Fuzz introspector
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues

Fuzzer details

Fuzzer: fuzz_entries

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 65 80.2%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 16 19.7%
All colors 81 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
34 42 ...fuzz_entries.TestInput call site: 00042 google.protobuf.json_format._Printer._FieldToJsonObject
22 8 google.cloud.logging_v2.entries.logger_name_from_path call site: 00008 google.cloud.logging_v2.entries.logger_name_from_path
6 33 ...fuzz_entries.TestInput call site: 00033 google.cloud._helpers._datetime_to_rfc3339
1 31 ...fuzz_entries.TestInput call site: 00031 .super
1 40 ...fuzz_entries.TestInput call site: 00040 .super
1 78 ...fuzz_entries.TestInput call site: 00078 protobuf_entry.to_api_repr

Runtime coverage analysis

Covered functions
424
Functions that are reachable but not covered
44
Reachable functions
50
Percentage of reachable functions covered
12.0%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_entries 16
google.cloud.logging_v2.entries 8
google.cloud._helpers 7
google.protobuf.json_format 19
google.protobuf.internal.type_checkers 3

Fuzzer: fuzz_helpers

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 15 55.5%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 12 44.4%
All colors 27 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
6 16 google.cloud.logging_v2.handlers._helpers._parse_trace_parent call site: 00016 google.cloud.logging_v2.handlers._helpers._parse_xcloud_trace
5 0 EP call site: 00000 google.cloud.logging_v2._helpers._normalize_severity
2 6 google.cloud.logging_v2._helpers._normalize_severity call site: 00006 google.cloud.logging_v2._helpers._add_defaults_to_filter
2 12 google.cloud.logging_v2._helpers._add_defaults_to_filter call site: 00012 google.cloud.logging_v2.handlers._helpers._parse_trace_parent

Runtime coverage analysis

Covered functions
423
Functions that are reachable but not covered
14
Reachable functions
18
Percentage of reachable functions covered
22.22%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_helpers 8
google.cloud.logging_v2._helpers 5
google.cloud.logging_v2.handlers._helpers 4

Fuzzer: fuzz_handlers

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 37 50.0%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 37 50.0%
All colors 74 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
6 13 google.cloud.logging_v2.handlers.structured_log.StructuredLogHandler.__init__ call site: 00013 google.cloud.logging_v2.handlers.structured_log.StructuredLogHandler.format
5 0 EP call site: 00000 google.cloud.logging_v2.handlers.handlers.CloudLoggingFilter._infer_source_location
5 36 google.cloud.logging_v2.handlers.structured_log.StructuredLogHandler.format call site: 00036 google.cloud.logging_v2.handlers.handlers.setup_logging
5 54 google.cloud.logging_v2.handlers._monitored_resources.detect_resource call site: 00054 google.cloud.logging_v2.handlers._monitored_resources._create_functions_resource
5 68 google.cloud.logging_v2.handlers._monitored_resources.detect_resource call site: 00068 logger.handlers.clear
3 45 google.cloud.logging_v2.handlers._monitored_resources.detect_resource call site: 00045 google.cloud.logging_v2.handlers._monitored_resources._create_app_engine_resource
3 60 google.cloud.logging_v2.handlers._monitored_resources.detect_resource call site: 00060 google.cloud.logging_v2.handlers._monitored_resources._create_cloud_run_resource
2 7 google.cloud.logging_v2.handlers.handlers.CloudLoggingFilter._infer_source_location call site: 00007 google.cloud.logging_v2.handlers.structured_log.StructuredLogHandler.__init__
1 23 google.cloud.logging_v2.handlers.handlers._format_and_parse_message call site: 00023 .isinstance
1 29 google.cloud.logging_v2.handlers.handlers._format_and_parse_message call site: 00029 passed_json_fields.copy
1 42 google.cloud.logging_v2.handlers._monitored_resources.detect_resource call site: 00042 requests.get

Runtime coverage analysis

Covered functions
423
Functions that are reachable but not covered
29
Reachable functions
40
Percentage of reachable functions covered
27.5%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_handlers 10
google.cloud.logging_v2.handlers.handlers 13
google.cloud.logging_v2.handlers.structured_log 10
google.cloud.logging_v2.handlers._monitored_resources 9
google.cloud.logging_v2._helpers 1

