Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fuzzing message and metadata packages #100

Closed
wants to merge 3 commits into from
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 2 additions & 0 deletions .fleece.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
fleece-dir: fleece
repo-root: .
14 changes: 14 additions & 0 deletions fleece/docker/go-fuzz.dockerfile
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
FROM golang:1.14-alpine

# Install deps and useful things
RUN apk add build-base pkgconfig bash vim git

# Install go-fuzz
RUN GO111MODULE=off go get -u github.com/dvyukov/go-fuzz/go-fuzz github.com/dvyukov/go-fuzz/go-fuzz-build
WORKDIR /tmp/fuzzing

# NB: for use with docker-compose
COPY ./go-fuzz.sh /go-fuzz.sh
RUN chmod 755 /go-fuzz.sh

CMD bash
60 changes: 60 additions & 0 deletions fleece/docker/go-fuzz.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,60 @@
#! /usr/bin/env bash
set -e

# TODO: replace this shell script
# $1 - fuzzer package
# $2 - name of the fuzzer function (will be used for the `workdir` argument to `go-fuzz`).
# `--build` - (optional) builds fuzzer package before being run.
# Additional args following `--` are passed directly to `go-fuzz`.

if [[ $# -lt 2 ]]; then
echo "usage: entrypoint.sh <fuzzer package path> <fuzzer func name> [-b|--build] [-- [go-fuzz arg[, ...]]]"
fi

snake_case() {
echo $1 | sed 's,/,_,g'
}

pkg=$1
shift
name=$1
shift
# TODO: this hack breaks support for global --config flag
workdir=$(cat .fleece.yaml |grep fleece-dir|sed -E 's,.+:\s(.+),\1,')/workdirs/${name}
bin=$(snake_case "${pkg:2}")-fuzz.zip
bin_path=${workdir}/${bin}

has_built=false
build() {
mkdir -p "${workdir}"
go-fuzz-build -o "${bin_path}" "${pkg}"
echo "build done"
}

while [[ $# -gt 0 ]]; do
case $1 in
-b | --build)
echo "Building fuzz binary..."
build
has_built=true
shift
;;
--)
shift
rest_args=$@
break
;;
*)
shift
;;
esac
done

if [[ $has_built == "false" && ! -e $bin_path ]]; then
echo "Fuzz binary not found; building..."
build
fi

rest_args=$@

go-fuzz -bin="${bin_path}" -func="${name}" -workdir="${workdir}" $rest_args
1 change: 1 addition & 0 deletions fleece/workdirs/.gitignore
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
*.zip
Empty file added fleece/workdirs/.gitkeep
Empty file.
66 changes: 66 additions & 0 deletions message/message_fuzz.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,66 @@
//+build gofuzz

package message

import (
"bytes"
"fmt"
"reflect"

gofuzz "github.com/google/gofuzz"
fleece "github.com/leastauthority/fleece/fuzzing"
)

func FuzzFromNetToNet(data []byte) int {
buf1 := bytes.NewBuffer(data)
msg1, err := FromNet(buf1)
if err != nil {
return fleece.FuzzNormal
}

buf2 := new(bytes.Buffer)
if err := msg1.ToNet(buf2); err != nil {
//return fleece.FuzzNormal
panic(fmt.Errorf("unable to serialize message: %w", err))
}

msg2, err := FromNet(buf2)
if err != nil {
panic(fmt.Errorf("unable to deserialize message: %w", err))
}

if !reflect.DeepEqual(msg1, msg2) {
panic("deserialized messages are not deeply equal!")
}
return fleece.FuzzInteresting
}

func FuzzFromNetToNetStructural(data []byte) int {
msg1 := New()
f := gofuzz.NewFromGoFuzz(data).NilChance(0).NumElements(3, 20)
f.Fuzz(&msg1)

buf1 := bytes.NewBuffer(data)
if err := msg1.ToNet(buf1); err != nil {
return fleece.FuzzNormal
}

msg2, err := FromNet(buf1)
if err != nil {
panic(fmt.Errorf("unable to deserialize message: %w", err))
}

buf2 := new(bytes.Buffer)
if err := msg2.ToNet(buf2); err != nil {
panic(fmt.Errorf("unable to serialize message: %w", err))
}

if !reflect.DeepEqual(msg1, msg2) {
panic("deserialized messages are not deeply equal!")
}

if bytes.Equal(buf1.Bytes(), buf2.Bytes()) {
panic("serialized messages are not equal!")
}
return fleece.FuzzInteresting
}
63 changes: 63 additions & 0 deletions message/message_fuzz_test.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,63 @@
//+build gofuzz

package message

import (
"flag"
"os"
"testing"

fleece "github.com/leastauthority/fleece/fuzzing"
"github.com/stretchr/testify/require"
)

