/platforms)\nto `0.0.11`\n\n\n\u003c/details\u003e\n\n\u003cdetails\u003e\n\u003csummary\u003echore(deps): update dependency abseil-cpp to\nv20240116.3\u003c/summary\u003e\n\n  - Schedule: [\"at any time\"]\n  - Branch name: `renovate/abseil-cpp-20240116.x`\n  - Merge into: `master`\n- Upgrade [abseil-cpp](https://redirect.github.com/abseil/abseil-cpp) to\n`20240116.3`\n\n\n\u003c/details\u003e\n\n\u003cdetails\u003e\n\u003csummary\u003echore(deps): update dependency bazel to v8.3.1\u003c/summary\u003e\n\n  - Schedule: [\"at any time\"]\n  - Branch name: `renovate/bazel-8.x`\n  - Merge into: `master`\n- Upgrade [bazel](https://redirect.github.com/bazelbuild/bazel) to\n`8.3.1`\n\n\n\u003c/details\u003e\n\n\u003cdetails\u003e\n\u003csummary\u003echore(deps): update dependency bazel_features to\nv1.32.0\u003c/summary\u003e\n\n  - Schedule: [\"at any time\"]\n  - Branch name: `renovate/bazel_features-1.x`\n  - Merge into: `master`\n- Upgrade\n[bazel_features](https://redirect.github.com/bazel-contrib/bazel_features)\nto `1.32.0`\n\n\n\u003c/details\u003e\n\n\u003cdetails\u003e\n\u003csummary\u003echore(deps): update dependency bazel_skylib to v1.8.0\u003c/summary\u003e\n\n  - Schedule: [\"at any time\"]\n  - Branch name: `renovate/bazel_skylib-1.x`\n  - Merge into: `master`\n- Upgrade\n[bazel_skylib](https://redirect.github.com/bazelbuild/bazel-skylib) to\n`1.8.0`\n\n\n\u003c/details\u003e\n\n\u003cdetails\u003e\n\u003csummary\u003echore(deps): update dependency googletest to v1.17.0\u003c/summary\u003e\n\n  - Schedule: [\"at any time\"]\n  - Branch name: `renovate/googletest-1.x`\n  - Merge into: `master`\n- Upgrade [googletest](https://google.github.io/googletest/) to `1.17.0`\n\n\n\u003c/details\u003e\n\n\u003cdetails\u003e\n\u003csummary\u003echore(deps): update dependency honggfuzz to v2.6\u003c/summary\u003e\n\n  - Schedule: [\"at any time\"]\n  - Branch name: `renovate/honggfuzz-2.x`\n  - Merge into: `master`\n- Upgrade [honggfuzz](https://redirect.github.com/google/honggfuzz) to\n`2.6`\n\n\n\u003c/details\u003e\n\n\u003cdetails\u003e\n\u003csummary\u003echore(deps): update dependency rules_cc to v0.1.2\u003c/summary\u003e\n\n  - Schedule: [\"at any time\"]\n  - Branch name: `renovate/rules_cc-0.x`\n  - Merge into: `master`\n- Upgrade [rules_cc](https://redirect.github.com/bazelbuild/rules_cc) to\n`0.1.2`\n\n\n\u003c/details\u003e\n\n\u003cdetails\u003e\n\u003csummary\u003echore(deps): update dependency rules_python to\nv0.40.0\u003c/summary\u003e\n\n  - Schedule: [\"at any time\"]\n  - Branch name: `renovate/rules_python-0.x`\n  - Merge into: `master`\n- Upgrade\n[rules_python](https://redirect.github.com/bazel-contrib/rules_python)\nto `0.40.0`\n- Upgrade\n[rules_python](https://redirect.github.com/bazelbuild/rules_python) to\n`0.40.0`\n\n\n\u003c/details\u003e\n\n\u003cdetails\u003e\n\u003csummary\u003echore(deps): update dependency rules_shell to v0.5.0\u003c/summary\u003e\n\n  - Schedule: [\"at any time\"]\n  - Branch name: `renovate/rules_shell-0.x`\n  - Merge into: `master`\n- Upgrade\n[rules_shell](https://redirect.github.com/bazelbuild/rules_shell) to\n`0.5.0`\n\n\n\u003c/details\u003e\n\n\u003cdetails\u003e\n\u003csummary\u003echore(deps): update dependency stardoc to v0.8.0\u003c/summary\u003e\n\n  - Schedule: [\"at any time\"]\n  - Branch name: `renovate/stardoc-0.x`\n  - Merge into: `master`\n- Upgrade [stardoc](https://redirect.github.com/bazelbuild/stardoc) to\n`0.8.0`\n\n\n\u003c/details\u003e\n\n\u003cdetails\u003e\n\u003csummary\u003echore(deps): update actions/checkout action to v4\u003c/summary\u003e\n\n  - Schedule: [\"at any time\"]\n  - Branch name: `renovate/actions-checkout-4.x`\n  - Merge into: `master`\n- Upgrade\n[actions/checkout](https://redirect.github.com/actions/checkout) to `v4`\n\n\n\u003c/details\u003e\n\n\u003cdetails\u003e\n\u003csummary\u003echore(deps): update actions/setup-go action to v5\u003c/summary\u003e\n\n  - Schedule: [\"at any time\"]\n  - Branch name: `renovate/actions-setup-go-5.x`\n  - Merge into: `master`\n- Upgrade\n[actions/setup-go](https://redirect.github.com/actions/setup-go) to `v5`\n\n\n\u003c/details\u003e\n\n\u003cdetails\u003e\n\u003csummary\u003echore(deps): update actions/setup-python action to v5\u003c/summary\u003e\n\n  - Schedule: [\"at any time\"]\n  - Branch name: `renovate/actions-setup-python-5.x`\n  - Merge into: `master`\n- Upgrade\n[actions/setup-python](https://redirect.github.com/actions/setup-python)\nto `v5`\n\n\n\u003c/details\u003e\n\n\u003cdetails\u003e\n\u003csummary\u003echore(deps): update dependency abseil-cpp to\nv20250512\u003c/summary\u003e\n\n  - Schedule: [\"at any time\"]\n  - Branch name: `renovate/abseil-cpp-20250512.x`\n  - Merge into: `master`\n- Upgrade [abseil-cpp](https://redirect.github.com/abseil/abseil-cpp) to\n`20250512.1`\n\n\n\u003c/details\u003e\n\n\u003cdetails\u003e\n\u003csummary\u003echore(deps): update dependency platforms to v1\u003c/summary\u003e\n\n  - Schedule: [\"at any time\"]\n  - Branch name: `renovate/platforms-1.x`\n  - Merge into: `master`\n- Upgrade [platforms](https://redirect.github.com/bazelbuild/platforms)\nto `1.0.0`\n\n\n\u003c/details\u003e\n\n\u003cdetails\u003e\n\u003csummary\u003echore(deps): update dependency rules_java to v8\u003c/summary\u003e\n\n  - Schedule: [\"at any time\"]\n  - Branch name: `renovate/rules_java-8.x`\n  - Merge into: `master`\n- Upgrade\n[rules_java](https://redirect.github.com/bazelbuild/rules_java) to\n`8.13.0`\n\n\n\u003c/details\u003e\n\n\u003cdetails\u003e\n\u003csummary\u003echore(deps): update dependency rules_python to v1\u003c/summary\u003e\n\n  - Schedule: [\"at any time\"]\n  - Branch name: `renovate/rules_python-1.x`\n  - Merge into: `master`\n- Upgrade\n[rules_python](https://redirect.github.com/bazel-contrib/rules_python)\nto `1.5.1`\n- Upgrade\n[rules_python](https://redirect.github.com/bazelbuild/rules_python) to\n`1.5.1`\n\n\n\u003c/details\u003e\n\n\u003cdetails\u003e\n\u003csummary\u003echore(deps): update dependency ubuntu to v24\u003c/summary\u003e\n\n  - Schedule: [\"at any time\"]\n  - Branch name: `renovate/ubuntu-24.x`\n  - Merge into: `master`\n- Upgrade [ubuntu](https://redirect.github.com/actions/runner-images) to\n`24.04`\n\n\n\u003c/details\u003e\n\n\n\n🚸 Branch creation will be limited to maximum 2 per hour, so it doesn\u0027t\nswamp any CI resources or overwhelm the project. See docs for\n`prhourlylimit` for details.\n\n\n---\n\n❓ Got questions? Check out Renovate\u0027s\n[Docs](https://docs.renovatebot.com/), particularly the Getting Started\nsection.\nIf you need any further assistance then you can also [request help\nhere](https://redirect.github.com/renovatebot/renovate/discussions).\n\n\n---\n\nThis PR was generated by [Mend Renovate](https://mend.io/renovate/).\nView the [repository job\nlog](https://developer.mend.io/github/bazel-contrib/rules_fuzzing).\n\n\n\u003c!--renovate-config-hash:e80b4e42a3043bc12fa0640db4bac392d2bf770acf841360d7c8ceeeac2ec1a9--\u003e\n\nCo-authored-by: renovate[bot] \u003c29139614+renovate[bot]@users.noreply.github.com\u003e"
    },
    {
      "commit": "d76d2b90e51deb813b9b094950be70864e2668c2",
      "tree": "14c52917286ab88d75dfb1bed48259397d0630ce",
      "parents": [
        "0f2eca9ca927aaf61d2a58fd8f59b9747db8564a"
      ],
      "author": {
        "name": "simonresch",
        "email": "65217285+simonresch@users.noreply.github.com",
        "time": "Mon Jul 07 00:25:05 2025 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Mon Jul 07 00:25:05 2025 +0200"
      },
      "message": "Propagate tags and target_compatible_with to generated bazel targets (#262)\n\nForwards `tags` and `target_compatible_with` to the generated targets\nfrom `cc_fuzz_test`, `java_fuzz_test` and `fuzzing_decoration`.\n\nBeing able to modify tags and specify platform constraints is frequently\nneeded in CI/CD integrations."