Fuzzer: fuzz_resources

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 15 38.4%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 24 61.5%
All colors 39 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
5 24 google.cloud.logging_v2.handlers._monitored_resources.detect_resource call site: 00024 google.cloud.logging_v2.handlers._monitored_resources._create_functions_resource
3 15 google.cloud.logging_v2.handlers._monitored_resources.detect_resource call site: 00015 google.cloud.logging_v2.handlers._monitored_resources._create_app_engine_resource
3 30 google.cloud.logging_v2.handlers._monitored_resources.detect_resource call site: 00030 google.cloud.logging_v2.handlers._monitored_resources._create_cloud_run_resource
2 0 EP call site: 00000 mock.mock.patch
1 10 mock.mock._patch.__init__ call site: 00010 google.cloud.logging_v2.handlers._monitored_resources.detect_resource
1 12 google.cloud.logging_v2.handlers._monitored_resources.detect_resource call site: 00012 requests.get

Runtime coverage analysis

Covered functions
485
Functions that are reachable but not covered
12
Reachable functions
21
Percentage of reachable functions covered
42.86%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_resources 3
mock.mock 7
google.cloud.logging_v2.handlers._monitored_resources 9
google.cloud.logging_v2._helpers 1

Analyses and suggestions

Optimal target analysis

Remaining optimal interesting functions

The following table shows a list of functions that are optimal targets. Optimal targets are identified by finding the functions that in combination, yield a high code coverage.

Func name Functions filename Arg count Args Function depth hitcount instr count bb count cyclomatic complexity Reachable functions Incoming references total cyclomatic complexity Unreached complexity
google.protobuf.text_format._Parser._MergeField google.protobuf.text_format 3 ['N/A', 'N/A', 'N/A'] 5 0 18 23 12 215 9 724 682
google.oauth2._id_token_async.fetch_id_token google.oauth2._id_token_async 2 ['N/A', 'N/A'] 12 0 4 4 5 172 0 555 513
google.api_core.operations_v1.transports.rest.OperationsRestTransport._list_operations google.api_core.operations_v1.transports.rest 5 ['N/A', 'N/A', 'N/A', 'N/A', 'N/A'] 5 0 3 2 4 92 0 323 197
google.auth._default._get_explicit_environ_credentials google.auth._default 1 ['N/A'] 4 0 3 2 4 97 1 307 188
mock.mock._patch.__enter__ mock.mock 1 ['N/A'] 3 0 5 38 18 60 1 221 179
google.protobuf.text_format._Printer.PrintFieldValue google.protobuf.text_format 3 ['N/A', 'N/A', 'N/A'] 6 0 14 12 8 194 14 653 148
google.api_core.operations_v1.transports.rest.OperationsRestTransport.__init__ google.api_core.operations_v1.transports.rest 12 ['N/A', 'N/A', 'N/A', 'N/A', 'N/A', 'N/A', 'N/A', 'N/A', 'N/A', 'N/A', 'N/A', 'N/A'] 4 0 4 2 4 52 0 168 129

Implementing fuzzers that target the above functions will improve reachability such that it becomes:

Functions statically reachable by fuzzers
17.3%
666/3839
Cyclomatic complexity statically reachable by fuzzers
18.2%
2243 / 12262

All functions overview

If you implement fuzzers for these functions, the status of all functions in the project will be:

Func name Functions filename Args Function call depth Reached by Fuzzers Fuzzers runtime hit Func lines hit % I Count BB Count Cyclomatic complexity Functions reached Reached by functions Accumulated cyclomatic complexity Undiscovered complexity

Runtime coverage analysis

This section shows analysis of runtime coverage data.

For futher technical details on how this section is generated, please see the Glossary .

