hcl/json: fuzzing utilities

This commit is contained in:
Martin Atkins 2018-02-16 21:18:25 -08:00
parent f87a794800
commit 77dc2cba20
16 changed files with 142 additions and 0 deletions

1
hcl/json/fuzz/.gitignore vendored Normal file
View File

@ -0,0 +1 @@
fuzz*-fuzz.zip

25
hcl/json/fuzz/Makefile Normal file
View File

@ -0,0 +1,25 @@
ifndef FUZZ_WORK_DIR
$(error FUZZ_WORK_DIR is not set)
endif
default:
@echo "See README.md for usage instructions"
fuzz-config: fuzz-exec-config
fuzz-exec-%: fuzz%-fuzz.zip
go-fuzz -bin=./fuzz$*-fuzz.zip -workdir=$(FUZZ_WORK_DIR)
fuzz%-fuzz.zip: %/fuzz.go
go-fuzz-build github.com/hashicorp/hcl2/hcl/json/fuzz/$*
tools:
go get -u github.com/dvyukov/go-fuzz/go-fuzz
go get -u github.com/dvyukov/go-fuzz/go-fuzz-build
clean:
rm fuzz*-fuzz.zip
.PHONY: tools clean fuzz-config fuzz-expr fuzz-template fuzz-traversal
.PRECIOUS: fuzzconfig-fuzz.zip fuzzexpr-fuzz.zip fuzztemplate-fuzz.zip fuzztraversal-fuzz.zip

57
hcl/json/fuzz/README.md Normal file
View File

@ -0,0 +1,57 @@
# JSON syntax fuzzing utilities
This directory contains helper functions and corpuses that can be used to
fuzz-test the HCL JSON parser using [go-fuzz](https://github.com/dvyukov/go-fuzz).
To fuzz, first install go-fuzz and its build tool in your `GOPATH`:
```
$ make tools
```
Now you can fuzz one or all of the parsers:
```
$ make fuzz-config FUZZ_WORK_DIR=/tmp/hcl2-fuzz-config
```
In all cases, set `FUZZ_WORK_DIR` to a directory where `go-fuzz` can keep state
as it works. This should ideally be in a ramdisk for efficiency, and should
probably _not_ be on an SSD to avoid thrashing it.
## Understanding the result
A small number of subdirectories will be created in the work directory.
If you let `go-fuzz` run for a few minutes (the more minutes the better) it
may detect "crashers", which are inputs that caused the parser to panic. Details
about these are written to `$FUZZ_WORK_DIR/crashers`:
```
$ ls /tmp/hcl2-fuzz-config/crashers
7f5e9ec80c89da14b8b0b238ec88969f658f5a2d
7f5e9ec80c89da14b8b0b238ec88969f658f5a2d.output
7f5e9ec80c89da14b8b0b238ec88969f658f5a2d.quoted
```
The base file above (with no extension) is the input that caused a crash. The
`.output` file contains the panic stack trace, which you can use as a clue to
figure out what caused the crash.
A good first step to fixing a detected crasher is to copy the failing input
into one of the unit tests in the `hcl/json` package and see it crash there
too. After that, it's easy to re-run the test as you try to fix it. The
file with the `.quoted` extension contains a form of the input that is quoted
in Go syntax for easy copy-paste into a test case, even if the input contains
non-printable characters or other inconvenient symbols.
## Rebuilding for new Upstream Code
An archive file is created for `go-fuzz` to use on the first run of each
of the above, as a `.zip` file created in this directory. If upstream code
is changed these will need to be deleted to cause them to be rebuilt with
the latest code:
```
$ make clean
```

View File

@ -0,0 +1,3 @@
{
"foo": "${upper(bar + baz[1])}"
}

View File

@ -0,0 +1,3 @@
{
"foo": "bar"
}

View File

@ -0,0 +1,5 @@
{
"block": {
"foo": true
}
}

View File

@ -0,0 +1,3 @@
{
"block": {}
}

View File

@ -0,0 +1,7 @@
{
"block": {
"another_block": {
"foo": "bar"
}
}
}

View File

@ -0,0 +1 @@
{}

View File

@ -0,0 +1,3 @@
{
"hello": []
}

View File

@ -0,0 +1,3 @@
{
"hello": [[]]
}

View File

@ -0,0 +1,7 @@
{
"hello": [
"hello",
true,
1.2
]
}

View File

@ -0,0 +1,3 @@
{
"foo": 1.234234e30
}

View File

@ -0,0 +1,3 @@
{
"foo": 1024
}

View File

@ -0,0 +1,3 @@
{
"foo": "föo ${föo(\"föo\")}"
}

View File

@ -0,0 +1,15 @@
package fuzzconfig
import (
"github.com/hashicorp/hcl2/hcl/json"
)
func Fuzz(data []byte) int {
_, diags := json.Parse(data, "<fuzz-conf>")
if diags.HasErrors() {
return 0
}
return 1
}