    },
    {
      "commit": "0f2eca9ca927aaf61d2a58fd8f59b9747db8564a",
      "tree": "501a3045c499caac23c043fb84147dd149e7a1b0",
      "parents": [
        "284526edf1b5e1f0279d0f8a4b4bf1d872a8efc1"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Sun Jul 06 22:00:15 2025 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Sun Jul 06 16:00:15 2025 -0400"
      },
      "message": "Update CODEOWNERS (#266)\n\n"
    },
    {
      "commit": "284526edf1b5e1f0279d0f8a4b4bf1d872a8efc1",
      "tree": "fc5228785387da24650f64b898e232ff7d3db006",
      "parents": [
        "e61aebf416ce308dc492f94e400ab846f01b7b7d"
      ],
      "author": {
        "name": "Corentin Kerisit",
        "email": "corentin.kerisit@gmail.com",
        "time": "Tue Feb 18 18:47:54 2025 +0100"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Tue Feb 18 12:47:54 2025 -0500"
      },
      "message": "Mark extension as reproducible (#261)\n\nThis removes an unnecessary entry from the lockfiles of rules_fuzzing users."
    },
    {
      "commit": "e61aebf416ce308dc492f94e400ab846f01b7b7d",
      "tree": "58148ca4a083496de8af1dee00d41e3a2fe08bd5",
      "parents": [
        "1b9ddac66217c77f4eea0d3a8b765953ab5080b5"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Fri Feb 14 22:28:13 2025 +0100"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Fri Feb 14 16:28:13 2025 -0500"
      },
      "message": "Update Jazzer and Bazel (#260)\n\n* Update Jazzer and Bazel\n\n* Update deps and fix stardoc"
    },
    {
      "commit": "1b9ddac66217c77f4eea0d3a8b765953ab5080b5",
      "tree": "3d24dafbaa37e593af67f7d3787682e8ab24facc",
      "parents": [
        "a8d424dcf30a1d45a4fbf20c3652dabdc943e5a5"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Sat Sep 28 20:46:56 2024 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Sat Sep 28 14:46:56 2024 -0400"
      },
      "message": "Add aliases for OSS-Fuzz engines (#258)\n\nThis allows Bzlmod users to reference the engines without reaching into rules_fuzzing internals."
    },
    {
      "commit": "a8d424dcf30a1d45a4fbf20c3652dabdc943e5a5",
      "tree": "3f07e4bd67be206448eec28d73acd78cb696cffc",
      "parents": [
        "691c8938ff87681f7281cc4ba840e74e3b63c54b"
      ],
      "author": {
        "name": "simonresch",
        "email": "65217285+simonresch@users.noreply.github.com",
        "time": "Sun Sep 15 03:00:51 2024 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Sat Sep 14 22:00:51 2024 -0300"
      },
      "message": "fix(replayer): replay corpus files in hidden dirs (#254)\n\n* fix(replay): replay corpus files in hidden dirs\n\nThe replayer would not execute hidden corpus files or files in hidden\ndirectories if they were in the bazel project root (#253).\n\n* chore: update upload-artifact action\n\n`actions/upload-artifact` v1 and v2 are no longer supported."
    },
    {
      "commit": "691c8938ff87681f7281cc4ba840e74e3b63c54b",
      "tree": "86c924635135c002dde4bcc6a377b7ba8adb7582",
      "parents": [
        "273fcfdc13a2bd3aa50b0a83074aa52f3a330562"
      ],
      "author": {
        "name": "Marcel",
        "email": "maleo@google.com",
        "time": "Tue May 14 09:37:53 2024 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Tue May 14 03:37:53 2024 -0400"
      },
      "message": "Update rules_python to 0.28.0 (#250)\n\nfor WORKSPACE dependencies. MODULE.bazel already uses this version."
    },
    {
      "commit": "273fcfdc13a2bd3aa50b0a83074aa52f3a330562",
      "tree": "e9a926f3aec09e9df6b0cabf424296e76d6bdfb1",
      "parents": [
        "2b2406bc7830c488e73ef92af715d5453c6c8a4b"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Fri Apr 12 17:44:09 2024 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Fri Apr 12 11:44:09 2024 -0400"
      },
      "message": "Make fmeum the BCR maintainer (#249)\n\nBy also making me the `fixedReleaser`, BCR release automation should\r\nwork as it will use my fork."
    },
    {
      "commit": "2b2406bc7830c488e73ef92af715d5453c6c8a4b",
      "tree": "51995d6d844ad36ed8356469ea5384c3a66695b1",
      "parents": [
        "9d0ef1c0333cb219bb3a8123bee04ecbac7da97e"
      ],
      "author": {
        "name": "Stefan Bucur",
        "email": "281483+stefanbucur@users.noreply.github.com",
        "time": "Fri Apr 12 11:25:10 2024 -0400"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Fri Apr 12 11:25:10 2024 -0400"
      },
      "message": "Update metadata.template.json with correct email (#247)\n\n"
    },
    {
      "commit": "9d0ef1c0333cb219bb3a8123bee04ecbac7da97e",
      "tree": "377bd9fb93aa16faa6332bca42626d1585085fd7",
      "parents": [
        "b0199e6313c342ddf0ff21e10827da63bf3aca0d"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Fri Apr 12 17:23:56 2024 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Fri Apr 12 11:23:56 2024 -0400"
      },
      "message": "Fix incompatibility with Bazel 6 (#248)\n\nAdds a missing `None` to an otherwise failing `getattr`."
    },
    {
      "commit": "b0199e6313c342ddf0ff21e10827da63bf3aca0d",
      "tree": "9f5ba0486944668accc4c4d722dcd980bc6ba64f",
      "parents": [
        "1dbcd9167300ad226d29972f5f9c925d6d81f441"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Wed Mar 27 22:57:57 2024 +0100"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Wed Mar 27 17:57:57 2024 -0400"
      },
      "message": "Add metadata for \"Publish to BCR\" app (#246)\n\n* Add metadata for \"Publish to BCR\" app\r\n\r\n* Update presubmit.yml"
    },
    {
      "commit": "1dbcd9167300ad226d29972f5f9c925d6d81f441",
      "tree": "d9cfc16651bb62294e79c8aca36b9197eb657dd5",
      "parents": [
        "d17a7d79c881cb8b1a1ba1d2e41c1adf1d60b23b"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Sun Mar 10 13:08:19 2024 +0100"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Sun Mar 10 08:08:19 2024 -0400"
      },
      "message": "Add support for Bzlmod (#242)\n\n* Add support for Bzlmod\r\n\r\nRequires fixing a case of a non-hermetic Python import in\r\n`dict_validation_test` that breaks with Python 3.11, with which Bazel\r\nuses `PYTHONSAFEPATH` by default.\r\n\r\nA follow-up PR will provide the publishing setup for releases to the\r\nBazel Central Registry (BCR).\r\n\r\n* Disable layering_check for OSS-Fuzz\r\n\r\nOSS-Fuzz builds fail with:\r\n```\r\nERROR: /root/.cache/bazel/_bazel_root/17db7bb59affe64429348778697da03a/external/abseil-cpp~20230802.1/absl/strings/BUILD.bazel:591:11: Compiling absl/strings/internal/cordz_functions.cc failed: undeclared inclusion(s) in rule \u0027@@abseil-cpp~20230802.1//absl/strings:cordz_functions\u0027:\r\nthis rule is missing dependency declarations for the following files included by \u0027absl/strings/internal/cordz_functions.cc\u0027:\r\n  \u0027bazel-out/k8-opt-ST-b76ee6246659/bin/external/abseil-cpp~20230802.1/absl/base/atomic_hook.cppmap\u0027\r\n  \u0027bazel-out/k8-opt-ST-b76ee6246659/bin/external/abseil-cpp~20230802.1/absl/base/errno_saver.cppmap\u0027\r\n  \u0027bazel-out/k8-opt-ST-b76ee6246659/bin/external/abseil-cpp~20230802.1/absl/base/log_severity.cppmap\u0027\r\n```\r\n\r\nThese files are emitted by Bazel when using the `layering_check`\r\nfeature. This looks like a bug or breaking change in clang.\r\n\r\n* Revert \"Disable layering_check for OSS-Fuzz\"\r\n\r\nThis reverts commit 60a831d46ce6de6a5eed6bf63ae4f0f5087864ac.\r\n\r\n* Address review comments\r\n\r\n* Update abseil and use a custom repo_name\r\n\r\n* Add subproject to .bazelignore\r\n\r\n* Use `Label` in macros\r\n\r\n* Update Bazel to 7.0.2 and ignore WORKSPACE repos in example repo\r\n\r\n* Add _repo_mapping file if supported\r\n\r\n* Apply repo mapping to local_jdk exclusion\r\n\r\n* Fix failure if there are no runfiles\r\n\r\n* Make `local_jdk` visible"
    },
    {
      "commit": "d17a7d79c881cb8b1a1ba1d2e41c1adf1d60b23b",
      "tree": "fdf476bbeae008a9368990d1e95449b0c8c20ad3",
      "parents": [
        "67ba0264c46c173a75825f2ae0a0b4b9b17c5e59"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Wed Dec 13 16:35:58 2023 +0100"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Wed Dec 13 10:35:58 2023 -0500"
      },
      "message": "Update to Bazel 7 (#241)\n\n* Only force clang, not clang-10\n\nclang-10 isn\u0027t available on macOS. Before Bazel 7, this never applied\nto macOS since the default toolchain used Xcode, ignoring the value of\n`CC` alltogether.\n\nAlso move from `--action_env` to `--repo_env`, which doesn\u0027t leak into\nall actions environment, and don\u0027t set `CXX`, which isn\u0027t read by Bazel.\n\n* Do not use `rules_cc`\n\nThe core rules still live in Bazel and `rules_cc` in particular isn\u0027t\nwell maintained right now. It is better to switch to the external\nrulesets when the Bzlmod migration has been completed and the rules are\nstarlarkified, with the external rulesets being the source of truth.\n\n* Pin Java language and runtime version to 11\n\nTargetting Java 8 is deprecated on a JDK 21, which Bazel 7 uses for\ncompilation by default.\n\nAs a side effect, this allows contributors to run all tests without a\nlocal JDK.\n\n* Do not depend on source directories\n\nThis has always been unsound and triggers a warning with Bazel 7.\n\n* Disable Bzlmod\n\nEnabled by default in Bazel 7, but rules_fuzzing isn\u0027t compatible with\nit yet.\n\n* Update to Bazel 7\n\nThis requires updating some dependencies."
