 50f1a4e426
			
		
	
	50f1a4e426
	
	
	
		
			
			It is too noisy and not really useful if the input is random. Signed-off-by: Kazuyoshi Kato <katokazu@amazon.com>
		
			
				
	
	
		
			87 lines
		
	
	
		
			2.2 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			87 lines
		
	
	
		
			2.2 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| //go:build gofuzz
 | |
| // +build gofuzz
 | |
| 
 | |
| /*
 | |
|    Copyright The containerd Authors.
 | |
|    Licensed under the Apache License, Version 2.0 (the "License");
 | |
|    you may not use this file except in compliance with the License.
 | |
|    You may obtain a copy of the License at
 | |
|        http://www.apache.org/licenses/LICENSE-2.0
 | |
|    Unless required by applicable law or agreed to in writing, software
 | |
|    distributed under the License is distributed on an "AS IS" BASIS,
 | |
|    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
|    See the License for the specific language governing permissions and
 | |
|    limitations under the License.
 | |
| */
 | |
| 
 | |
| package fuzz
 | |
| 
 | |
| import (
 | |
| 	"bytes"
 | |
| 	"context"
 | |
| 	"os"
 | |
| 
 | |
| 	fuzz "github.com/AdaLogics/go-fuzz-headers"
 | |
| 	"github.com/sirupsen/logrus"
 | |
| 
 | |
| 	"github.com/containerd/containerd/archive"
 | |
| 	"github.com/containerd/containerd/content/local"
 | |
| 	imageArchive "github.com/containerd/containerd/images/archive"
 | |
| 	"github.com/containerd/containerd/log"
 | |
| )
 | |
| 
 | |
| // FuzzApply implements a fuzzer that applies
 | |
| // a fuzzed tar archive on a directory
 | |
| func FuzzApply(data []byte) int {
 | |
| 	ctx := context.Background()
 | |
| 
 | |
| 	// Apply() is logging the below message, which is too noisy and not really useful
 | |
| 	// if the input is random.
 | |
| 	//
 | |
| 	// level=warning msg="ignored xattr ... in archive" error="operation not supported"
 | |
| 	log.G(ctx).Logger.SetLevel(logrus.PanicLevel)
 | |
| 
 | |
| 	f := fuzz.NewConsumer(data)
 | |
| 	iters, err := f.GetInt()
 | |
| 	if err != nil {
 | |
| 		return 0
 | |
| 	}
 | |
| 	maxIters := 20
 | |
| 	tmpDir, err := os.MkdirTemp("", "prefix-test")
 | |
| 	if err != nil {
 | |
| 		return 0
 | |
| 	}
 | |
| 	defer os.RemoveAll(tmpDir)
 | |
| 	for i := 0; i < iters%maxIters; i++ {
 | |
| 		rBytes, err := f.TarBytes()
 | |
| 		if err != nil {
 | |
| 			return 0
 | |
| 		}
 | |
| 		r := bytes.NewReader(rBytes)
 | |
| 		_, _ = archive.Apply(ctx, tmpDir, r)
 | |
| 	}
 | |
| 	return 1
 | |
| }
 | |
| 
 | |
| // FuzzImportIndex implements a fuzzer
 | |
| // that targets archive.ImportIndex()
 | |
| func FuzzImportIndex(data []byte) int {
 | |
| 	f := fuzz.NewConsumer(data)
 | |
| 	tarBytes, err := f.TarBytes()
 | |
| 	if err != nil {
 | |
| 		return 0
 | |
| 	}
 | |
| 	ctx := context.Background()
 | |
| 	r := bytes.NewReader(tarBytes)
 | |
| 	tmpdir, err := os.MkdirTemp("", "fuzzing-")
 | |
| 	if err != nil {
 | |
| 		return 0
 | |
| 	}
 | |
| 	cs, err := local.NewStore(tmpdir)
 | |
| 	if err != nil {
 | |
| 		return 0
 | |
| 	}
 | |
| 	_, _ = imageArchive.ImportIndex(ctx, cs, r)
 | |
| 	return 1
 | |
| }
 |