guice: Initial integration (#7740)

Initial integration
This commit is contained in:
psy 2022-05-23 18:36:41 +02:00 committed by GitHub
parent 915b5fff5d
commit dd9f2c2778
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
4 changed files with 203 additions and 0 deletions

29
projects/guice/Dockerfile Normal file
View File

@ -0,0 +1,29 @@
# Copyright 2022 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
################################################################################
FROM gcr.io/oss-fuzz-base/base-builder-jvm
RUN curl -L https://downloads.apache.org/maven/maven-3/3.6.3/binaries/apache-maven-3.6.3-bin.zip -o maven.zip && \
unzip maven.zip -d $SRC/maven && \
rm -rf maven.zip
ENV MVN $SRC/maven/apache-maven-3.6.3/bin/mvn
RUN git clone --depth 1 https://github.com/google/guice
COPY build.sh $SRC/
COPY *Fuzzer.java $SRC/
WORKDIR $SRC/guice

View File

@ -0,0 +1,62 @@
import com.code_intelligence.jazzer.api.FuzzedDataProvider;
import com.google.inject.*;
import com.google.inject.internal.Annotations;
import com.google.inject.internal.InternalFlags;
import com.google.inject.matcher.Matchers;
import com.google.inject.name.Named;
import com.google.inject.CreationException;
import com.google.inject.name.Names;
import static java.lang.annotation.RetentionPolicy.RUNTIME;
import static com.google.inject.name.Names.named;
import com.google.inject.ConfigurationException;
import java.lang.annotation.Retention;
import java.util.*;
public class InjectorFuzzer {
@Retention(RUNTIME)
@BindingAnnotation
@interface NumericValue {}
@Retention(RUNTIME)
@BindingAnnotation
@interface EnumValue {}
@Retention(RUNTIME)
@BindingAnnotation
@interface ClassName {}
public enum Bar {
TEE,
BAZ,
BOB
}
public static void fuzzerTestOneInput(FuzzedDataProvider data) {
String value = data.consumeRemainingAsString();
try {
Injector injector =
Guice.createInjector(
new AbstractModule() {
@Override
protected void configure() {
bindConstant().annotatedWith(NumericValue.class).to(value);
bindConstant().annotatedWith(EnumValue.class).to(value);
bindConstant().annotatedWith(ClassName.class).to(value);
}
});
DummyClass foo = injector.getInstance(DummyClass.class);
} catch (CreationException | ConfigurationException e) { }
}
public static class DummyClass {
@Inject @EnumValue Bar enumField;
@Inject @ClassName Class<?> classField;
@Inject @NumericValue Byte byteField;
}
}

100
projects/guice/build.sh Executable file
View File

@ -0,0 +1,100 @@
#!/bin/bash -eu
# Copyright 2022 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
################################################################################
cat > patch.diff <<- EOM
--- a/pom.xml 2022-05-05 09:49:53.028735612 +0200
+++ b/pom.xml 2022-05-05 09:49:30.445695122 +0200
@@ -120,7 +120,7 @@
| The last stable release version id, used for generating API diffs between released versions
-->
<guice.lastStableRelease>5.1.0</guice.lastStableRelease>
- <guice.skipTests>false</guice.skipTests>
+ <guice.skipTests>true</guice.skipTests>
<gpg.skip>true</gpg.skip>
</properties>
EOM
git apply patch.diff
cd core
cat > patch2.diff <<- EOM
--- a/pom.xml 2022-05-05 13:32:09.413975213 +0200
+++ b/pom.xml 2022-05-05 13:33:53.389402985 +0200
@@ -68,6 +68,24 @@
<build>
<plugins>
+ <plugin>
+ <groupId>org.apache.maven.plugins</groupId>
+ <artifactId>maven-assembly-plugin</artifactId>
+ <executions>
+ <execution>
+ <phase>package</phase>
+ <goals>
+ <goal>single</goal>
+ </goals>
+ <configuration>
+ <descriptorRefs>
+ <descriptorRef>jar-with-dependencies</descriptorRef>
+ </descriptorRefs>
+ </configuration>
+ </execution>
+ </executions>
+ </plugin>
+
<!--
| Add standard LICENSE and NOTICE files
-->
EOM
git apply patch2.diff
cd ..
MAVEN_ARGS="-Djavac.src.version=15 -Djavac.target.version=15 -DskipTests"
$MVN package $MAVEN_ARGS
CURRENT_VERSION=$($MVN org.apache.maven.plugins:maven-help-plugin:3.2.0:evaluate \
-Dexpression=project.version -q -DforceStdout)
cp "core/target/guice-$CURRENT_VERSION-jar-with-dependencies.jar" "$OUT/guice.jar"
ALL_JARS="guice.jar"
# The classpath at build-time includes the project jars in $OUT as well as the
# Jazzer API.
BUILD_CLASSPATH=$(echo $ALL_JARS | xargs printf -- "$OUT/%s:"):$JAZZER_API_PATH
# All .jar and .class files lie in the same directory as the fuzzer at runtime.
RUNTIME_CLASSPATH=$(echo $ALL_JARS | xargs printf -- "\$this_dir/%s:"):\$this_dir
for fuzzer in $(find $SRC -name '*Fuzzer.java'); do
fuzzer_basename=$(basename -s .java $fuzzer)
javac -cp $BUILD_CLASSPATH $fuzzer
cp $SRC/$fuzzer_basename*.class $OUT/
# Create an execution wrapper that executes Jazzer with the correct arguments.
echo "#!/bin/sh
# LLVMFuzzerTestOneInput for fuzzer detection.
this_dir=\$(dirname \"\$0\")
LD_LIBRARY_PATH=\"$JVM_LD_LIBRARY_PATH\":\$this_dir \
\$this_dir/jazzer_driver --agent_path=\$this_dir/jazzer_agent_deploy.jar \
--cp=$RUNTIME_CLASSPATH \
--target_class=$fuzzer_basename \
--jvm_args=\"-Xmx2048m\" \
\$@" > $OUT/$fuzzer_basename
chmod u+x $OUT/$fuzzer_basename
done

View File

@ -0,0 +1,12 @@
homepage: "https://github.com/google/guice"
language: jvm
main_repo: "https://github.com/google/guice.git"
fuzzing_engines:
- libfuzzer
sanitizers:
- address
vendor_ccs:
- "wagner@code-intelligence.com"
- "yakdan@code-intelligence.com"
- "glendowne@code-intelligence.com"
- "patrice.salathe@code-intelligence.com"