    },
    {
      "commit": "67ba0264c46c173a75825f2ae0a0b4b9b17c5e59",
      "tree": "260d2c01cb931af4a969491a74bd1ea772971da2",
      "parents": [
        "03152957bfbac105d0eb6707b304f46129f57db4"
      ],
      "author": {
        "name": "Ted Pudlik",
        "email": "tpudlik@gmail.com",
        "time": "Thu Nov 16 14:50:07 2023 -0800"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Thu Nov 16 17:50:07 2023 -0500"
      },
      "message": "Update pip_parse invocation (#240)\n\nThe `requirements` argument is deprecated and will be removed in the\r\nnext rules_python release.\r\n\r\nFixes #239"
    },
    {
      "commit": "03152957bfbac105d0eb6707b304f46129f57db4",
      "tree": "383968dc91289890e1495e831df3d3a729d258a8",
      "parents": [
        "3504079adee2c19b2f6c0779caefd9856375ba7b"
      ],
      "author": {
        "name": "Adam Cozzette",
        "email": "acozzette@google.com",
        "time": "Sat Nov 11 10:23:46 2023 -0800"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Sat Nov 11 13:23:46 2023 -0500"
      },
      "message": "Fix import to include full path (#238)\n\nThis seems to be necessary for the project to build successfully with\r\nBazel 6.\r\n\r\nI also fixed some build errors related to Python 3.12, by upgrading to\r\nthe most recent versions of absl, six, and rules_python."
    },
    {
      "commit": "3504079adee2c19b2f6c0779caefd9856375ba7b",
      "tree": "c5d34748437b01d23aad9714b4e7f2ec388472d3",
      "parents": [
        "ef5d0345cb46c6608da54674f1b18524e08bf21a"
      ],
      "author": {
        "name": "Robin Lindén",
        "email": "_@robinlinden.eu",
        "time": "Thu Oct 19 13:58:00 2023 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Thu Oct 19 07:58:00 2023 -0400"
      },
      "message": "Update abseil-cpp to fix build with Clang \u003e\u003d16 (#237)\n\nThis fixes a build error in newer Clang caused by a\r\nfeature\u003dlayering_check violation:\r\n\r\n```\r\nIn file included from external/com_google_absl/absl/debugging/stacktrace.cc:46:\r\nexternal/com_google_absl/absl/debugging/internal/stacktrace_x86-inl.inc:38:10: error: module @com_google_absl//absl/debugging:stacktrace does not depend on a module exporting \u0027absl/base/internal/raw_logging.h\u0027\r\n         ^\r\n1 error generated.\r\n```"
    },
    {
      "commit": "ef5d0345cb46c6608da54674f1b18524e08bf21a",
      "tree": "5d98ad4557a6477115bc55930f0e8dc085b19f0e",
      "parents": [
        "ec40a7bdb112271b765d08e43dcc87e5068daf0c"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Fri Sep 22 07:55:18 2023 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Fri Sep 22 01:55:18 2023 -0400"
      },
      "message": "Fix `main_class` error in `java_fuzz_test` (#236)\n\nIn certain situations, `java_fuzz_test`s failed with\r\n\r\n```\r\nERROR: Projects/fuzz-sample/BUILD:3:15: in java_binary rule //:JavaFuzzTest_metadata_: need at least one of \u0027main_class\u0027 or Java source files\r\nERROR: Projects/fuzz-sample/BUILD:3:15: in java_binary rule //:JavaFuzzTest_metadata_: main_class was not provided and cannot be inferred: source path doesn\u0027t include a known root (java, javatests, src, testsrc)\r\nERROR: Projects/fuzz-sample/BUILD:3:15: Analysis of target \u0027//:JavaFuzzTest_metadata_\u0027 failed\r\n```\r\n\r\nThis is fixed by marking the metadata jar as non-executable."
    },
    {
      "commit": "ec40a7bdb112271b765d08e43dcc87e5068daf0c",
      "tree": "8161180b338750b1d108094f169bc4b4e66079a7",
      "parents": [
        "3b77f15fda02ced89f2ef4ea35a027c20e6c428f"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Sun Sep 10 15:51:44 2023 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Sun Sep 10 09:51:44 2023 -0400"
      },
      "message": "Update Jazzer to v0.20.1 (#232)\n\n"
    },
    {
      "commit": "3b77f15fda02ced89f2ef4ea35a027c20e6c428f",
      "tree": "2558d9c046ba4c1c7cd3df626ec521d872cca578",
      "parents": [
        "dff339f0ed1492958409b4c9c8937f9ded712861"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Sun Sep 10 15:50:22 2023 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Sun Sep 10 09:50:22 2023 -0400"
      },
      "message": "Add `asan-ubsan` instrumentation option (#231)\n\nThis option combines ASan with UBSan, which is very useful for running\r\nthe replay tests as well as while iterating on a fuzz test locally."
    },
    {
      "commit": "dff339f0ed1492958409b4c9c8937f9ded712861",
      "tree": "f2981f7d7204fd8bbfdee21d9fa0c26633ba0784",
      "parents": [
        "d93363c5685608f5e5774e31264db0545e8e1924"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Thu Sep 07 22:53:35 2023 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Thu Sep 07 16:53:35 2023 -0400"
      },
      "message": "Apply buildifier lint fixes (#233)\n\n"
    },
    {
      "commit": "d93363c5685608f5e5774e31264db0545e8e1924",
      "tree": "ad7368961a0110d06873cc4eb3eed2c0c3278340",
      "parents": [
        "964d7736d21671b806975a1094c6cbe20b1b1e7c"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Fri Jul 07 17:15:18 2023 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Fri Jul 07 11:15:18 2023 -0400"
      },
      "message": "Update and simplify Jazzer integration (#218)\n\n* Update Jazzer to v0.17.1\r\n\r\n* Add support for sanitizer runtimes\r\n\r\n* Refactor oss-fuzz support\r\n\r\n* Address review comments"
    },
    {
      "commit": "964d7736d21671b806975a1094c6cbe20b1b1e7c",
      "tree": "53488da6dbe1c5693b88c7f3f79c3b35398fa432",
      "parents": [
        "9865504b549e86ccfb4713afcc1914c982567f05"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Thu Jul 06 19:45:31 2023 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Thu Jul 06 13:45:31 2023 -0400"
      },
      "message": "Update honggfuzz to 2.5 (#229)\n\n"
    },
    {
      "commit": "9865504b549e86ccfb4713afcc1914c982567f05",
      "tree": "e74db3c0867eeb2417f186ed1f379781ce5785b2",
      "parents": [
        "a68bf9f35dc20757ca19429deb06e51066c8f999"
      ],
      "author": {
        "name": "Keith Smiley",
        "email": "keithbsmiley@gmail.com",
        "time": "Fri Mar 24 11:06:32 2023 -0700"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Fri Mar 24 14:06:32 2023 -0400"
      },
      "message": "Update rules_python and use new deps installer (#225)\n\n"
    },
    {
      "commit": "a68bf9f35dc20757ca19429deb06e51066c8f999",
      "tree": "e35949929861a8e57cad7ea3a27707f7d39455a9",
      "parents": [
        "22a866a3c98f374ab3284a7d26fc8318c17a711c"
      ],
      "author": {
        "name": "Keith Smiley",
        "email": "keithbsmiley@gmail.com",
        "time": "Fri Mar 24 10:30:25 2023 -0700"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Fri Mar 24 13:30:25 2023 -0400"
      },
      "message": "Update bazel to 5.4.0 (#226)\n\n* Update bazel to 6.1.1\r\n\r\n* 5.4 instead"
    },
    {
      "commit": "22a866a3c98f374ab3284a7d26fc8318c17a711c",
      "tree": "7a1f7d932731795c02f77286b1e200fb6190ec4d",
      "parents": [
        "040489e3b34de235f650cf8cf5f345c19ff20943"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Mon Dec 05 17:25:03 2022 +0100"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Mon Dec 05 11:25:03 2022 -0500"
      },
      "message": "Fix memory leaks in Java runfiles test (#220)\n\n"
    },
    {
      "commit": "040489e3b34de235f650cf8cf5f345c19ff20943",
      "tree": "d11b034a0ce5403a159eac84250ae1736608f266",
      "parents": [
        "77f682184a4226e1f8cd2b52b7773792d5bb3314"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Fri Dec 02 21:15:50 2022 +0100"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Fri Dec 02 15:15:50 2022 -0500"
      },
      "message": "Add coverage support to C++ regression tests (#212)\n\nCo-authored-by: Zhen Yu Ding \u003czhendeveloper@gmail.com\u003e\r\n\r\nCo-authored-by: Zhen Yu Ding \u003czhendeveloper@gmail.com\u003e"
    },
    {
      "commit": "77f682184a4226e1f8cd2b52b7773792d5bb3314",
      "tree": "bc081204ef70fc7727232c3274fd13d2c6a47a25",
      "parents": [
        "4cce8c759ab033ac9e6479d776113e00163b5b40"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Fri Dec 02 21:14:51 2022 +0100"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Fri Dec 02 15:14:51 2022 -0500"
      },
      "message": "Do not deviate from UBSan default for local fuzzing (#219)\n\nOSS-Fuzz uses different compile-time settings for UBSan tuned for their\r\nsetup, but it doesn\u0027t make sense to enforce these also for local users.\r\n\r\nIn OSS-Fuzz mode, these flags will still be picked up from the\r\nenvironment."