var (
crashLimit int
fleeceDir string
skipPattern string
skipPatternDelimiter string
safe, verbose bool

env *fleece.Env
filters []fleece.IterFilter
)

func init() {
flag.IntVar(&crashLimit, "crash-limit", 1000, "number of crashing inputs to test before stopping")
flag.StringVar(&fleeceDir, "fleece-dir", "fleece", "path to fleece dir relative to repo/module root")
flag.StringVar(&skipPattern, "skip", "", "if provided, crashers with recorded outputs which match the pattern will be skipped")
flag.StringVar(&skipPatternDelimiter, "skip-delimiter", "", "delimiter used to split skip pattern")
flag.BoolVar(&safe, "safe", true, "\"if true, skips crashers with recorded outputs that timed-out or ran out of memory\"")
flag.BoolVar(&verbose, "verbose", false, "if true, logs each skip")
}

func TestMain(m *testing.M) {
flag.Parse()
env = fleece.NewEnv(fleeceDir)

skipFilter := fleece.SkipFilter(skipPattern, skipPatternDelimiter, verbose)
filters = []fleece.IterFilter{skipFilter}
if safe {
filters = append(filters,
fleece.SkipTimedOut,
fleece.SkipOutOfMemory)
}

os.Exit(m.Run())
}

func TestFuzzFromNetToNet(t *testing.T) {
_, panics, _ := fleece.
MustNewCrasherIterator(env, FuzzFromNetToNet, filters...).
TestFailingLimit(t, crashLimit)

require.Zero(t, panics)
}

func TestFuzzFromNetToNetStructural(t *testing.T) {
_, panics, _ := fleece.
MustNewCrasherIterator(env, FuzzFromNetToNetStructural, filters...).
TestFailingLimit(t, crashLimit)

require.Zero(t, panics)
}
43 changes: 43 additions & 0 deletions metadata/metadata_fuzz.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,43 @@
//+build gofuzz

package metadata

import (
"bytes"
"fmt"
fleece "github.com/leastauthority/fleece/fuzzing"
"reflect"
)

// FuzzDecodeMetadata fuzzes the decode metadata function
func FuzzDecodeEncodeMetadata(data []byte) int {
metadata1, err := DecodeMetadata(data)
if err != nil {
return fleece.FuzzNormal
}

data1, err := EncodeMetadata(metadata1)
if err != nil {
panic(fmt.Errorf("unable to encode metadata: %w", err))
}

metadata2, err := DecodeMetadata(data1)
if err != nil {
panic(fmt.Errorf("unable to decode metadata: %w", err))
}

data2, err := EncodeMetadata(metadata2)
if err != nil {
panic(fmt.Errorf("unable to re-encode metadata: %w", err))
}

if !reflect.DeepEqual(metadata1, metadata2) {
panic("deserialized metadata are not deeply equal!")
}

if bytes.Equal(data1, data2) {
panic("serialized metadata are not deeply equal!")
}
return fleece.FuzzInteresting
}

55 changes: 55 additions & 0 deletions metadata/metadata_fuzz_test.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,55 @@
//+build gofuzz

package metadata

import (
"flag"
"os"
"testing"

fleece "github.com/leastauthority/fleece/fuzzing"
"github.com/stretchr/testify/require"
)

var (
crashLimit int
fleeceDir string
skipPattern string
skipPatternDelimiter string
safe, verbose bool

env *fleece.Env
filters []fleece.IterFilter
)

func init() {
flag.IntVar(&crashLimit, "crash-limit", 1000, "number of crashing inputs to test before stopping")
flag.StringVar(&fleeceDir, "fleece-dir", "fleece", "path to fleece dir relative to repo/module root")
flag.StringVar(&skipPattern, "skip", "", "if provided, crashers with recorded outputs which match the pattern will be skipped")
flag.StringVar(&skipPatternDelimiter, "skip-delimiter", "", "delimiter used to split skip pattern")
flag.BoolVar(&safe, "safe", true, "\"if true, skips crashers with recorded outputs that timed-out or ran out of memory\"")
flag.BoolVar(&verbose, "verbose", false, "if true, logs each skip")
}

func TestMain(m *testing.M) {
flag.Parse()
env = fleece.NewEnv(fleeceDir)

skipFilter := fleece.SkipFilter(skipPattern, skipPatternDelimiter, verbose)
filters = []fleece.IterFilter{skipFilter}
if safe {
filters = append(filters,
fleece.SkipTimedOut,
fleece.SkipOutOfMemory)
}

os.Exit(m.Run())
}

func TestFuzzDecodeEncodeMetadata(t *testing.T) {
_, panics, _ := fleece.
MustNewCrasherIterator(env, FuzzDecodeEncodeMetadata, filters...).
TestFailingLimit(t, crashLimit)

require.Zero(t, panics)
}