Complex functions with low coverage

Func name Function total lines Lines covered at runtime percentage covered Reached by fuzzers
google.cloud.logging_v2.entries.LogEntry.from_api_repr 35 0 0.0% []
re.search 37 13 35.13% []
collections.abc.MutableMapping.get 185 52 28.10% []
google.protobuf.json_format._Printer._RegularMessageToJsonObject 41 0 0.0% ['fuzz_entries']
google.protobuf.json_format._Printer._FieldToJsonObject 33 0 0.0% ['fuzz_entries']
google.protobuf.json_format._Parser._ConvertFieldValuePair 71 0 0.0% []
google.protobuf.json_format._ConvertScalarFieldValue 32 0 0.0% []
google.protobuf.descriptor_pool.DescriptorPool._ConvertFileProtoToFileDescriptor 37 0 0.0% []
google.protobuf.descriptor_pool.DescriptorPool._ConvertMessageDescriptor 31 0 0.0% []
google.protobuf.descriptor_pool.DescriptorPool._SetFieldType 47 0 0.0% []
google.protobuf.internal.api_implementation._CanImport 43 21 48.83% []
os.remove 42 22 52.38% []
name.rstrip 72 12 16.66% []
google.protobuf.descriptor_pb2 215 13 6.046% []
google.protobuf.descriptor.MakeDescriptor 44 0 0.0% []
m.groupdict 39 7 17.94% []
google.protobuf.internal.decoder.EnumDecoder.DecodeField 31 13 41.93% []
google.protobuf.internal.decoder.MessageSetItemDecoder.DecodeItem 39 0 0.0% []
struct.unpack 63 22 34.92% []
google.protobuf.internal.well_known_types.Timestamp.FromJsonString 38 0 0.0% []
google.rpc.context.attribute_context_pb2 74 38 51.35% []
google.api_core.path_template.transcode 34 0 0.0% []
six.moves.urllib.parse.urljoin 521 281 53.93% []
urllib3.response.MultiDecoder 429 86 20.04% []
url.find 206 54 26.21% []
key.split 258 76 29.45% []
connection.close 231 70 30.30% []
d.get 189 25 13.22% []
api.Authenticate 195 14 7.179% []
google.api_core.operations_v1.abstract_operations_client.AbstractOperationsClient.__init__ 35 0 0.0% []
google.protobuf.wrappers_pb2 31 11 35.48% []
channel.unary_unary 828 169 20.41% []
urllib3.util.ssl_.create_urllib3_context 192 46 23.95% []
mock.mock._patch.__enter__ 101 36 35.64% []
mock.mock._Call.__eq__ 38 1 2.631% []
mock.mock.create_autospec 69 0 0.0% []
e.with_traceback 37 13 35.13% []
name.replace 72 12 16.66% []
m._mock_children.get 39 7 17.94% []

Files and Directories in report

This section shows which files and directories are considered in this report. The main reason for showing this is fuzz introspector may include more code in the reasoning than is desired. This section helps identify if too many files/directories are included, e.g. third party code, which may be irrelevant for the threat model. In the event too much is included, fuzz introspector supports a configuration file that can exclude data from the report. See the following link for more information on how to create a config file: link