    },
    {
      "commit": "4cce8c759ab033ac9e6479d776113e00163b5b40",
      "tree": "9820c72ece81c3571ea97753ea9ae67ea64f4aad",
      "parents": [
        "b193df79b10dbfb4c623bda23e825e835f12bada"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Thu Dec 01 23:36:09 2022 +0100"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Thu Dec 01 17:36:09 2022 -0500"
      },
      "message": "Use Bazel\u0027s default `PATH` when running Python actions (#217)\n\n* Use Bazel\u0027s default `PATH` when running Python actions\r\n\r\nWithout `use_default_shell_env`, `PATH` was not set for Python actions,\r\nwhich resulted in `python` (or `python3`) not being found.\r\n\r\n* Pin Ubuntu images to 20.04\r\n\r\nubuntu-latest now resolves to ubuntu-22.04, which does not provide\r\nclang-10."
    },
    {
      "commit": "b193df79b10dbfb4c623bda23e825e835f12bada",
      "tree": "3731eca3d7fc25dba52f1dcb0f384bb57813e360",
      "parents": [
        "5ef6c23bd01defadc662ce76aeb7c71fcdf1e8a6"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Fri Nov 11 17:34:39 2022 +0100"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Fri Nov 11 11:34:39 2022 -0500"
      },
      "message": "Remove libFuzzer stub source file (#213)\n\nThe stub containing the warning is redundant: If it is linked in, then\r\nthe target depending on it will also pick up the `-fsanitize\u003dfuzzer`\r\nflag and thus link in libFuzzer.\r\n\r\nOn macOS, where weak symbols are treated differently by default, the\r\nstub can lead to libFuzzer not being linked at all."
    },
    {
      "commit": "5ef6c23bd01defadc662ce76aeb7c71fcdf1e8a6",
      "tree": "42b107f50b29cd8ab1e2e72df715b78f0cede88b",
      "parents": [
        "23f9676510995ebf0de2ef3aa7da41045308c171"
      ],
      "author": {
        "name": "Stefan Bucur",
        "email": "281483+stefanbucur@users.noreply.github.com",
        "time": "Wed Aug 31 22:42:17 2022 -0400"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Wed Aug 31 22:42:17 2022 -0400"
      },
      "message": "Update the RE2 example to the latest version. (#211)\n\n"
    },
    {
      "commit": "23f9676510995ebf0de2ef3aa7da41045308c171",
      "tree": "fec9a86a06efc6a73cb55c0b38c1cd90174333ff",
      "parents": [
        "864d98541c3b456cb54d2a5e4d5642c5b2d3cb0b"
      ],
      "author": {
        "name": "Stefan Bucur",
        "email": "281483+stefanbucur@users.noreply.github.com",
        "time": "Fri Aug 19 12:46:02 2022 -0400"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Fri Aug 19 12:46:02 2022 -0400"
      },
      "message": "Bump up rules_python to v0.11 (#208)\n\n"
    },
    {
      "commit": "864d98541c3b456cb54d2a5e4d5642c5b2d3cb0b",
      "tree": "712f590a186ca519535a75528fa42448c6a5b2a8",
      "parents": [
        "4fc58953b5815e28c6c8617bf98469695f2cb7b6"
      ],
      "author": {
        "name": "Matt Armstrong",
        "email": "matta@users.noreply.github.com",
        "time": "Fri Aug 19 09:27:05 2022 -0700"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Fri Aug 19 12:27:05 2022 -0400"
      },
      "message": "Appease unused variable warnings in libfuzzer_stub.cc (#210)\n\n"
    },
    {
      "commit": "4fc58953b5815e28c6c8617bf98469695f2cb7b6",
      "tree": "4f55be95e71954748e3c689bb74f83014f6ec76f",
      "parents": [
        "bb61ddf7fd3ce605b3733de901457e79cb989fa4"
      ],
      "author": {
        "name": "Stefan Bucur",
        "email": "281483+stefanbucur@users.noreply.github.com",
        "time": "Fri Aug 19 12:02:18 2022 -0400"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Fri Aug 19 12:02:18 2022 -0400"
      },
      "message": "Update CODEOWNERS (#209)\n\nRemoving Markus and adding @fniksic."
    },
    {
      "commit": "bb61ddf7fd3ce605b3733de901457e79cb989fa4",
      "tree": "b6195f6fa9036a5cf17485381f254ce4d2be01ea",
      "parents": [
        "c4ae20c8e688c1c4d29ba0d1cd2d7e0d66deacd0"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Sun Jun 19 23:06:31 2022 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Sun Jun 19 17:06:31 2022 -0400"
      },
      "message": "Support \"size\" and \"timeout\" on *_fuzz_test (#204)\n\n"
    },
    {
      "commit": "c4ae20c8e688c1c4d29ba0d1cd2d7e0d66deacd0",
      "tree": "935fcdd150b54d602966c698efcb2f0480b1f417",
      "parents": [
        "41c075386cc15202ef2aa39ba84082887331492f"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Thu May 12 22:27:10 2022 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Thu May 12 16:27:10 2022 -0400"
      },
      "message": "Fix bazel_lint job (#205)\n\n* Fix bazel_lint job\r\n\r\ngo get is no longer a supported way to install binaries.\r\n\r\n* Apply buildifier fixes"
    },
    {
      "commit": "41c075386cc15202ef2aa39ba84082887331492f",
      "tree": "5d2b53131a1003a326a316b26229863af902721d",
      "parents": [
        "47feed2a7e5ffd433d60993a0a5ddedea802de52"
      ],
      "author": {
        "name": "Stefan Bucur",
        "email": "281483+stefanbucur@users.noreply.github.com",
        "time": "Thu Feb 03 13:20:02 2022 -0500"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Thu Feb 03 13:20:02 2022 -0500"
      },
      "message": "Update the README to point to latest release. (#197)\n\n"
    },
    {
      "commit": "47feed2a7e5ffd433d60993a0a5ddedea802de52",
      "tree": "71ba48ff6d953e2c4210c9d5c6f6eda630569144",
      "parents": [
        "69a849f83f524a99f3685b08f34bfe134281f342"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Thu Feb 03 18:43:02 2022 +0100"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Thu Feb 03 12:43:02 2022 -0500"
      },
      "message": "Update rules_python to 0.6.0 (#199)\n\nThis allows us to get rid of the py_repositories() call in init.bzl.\r\nThis call is no longer needed with newer versions of rules_python and\r\nproduces warnings."
    },
    {
      "commit": "69a849f83f524a99f3685b08f34bfe134281f342",
      "tree": "51878a98f334e90488081485b06c951f58fa8875",
      "parents": [
        "bf065ea9ea674e910700254d3a89d824ec8015df"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Fri Jan 21 15:59:14 2022 +0100"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Fri Jan 21 09:59:14 2022 -0500"
      },
      "message": "Improve CI setup (#196)\n\n* Run daily CI tests against last_green Bazel\r\n\r\nThis will allow us to catch Bazel compatibility issues sooner.\r\n\r\nAlso makes it possible to manually trigger such a run, e.g. on a PR.\r\n\r\n* Run CI Fuzz test daily\r\n\r\nThis guards against undetected breaking changes introduced by OSS-Fuzz\r\nupstream changes."
    },
    {
      "commit": "bf065ea9ea674e910700254d3a89d824ec8015df",
      "tree": "7cbc4d06bf25c829d9c7b250693990c3bce35911",
      "parents": [
        "d759d0196ab4d9faf2846001d67988c11d55e2b4"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Thu Jan 20 16:34:11 2022 +0100"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Thu Jan 20 10:34:11 2022 -0500"
      },
      "message": "Fix native library handling (#195)\n\n* Correctly escape native library path separator\r\n\r\nThis should have been changed when Jazzer was updated past\r\nhttps://github.com/CodeIntelligenceTesting/jazzer/commit/24069c388579f54ec9872e61efa44f5e6065f838\r\nbut was missed due to missing test coverage for the case of multiple\r\nnative libraries.\r\n\r\nWhen Bazel 5 was released today, the use of transitions coupled with\r\nhttps://github.com/bazelbuild/bazel/commit/20061f8fb7ed95924c6cdbaaaf3d06a64edf974e\r\ncaused the NativeFuzzTest example to suddenly have two native library\r\ndependencies, which triggered the dormant bug.\r\n\r\n* Skip non-dynamic libraries for java.library.path\r\n\r\ntransitive_native_libraries can contain LibraryToLink instances for\r\nstatic libraries and object files, which do not have to be added to the\r\njava.library.path. Prevent analysis time failures by skipping them."
