mirror of https://github.com/google/oss-fuzz.git
[spring-retry] initial integration (#8567)
This commit is contained in:
parent
97c3caf63b
commit
5056aa972a
|
@ -0,0 +1,27 @@
|
|||
# Copyright 2022 Google LLC
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
#
|
||||
################################################################################
|
||||
|
||||
FROM gcr.io/oss-fuzz-base/base-builder-jvm
|
||||
|
||||
RUN apt update && apt install -y openjdk-17-jdk
|
||||
|
||||
RUN git clone --depth 1 https://github.com/google/fuzzing
|
||||
|
||||
RUN git clone https://github.com/spring-projects/spring-retry.git && git -C ./spring-retry checkout v1.3.3
|
||||
|
||||
COPY build.sh $SRC/
|
||||
COPY PatternMatcher_match_Fuzzer.java $SRC/
|
||||
WORKDIR $SRC/spring-retry
|
|
@ -0,0 +1,44 @@
|
|||
// Copyright 2022 Google LLC
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
//
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
import com.code_intelligence.jazzer.api.FuzzedDataProvider;
|
||||
import com.code_intelligence.jazzer.api.FuzzerSecurityIssueHigh;
|
||||
import com.code_intelligence.jazzer.api.FuzzerSecurityIssueMedium;
|
||||
|
||||
import org.springframework.classify.PatternMatcher;
|
||||
|
||||
import java.util.*;
|
||||
import java.lang.*;
|
||||
|
||||
public class PatternMatcher_match_Fuzzer {
|
||||
public static void fuzzerTestOneInput(FuzzedDataProvider data) {
|
||||
if (data.remainingBytes() < 2)
|
||||
return;
|
||||
|
||||
String pattern = data.consumeString(data.consumeInt(0, 1000));
|
||||
String str = data.consumeString(data.consumeInt(0, 1000));
|
||||
|
||||
// Fill the hash map with things
|
||||
Map<String, Integer> map = new HashMap<String, Integer>();
|
||||
while (data.remainingBytes() > 0) {
|
||||
String key = data.consumeString(data.consumeInt(0, 1000));
|
||||
Integer val = data.consumeInt(0, 255);
|
||||
map.putIfAbsent(key, val);
|
||||
}
|
||||
|
||||
PatternMatcher pm = new PatternMatcher(map);
|
||||
pm.match(pattern, str);
|
||||
}
|
||||
}
|
|
@ -0,0 +1,67 @@
|
|||
#!/bin/bash -eu
|
||||
# Copyright 2022 Google LLC
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
#
|
||||
################################################################################
|
||||
MVNW=./mvnw
|
||||
|
||||
sed -i "s/<java.version>1.6<\/java.version>/<java.version>1.7<\/java.version>/g" pom.xml
|
||||
|
||||
export JAVA_HOME="$OUT/open-jdk-17"
|
||||
mkdir -p $JAVA_HOME
|
||||
rsync -aL --exclude=*.zip "/usr/lib/jvm/java-17-openjdk-amd64/" "$JAVA_HOME"
|
||||
|
||||
JVM_LD_LIBRARY_PATH="${JAVA_HOME}/lib/server"
|
||||
|
||||
# Build the target jar.
|
||||
CURRENT_VERSION=$(${MVNW} org.apache.maven.plugins:maven-help-plugin:3.2.0:evaluate \
|
||||
-Dexpression=project.version -q -DforceStdout)
|
||||
${MVNW} package org.apache.maven.plugins:maven-shade-plugin:3.2.4:shade -Dmaven.test.skip=true
|
||||
cp "target/spring-retry-$CURRENT_VERSION.jar" $OUT/spring-retry.jar
|
||||
|
||||
# The jar files containing the project (separated by spaces).
|
||||
PROJECT_JARS=spring-retry.jar
|
||||
|
||||
# Get the fuzzer dependencies (gson).
|
||||
${MVNW} dependency:copy -Dartifact=com.google.code.gson:gson:2.8.6 -DoutputDirectory=$OUT/
|
||||
|
||||
# The jar files containing further dependencies of the fuzz targets (separated
|
||||
# by spaces).
|
||||
FUZZER_JARS=gson-2.8.6.jar
|
||||
|
||||
# Build fuzzers in $OUT.
|
||||
ALL_JARS="$PROJECT_JARS $FUZZER_JARS"
|
||||
BUILD_CLASSPATH=$(echo $ALL_JARS | xargs printf -- "$OUT/%s:"):$JAZZER_API_PATH
|
||||
|
||||
# All jars and class files lie in the same directory as the fuzzer at runtime.
|
||||
RUNTIME_CLASSPATH=$(echo $ALL_JARS | xargs printf -- "\$this_dir/%s:"):.:\$this_dir
|
||||
|
||||
for fuzzer in $(find $SRC -name '*Fuzzer.java'); do
|
||||
fuzzer_basename=$(basename -s .java $fuzzer)
|
||||
javac -cp $BUILD_CLASSPATH $fuzzer
|
||||
cp $SRC/$fuzzer_basename.class $OUT/
|
||||
|
||||
# Create execution wrapper.
|
||||
echo "#!/bin/sh
|
||||
# LLVMFuzzerTestOneInput for fuzzer detection.
|
||||
this_dir=\$(dirname \"\$0\")
|
||||
JAVA_HOME=\"\$this_dir/open-jdk-17/\" \
|
||||
LD_LIBRARY_PATH=\"$JVM_LD_LIBRARY_PATH\":\$this_dir \
|
||||
\$this_dir/jazzer_driver --agent_path=\$this_dir/jazzer_agent_deploy.jar \
|
||||
--cp=$RUNTIME_CLASSPATH \
|
||||
--target_class=$fuzzer_basename \
|
||||
--jvm_args=\"-Xmx2048m\" \
|
||||
\$@" > $OUT/$fuzzer_basename
|
||||
chmod +x $OUT/$fuzzer_basename
|
||||
done
|
|
@ -0,0 +1,16 @@
|
|||
homepage: "https://ci.spring.io/teams/spring-retry/pipelines/spring-retry-2.0.x"
|
||||
language: jvm
|
||||
main_repo: "https://github.com/spring-projects/spring-retry.git"
|
||||
primary_contact: ""
|
||||
fuzzing_engines:
|
||||
- libfuzzer
|
||||
sanitizers:
|
||||
- address
|
||||
vendor_ccs:
|
||||
- "wagner@code-intelligence.com"
|
||||
- "yakdan@code-intelligence.com"
|
||||
- "glendowne@code-intelligence.com"
|
||||
- "patrice.salathe@code-intelligence.com"
|
||||
- "hlin@code-intelligence.com"
|
||||
- "jacek.trossen@code-intelligence.com"
|
||||
- "peter.samarin@code-intelligence.com"
|
Loading…
Reference in New Issue