opencsv: Initial integration (#10069)

Initial integration of opencsv into OSS-Fuzz.
This commit is contained in:
Henry Lin 2023-04-14 14:05:45 +02:00 committed by GitHub
parent 987055edc8
commit baab3431e0
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
7 changed files with 300 additions and 0 deletions

4
projects/opencsv/.gitignore vendored Normal file
View File

@ -0,0 +1,4 @@
project-parent/opencsv
project-parent/fuzz-targets/target
project-parent/fuzz-targets/src/test/resources
project-parent/fuzz-targets/pom.xml.versionsBackup

View File

@ -0,0 +1,41 @@
# Copyright 2023 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
################################################################################
FROM gcr.io/oss-fuzz-base/base-builder-jvm
RUN curl -L https://archive.apache.org/dist/maven/maven-3/3.6.3/binaries/apache-maven-3.6.3-bin.zip -o maven.zip && \
unzip maven.zip -d $SRC/maven && \
rm -rf maven.zip
ENV MVN $SRC/maven/apache-maven-3.6.3/bin/mvn
RUN git clone --depth 1 https://github.com/google/fuzzing && \
cp fuzzing/dictionaries/csv.dict $SRC/CSVReaderFuzzer.dict && \
rm -rf fuzzing
RUN git clone --depth 1 https://github.com/dvyukov/go-fuzz-corpus && \
zip -j $SRC/CSVReaderFuzzer_seed_corpus.zip go-fuzz-corpus/csv/corpus/* && \
rm -rf go-fuzz-corpus
# if not set python infra helper cannot be used for local testing
COPY project-parent $SRC/project-parent/
RUN rm -rf $SRC/project-parent/opencsv
RUN git clone --depth 1 https://git.code.sf.net/p/opencsv/source/ $SRC/project-parent/opencsv
COPY build.sh $SRC/
WORKDIR $SRC/

82
projects/opencsv/build.sh Executable file
View File

@ -0,0 +1,82 @@
#!/bin/bash -eu
# Copyright 2023 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
################################################################################
PROJECT=opencsv
PROJECT_GROUP_ID=com.opencsv
PROJECT_ARTIFACT_ID=opencsv
MAIN_REPOSITORY=https://git.code.sf.net/p/opencsv/source/
MAVEN_ARGS="-Djavac.src.version=15 -Djavac.target.version=15 -Denforcer.skip=true -DskipTests -Dgpg.skip"
function set_project_version_in_fuzz_targets_dependency {
PROJECT_VERSION=$(cd $PROJECT && $MVN org.apache.maven.plugins:maven-help-plugin:3.2.0:evaluate -Dexpression=project.version -q -DforceStdout)
# set dependency project version in fuzz-targets
(cd fuzz-targets && $MVN versions:use-dep-version -Dincludes=$PROJECT_GROUP_ID:$PROJECT_ARTIFACT_ID -DdepVersion=$PROJECT_VERSION -DforceVersion=true)
}
cd project-parent
# LOCAL_DEV env variable need to be set in local development env
if [[ -v LOCAL_DEV ]]; then
MVN=mvn
# checkout latest project version
git -C $PROJECT pull || git clone $MAIN_REPOSITORY $PROJECT
set_project_version_in_fuzz_targets_dependency
#install
(cd $PROJECT && $MVN install $MAVEN_ARGS)
mvn -pl fuzz-targets install
else
# Move seed corpus and dictionary.
mv $SRC/{*.zip,*.dict} $OUT
set_project_version_in_fuzz_targets_dependency
#install
(cd $PROJECT && $MVN install $MAVEN_ARGS -Dmaven.repo.local=$OUT/m2)
$MVN -pl fuzz-targets install -Dmaven.repo.local=$OUT/m2
# build classpath
$MVN -pl fuzz-targets dependency:build-classpath -Dmdep.outputFile=cp.txt -Dmaven.repo.local=$OUT/m2
cp -r $SRC/project-parent/fuzz-targets/target/test-classes/ $OUT/
RUNTIME_CLASSPATH_ABSOLUTE="$(cat fuzz-targets/cp.txt):$OUT/test-classes"
RUNTIME_CLASSPATH=$(echo $RUNTIME_CLASSPATH_ABSOLUTE | sed "s|$OUT|\$this_dir|g")
for fuzzer in $(find $SRC/project-parent -name '*Fuzzer.java'); do
fuzzer_basename=$(basename -s .java $fuzzer)
# Create an execution wrapper for every fuzztarget
echo "#!/bin/bash
# LLVMFuzzerTestOneInput comment for fuzzer detection by infrastructure.
this_dir=\$(dirname \"\$0\")
if [[ \"\$@\" =~ (^| )-runs=[0-9]+($| ) ]]; then
mem_settings='-Xmx1900m -Xss900k'
else
mem_settings='-Xmx2048m -Xss1024k'
fi
java -cp $RUNTIME_CLASSPATH \
\$mem_settings \
com.code_intelligence.jazzer.Jazzer \
--target_class=com.example.$fuzzer_basename \
--disabled_hooks=com.code_intelligence.jazzer.sanitizers.RegexInjection \
\$@" > $OUT/$fuzzer_basename
chmod u+x $OUT/$fuzzer_basename
done
fi