    },
    {
      "commit": "d759d0196ab4d9faf2846001d67988c11d55e2b4",
      "tree": "c1efdbbbe6c7c194d8428e5b97aa512f6f1e997b",
      "parents": [
        "ebf883d54a50872b95c80cd4bc3f0a9377462ffd"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Wed Jan 19 18:20:16 2022 +0100"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Wed Jan 19 12:20:16 2022 -0500"
      },
      "message": "Pin Bazel to 4.2.2 (#194)\n\nSince OSS-Fuzz uses Bazelisk to invoke Bazel and rules_fuzzing does not\r\npin a Bazel version, the latest stable release of Bazel will be used.\r\nThis can (and did, twice now) unexpectedly break the build.\r\n\r\nWe should intead pin a Bazel version and consciously update it when we\r\nadd support for a new version."
    },
    {
      "commit": "ebf883d54a50872b95c80cd4bc3f0a9377462ffd",
      "tree": "66334b8868a1ff3998bc7ba2cde7828804085fff",
      "parents": [
        "9b3d9a84d642eab3b6844bccdae175244c41ec4d"
      ],
      "author": {
        "name": "Stefan Bucur",
        "email": "281483+stefanbucur@users.noreply.github.com",
        "time": "Fri Jan 07 10:55:35 2022 -0500"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Fri Jan 07 10:55:35 2022 -0500"
      },
      "message": "Updated the README file to clarify prerequisites. (#191)\n\n"
    },
    {
      "commit": "9b3d9a84d642eab3b6844bccdae175244c41ec4d",
      "tree": "e769805799302632851938b3770434dfb2c88774",
      "parents": [
        "facdeb5b20def33a8e2a823ef4a29441468be8a8"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Mon Jan 03 17:52:23 2022 +0100"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Mon Jan 03 11:52:23 2022 -0500"
      },
      "message": "Update jazzer (#181)\n\n* Update Jazzer\r\n\r\nThe new Jazzer version includes logic to find libjvm.so, improved\r\ninstrumentation for the Map interface as well as support for M1 Macs.\r\n\r\n* Symlink missing local_jdk runfiles in OSS-Fuzz\r\n\r\n* Create Java native libraries with .dylib extension on macOS\r\n\r\n* Test Java examples in the CI on macOS\r\n\r\nThe newest Jazzer version finds libjvm.dylib on macOS.\r\n\r\n* Add more comments to java_fuzz_test examples"
    },
    {
      "commit": "facdeb5b20def33a8e2a823ef4a29441468be8a8",
      "tree": "a36910f8b80441531bebb7f0a4b1825af469962c",
      "parents": [
        "bb89e9fb76c7b05c85485f039da9e8692b8a006b"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Thu Dec 02 18:49:00 2021 +0100"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Thu Dec 02 12:49:00 2021 -0500"
      },
      "message": "Support UBSan for local fuzzing (#187)\n\nWith Jazzer supporting full UBSan as of\r\nhttps://github.com/CodeIntelligenceTesting/jazzer/pull/169\r\nas well as a much simpler way to link the UBSan C++ runtime via the flag\r\nused in #186, UBSan can now be supported in local mode without\r\nintroducing additional complexity.\r\n\r\nThe list of enabled UBSan checks is taken from OSS-Fuzz.\r\n\r\nThe commit also adds tests to verify that both C++ and Java fuzz tests\r\nsupport the UBSan C++ checks without linker errors."
    },
    {
      "commit": "bb89e9fb76c7b05c85485f039da9e8692b8a006b",
      "tree": "f61568dd094a7a9f62974775352eaa50cf3b1785",
      "parents": [
        "4721596a6d00d84030771f9c5ea396a97ca5b666"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Mon Nov 29 17:27:31 2021 +0100"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Mon Nov 29 11:27:31 2021 -0500"
      },
      "message": "Allow passing deploy_manifest_lines to java_fuzz_test (#184)\n\nSome of Jazzer\u0027s extra features use manifest entries and this makes it\r\npossible to use them.\r\n\r\nAlong the way, by using +\u003d [...] instead of append(...), the deps\r\nand deploy_manifest_lines attributes on *_fuzz_test macros become\r\nconfigurable (i.e. support select() values)."
    },
    {
      "commit": "4721596a6d00d84030771f9c5ea396a97ca5b666",
      "tree": "a55f207bf9ca63e7be4c838afbc25963d7542a95",
      "parents": [
        "5ffd60fbad17c43a1fe1ba0e40d3fe467d989127"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Mon Nov 29 04:03:38 2021 +0100"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Sun Nov 28 22:03:38 2021 -0500"
      },
      "message": "Link UBSan C++ runtime with a flag rather than explicitly (#186)\n\nThis simplifies the oss_fuzz repository rule."
    },
    {
      "commit": "5ffd60fbad17c43a1fe1ba0e40d3fe467d989127",
      "tree": "5c1d3dc0e8418c993f6e361e6c4402e5538f9689",
      "parents": [
        "c13dcd6c7cd5bb4c2e30c260eb5d1333f7ae0b7d"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Mon Nov 15 16:26:47 2021 +0100"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Mon Nov 15 10:26:47 2021 -0500"
      },
      "message": "Instrument native libraries in deploy JARs (#183)\n\nMany Java projects using native libraries add them as resources rather\r\nthan relying on Bazel to add them to the native library path. This\r\nchange ensure that these libraries are correctly instrumented for\r\nfuzzing."
    },
    {
      "commit": "c13dcd6c7cd5bb4c2e30c260eb5d1333f7ae0b7d",
      "tree": "48c9ae611fe8e79436d8a1e8c17db8c8c34a2a6d",
      "parents": [
        "4bafba51ffd9d418d236adb61de36fda1a90e764"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Mon Nov 15 16:25:43 2021 +0100"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Mon Nov 15 10:25:43 2021 -0500"
      },
      "message": "Update abseil-cpp (#182)\n\nabseil-cpp now depends on the Bazel platforms repository.\r\n\r\nThis update fixes the following compiler warnings with clang-13:\r\n\r\n```\r\nINFO: From Compiling absl/strings/internal/str_format/float_conversion.cc:\r\nIn file included from external/com_google_absl/absl/strings/internal/str_format/float_conversion.cc:28:\r\nexternal/com_google_absl/absl/functional/function_ref.h:124:16: warning: definition of implicit copy constructor for \u0027FunctionRef\u003cvoid (absl::Span\u003cunsigned int\u003e)\u003e\u0027 is deprecated because it has a user-declared copy assignment operator [-Wdeprecated-copy]\r\n  FunctionRef\u0026 operator\u003d(const FunctionRef\u0026 rhs) \u003d delete;\r\n               ^\r\nexternal/com_google_absl/absl/strings/internal/str_format/float_conversion.cc:75:39: note: in implicit copy constructor for \u0027absl::FunctionRef\u003cvoid (absl::Span\u003cunsigned int\u003e)\u003e\u0027 first required here\r\n        return RunWithCapacityImpl\u003c1\u003e(f);\r\n                                      ^\r\nIn file included from external/com_google_absl/absl/strings/internal/str_format/float_conversion.cc:28:\r\nexternal/com_google_absl/absl/functional/function_ref.h:124:16: warning: definition of implicit copy constructor for \u0027FunctionRef\u003cvoid (absl::str_format_internal::(anonymous namespace)::BinaryToDecimal)\u003e\u0027 is deprecated because it has a user-declared copy assignment operator [-Wdeprecated-copy]\r\n  FunctionRef\u0026 operator\u003d(const FunctionRef\u0026 rhs) \u003d delete;\r\n               ^\r\nexternal/com_google_absl/absl/strings/internal/str_format/float_conversion.cc:143:10: note: in implicit copy constructor for \u0027absl::FunctionRef\u003cvoid (absl::str_format_internal::(anonymous namespace)::BinaryToDecimal)\u003e\u0027 first required here\r\n        [\u003d](absl::Span\u003cuint32_t\u003e input) { f(BinaryToDecimal(input, v, exp)); });\r\n         ^\r\nIn file included from external/com_google_absl/absl/strings/internal/str_format/float_conversion.cc:28:\r\nexternal/com_google_absl/absl/functional/function_ref.h:124:16: warning: definition of implicit copy constructor for \u0027FunctionRef\u003cvoid (absl::str_format_internal::(anonymous namespace)::FractionalDigitGenerator)\u003e\u0027 is deprecated because it has a user-declared copy assignment operator [-Wdeprecated-copy]\r\n  FunctionRef\u0026 operator\u003d(const FunctionRef\u0026 rhs) \u003d delete;\r\n               ^\r\nexternal/com_google_absl/absl/strings/internal/str_format/float_conversion.cc:249:34: note: in implicit copy constructor for \u0027absl::FunctionRef\u003cvoid (absl::str_format_internal::(anonymous namespace)::FractionalDigitGenerator)\u003e\u0027 first required here\r\n                                [\u003d](absl::Span\u003cuint32_t\u003e input) {\r\n                                 ^\r\n3 warnings generated.\r\n```"
    },
    {
      "commit": "4bafba51ffd9d418d236adb61de36fda1a90e764",
      "tree": "6e1edfb030798f14304dbf82fb9129c46e551eaa",
      "parents": [
        "e409c0ce41a5d9b93cd6bf64fa3ca0ec15c1e873"
      ],
      "author": {
        "name": "Xinhao Yuan",
        "email": "xinhaoyuan@gmail.com",
        "time": "Thu Sep 30 10:22:35 2021 -0400"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Thu Sep 30 10:22:35 2021 -0400"
      },
      "message": "Check if the non-escaped chars are spaces or printable in \"C\" locale to match libFuzzer\u0027s dictionary parsing. (#178)\n\n"
    },
    {
      "commit": "e409c0ce41a5d9b93cd6bf64fa3ca0ec15c1e873",
      "tree": "2611ed9e1b6c52fb114524f780d21ced1b5fcea1",
      "parents": [
        "b2b3efdcd70d319c6e0e9b687baff3b54e5a5711"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Thu Sep 02 17:43:29 2021 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Thu Sep 02 11:43:29 2021 -0400"
      },
      "message": "Restore and verify GCC compatibility (#177)\n\n* Declare intermediate targets as manual\r\n\r\nMakes it easier to skip targets, such as those using FuzzedDataProvider\r\nwhen using gcc as CC.\r\n\r\n* Restore compatibility with gcc for replay engine\r\n\r\nUsing the weak attribute together with an explicitly undefined symbol\r\nshould still work on macOS, see:\r\nhttps://stackoverflow.com/a/34983229/297261\r\n\r\n* Update Jazzer for gcc compatibility\r\n\r\n* Skip FuzzedDataProvider test with non-clang CC\r\n\r\n* Run regression tests with GCC\r\n\r\n* Run regression tests in CI on macOS\r\n\r\nExcludes the tests in //examples/java, which require further fixes to\r\nfind libjvm.dylib.\r\n\r\n* Make launchers compatible with macOS\r\n\r\nImplements the missing readlink -f command in Python."
