commit
fda782a7b9
77
contrib/fuzz/containerd_import_fuzzer.go
Normal file
77
contrib/fuzz/containerd_import_fuzzer.go
Normal file
@ -0,0 +1,77 @@
|
|||||||
|
// +build gofuzz
|
||||||
|
|
||||||
|
/*
|
||||||
|
Copyright The containerd Authors.
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package fuzz
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"context"
|
||||||
|
|
||||||
|
fuzz "github.com/AdaLogics/go-fuzz-headers"
|
||||||
|
|
||||||
|
"github.com/containerd/containerd"
|
||||||
|
_ "github.com/containerd/containerd/cmd/containerd"
|
||||||
|
"github.com/containerd/containerd/cmd/containerd/command"
|
||||||
|
"github.com/containerd/containerd/namespaces"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
defaultRoot = "/var/lib/containerd"
|
||||||
|
defaultState = "/tmp/containerd"
|
||||||
|
defaultAddress = "/tmp/containerd/containerd.sock"
|
||||||
|
)
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
args := []string{"--log-level", "debug"}
|
||||||
|
go func() {
|
||||||
|
// This is similar to invoking the
|
||||||
|
// containerd binary.
|
||||||
|
// See contrib/fuzz/oss_fuzz_build.sh
|
||||||
|
// for more info.
|
||||||
|
command.StartDaemonForFuzzing(args)
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
|
||||||
|
func fuzzContext() (context.Context, context.CancelFunc) {
|
||||||
|
ctx, cancel := context.WithCancel(context.Background())
|
||||||
|
ctx = namespaces.WithNamespace(ctx, "fuzzing-namespace")
|
||||||
|
return ctx, cancel
|
||||||
|
}
|
||||||
|
|
||||||
|
func FuzzContainerdImport(data []byte) int {
|
||||||
|
client, err := containerd.New(defaultAddress)
|
||||||
|
if err != nil {
|
||||||
|
return 0
|
||||||
|
}
|
||||||
|
defer client.Close()
|
||||||
|
|
||||||
|
f := fuzz.NewConsumer(data)
|
||||||
|
|
||||||
|
noOfImports, err := f.GetInt()
|
||||||
|
if err != nil {
|
||||||
|
return 0
|
||||||
|
}
|
||||||
|
maxImports := 20
|
||||||
|
ctx, cancel := fuzzContext()
|
||||||
|
defer cancel()
|
||||||
|
for i := 0; i < noOfImports%maxImports; i++ {
|
||||||
|
tarBytes, err := f.GetBytes()
|
||||||
|
if err != nil {
|
||||||
|
return 0
|
||||||
|
}
|
||||||
|
_, _ = client.Import(ctx, bytes.NewReader(tarBytes))
|
||||||
|
}
|
||||||
|
return 1
|
||||||
|
}
|
@ -27,6 +27,30 @@ mv contrib/fuzz/docker_fuzzer.go remotes/docker/
|
|||||||
mv contrib/fuzz/container_fuzzer.go integration/client/
|
mv contrib/fuzz/container_fuzzer.go integration/client/
|
||||||
|
|
||||||
|
|
||||||
|
# Change path of socket since OSS-fuzz does not grant access to /run
|
||||||
|
sed -i 's/\/run\/containerd/\/tmp\/containerd/g' $SRC/containerd/defaults/defaults_unix.go
|
||||||
|
|
||||||
|
# To build FuzzContainer2 we need to prepare a few things:
|
||||||
|
# We change the name of the cmd/containerd package
|
||||||
|
# so that we can import it.
|
||||||
|
# We furthermore add an exported function that is similar
|
||||||
|
# to cmd/containerd.main and call that instead of calling
|
||||||
|
# the containerd binary.
|
||||||
|
#
|
||||||
|
# In the fuzzer we import cmd/containerd as a low-maintenance
|
||||||
|
# way of initializing all the plugins.
|
||||||
|
# Make backup of cmd/containerd:
|
||||||
|
cp -r $SRC/containerd/cmd/containerd $SRC/cmd-containerd-backup
|
||||||
|
# Rename package:
|
||||||
|
find $SRC/containerd/cmd/containerd -type f -exec sed -i 's/package main/package mainfuzz/g' {} \;
|
||||||
|
# Add an exported function
|
||||||
|
sed -i -e '$afunc StartDaemonForFuzzing(arguments []string) {\n\tapp := App()\n\t_ = app.Run(arguments)\n}' $SRC/containerd/cmd/containerd/command/main.go
|
||||||
|
# Build fuzzer:
|
||||||
|
compile_go_fuzzer github.com/containerd/containerd/contrib/fuzz FuzzContainerdImport fuzz_containerd_import
|
||||||
|
# Reinstante backup of cmd/containerd:
|
||||||
|
mv $SRC/cmd-containerd-backup $SRC/containerd/cmd/containerd
|
||||||
|
|
||||||
|
# Compile more fuzzers
|
||||||
compile_go_fuzzer github.com/containerd/containerd/remotes/docker FuzzFetcher fuzz_fetcher
|
compile_go_fuzzer github.com/containerd/containerd/remotes/docker FuzzFetcher fuzz_fetcher
|
||||||
compile_go_fuzzer github.com/containerd/containerd/remotes/docker FuzzParseDockerRef fuzz_parse_docker_ref
|
compile_go_fuzzer github.com/containerd/containerd/remotes/docker FuzzParseDockerRef fuzz_parse_docker_ref
|
||||||
compile_go_fuzzer github.com/containerd/containerd/contrib/fuzz FuzzFiltersParse fuzz_filters_parse
|
compile_go_fuzzer github.com/containerd/containerd/contrib/fuzz FuzzFiltersParse fuzz_filters_parse
|
||||||
@ -38,7 +62,7 @@ compile_go_fuzzer github.com/containerd/containerd/contrib/fuzz FuzzArchiveExpor
|
|||||||
compile_go_fuzzer github.com/containerd/containerd/contrib/fuzz FuzzParseAuth fuzz_parse_auth
|
compile_go_fuzzer github.com/containerd/containerd/contrib/fuzz FuzzParseAuth fuzz_parse_auth
|
||||||
compile_go_fuzzer github.com/containerd/containerd/contrib/fuzz FuzzParseProcPIDStatus fuzz_parse_proc_pid_status
|
compile_go_fuzzer github.com/containerd/containerd/contrib/fuzz FuzzParseProcPIDStatus fuzz_parse_proc_pid_status
|
||||||
|
|
||||||
# FuzzCreateContainer requires more setup than the fuzzers above.
|
# The below fuzzers require more setup than the fuzzers above.
|
||||||
# We need the binaries from "make".
|
# We need the binaries from "make".
|
||||||
wget -c https://github.com/protocolbuffers/protobuf/releases/download/v3.11.4/protoc-3.11.4-linux-x86_64.zip
|
wget -c https://github.com/protocolbuffers/protobuf/releases/download/v3.11.4/protoc-3.11.4-linux-x86_64.zip
|
||||||
unzip protoc-3.11.4-linux-x86_64.zip -d /usr/local
|
unzip protoc-3.11.4-linux-x86_64.zip -d /usr/local
|
||||||
|
Loading…
Reference in New Issue
Block a user