diff options
author | Erik Dubbelboer <erik@dubbelboer.com> | 2024-01-09 13:01:31 +0100 |
---|---|---|
committer | Erik Dubbelboer <erik@dubbelboer.com> | 2024-01-09 13:01:31 +0100 |
commit | a04cd8c39f312da01be79e085b0cb4b643f9614b (patch) | |
tree | a0e50cc3aa75c4e89331c8466764c6ddb96fa2f5 /fuzz_test.go | |
parent | refactor: move manually created tchar table to bytesconv_table_gen (#1689) (diff) | |
download | fasthttp-a04cd8c39f312da01be79e085b0cb4b643f9614b.tar.gz fasthttp-a04cd8c39f312da01be79e085b0cb4b643f9614b.tar.bz2 fasthttp-a04cd8c39f312da01be79e085b0cb4b643f9614b.zip |
Move Fuzz tests into their own file
This is required for https://github.com/google/oss-fuzz/pull/11453
Diffstat (limited to 'fuzz_test.go')
-rw-r--r-- | fuzz_test.go | 93 |
1 files changed, 93 insertions, 0 deletions
diff --git a/fuzz_test.go b/fuzz_test.go new file mode 100644 index 0000000..72fa1a2 --- /dev/null +++ b/fuzz_test.go @@ -0,0 +1,93 @@ +package fasthttp + +import ( + "bufio" + "bytes" + "testing" +) + +func FuzzCookieParse(f *testing.F) { + inputs := []string{ + `xxx=yyy`, + `xxx=yyy; expires=Tue, 10 Nov 2009 23:00:00 GMT; domain=foobar.com; path=/a/b`, + " \n\t\"", + } + for _, input := range inputs { + f.Add([]byte(input)) + } + c := AcquireCookie() + defer ReleaseCookie(c) + f.Fuzz(func(t *testing.T, cookie []byte) { + _ = c.ParseBytes(cookie) + + w := bytes.Buffer{} + if _, err := c.WriteTo(&w); err != nil { + t.Fatalf("unexpected error: %v", err) + } + }) +} + +func FuzzVisitHeaderParams(f *testing.F) { + inputs := []string{ + `application/json; v=1; foo=bar; q=0.938; param=param; param="big fox"; q=0.43`, + `*/*`, + `\\`, + `text/plain; foo="\\\"\'\\''\'"`, + } + for _, input := range inputs { + f.Add([]byte(input)) + } + f.Fuzz(func(t *testing.T, header []byte) { + VisitHeaderParams(header, func(key, value []byte) bool { + if len(key) == 0 { + t.Errorf("Unexpected length zero parameter, failed input was: %s", header) + } + return true + }) + }) +} + +func FuzzResponseReadLimitBody(f *testing.F) { + res := AcquireResponse() + defer ReleaseResponse(res) + + f.Add([]byte("HTTP/1.1 200 OK\r\nContent-Type: aa\r\nContent-Length: 10\r\n\r\n9876543210"), 1024*1024) + + f.Fuzz(func(t *testing.T, body []byte, max int) { + _ = res.ReadLimitBody(bufio.NewReader(bytes.NewReader(body)), max) + w := bytes.Buffer{} + _, _ = res.WriteTo(&w) + }) +} + +func FuzzRequestReadLimitBody(f *testing.F) { + req := AcquireRequest() + defer ReleaseRequest(req) + + f.Add([]byte("POST /a HTTP/1.1\r\nHost: a.com\r\nTransfer-Encoding: chunked\r\nContent-Type: aa\r\n\r\n6\r\nfoobar\r\n3\r\nbaz\r\n0\r\nfoobar\r\n\r\n"), 1024*1024) + + f.Fuzz(func(t *testing.T, body []byte, max int) { + _ = req.ReadLimitBody(bufio.NewReader(bytes.NewReader(body)), max) + w := bytes.Buffer{} + _, _ = req.WriteTo(&w) + }) +} + +func FuzzURIUpdateBytes(f *testing.F) { + u := AcquireURI() + defer ReleaseURI(u) + + f.Add([]byte(`http://foobar.com/aaa/bb?cc`)) + f.Add([]byte(`//foobar.com/aaa/bb?cc`)) + f.Add([]byte(`/aaa/bb?cc`)) + f.Add([]byte(`xx?yy=abc`)) + + f.Fuzz(func(t *testing.T, uri []byte) { + u.UpdateBytes(uri) + + w := bytes.Buffer{} + if _, err := u.WriteTo(&w); err != nil { + t.Fatalf("unexpected error: %v", err) + } + }) +} |