    },
    {
      "commit": "b2b3efdcd70d319c6e0e9b687baff3b54e5a5711",
      "tree": "00d9e330b8ca113ca24aaa2f441f071f378d6a39",
      "parents": [
        "9775cd58b85a464e969e8a0734c7ffef28036583"
      ],
      "author": {
        "name": "Stefan Bucur",
        "email": "281483+stefanbucur@users.noreply.github.com",
        "time": "Mon Jul 26 11:02:03 2021 -0400"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Mon Jul 26 11:02:03 2021 -0400"
      },
      "message": "Use correct SHA256 sum (fixes #172) (#173)\n\n"
    },
    {
      "commit": "9775cd58b85a464e969e8a0734c7ffef28036583",
      "tree": "efab82d655205eeae8f150fcc71ce0478c09e0e3",
      "parents": [
        "d717ccff885ca413dc6568d068664fa80b3d3a20"
      ],
      "author": {
        "name": "Xinhao Yuan",
        "email": "xinhaoyuan@gmail.com",
        "time": "Wed Jul 21 10:58:05 2021 -0400"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Wed Jul 21 10:58:05 2021 -0400"
      },
      "message": "Do not add \"--\" when passing args into the engine launcher since other options are passed using environment variables; In engine launchers, append the args to the fuzzer command. (#171)\n\n"
    },
    {
      "commit": "d717ccff885ca413dc6568d068664fa80b3d3a20",
      "tree": "3cd36e2a7c01f33429929c276b15c45cfe54ccc7",
      "parents": [
        "75e5a38573e0704b1374d2942225e8b44ead6a51"
      ],
      "author": {
        "name": "Stefan Bucur",
        "email": "281483+stefanbucur@users.noreply.github.com",
        "time": "Tue Jul 13 13:59:57 2021 -0400"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Tue Jul 13 13:59:57 2021 -0400"
      },
      "message": "Update the package version in the README. (#170)\n\n"
    },
    {
      "commit": "75e5a38573e0704b1374d2942225e8b44ead6a51",
      "tree": "51c0c241a91e453ed786d1960d08f92472670a95",
      "parents": [
        "2548aeae56e911b09b2ea879b94f30ae3a01dc50"
      ],
      "author": {
        "name": "Stefan Bucur",
        "email": "281483+stefanbucur@users.noreply.github.com",
        "time": "Mon Jul 12 11:00:48 2021 -0400"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Mon Jul 12 11:00:48 2021 -0400"
      },
      "message": "Reorganize and update the Java documentation in the README file in a … (#166)\n\n* Reorganize and update the Java documentation in the README file in a single section. This should make it easier for readers to find all the Java-specific information.\r\n\r\n* Fix typo.\r\n\r\n* Remove duplicated entries.\r\n\r\n* Fix the README Java example.\r\n\r\n* Small clarification.\r\n\r\n* Make Java support a bit more prominent.\r\n\r\n* Do not hardcode clang version.\r\n\r\n* Tweaks.\r\n\r\n* Add more context to the WORKSPACE snippet.\r\n\r\n* Fix typo.\r\n\r\n* Update the User Guide with more --config examples."
    },
    {
      "commit": "2548aeae56e911b09b2ea879b94f30ae3a01dc50",
      "tree": "3a7c6068948d259af97ae2188e1c86fa6936797d",
      "parents": [
        "bd484933045d1314121f840b1b29910650803311"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Thu Jul 08 16:17:54 2021 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Thu Jul 08 10:17:54 2021 -0400"
      },
      "message": "Do not link to binary from its own runfiles tree (#161)\n\nThis deviates from the usual Bazel runfiles layout, but is required\r\nsince ClusterFuzz executes fuzz targets in subdirectories and would thus\r\nduplicate every C++ fuzz target."
    },
    {
      "commit": "bd484933045d1314121f840b1b29910650803311",
      "tree": "ec00fabfbe6796c9ac65bd66818e35a919a76cd4",
      "parents": [
        "2a2268c0ca63f402cbe9a6a7ea3577bf035c57db"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Thu Jul 08 16:15:56 2021 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Thu Jul 08 10:15:56 2021 -0400"
      },
      "message": "Simplify Java example names (#159)\n\n"
    },
    {
      "commit": "2a2268c0ca63f402cbe9a6a7ea3577bf035c57db",
      "tree": "3c3858a4badbd5a600b64990ec2e3f24c0191557",
      "parents": [
        "31b9b725e51ad6b33cc3e8f884ef74df0b7e361a"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Thu Jul 08 16:14:26 2021 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Thu Jul 08 10:14:26 2021 -0400"
      },
      "message": "Disable leak instrumentation for Jazzer (#160)\n\nJazzer is based on libFuzzer and hence generally requires the same\r\ninstrumentation for native code. Since it does not support\r\nLeakSanitizer, the corresponding instrumentation can be disabled to\r\nsave some (potentially negligible) runtime cost."
    },
    {
      "commit": "31b9b725e51ad6b33cc3e8f884ef74df0b7e361a",
      "tree": "980e7fb5134e27aec51cf54f05bb796d8b829838",
      "parents": [
        "59109857420065e60e550c500bdc2db97a80ca64"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Thu Jul 08 16:12:59 2021 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Thu Jul 08 10:12:59 2021 -0400"
      },
      "message": "Set RUNFILES_DIR in launcher (#163)\n\nWhile cc_fuzz_test and java_fuzz_test do find their runfiles when\r\nexecuted, this is not strictly guaranteed without an explicitly set\r\nRUNFILES_DIR variable."
    },
    {
      "commit": "59109857420065e60e550c500bdc2db97a80ca64",
      "tree": "f892716424883d3f577c3aa29b6d0a1cf8dd78cc",
      "parents": [
        "1807f4710c3e3e59956cf770e46db96662bcc30f"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Thu Jul 01 15:46:55 2021 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Thu Jul 01 09:46:55 2021 -0400"
      },
      "message": "Use correct `cc_engine_instrumentation` in `jazzer` config (#158)\n\nWhile the `cc_engine_instrumentation` settings `libfuzzer` and `jazzer`\r\nlead to the same instrumentation, this may not remain so indefinitely.\r\nThus the `jazzer` and `asan-jazzer` config in `.bazelrc` should use\r\nthe `jazzer` value for the setting.\r\n\r\nAlso, even when not using a sanitizer via the `jazzer` config, native\r\nlibrary dependencies should be instrumented for fuzzing.\r\n\r\nThis requires updating Jazzer to the latest version as previous versions\r\ndid not correctly export certain sanitizer symbols."
    },
    {
      "commit": "1807f4710c3e3e59956cf770e46db96662bcc30f",
      "tree": "556b810e7397b26f0fe69c3e25240f60f036731a",
      "parents": [
        "82d523ff945ded86efa6336cc582f89d56a563a1"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Thu Jul 01 03:31:18 2021 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Wed Jun 30 21:31:18 2021 -0400"
      },
      "message": "Add OSS-Fuzz support to java_fuzz_test (#157)\n\n* Add OSS-Fuzz support to java_fuzz_test\r\n\r\nThis commit makes the \u003cbasename\u003e_oss_fuzz targets of java_fuzz_test\r\ninstances work in OSS-Fuzz, based on the runfiles support and the\r\nhandling of OSS-Fuzz provided binaries introduced in previous PRs.\r\n\r\nThe following parts of the commit are notable:\r\n* The Jazzer update results in a simplified runfiles structure of the\r\n  driver, which prevents runfile paths clashes.\r\n* Since .options files are discouraged, target-dependant shell scripts\r\n  are used to set the required options for sanitizers.\r\n* The transitive_native_deps attribute of java_fuzz_test is removed in\r\n  favor of an overapproximation of the Java library path, which makes\r\n  the java_fuzz_test easier to use with Bazel 4.\r\n\r\n* Add a CI Fuzz test for Java and native runfiles\r\n\r\n* Address review comments\r\n\r\n* Add comment to bash runfiles lib loading scripts\r\n\r\n* Run CI Fuzz for java_fuzz_tests"
    },
    {
      "commit": "82d523ff945ded86efa6336cc582f89d56a563a1",
      "tree": "0e1c37a7009449bcbd0cb2289a253e312bf86c42",
      "parents": [
        "5d64df89a40c83a87c0865934b700851e809585f"
      ],
      "author": {
        "name": "Xinhao Yuan",
        "email": "xinhaoyuan@gmail.com",
        "time": "Thu Jun 17 18:02:40 2021 -0400"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Thu Jun 17 18:02:40 2021 -0400"
      },
      "message": "Fix bazel_skylib rule and update the documents. (#156)\n\n* Change skylib srcs to deps to include the libraries properly, as srcs are expecting .bzl files, which are not visible to public.\r\n\r\n* Update the documents."