Files in report

Source file Reached by Covered by
[] []
google.api_core.general_helpers [] []
google.protobuf.compiler [] []
google.cloud._testing [] []
google.type.quaternion_pb2 [] []
google.cloud.appengine_logging.gapic_version [] []
google.cloud.logging_v2.types.logging_metrics [] []
google.iam.v1.options_pb2_grpc [] []
google.api_core.client_options [] []
google.auth.crypt.rsa [] []
google.cloud.logging_v2.handlers.middleware [] []
google.protobuf.internal.builder [] []
mock.backports [] []
io [] []
google.longrunning.operations_grpc [] []
google.auth.api_key [] []
google.api_core.operations_v1.operations_client [] []
google.type.localized_text_pb2 [] []
google.iam.v1 [] []
getpass [] []
google.api.logging_pb2 [] []
sys [] []
google.auth.transport.requests [] []
posixpath [] []
distutils [] []
google.protobuf.util [] []
weakref [] []
google.protobuf.json_format ['fuzz_entries'] []
google.protobuf.empty_pb2 [] []
google.api_core.client_info [] []
google.auth.exceptions [] []
google.cloud.extended_operations_pb2 [] []
google.protobuf.message [] []
google.cloud.logging_v2.services.logging_service_v2.transports [] []
google.api_core.page_iterator_async [] []
google.cloud.logging_v2.services.config_service_v2.transports.base [] []
google.api_core.future._helpers [] []
google.cloud.logging_v2.handlers.transports [] []
google.cloud.logging_v2.types [] []
google.auth._jwt_async [] []
google.auth.credentials [] []
google.auth.transport [] []
google.protobuf.internal._parameterized [] []
google.api.label_pb2 [] []
google.rpc.context.audit_context_pb2 [] []
platform [] []
typing [] []
google.oauth2.challenges [] []
OpenSSL [] []
google.api.backend_pb2 [] []
google.type.timeofday_pb2 [] []
google.protobuf.internal.encoder [] []
mock.mock ['fuzz_resources'] []
google.rpc [] []
google.auth.transport.mtls [] []
google.type.datetime_pb2 [] []
google.api.auth_pb2 [] []
google.cloud.version [] []
google.api_core.timeout [] []
google.protobuf.internal.testing_refleaks [] []
google.cloud.logging_v2.services.metrics_service_v2.transports.grpc [] []
google.api.monitoring_pb2 [] []
google.protobuf.field_mask_pb2 [] []
google.cloud.location.locations_pb2 [] []
google.api_core.exceptions [] []
google.api_core.future.base [] []
google.protobuf.any_pb2 [] []
google.iam.v1.iam_policy_pb2_grpc [] []
google.auth.crypt._helpers [] []
google.type.color_pb2 [] []
google.protobuf.duration_pb2 [] []
google.auth._default_async [] []
google.auth.crypt [] []
cryptography [] []
google.api.consumer_pb2 [] []
google.auth.transport.grpc [] []
google.protobuf.symbol_database [] []
google.cloud.logging_v2.types.logging_config [] []
operator [] []
google.cloud.logging_v2.services.logging_service_v2.async_client [] []
google.api_core.gapic_v1.method_async [] []
google.api_core.rest_streaming [] []
mock [] []
google.cloud.logging_v2.metric [] []
google.protobuf.pyext.cpp_message [] []
google.protobuf.internal.field_mask [] []
collections [] []
flask [] []
google.type.calendar_period_pb2 [] []
grpc [] []
google.gapic.metadata.gapic_metadata_pb2 [] []
google.api.error_reason_pb2 [] []
google.cloud.logging_v2.gapic_version [] []
google.protobuf.descriptor_database [] []
google.auth.jwt [] []
google.rpc.context [] []
os [] []
google.cloud.logging_v2._instrumentation [] []
google.api_core.gapic_v1.method [] []
google.api_core.operations_v1.operations_client_config [] []
google.auth.external_account_authorized_user [] []
google.cloud.logging_v2.logger [] []
google.type.fraction_pb2 [] []
google.rpc.code_pb2 [] []
google.protobuf.internal.api_implementation [] []
google.cloud.exceptions [] []
google.cloud.operation [] []
google.protobuf.internal.message_listener [] []
google.protobuf.timestamp_pb2 [] []
google.iam.v1.policy_pb2 [] []
google.logging.type.log_severity_pb2 [] []
google.longrunning.operations_proto_pb2 [] []
google.api.documentation_pb2 [] []
google.auth.transport._aiohttp_requests [] []
inspect [] []
google.cloud.logging_v2.services.logging_service_v2.transports.grpc_asyncio [] []
google.api.httpbody_pb2 [] []
google.oauth2.service_account [] []
google.longrunning.operations_grpc_pb2 [] []
pkg_resources [] []
rsa [] []
google.cloud.logging_v2 [] []
atheris [] []
google.auth._helpers [] []
copyreg [] []
time [] []
google.cloud.logging_v2.services.config_service_v2 [] []
hmac [] []
google.protobuf.internal.containers [] []
google.protobuf.type_pb2 [] []
google.auth.crypt.es256 [] []
