diff options
author | Fabian Meumertzheim <meumertzheim@code-intelligence.com> | 2021-03-16 14:24:31 +0100 |
---|---|---|
committer | GitHub <noreply@github.com> | 2021-03-16 06:24:31 -0700 |
commit | cf274aba469e488358dfc24691269030ba0dd797 (patch) | |
tree | efefe4b47e11f1d64f99a759cb69c2a6d5fa7c5f /projects | |
parent | c903d51b15d2263ba95182f8498e29dfcdb0eee9 (diff) | |
download | oss-fuzz-cf274aba469e488358dfc24691269030ba0dd797.tar.gz |
[jackson-core] Initial integration (#5396)
Diffstat (limited to 'projects')
-rw-r--r-- | projects/jackson-core/Dockerfile | 35 | ||||
-rw-r--r-- | projects/jackson-core/JsonFuzzer.java | 44 | ||||
-rw-r--r-- | projects/jackson-core/build.sh | 54 | ||||
-rw-r--r-- | projects/jackson-core/project.yaml | 10 |
4 files changed, 143 insertions, 0 deletions
diff --git a/projects/jackson-core/Dockerfile b/projects/jackson-core/Dockerfile new file mode 100644 index 000000000..942dc4420 --- /dev/null +++ b/projects/jackson-core/Dockerfile @@ -0,0 +1,35 @@ + +# Copyright 2021 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +################################################################################ + +FROM gcr.io/oss-fuzz-base/base-builder +RUN apt-get update && apt-get install -y maven + +RUN git clone --depth 1 https://github.com/google/fuzzing +RUN cat fuzzing/dictionaries/json.dict > $OUT/DenylistFuzzer.dict + +RUN git clone --depth 1 https://github.com/dvyukov/go-fuzz-corpus && \ + zip -j $OUT/JsonFuzzer_seed_corpus.zip go-fuzz-corpus/json/corpus/* + +ENV JACKSON_BRANCH=2.13 + +RUN git clone --depth 1 --branch=$JACKSON_BRANCH https://github.com/FasterXML/jackson-core +RUN git clone --depth 1 --branch=$JACKSON_BRANCH https://github.com/FasterXML/jackson-databind +RUN git clone --depth 1 --branch=$JACKSON_BRANCH https://github.com/FasterXML/jackson-annotations + +COPY build.sh $SRC/ +COPY JsonFuzzer.java $SRC/ +WORKDIR $SRC/ diff --git a/projects/jackson-core/JsonFuzzer.java b/projects/jackson-core/JsonFuzzer.java new file mode 100644 index 000000000..05c0bb365 --- /dev/null +++ b/projects/jackson-core/JsonFuzzer.java @@ -0,0 +1,44 @@ +// Copyright 2021 Google LLC +// +// Licensed under the Apache License, Version 2.0 (the "License"); +// you may not use this file except in compliance with the License. +// You may obtain a copy of the License at +// +// http://www.apache.org/licenses/LICENSE-2.0 +// +// Unless required by applicable law or agreed to in writing, software +// distributed under the License is distributed on an "AS IS" BASIS, +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +// See the License for the specific language governing permissions and +// limitations under the License. +// +//////////////////////////////////////////////////////////////////////////////// + +import com.code_intelligence.jazzer.api.FuzzedDataProvider; +import com.fasterxml.jackson.core.JsonParser; +import com.fasterxml.jackson.databind.ObjectMapper; + +import java.io.IOException; + +public class JsonFuzzer { + public static void fuzzerTestOneInput(FuzzedDataProvider data) { + ObjectMapper mapper = new ObjectMapper(); + if (data.consumeBoolean()) + mapper.enable(JsonParser.Feature.ALLOW_COMMENTS); + if (data.consumeBoolean()) + mapper.enable(JsonParser.Feature.ALLOW_SINGLE_QUOTES); + if (data.consumeBoolean()) + mapper.enable(JsonParser.Feature.ALLOW_UNQUOTED_FIELD_NAMES); + if (data.consumeBoolean()) + mapper.enable(JsonParser.Feature.ALLOW_YAML_COMMENTS); + if (data.consumeBoolean()) + mapper.enable(JsonParser.Feature.IGNORE_UNDEFINED); + if (data.consumeBoolean()) + mapper.enable(JsonParser.Feature.STRICT_DUPLICATE_DETECTION); + + try { + mapper.readTree(data.consumeRemainingAsBytes()); + } catch (IOException ignored) { + } + } +} diff --git a/projects/jackson-core/build.sh b/projects/jackson-core/build.sh new file mode 100644 index 000000000..4603810de --- /dev/null +++ b/projects/jackson-core/build.sh @@ -0,0 +1,54 @@ +#!/bin/bash -eu +# Copyright 2021 Google Inc. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +################################################################################ + +MAVEN_ARGS="-P!java14+ -Dmaven.test.skip=true -Djavac.src.version=15 -Djavac.target.version=15" + +DEPENDENCIES="jackson-core jackson-databind jackson-annotations" +for dependency in $DEPENDENCIES; do + cd $SRC/$dependency + mvn package $MAVEN_ARGS + current_version=$(mvn org.apache.maven.plugins:maven-help-plugin:3.2.0:evaluate \ + -Dexpression=project.version -q -DforceStdout) + cp "target/$dependency-$current_version.jar" $OUT/$dependency.jar +done + +ALL_JARS=$(echo $DEPENDENCIES | xargs printf -- "%s.jar ") + +# The classpath at build-time includes the project jars in $OUT as well as the +# Jazzer API. +BUILD_CLASSPATH=$(echo $ALL_JARS | xargs printf -- "$OUT/%s:"):$JAZZER_API_PATH + +# All .jar and .class files lie in the same directory as the fuzzer at runtime. +RUNTIME_CLASSPATH=$(echo $ALL_JARS | xargs printf -- "\$this_dir/%s:"):\$this_dir + +for fuzzer in $(find $SRC -name '*Fuzzer.java'); do + fuzzer_basename=$(basename -s .java $fuzzer) + javac -cp $BUILD_CLASSPATH $fuzzer + cp $SRC/$fuzzer_basename.class $OUT/ + + # Create an execution wrapper that executes Jazzer with the correct arguments. + echo "#!/bin/sh +# LLVMFuzzerTestOneInput for fuzzer detection. +this_dir=\$(dirname \"\$0\") +LD_LIBRARY_PATH=\"$JVM_LD_LIBRARY_PATH\":\$this_dir \ +\$this_dir/jazzer_driver --agent_path=\$this_dir/jazzer_agent_deploy.jar \ +--cp=$RUNTIME_CLASSPATH \ +--target_class=$fuzzer_basename \ +--jvm_args=\"-Xmx2048m\" \ +\$@" > $OUT/$fuzzer_basename + chmod u+x $OUT/$fuzzer_basename +done diff --git a/projects/jackson-core/project.yaml b/projects/jackson-core/project.yaml new file mode 100644 index 000000000..90c85c585 --- /dev/null +++ b/projects/jackson-core/project.yaml @@ -0,0 +1,10 @@ +homepage: "https://github.com/FasterXML/jackson-core" +language: jvm +primary_contact: "tatu@fasterxml.com" +auto_ccs: + - "meumertzheim@code-intelligence.com" +fuzzing_engines: + - libfuzzer +main_repo: "https://github.com/FasterXML/jackson-core" +sanitizers: + - address |