Fuzzing: Add two more fuzzers
Signed-off-by: AdamKorcz <adam@adalogics.com>
This commit is contained in:
parent
7d4891783a
commit
41a04246f4
@ -24,6 +24,8 @@ import (
|
||||
fuzz "github.com/AdaLogics/go-fuzz-headers"
|
||||
|
||||
"github.com/containerd/containerd/archive"
|
||||
"github.com/containerd/containerd/content/local"
|
||||
imageArchive "github.com/containerd/containerd/images/archive"
|
||||
)
|
||||
|
||||
// FuzzApply implements a fuzzer that applies
|
||||
@ -50,3 +52,25 @@ func FuzzApply(data []byte) int {
|
||||
}
|
||||
return 1
|
||||
}
|
||||
|
||||
// FuzzImportIndex implements a fuzzer
|
||||
// that targets archive.ImportIndex()
|
||||
func FuzzImportIndex(data []byte) int {
|
||||
f := fuzz.NewConsumer(data)
|
||||
tarBytes, err := f.TarBytes()
|
||||
if err != nil {
|
||||
return 0
|
||||
}
|
||||
ctx := context.Background()
|
||||
r := bytes.NewReader(tarBytes)
|
||||
tmpdir, err := ioutil.TempDir("", "fuzzing-")
|
||||
if err != nil {
|
||||
return 0
|
||||
}
|
||||
cs, err := local.NewStore(tmpdir)
|
||||
if err != nil {
|
||||
return 0
|
||||
}
|
||||
_, _ = imageArchive.ImportIndex(ctx, cs, r)
|
||||
return 1
|
||||
}
|
||||
|
138
contrib/fuzz/content_fuzzer.go
Normal file
138
contrib/fuzz/content_fuzzer.go
Normal file
@ -0,0 +1,138 @@
|
||||
// +build gofuzz
|
||||
|
||||
/*
|
||||
Copyright The containerd Authors.
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
// nolint: golint
|
||||
package fuzz
|
||||
|
||||
import (
|
||||
"bytes"
|
||||
"context"
|
||||
_ "crypto/sha256" // required by go-digest
|
||||
"fmt"
|
||||
"io/ioutil"
|
||||
"os"
|
||||
"path/filepath"
|
||||
"reflect"
|
||||
|
||||
fuzz "github.com/AdaLogics/go-fuzz-headers"
|
||||
digest "github.com/opencontainers/go-digest"
|
||||
ocispec "github.com/opencontainers/image-spec/specs-go/v1"
|
||||
|
||||
"github.com/containerd/containerd/content"
|
||||
"github.com/containerd/containerd/content/local"
|
||||
)
|
||||
|
||||
// checkBlobPath performs some basic validation
|
||||
func checkBlobPath(dgst digest.Digest, root string) error {
|
||||
if err := dgst.Validate(); err != nil {
|
||||
return err
|
||||
}
|
||||
path := filepath.Join(root, "blobs", dgst.Algorithm().String(), dgst.Hex())
|
||||
_, err := os.Stat(path)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
// generateBlobs is a helper function to create random blobs
|
||||
func generateBlobs(f *fuzz.ConsumeFuzzer) (map[digest.Digest][]byte, error) {
|
||||
blobs := map[digest.Digest][]byte{}
|
||||
blobQty, err := f.GetInt()
|
||||
if err != nil {
|
||||
return blobs, err
|
||||
}
|
||||
maxsize := 4096
|
||||
nblobs := blobQty % maxsize
|
||||
|
||||
for i := 0; i < nblobs; i++ {
|
||||
digestBytes, err := f.GetBytes()
|
||||
if err != nil {
|
||||
return blobs, err
|
||||
}
|
||||
|
||||
dgst := digest.FromBytes(digestBytes)
|
||||
blobs[dgst] = digestBytes
|
||||
}
|
||||
|
||||
return blobs, nil
|
||||
}
|
||||
|
||||