google.protobuf.unknown_fields [] []
google.api_core.version [] []
google.cloud.logging_v2.services.config_service_v2.transports [] []
google.cloud.logging_v2.handlers.middleware.request [] []
google.api.usage_pb2 [] []
calendar [] []
google.cloud.logging_v2.services.metrics_service_v2.transports.grpc_asyncio [] []
google.type.money_pb2 [] []
google.protobuf.internal.well_known_types [] []
google.auth.iam [] []
google.api_core.operations_v1.pagers [] []
google.cloud.appengine_logging_v1.services [] []
google.type.latlng_pb2 [] []
google.api_core.gapic_v1.client_info [] []
google.auth.transport._http_client [] []
tempfile [] []
google.cloud.appengine_logging_v1 [] []
google.cloud.logging_v2.services.config_service_v2.pagers [] []
google.rpc.context.attribute_context_pb2 [] []
google.iam.v1.policy_pb2_grpc [] []
google.api_core.operations_v1.transports [] []
google.auth.identity_pool [] []
google.auth._exponential_backoff [] []
google.iam.v1.logging [] []
proto [] []
google.api_core.datetime_helpers [] []
google.cloud.logging_v2.resource [] []
google._upb._message [] []
google.cloud.logging_v2.types.log_entry [] []
google.cloud.logging_v2.services.config_service_v2.async_client [] []
google.type.expr_pb2 [] []
google.oauth2._client [] []
google.api.context_pb2 [] []
google.protobuf.internal.python_message [] []
google.auth._service_account_info [] []
google.cloud.logging_v2.services.logging_service_v2.client [] []
google.api.visibility_pb2 [] []
google.longrunning.operations_pb2_grpc [] []
google.type.interval_pb2 [] []
google.cloud.logging_v2._http [] []
google.api_core.path_template [] []
google.protobuf.pyext [] []
google.api.client_pb2 [] []
google.cloud.logging_v2.services [] []
google.cloud.logging_v2.handlers.container_engine [] []
google.protobuf.descriptor_pb2 [] []
google.api_core.operation_async [] []
google.cloud.logging_v2._gapic [] []
google.cloud.logging_v2.services.logging_service_v2.pagers [] []
google.api.service_pb2 [] []
google.api_core.iam [] []
uuid [] []
google.cloud.client [] []
google.cloud.logging_v2.entries ['fuzz_entries'] []
google.iam.v1.options_pb2 [] []
google.api_core.operations_v1.abstract_operations_client [] []
google.api.log_pb2 [] []
google.type.decimal_pb2 [] []
google.auth.compute_engine.credentials [] []
google.cloud._helpers ['fuzz_entries'] []
google.logging.type [] []
google.cloud.logging_v2.handlers._helpers ['fuzz_helpers'] []
google.api.field_behavior_pb2 [] []
google.oauth2._credentials_async [] []
cffi [] []
google.api_core.gapic_v1.routing_header [] []
google.oauth2._service_account_async [] []
google.type.dayofweek_pb2 [] []
google.auth.downscoped [] []
google.oauth2.sts [] []
google.auth._credentials_async [] []
google.gapic.metadata [] []
google.protobuf.internal.type_checkers ['fuzz_entries'] []
pprint [] []
...fuzz_entries ['fuzz_entries'] []
google.protobuf.descriptor_pool [] []
subprocess [] []
google.oauth2.reauth [] []
google.oauth2.gdch_credentials [] []
google.logging.type.http_request_pb2 [] []
google.auth [] []
google.api.metric_pb2 [] []
google.protobuf.service_reflection [] []
google.auth.version [] []
google.cloud.audit [] []
cachetools [] []
google.auth.transport.urllib3 [] []
google.auth.app_engine [] []
google.api_core.future.async_future [] []
google.cloud.logging_v2.services.config_service_v2.transports.grpc [] []
google.cloud.logging_v2.services.metrics_service_v2.transports.base [] []
google.cloud.logging_v2.handlers.transports.background_thread [] []
google.api_core.operations_v1.transports.base [] []
google.auth.crypt.base [] []
google.api_core.grpc_helpers_async [] []
google.protobuf.api_pb2 [] []
google.auth.crypt._python_rsa [] []
google.api_core.grpc_helpers [] []
google.api_core.gapic_v1 [] []
google.oauth2 [] []
google.protobuf.service [] []
logging [] []
grpc_status [] []
google.auth.compute_engine._metadata [] []
google.protobuf.compiler.plugin_pb2 [] []
google.auth.compute_engine [] []
google.longrunning [] []
google.protobuf.proto_builder [] []
math [] []
google.api.billing_pb2 [] []
aiohttp [] []
google.auth.crypt._cryptography_rsa [] []
google.api_core.future.polling [] []
google.api.endpoint_pb2 [] []
google.api.distribution_pb2 [] []
google.protobuf.wrappers_pb2 [] []
functools [] []
google.longrunning.operations_pb2 [] []
datetime [] []
google.api.quota_pb2 [] []
...fuzz_resources ['fuzz_resources'] []
six [] []
google.cloud.logging.handlers [] []
copy [] []
google.cloud.logging_v2.sink [] []
