mirror of https://github.com/google/oss-fuzz.git
jackson-databind: Initial integration (#7610)
* Initial integration * Use 2.14 branch
This commit is contained in:
parent
32fd138d10
commit
45d1d61baa
|
@ -0,0 +1,41 @@
|
|||
# Copyright 2022 Google LLC
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
#
|
||||
################################################################################
|
||||
|
||||
FROM gcr.io/oss-fuzz-base/base-builder-jvm
|
||||
|
||||
RUN curl -L https://downloads.apache.org/maven/maven-3/3.6.3/binaries/apache-maven-3.6.3-bin.zip -o maven.zip && \
|
||||
unzip maven.zip -d $SRC/maven && \
|
||||
rm -rf maven.zip
|
||||
|
||||
RUN git clone --depth 1 https://github.com/google/fuzzing && \
|
||||
mv fuzzing/dictionaries/json.dict $SRC/ObjectReaderFuzzer.dict && \
|
||||
rm -rf fuzzing
|
||||
|
||||
RUN git clone --depth 1 https://github.com/dvyukov/go-fuzz-corpus && \
|
||||
zip -q $SRC/ObjectReaderFuzzer_seed_corpus.zip go-fuzz-corpus/json/corpus/* && \
|
||||
rm -rf go-fuzz-corpus
|
||||
|
||||
RUN git clone --depth 1 --branch 2.14 https://github.com/FasterXML/jackson-databind
|
||||
|
||||
ENV MVN $SRC/maven/apache-maven-3.6.3/bin/mvn
|
||||
|
||||
WORKDIR jackson-databind
|
||||
|
||||
RUN git clone --depth 1 https://github.com/FasterXML/jackson-annotations
|
||||
RUN git clone --depth 1 https://github.com/FasterXML/jackson-core
|
||||
|
||||
COPY build.sh $SRC/
|
||||
COPY ObjectReaderFuzzer.java $SRC/
|
|
@ -0,0 +1,48 @@
|
|||
import com.code_intelligence.jazzer.api.FuzzedDataProvider;
|
||||
|
||||
import java.util.*;
|
||||
|
||||
import com.fasterxml.jackson.databind.ObjectMapper;
|
||||
import com.fasterxml.jackson.core.JsonProcessingException;
|
||||
|
||||
public class ObjectReaderFuzzer {
|
||||
public static Class[] classes = { DummyClass.class, Integer.class, String.class, Byte.class, List.class, Map.class,
|
||||
TreeMap.class, BitSet.class, TimeZone.class, Date.class, Calendar.class, Locale.class };
|
||||
|
||||
public static void fuzzerTestOneInput(FuzzedDataProvider data) {
|
||||
ObjectMapper mapper = new ObjectMapper();
|
||||
int idx = data.consumeInt(0, classes.length - 1);
|
||||
|
||||
try {
|
||||
mapper.readValue(data.consumeRemainingAsString(), classes[idx]);
|
||||
} catch (JsonProcessingException e) { }
|
||||
}
|
||||
|
||||
public static class DummyClass {
|
||||
public TreeMap<String, Integer> _treeMap;
|
||||
public List<String> _arrayList;
|
||||
public Set<String> _hashSet;
|
||||
public Map<String, Object> _hashMap;
|
||||
public List<Integer> _asList = Arrays.asList(1, 2, 3);
|
||||
public int[] _intArray;
|
||||
public long[] _longArray;
|
||||
public short[] _shortArray;
|
||||
public float[] _floatArray;
|
||||
public double[] _doubleArray;
|
||||
public byte[] _byteArray;
|
||||
public char[] _charArray;
|
||||
public String[] _stringArray;
|
||||
public BitSet _bitSet;
|
||||
public Date _date;
|
||||
public TimeZone _timeZone;
|
||||
public Calendar _calendar;
|
||||
public Locale _locale;
|
||||
public Integer[] _integerArray;
|
||||
public boolean _boolean;
|
||||
public char _char;
|
||||
public byte _byte;
|
||||
public short _short;
|
||||
public int _int;
|
||||
public float _float;