// checkwrite is a wrapper around content.WriteBlob()
|
||||
func checkWrite(ctx context.Context, cs content.Store, dgst digest.Digest, p []byte) (digest.Digest, error) {
|
||||
if err := content.WriteBlob(ctx, cs, dgst.String(), bytes.NewReader(p),
|
||||
ocispec.Descriptor{Size: int64(len(p)), Digest: dgst}); err != nil {
|
||||
return dgst, err
|
||||
}
|
||||
return dgst, nil
|
||||
}
|
||||
|
||||
// populateBlobStore creates a bunch of blobs
|
||||
func populateBlobStore(ctx context.Context, cs content.Store, f *fuzz.ConsumeFuzzer) (map[digest.Digest][]byte, error) {
|
||||
blobs, err := generateBlobs(f)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
for dgst, p := range blobs {
|
||||
d, err := checkWrite(ctx, cs, dgst, p)
|
||||
_ = d
|
||||
if err != nil {
|
||||
return blobs, err
|
||||
}
|
||||
}
|
||||
return blobs, nil
|
||||
}
|
||||
|
||||
// FuzzCSWalk implements a fuzzer that targets contentStore.Walk()
|
||||
func FuzzCSWalk(data []byte) int {
|
||||
ctx := context.Background()
|
||||
expected := map[digest.Digest]struct{}{}
|
||||
found := map[digest.Digest]struct{}{}
|
||||
tmpdir, err := ioutil.TempDir("", "fuzzing-")
|
||||
if err != nil {
|
||||
return 0
|
||||
}
|
||||
cs, err := local.NewStore(tmpdir)
|
||||
if err != nil {
|
||||
return 0
|
||||
}
|
||||
|
||||
f := fuzz.NewConsumer(data)
|
||||
blobs, err := populateBlobStore(ctx, cs, f)
|
||||
_ = blobs
|
||||
if err != nil {
|
||||
return 0
|
||||
}
|
||||
|
||||
for dgst := range blobs {
|
||||
expected[dgst] = struct{}{}
|
||||
}
|
||||
|
||||
if err := cs.Walk(ctx, func(bi content.Info) error {
|
||||
found[bi.Digest] = struct{}{}
|
||||
err = checkBlobPath(bi.Digest, tmpdir)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
return nil
|
||||
}); err != nil {
|
||||
return 0
|
||||
}
|
||||
if !reflect.DeepEqual(expected, found) {
|
||||
panic(fmt.Sprintf("%v != %v but should be equal", found, expected))
|
||||
}
|
||||
return 1
|
||||
}
|
@ -14,6 +14,11 @@
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
|
||||
set -o nounset
|
||||
set -o pipefail
|
||||
set -o errexit
|
||||
set -x
|
||||
|
||||
cd "$(dirname "${BASH_SOURCE[0]}")"
|
||||
cd ../../
|
||||
|
||||
@ -26,7 +31,8 @@ compile_go_fuzzer github.com/containerd/containerd/remotes/docker FuzzFetcher fu
|
||||
compile_go_fuzzer github.com/containerd/containerd/contrib/fuzz FuzzFiltersParse fuzz_filters_parse
|
||||
compile_go_fuzzer github.com/containerd/containerd/contrib/fuzz FuzzPlatformsParse fuzz_platforms_parse
|
||||
compile_go_fuzzer github.com/containerd/containerd/contrib/fuzz FuzzApply fuzz_apply
|
||||
|
||||
compile_go_fuzzer github.com/containerd/containerd/contrib/fuzz FuzzImportIndex fuzz_import_index
|
||||
compile_go_fuzzer github.com/containerd/containerd/contrib/fuzz FuzzCSWalk fuzz_cs_walk
|
||||
|
||||
# FuzzCreateContainer requires more setup than the fuzzers above.
|
||||
# We need the binaries from "make".
|
||||
|
Loading…
Reference in New Issue
Block a user