aboutsummaryrefslogtreecommitdiff
path: root/fuzz_test.go
diff options
context:
space:
mode:
authorGravatar Erik Dubbelboer <erik@dubbelboer.com> 2024-01-09 13:01:31 +0100
committerGravatar Erik Dubbelboer <erik@dubbelboer.com> 2024-01-09 13:01:31 +0100
commita04cd8c39f312da01be79e085b0cb4b643f9614b (patch)
treea0e50cc3aa75c4e89331c8466764c6ddb96fa2f5 /fuzz_test.go
parentrefactor: move manually created tchar table to bytesconv_table_gen (#1689) (diff)
downloadfasthttp-a04cd8c39f312da01be79e085b0cb4b643f9614b.tar.gz
fasthttp-a04cd8c39f312da01be79e085b0cb4b643f9614b.tar.bz2
fasthttp-a04cd8c39f312da01be79e085b0cb4b643f9614b.zip
Move Fuzz tests into their own file
This is required for https://github.com/google/oss-fuzz/pull/11453
Diffstat (limited to 'fuzz_test.go')
-rw-r--r--fuzz_test.go93
1 files changed, 93 insertions, 0 deletions
diff --git a/fuzz_test.go b/fuzz_test.go
new file mode 100644
index 0000000..72fa1a2
--- /dev/null
+++ b/fuzz_test.go
@@ -0,0 +1,93 @@
+package fasthttp
+
+import (
+ "bufio"
+ "bytes"
+ "testing"
+)
+
+func FuzzCookieParse(f *testing.F) {
+ inputs := []string{
+ `xxx=yyy`,
+ `xxx=yyy; expires=Tue, 10 Nov 2009 23:00:00 GMT; domain=foobar.com; path=/a/b`,
+ " \n\t\"",
+ }
+ for _, input := range inputs {
+ f.Add([]byte(input))
+ }
+ c := AcquireCookie()
+ defer ReleaseCookie(c)
+ f.Fuzz(func(t *testing.T, cookie []byte) {
+ _ = c.ParseBytes(cookie)
+
+ w := bytes.Buffer{}
+ if _, err := c.WriteTo(&w); err != nil {
+ t.Fatalf("unexpected error: %v", err)
+ }
+ })
+}
+
+func FuzzVisitHeaderParams(f *testing.F) {
+ inputs := []string{
+ `application/json; v=1; foo=bar; q=0.938; param=param; param="big fox"; q=0.43`,
+ `*/*`,
+ `\\`,
+ `text/plain; foo="\\\"\'\\''\'"`,
+ }
+ for _, input := range inputs {
+ f.Add([]byte(input))
+ }
+ f.Fuzz(func(t *testing.T, header []byte) {
+ VisitHeaderParams(header, func(key, value []byte) bool {
+ if len(key) == 0 {
+ t.Errorf("Unexpected length zero parameter, failed input was: %s", header)
+ }
+ return true
+ })
+ })
+}
+
+func FuzzResponseReadLimitBody(f *testing.F) {
+ res := AcquireResponse()
+ defer ReleaseResponse(res)
+
+ f.Add([]byte("HTTP/1.1 200 OK\r\nContent-Type: aa\r\nContent-Length: 10\r\n\r\n9876543210"), 1024*1024)
+
+ f.Fuzz(func(t *testing.T, body []byte, max int) {
+ _ = res.ReadLimitBody(bufio.NewReader(bytes.NewReader(body)), max)
+ w := bytes.Buffer{}
+ _, _ = res.WriteTo(&w)
+ })
+}
+
+func FuzzRequestReadLimitBody(f *testing.F) {
+ req := AcquireRequest()
+ defer ReleaseRequest(req)
+
+ f.Add([]byte("POST /a HTTP/1.1\r\nHost: a.com\r\nTransfer-Encoding: chunked\r\nContent-Type: aa\r\n\r\n6\r\nfoobar\r\n3\r\nbaz\r\n0\r\nfoobar\r\n\r\n"), 1024*1024)
+
+ f.Fuzz(func(t *testing.T, body []byte, max int) {
+ _ = req.ReadLimitBody(bufio.NewReader(bytes.NewReader(body)), max)
+ w := bytes.Buffer{}
+ _, _ = req.WriteTo(&w)
+ })
+}
+
+func FuzzURIUpdateBytes(f *testing.F) {
+ u := AcquireURI()
+ defer ReleaseURI(u)
+
+ f.Add([]byte(`http://foobar.com/aaa/bb?cc`))
+ f.Add([]byte(`//foobar.com/aaa/bb?cc`))
+ f.Add([]byte(`/aaa/bb?cc`))
+ f.Add([]byte(`xx?yy=abc`))
+
+ f.Fuzz(func(t *testing.T, uri []byte) {
+ u.UpdateBytes(uri)
+
+ w := bytes.Buffer{}
+ if _, err := u.WriteTo(&w); err != nil {
+ t.Fatalf("unexpected error: %v", err)
+ }
+ })
+}