|
||||
}
|
||||
}
|
|
@ -0,0 +1,69 @@
|
|||
#!/bin/bash -eu
|
||||
# Copyright 2022 Google LLC
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
#
|
||||
################################################################################
|
||||
|
||||
# Move seed corpus and dictionary.
|
||||
mv $SRC/{*.zip,*.dict} $OUT
|
||||
|
||||
# jackson-databind
|
||||
MAVEN_ARGS="-Djavac.src.version=15 -Djavac.target.version=15 -DskipTests"
|
||||
$MVN package $MAVEN_ARGS
|
||||
CURRENT_VERSION=$($MVN org.apache.maven.plugins:maven-help-plugin:3.2.0:evaluate \
|
||||
-Dexpression=project.version -q -DforceStdout)
|
||||
cp "target/jackson-databind-$CURRENT_VERSION.jar" "$OUT/jackson-databind.jar"
|
||||
|
||||
# jackson-core
|
||||
MAVEN_ARGS="-Djavac.src.version=15 -Djavac.target.version=15 -DskipTests"
|
||||
$MVN package $MAVEN_ARGS -f "jackson-core/pom.xml"
|
||||
CURRENT_VERSION=$($MVN org.apache.maven.plugins:maven-help-plugin:3.2.0:evaluate \
|
||||
-Dexpression=project.version -q -DforceStdout -f "jackson-core/pom.xml")
|
||||
cp "jackson-core/target/jackson-core-$CURRENT_VERSION.jar" "$OUT/jackson-core.jar"
|
||||
|
||||
# jackson-annnotations
|
||||
MAVEN_ARGS="-Djavac.src.version=15 -Djavac.target.version=15 -DskipTests"
|
||||
$MVN package $MAVEN_ARGS -f "jackson-annotations/pom.xml"
|
||||
CURRENT_VERSION=$($MVN org.apache.maven.plugins:maven-help-plugin:3.2.0:evaluate \
|
||||
-Dexpression=project.version -q -DforceStdout -f "jackson-annotations/pom.xml")
|
||||
cp "jackson-annotations/target/jackson-annotations-$CURRENT_VERSION.jar" "$OUT/jackson-annotations.jar"
|
||||
|
||||
ALL_JARS="jackson-databind.jar jackson-core.jar jackson-annotations.jar"
|
||||
|
||||
# The classpath at build-time includes the project jars in $OUT as well as the
|
||||
# Jazzer API.
|
||||
BUILD_CLASSPATH=$(echo $ALL_JARS | xargs printf -- "$OUT/%s:"):$JAZZER_API_PATH
|
||||
|
||||
# All .jar and .class files lie in the same directory as the fuzzer at runtime.
|
||||
RUNTIME_CLASSPATH=$(echo $ALL_JARS | xargs printf -- "\$this_dir/%s:"):\$this_dir
|
||||
|
||||
for fuzzer in $(find $SRC -name '*Fuzzer.java'); do
|
||||
fuzzer_basename=$(basename -s .java $fuzzer)
|
||||
javac -cp $BUILD_CLASSPATH $fuzzer
|
||||
cp $SRC/$fuzzer_basename.class $OUT/
|
||||
cp $SRC/$fuzzer_basename\$DummyClass.class $OUT/
|
||||
|
||||
# Create an execution wrapper that executes Jazzer with the correct arguments.
|
||||
echo "#!/bin/sh
|
||||
# LLVMFuzzerTestOneInput for fuzzer detection.
|
||||
this_dir=\$(dirname \"\$0\")
|
||||
LD_LIBRARY_PATH=\"$JVM_LD_LIBRARY_PATH\":\$this_dir \
|
||||
\$this_dir/jazzer_driver --agent_path=\$this_dir/jazzer_agent_deploy.jar \
|
||||
--instrumentation_excludes=com.fasterxml.jackson.core.** \
|
||||
--cp=$RUNTIME_CLASSPATH \
|
||||
--target_class=$fuzzer_basename \
|
||||
--jvm_args=\"-Xmx2048m\" \
|
||||
\$@" > $OUT/$fuzzer_basename
|
||||
chmod u+x $OUT/$fuzzer_basename
|
||||
done
|
|
@ -0,0 +1,13 @@
|
|||
homepage: "https://github.com/FasterXML/jackson-databind"
|
||||
language: jvm
|
||||
primary_contact: "tatu@fasterxml.com"
|
||||
auto_ccs:
|
||||
- "wagner@code-intelligence.com"
|
||||
- "yakdan@code-intelligence.com"
|
||||
- "glendowne@code-intelligence.com"
|
||||
- "patrice.salathe@code-intelligence.com"
|
||||
fuzzing_engines:
|
||||
- libfuzzer
|
||||
sanitizers:
|
||||
- address
|
||||
main_repo: "https://github.com/FasterXML/jackson-databind.git"
|
Loading…
Reference in New Issue