-
Notifications
You must be signed in to change notification settings - Fork 1.8k
/
fuzz_test.go
130 lines (104 loc) · 3.12 KB
/
fuzz_test.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
package fasthttp
import (
"bufio"
"bytes"
"net/url"
"strings"
"testing"
)
func FuzzCookieParse(f *testing.F) {
f.Add([]byte(`xxx=yyy`))
f.Add([]byte(`xxx=yyy; expires=Tue, 10 Nov 2009 23:00:00 GMT; domain=foobar.com; path=/a/b`))
f.Add([]byte(" \n\t\""))
f.Fuzz(func(t *testing.T, cookie []byte) {
var c Cookie
_ = c.ParseBytes(cookie)
w := bytes.Buffer{}
if _, err := c.WriteTo(&w); err != nil {
t.Fatalf("unexpected error: %v", err)
}
})
}
func FuzzVisitHeaderParams(f *testing.F) {
f.Add([]byte(`application/json; v=1; foo=bar; q=0.938; param=param; param="big fox"; q=0.43`))
f.Add([]byte(`*/*`))
f.Add([]byte(`\\`))
f.Add([]byte(`text/plain; foo="\\\"\'\\''\'"`))
f.Fuzz(func(t *testing.T, header []byte) {
VisitHeaderParams(header, func(key, value []byte) bool {
if len(key) == 0 {
t.Errorf("Unexpected length zero parameter, failed input was: %s", header)
}
return true
})
})
}
func FuzzResponseReadLimitBody(f *testing.F) {
f.Add([]byte("HTTP/1.1 200 OK\r\nContent-Type: aa\r\nContent-Length: 10\r\n\r\n9876543210"), 1024)
f.Fuzz(func(t *testing.T, body []byte, maxBodySize int) {
if len(body) > 1024*1024 || maxBodySize > 1024*1024 {
return
}
// Only test with a max for the body, otherwise a very large Content-Length will just OOM.
if maxBodySize <= 0 {
return
}
res := AcquireResponse()
defer ReleaseResponse(res)
_ = res.ReadLimitBody(bufio.NewReader(bytes.NewReader(body)), maxBodySize)
})
}
func FuzzRequestReadLimitBody(f *testing.F) {
f.Add([]byte("POST /a HTTP/1.1\r\nHost: a.com\r\nTransfer-Encoding: chunked\r\nContent-Type: aa\r\n\r\n6\r\nfoobar\r\n3\r\nbaz\r\n0\r\nfoobar\r\n\r\n"), 1024)
f.Fuzz(func(t *testing.T, body []byte, maxBodySize int) {
if len(body) > 1024*1024 || maxBodySize > 1024*1024 {
return
}
// Only test with a max for the body, otherwise a very large Content-Length will just OOM.
if maxBodySize <= 0 {
return
}
req := AcquireRequest()
defer ReleaseRequest(req)
_ = req.ReadLimitBody(bufio.NewReader(bytes.NewReader(body)), maxBodySize)
})
}
func FuzzURIUpdateBytes(f *testing.F) {
f.Add([]byte(`http://foobar.com/aaa/bb?cc`))
f.Add([]byte(`//foobar.com/aaa/bb?cc`))
f.Add([]byte(`/aaa/bb?cc`))
f.Add([]byte(`xx?yy=abc`))
f.Fuzz(func(t *testing.T, uri []byte) {
var u URI
u.UpdateBytes(uri)
w := bytes.Buffer{}
if _, err := u.WriteTo(&w); err != nil {
t.Fatalf("unexpected error: %v", err)
}
})
}
func FuzzURIParse(f *testing.F) {
f.Add(`http://foobar.com/aaa/bb?cc#dd`)
f.Add(`http://google.com?github.com`)
f.Add(`http://google.com#@github.com`)
f.Fuzz(func(t *testing.T, uri string) {
var u URI
uri = strings.ToLower(uri)
if !strings.HasPrefix(uri, "http://") && !strings.HasPrefix(uri, "https://") {
return
}
if u.Parse(nil, []byte(uri)) != nil {
return
}
nu, err := url.Parse(uri)
if err != nil {
return
}
if string(u.Host()) != nu.Host {
t.Fatalf("%q: unexpected host: %q. Expecting %q", uri, u.Host(), nu.Host)
}
if string(u.QueryString()) != nu.RawQuery {
t.Fatalf("%q: unexpected query string: %q. Expecting %q", uri, u.QueryString(), nu.RawQuery)
}
})
}