    },
    {
      "commit": "5d64df89a40c83a87c0865934b700851e809585f",
      "tree": "3542dea01b26f3346b3a6eede216e5291c57581a",
      "parents": [
        "e1450e7ebb4746ee4a2d3372192461493581e274"
      ],
      "author": {
        "name": "Xinhao Yuan",
        "email": "xinhaoyuan@gmail.com",
        "time": "Thu Jun 17 15:29:06 2021 -0400"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Thu Jun 17 15:29:06 2021 -0400"
      },
      "message": "Fix linting warnings and add linting checks into the workflow. (#155)\n\n"
    },
    {
      "commit": "e1450e7ebb4746ee4a2d3372192461493581e274",
      "tree": "0927c2b114f7ef62d9c7c803c6afcb49ec14655e",
      "parents": [
        "47c0676fd37484201ad6efcb3bd273dcbda2af2d"
      ],
      "author": {
        "name": "Xinhao Yuan",
        "email": "xinhaoyuan@gmail.com",
        "time": "Wed Jun 16 18:01:25 2021 -0400"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Wed Jun 16 18:01:25 2021 -0400"
      },
      "message": "Expose FuzzingEngineInfo so that external rules can use the information inside. (#154)\n\n"
    },
    {
      "commit": "47c0676fd37484201ad6efcb3bd273dcbda2af2d",
      "tree": "8560bd419072d0e466f6ee2b4fdb61c98c0f4856",
      "parents": [
        "560790456a4ec876fe233990ce90372800902105"
      ],
      "author": {
        "name": "Xinhao Yuan",
        "email": "xinhaoyuan@gmail.com",
        "time": "Wed Jun 16 10:22:10 2021 -0400"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Wed Jun 16 10:22:10 2021 -0400"
      },
      "message": "For LibFuzzer, do not read the output corpus in regression mode. (#153)\n\nFor Honggfuzz, use dry-run-only mode instead of minimize mode for more expected behavior, and enable outputs from the target for easier debugging."
    },
    {
      "commit": "560790456a4ec876fe233990ce90372800902105",
      "tree": "c69aac06a0d3c6d572ee11e885b53ed6467eec38",
      "parents": [
        "ce7b85c762cbb8ff2697b053ae7b7c9e43dd4a99"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Tue Jun 15 03:21:55 2021 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Mon Jun 14 21:21:55 2021 -0400"
      },
      "message": "Account for new OSS-Fuzz Jazzer binary names (#152)\n\nOSS-Fuzz now provides the Jazzer driver with the correct sanitizer in\r\njazzer_driver_with_sanitizer."
    },
    {
      "commit": "ce7b85c762cbb8ff2697b053ae7b7c9e43dd4a99",
      "tree": "76d4adb9151d08265735c528ea5cd551aa2fb819",
      "parents": [
        "8860c7123f2302e9d2d5f3eca9140793bb84bb0f"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Wed Jun 09 16:06:24 2021 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Wed Jun 09 10:06:24 2021 -0400"
      },
      "message": "Use OSS-Fuzz provided top-level files (#151)\n\n* Export provided Jazzer files from @rules_fuzzing_oss_fuzz\r\n\r\nOSS-Fuzz provides current builds of the Jazzer driver and agent, which\r\nshould be used by Java fuzz tests instead of those targets built from\r\nthe pinned rules_fuzzing dependency of Jazzer.\r\n\r\nThis commits exports the files provided in $OUT from the\r\n@rules_fuzzing_oss_fuzz repository.\r\n\r\n* Address review comment"
    },
    {
      "commit": "8860c7123f2302e9d2d5f3eca9140793bb84bb0f",
      "tree": "0862ec0ef06b4fba68baff4108194f155bb40edb",
      "parents": [
        "76d066385e81c059b26dae2407cc9c3581c01144"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Wed Jun 09 06:06:49 2021 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Wed Jun 09 00:06:49 2021 -0400"
      },
      "message": "Add full runfiles tree support (#149)\n\n* Add full runfiles tree support\r\n\r\nThe runfiles tree of a fuzzing_binary is now packaged correctly for\r\nOSS-Fuzz.\r\n\r\nFor a fuzz test foo, the runfiles are resolved relative to the\r\nfoo.runfiles directory in the output .tar and will be found by the Bazel\r\nrunfiles libraries.\r\n\r\nThis commit also adds a fuzz test that crashes if it can\u0027t find its\r\nrunfile.\r\n\r\n* Optional: Add symlink to fuzz test binary to runfiles tree\r\n\r\n* Address review comments"
    },
    {
      "commit": "76d066385e81c059b26dae2407cc9c3581c01144",
      "tree": "e0df4f91b8a9f6eea48859bd84005fc47b6fc00a",
      "parents": [
        "2194c70621120c82e56394d1db814a7ce1d5c34d"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Fri May 28 20:10:49 2021 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Fri May 28 14:10:49 2021 -0400"
      },
      "message": "Add support for .options files to fuzzing_binary (#148)\n\n* Add support for .options files to fuzzing_binary\r\n\r\n.options files can be used to supply custom options to sanitizers. While\r\nthey are rarely used for C++ fuzz targets (and thus not exposed via the\r\ncc_fuzz_test macro for now), they are necessary to run JVM fuzz targets\r\ncorrectly and will be used internally by the java_fuzz_test macro in a\r\nfollow-up commit.\r\n\r\n* Address review comments"
    },
    {
      "commit": "2194c70621120c82e56394d1db814a7ce1d5c34d",
      "tree": "03faeb6954057bd955be0d44071878a4829d1eca",
      "parents": [
        "a8e8945bebf4f2a4618b27f127f9fc7009afacff"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Wed May 26 06:48:40 2021 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Wed May 26 00:48:40 2021 -0400"
      },
      "message": "Filter unused runfiles for Jazzer targets (#147)\n\nThis commit removes the following two types of runfiles declared by the\r\njava_binary target passed into the jazzer_fuzz_binary rule which are not\r\nused during the execution of the Jazzer target:\r\n\r\n* the local JDK files in @local_jdk (Jazzer launches the JVM directly)\r\n* the individual jars on the runtime classpath (Jazzer executes the\r\n  deploy jar, which contains the contents of all these jars)."
    },
    {
      "commit": "a8e8945bebf4f2a4618b27f127f9fc7009afacff",
      "tree": "d6c6105c762859af527134a9e752f753f4f4f60c",
      "parents": [
        "b12a9cb9e27746be63a362d778f2211efe51f1e5"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Wed May 19 03:47:21 2021 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Tue May 18 21:47:21 2021 -0400"
      },
      "message": "Manually include \u003climits\u003e to fix CI failures (#150)\n\n"
    },
    {
      "commit": "b12a9cb9e27746be63a362d778f2211efe51f1e5",
      "tree": "c906794ab8b0d48f238fd9ce24d87b04a9373f56",
      "parents": [
        "3c6883424b831583ed302689a1287f259ceea92e"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "meumertzheim@code-intelligence.com",
        "time": "Tue May 11 23:18:09 2021 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Tue May 11 17:18:09 2021 -0400"
      },
      "message": "Prepare Java release (#145)\n\n* Update Jazzer\r\n\r\n* Add Stardoc for java_def.bzl\r\n\r\n* Add Java section to the README\r\n\r\n* Drop n/a comment from JavaFuzzTest\r\n\r\n* Fix format string\r\n\r\n* Prepend workspace name to label in fuzz_test.bzl\r\n\r\n* Simplify JavaNativeFuzzTest\r\n\r\nThe fuzz test now only contains an OOB read detectable with ASan rather\r\nthan both an OOB read and a segfault. Depending on compiler and\r\nenvironment, the segfault could be triggered first, which made it harder\r\nto determine whether ASan instrumentation had been applied correctly.\r\n\r\n* Address review comments"
    },
    {
      "commit": "3c6883424b831583ed302689a1287f259ceea92e",
      "tree": "bb03284df76e2d31e8f1e7a218420ca08eca3354",
      "parents": [
        "1663d55f8ec88b0c9c629574d7c40a664197225f"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "meumertzheim@code-intelligence.com",
        "time": "Thu May 06 18:16:42 2021 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Thu May 06 12:16:42 2021 -0400"
      },
      "message": "Initial `java_fuzz_test` implementation (#143)\n\n* Initial java_fuzz_test implementation\r\n\r\nAdds a java_fuzz_test macro for Java fuzz tests that can be invoked with\r\nthe Java fuzzer Jazzer.\r\n\r\nMost of the existing code remains unchanged, with the following\r\nexceptions:\r\n\r\n* CcFuzzingBinaryInfo loses its cc prefix as it can also be used for\r\n  other languages without changes.\r\n\r\nA small architectural difference between Jazzer and e.g. libFuzzer fuzz\r\ntargets is that the fuzzer itself is not linked into Java fuzz targets,\r\nbut remains a separate, stand-alone binary (the \"driver\"). The\r\njava_fuzz_test macro deals with this by applying the instrumentation\r\ntransition to native library dependencies directly and creating a\r\nfuzzing_binary_uninstrumented based on a binary shim that launches the\r\ndriver.\r\n\r\n* Address review comments\r\n\r\n* Simplify JNI build\r\n\r\n* Fix nit and docs"
    },
    {
      "commit": "1663d55f8ec88b0c9c629574d7c40a664197225f",
      "tree": "c80ce47665eef8b0a6ffd6524d1fc5f4613a9a9e",
      "parents": [
        "85e62a9732104783f8b89903d98c34f5535bd0e3"
      ],
      "author": {
        "name": "Fabian Meumertzheim",
        "email": "fabian@meumertzhe.im",
        "time": "Mon May 03 17:17:32 2021 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Mon May 03 11:17:32 2021 -0400"
      },
      "message": "Decompose FuzzingEngineInfo into orthogonal providers (#144)\n\n* Decompose FuzzingEngineInfo into orthogonal providers\r\n\r\nBy removing the engine_library_info field of CcFuzzingEngineInfo and\r\nrelying exlusively on the DefaultInfo and language-specific *Info\r\nproviders to propagate the information about the engine library,\r\nCcFuzzingEngineInfo can become almost completely generic in the\r\nlanguage.\r\n\r\nThis commit performs the required refactoring and renames the provider\r\nto FuzzingEngineInfo.\r\n\r\n* Drop Cc prefix of CcFuzzingBinaryInfo\r\n\r\nNow that FuzzingEngineInfo is language-independent, so is the fuzzing\r\nbinary info provider."