google.rpc.http_pb2 [] []
google.cloud.logging_v2.services.config_service_v2.client [] []
random [] []
threading [] []
shutil [] []
google.oauth2.id_token [] []
grpc_gcp [] []
binascii [] []
google.api_core.operations_v1.transports.rest [] []
google.type.month_pb2 [] []
google.auth._oauth2client [] []
google.cloud.logging_v2._helpers ['fuzz_helpers', 'fuzz_handlers', 'fuzz_resources'] []
importlib [] []
google.oauth2._id_token_async [] []
google.cloud.logging_v2.client [] []
hashlib [] []
google.protobuf.internal.extension_dict [] []
google.cloud.logging.handlers.middleware [] []
google.auth.transport._mtls_helper [] []
google.longrunning.operations_proto [] []
google.protobuf.internal.decoder [] []
gc [] []
google.auth.transport._custom_tls_signer [] []
...fuzz_handlers ['fuzz_handlers'] []
contextlib [] []
requests [] []
google.cloud._http [] []
google.cloud.logging_v2.types.logging [] []
google.auth.environment_vars [] []
google.api_core.operations_v1.operations_async_client [] []
google.type.postal_address_pb2 [] []
google.protobuf.message_factory [] []
google.api_core.retry_async [] []
google.protobuf.descriptor [] []
re [] []
google.cloud.logging_v2.services.logging_service_v2.transports.base [] []
google.cloud.logging_v2.handlers.handlers ['fuzz_handlers'] []
google.cloud.logging_v2.services.logging_service_v2 [] []
google.cloud.logging_v2.services.metrics_service_v2.client [] []
google.cloud.logging_v2.services.metrics_service_v2.pagers [] []
google.api.annotations_pb2 [] []
google.protobuf [] []
google.cloud.logging.gapic_version [] []
google.cloud.logging_v2.services.metrics_service_v2.transports [] []
json [] []
google.api.control_pb2 [] []
google.api.monitored_resource_pb2 [] []
base64 [] []
google.cloud.appengine_logging_v1.types [] []
google.oauth2.utils [] []
atexit [] []
google.auth.aws [] []
google.iam.v1.logging.audit_data_pb2 [] []
google.cloud.logging [] []
google.cloud.logging_v2.services.logging_service_v2.transports.grpc [] []
google.api_core.operation [] []
google.cloud.logging_v2.handlers.transports.base [] []
asyncio [] []
google.api.http_pb2 [] []
google.protobuf.internal.wire_format [] []
...fuzz_helpers ['fuzz_helpers'] []
google.auth._cloud_sdk [] []
[] []
struct [] []
google.api_core.gapic_v1.config_async [] []
google.api_core.page_iterator [] []
google.api.launch_stage_pb2 [] []
google.api_core.extended_operation [] []
google.protobuf.struct_pb2 [] []
unittest [] []
google.cloud.obsolete [] []
pyasn1 [] []
google.api_core.rest_helpers [] []
google.api_core.bidi [] []
google.cloud.logging_v2.handlers.structured_log ['fuzz_handlers'] []
google.api.resource_pb2 [] []
google.protobuf.internal [] []
google.cloud.environment_vars [] []
certifi [] []
google.oauth2._client_async [] []
google.api.source_info_pb2 [] []
google.auth.external_account [] []
google.api_core.future [] []
queue [] []
google.api.config_change_pb2 [] []
warnings [] []
google.auth.impersonated_credentials [] []
google.api.system_parameter_pb2 [] []
google.oauth2.credentials [] []
google.protobuf.text_encoding [] []
google.type.phone_number_pb2 [] []
google.cloud.logging_v2.services.config_service_v2.transports.grpc_asyncio [] []
google.oauth2._reauth_async [] []
google.type [] []
pyasn1_modules [] []
google.api_core.gapic_v1.config [] []
google.cloud.logging_v2.services.metrics_service_v2 [] []
google.type.date_pb2 [] []
google [] []
google.protobuf.text_format [] []
google.cloud.logging_v2.handlers.app_engine [] []
google.protobuf.internal.enum_type_wrapper [] []
google.cloud.appengine_logging_v1.types.request_log [] []
ctypes [] []
google.cloud.logging_v2.handlers [] []
google.rpc.status_pb2 [] []
google.cloud.appengine_logging [] []
google.rpc.error_details_pb2 [] []
google.api_core.operations_v1 [] []
google.protobuf.source_context_pb2 [] []
google.api [] []
google.cloud.logging_v2.handlers.transports.sync [] []
urllib [] []
google.iam.v1.iam_policy_pb2 [] []
google.protobuf.reflection [] []
google.cloud.logging.handlers.transports [] []
google.cloud.logging_v2.services.metrics_service_v2.async_client [] []
urllib3 [] []
pkgutil [] []
google.api_core [] []
google.auth._default [] []
google.api.routing_pb2 [] []
google.cloud.audit.audit_log_pb2 [] []
google.api_core.protobuf_helpers [] []
google.cloud.logging_v2.handlers._monitored_resources ['fuzz_handlers', 'fuzz_resources'] []
google.auth.pluggable [] []
google.api_core.retry [] []

Directories in report

Directory