View File

@ -0,0 +1,61 @@
<?xml version="1.0" encoding="UTF-8"?>
<project xmlns="http://maven.apache.org/POM/4.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 https://maven.apache.org/xsd/maven-4.0.0.xsd">
<modelVersion>4.0.0</modelVersion>
<groupId>com.fuzzer</groupId>
<artifactId>fuzz-targets</artifactId>
<version>0.0.1-SNAPSHOT</version>
<name>fuzz</name>
<description>fuzz</description>
<properties>
<java.version>15</java.version>
<maven.compiler.source>15</maven.compiler.source>
<maven.compiler.target>15</maven.compiler.target>
</properties>
<dependencies>
<dependency>
<groupId>com.code-intelligence</groupId>
<artifactId>jazzer-junit</artifactId>
<version>0.15.0</version>
</dependency>
<dependency>
<groupId>org.junit.jupiter</groupId>
<artifactId>junit-jupiter-engine</artifactId>
<version>5.9.0</version>
<scope>test</scope>
</dependency>
<dependency>
<groupId>org.junit.platform</groupId>
<artifactId>junit-platform-launcher</artifactId>
<version>1.9.2</version>
</dependency>
<dependency>
<groupId>com.opencsv</groupId>
<artifactId>opencsv</artifactId>
<version>Fuzzing-SNAPSHOT</version>
</dependency>
</dependencies>
<build>
<plugins>
<plugin>
<artifactId>maven-surefire-plugin</artifactId>
<version>2.22.2</version>
</plugin>
</plugins>
<testResources>
<testResource>
<directory>${project.basedir}/src/test/resources</directory>
</testResource>
</testResources>
</build>
</project>

View File

@ -0,0 +1,82 @@
// Copyright 2023 Google LLC
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
////////////////////////////////////////////////////////////////////////////////
package com.example;
import com.code_intelligence.jazzer.api.FuzzedDataProvider;
import com.code_intelligence.jazzer.junit.FuzzTest;
import com.opencsv.*;
import com.opencsv.enums.CSVReaderNullFieldIndicator;
import com.opencsv.exceptions.CsvException;
import com.opencsv.exceptions.CsvMultilineLimitBrokenException;
import com.opencsv.exceptions.CsvValidationException;
import org.apache.commons.lang3.StringUtils;
import org.junit.jupiter.api.*;
import java.io.FileReader;
import java.io.IOException;
import java.io.StringReader;
import java.util.Locale;
import java.util.regex.PatternSyntaxException;
class CSVReaderFuzzer {
static CSVParser csvParser;
static Locale systemLocale;
@BeforeAll
static void storeSystemLocale() {
systemLocale = Locale.getDefault();
}
@FuzzTest
void myFuzzTest(FuzzedDataProvider data) {
try {
Locale.setDefault(data.pickValue(Locale.getAvailableLocales()));
csvParser = new CSVParser();
ICSVParser parser = new CSVParserBuilder()
.withEscapeChar(data.consumeChar())
.withFieldAsNull(data.pickValue(CSVReaderNullFieldIndicator.values()))
.withIgnoreLeadingWhiteSpace(data.consumeBoolean())
.withIgnoreQuotations(data.consumeBoolean())
.withQuoteChar(data.consumeChar())
.withSeparator(data.consumeChar())
.withStrictQuotes(data.consumeBoolean())
.build();
RFC4180Parser rfc4180Parser = new RFC4180ParserBuilder()
.withFieldAsNull(data.pickValue(CSVReaderNullFieldIndicator.values()))
.withQuoteChar(data.consumeChar())
.withSeparator(data.consumeChar())
.build();
ICSVParser [] icsvParsers = {csvParser, parser, rfc4180Parser};
CSVReader csvReader = new CSVReaderBuilder(new StringReader(data.consumeString(500)))
.withCSVParser(data.pickValue(icsvParsers))
.withFieldAsNull(data.pickValue(CSVReaderNullFieldIndicator.values()))
.withKeepCarriageReturn(data.consumeBoolean())
.build();
csvReader.readAll();
Locale.setDefault(systemLocale);
} catch (CsvException | IOException e) {
// Documented exceptions.
} catch (UnsupportedOperationException | PatternSyntaxException e) {
// Need to catch them to continue fuzzing.
}
}
}

View File

@ -0,0 +1,16 @@
<?xml version="1.0" encoding="UTF-8"?>
<project xmlns="http://maven.apache.org/POM/4.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 https://maven.apache.org/xsd/maven-4.0.0.xsd">
<modelVersion>4.0.0</modelVersion>
<groupId>com.fuzzer</groupId>
<artifactId>project-parent</artifactId>
<version>0.1.0</version>
<packaging>pom</packaging>
<modules>
<module>opencsv</module>
<module>fuzz-targets</module>
</modules>
</project>

View File

@ -0,0 +1,14 @@
homepage: "https://sourceforge.net/projects/opencsv/"
language: jvm
fuzzing_engines:
- libfuzzer
main_repo: "https://git.code.sf.net/p/opencsv/source/"
sanitizers:
- address
vendor_ccs:
- "wagner@code-intelligence.com"
- "yakdan@code-intelligence.com"
- "glendowne@code-intelligence.com"
- "patrice.salathe@code-intelligence.com"
- "hlin@code-intelligence.com"
- "bug-disclosure@code-intelligence.com"