    },
    {
      "commit": "85e62a9732104783f8b89903d98c34f5535bd0e3",
      "tree": "be201260ea0eaa0811b6e11b0ce33683c828dc62",
      "parents": [
        "f6dc2e2dcf7761445379c8db4fbbed7802152c6e"
      ],
      "author": {
        "name": "Xinhao Yuan",
        "email": "xinhaoyuan@gmail.com",
        "time": "Thu Apr 29 13:13:16 2021 -0400"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Thu Apr 29 13:13:16 2021 -0400"
      },
      "message": "Sync with what libFuzzer accepts. (#142)\n\n"
    },
    {
      "commit": "f6dc2e2dcf7761445379c8db4fbbed7802152c6e",
      "tree": "e5069d49e2d737ec7702ef8b87104cedafd72318",
      "parents": [
        "53e67a789e5c980ce6369e3475f796def88b941d"
      ],
      "author": {
        "name": "Xinhao Yuan",
        "email": "xinhaoyuan@gmail.com",
        "time": "Thu Apr 15 14:11:43 2021 -0400"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Thu Apr 15 14:11:43 2021 -0400"
      },
      "message": "Improve dict validation (#140)\n\n* Refactor dict validation using regular expression for simplification and improvement.\r\nAfter the change, the validation will:\r\n\r\n - Disallow `\"\\\"`, `\"\"`, and any non-space suffix after the entry ends (e.g. `\"entry\"suffix`).\r\n - Disallow unesacped \u0027\"\u0027 in enties. Raw \u0027\"\u0027 can indeed be used in libFuzzer due to implementation details,\r\n   but it is undocumented (https://llvm.org/docs/LibFuzzer.html#dictionaries), implementation-dependent, and confusing.\r\n\r\n* Fix a bad entry in example dictionaries.\r\n\r\n* Show file paths and line numbers with errors."
    },
    {
      "commit": "53e67a789e5c980ce6369e3475f796def88b941d",
      "tree": "0ae351fab9111664ee6acc563454c167735bddab",
      "parents": [
        "8654b68078f606556e2a4cb05f471df4a1d697a2"
      ],
      "author": {
        "name": "Eugene Kliuchnikov",
        "email": "eustas@google.com",
        "time": "Wed Apr 14 03:15:27 2021 +0200"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Tue Apr 13 21:15:27 2021 -0400"
      },
      "message": "Fix OSX build (#139)\n\n* more portable strerror_r handling (borrowed from abseil)\r\n * adjust honggfuzz build options\r\n * notify linker about weak ref in :replay_main"
    },
    {
      "commit": "8654b68078f606556e2a4cb05f471df4a1d697a2",
      "tree": "78d215de3773720c47275fe444c71ed1484828c1",
      "parents": [
        "3b96e43d6ff683f804d8d08004e62622faa0e966"
      ],
      "author": {
        "name": "Xinhao Yuan",
        "email": "xinhaoyuan@gmail.com",
        "time": "Thu Apr 08 09:57:50 2021 -0400"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Thu Apr 08 09:57:50 2021 -0400"
      },
      "message": "Add an optional flag for listing corpus paths in lines instead of sep… (#137)\n\n* Add an optional flag for listing corpus paths in lines instead of separated by comma. This is to support corpus paths that contain commas.\r\n\r\n* Use the list file flag to support corpus paths with commas."
    },
    {
      "commit": "3b96e43d6ff683f804d8d08004e62622faa0e966",
      "tree": "1499c3b00b85b53d1394ba48d03582c72866ec70",
      "parents": [
        "2277ee4a6758f0a12f766b56513d35f199a73b37"
      ],
      "author": {
        "name": "Stefan Bucur",
        "email": "281483+stefanbucur@users.noreply.github.com",
        "time": "Mon Apr 05 12:13:06 2021 -0400"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Mon Apr 05 12:13:06 2021 -0400"
      },
      "message": "Clarify dependency management in the README.md (#136)\n\n"
    },
    {
      "commit": "2277ee4a6758f0a12f766b56513d35f199a73b37",
      "tree": "99fe6c3b0398c7d37992b4d6df60ff54213e17fd",
      "parents": [
        "152a91892ca25f6f53afab23b863a9009fb759c6"
      ],
      "author": {
        "name": "Stefan Bucur",
        "email": "281483+stefanbucur@users.noreply.github.com",
        "time": "Thu Apr 01 12:38:23 2021 -0400"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Thu Apr 01 12:38:23 2021 -0400"
      },
      "message": "Update the release version mentioned in README.md (#135)\n\n"
    },
    {
      "commit": "152a91892ca25f6f53afab23b863a9009fb759c6",
      "tree": "48a7a073f45fce604a3e7a6b76b361ce0346b731",
      "parents": [
        "fc0e7d437fda6666b9f5f25d1a40ae919cfcecf2"
      ],
      "author": {
        "name": "Stefan Bucur",
        "email": "281483+stefanbucur@users.noreply.github.com",
        "time": "Thu Apr 01 12:10:42 2021 -0400"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Thu Apr 01 12:10:42 2021 -0400"
      },
      "message": "Make sure the staging dir in OSS-Fuzz packaging rule is cleaned up, to permit non-sandboxed runs. (#134)\n\n"
    },
    {
      "commit": "fc0e7d437fda6666b9f5f25d1a40ae919cfcecf2",
      "tree": "6d2c47b5a80b4b31f7064929c2e9f422827ef591",
      "parents": [
        "e611b02d7bb4b44a8b073980793eb15751cfaa4b"
      ],
      "author": {
        "name": "Stefan Bucur",
        "email": "281483+stefanbucur@users.noreply.github.com",
        "time": "Tue Mar 16 09:51:53 2021 -0400"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Tue Mar 16 09:51:53 2021 -0400"
      },
      "message": "Force the linking of the UBSAN runtime in OSS-Fuzz builds. (#130)\n\n* Force the linking of the UBSAN runtime in OSS-Fuzz builds.\r\n\r\n* Fix llvm-config version.\r\n\r\n* Make the code architecture-independent.\r\n\r\n* Bzl formatter fix."
    },
    {
      "commit": "e611b02d7bb4b44a8b073980793eb15751cfaa4b",
      "tree": "6e89a882b38742c8ebae9c74be5b0afb23d2289f",
      "parents": [
        "73db9e7e8d0c288de93061467442b54a2c4fe937"
      ],
      "author": {
        "name": "Xinhao Yuan",
        "email": "xinhaoyuan@gmail.com",
        "time": "Mon Mar 01 14:46:53 2021 -0500"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Mon Mar 01 14:46:53 2021 -0500"
      },
      "message": "Simplify a fuzz test example. (#127)\n\n"
    },
    {
      "commit": "73db9e7e8d0c288de93061467442b54a2c4fe937",
      "tree": "b30f7c8094fcfb0f89540a07c4e3ccb85ecf0457",
      "parents": [
        "7d99f1a150df0292df22e0d849b5ed30940a77c5"
      ],
      "author": {
        "name": "Xinhao Yuan",
        "email": "xinhaoyuan@gmail.com",
        "time": "Mon Mar 01 13:58:20 2021 -0500"
      },
      "committer": {
        "name": "GitHub",
        "email": "noreply@github.com",
        "time": "Mon Mar 01 13:58:20 2021 -0500"
      },
      "message": "Convention fix (#126)\n\n* Refactor `base_name` to `name` according to the Bazel conventions https://docs.bazel.build/versions/master/skylark/macros.html#conventions.\r\n\r\n* Minor typo fix."
    }
  ],
  "next": "7d99f1a150df0292df22e0d849b5ed30940a77c5"
}
