blob: 266d1ec6b1f16bd39bc427fb4df58b2fe9eb1663 [file]
// Licensed to the Apache Software Foundation (ASF) under one
// or more contributor license agreements. See the NOTICE file
// distributed with this work for additional information
// regarding copyright ownership. The ASF licenses this file
// to you under the Apache License, Version 2.0 (the
// "License"); you may not use this file except in compliance
// with the License. You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing,
// software distributed under the License is distributed on an
// "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
// KIND, either express or implied. See the License for the
// specific language governing permissions and limitations
// under the License.
#![no_main]
use libfuzzer_sys::arbitrary::Arbitrary;
use libfuzzer_sys::arbitrary::Unstructured;
use libfuzzer_sys::fuzz_target;
use opendal::Operator;
use opendal::Result;
use opendal::tests::TEST_RUNTIME;
use opendal::tests::WriteAction;
use opendal::tests::WriteChecker;
use opendal::tests::init_test_service;
const MAX_DATA_SIZE: usize = 16 * 1024 * 1024;
#[derive(Debug, Clone)]
struct FuzzInput {
actions: Vec<WriteAction>,
buffer: Option<usize>,
concurrent: Option<usize>,
}
impl Arbitrary<'_> for FuzzInput {
fn arbitrary(u: &mut Unstructured<'_>) -> arbitrary::Result<Self> {
let mut actions = vec![];
let buffer = if u.int_in_range(0..=1)? == 1 {
Some(u.int_in_range(1..=8 * 1024 * 1024)?)
} else {
None
};
let concurrent = if u.int_in_range(0..=1)? == 1 {
Some(u.int_in_range(0..=16)?)
} else {
None
};
let count = u.int_in_range(1..=1024)?;
for _ in 0..count {
let size = u.int_in_range(1..=MAX_DATA_SIZE)?;
actions.push(WriteAction::Write(size));
}
Ok(FuzzInput {
actions,
buffer,
concurrent,
})
}
}
async fn fuzz_writer(op: Operator, input: FuzzInput) -> Result<()> {
let path = uuid::Uuid::new_v4().to_string();
let total_size = input
.actions
.iter()
.map(|a| match a {
WriteAction::Write(size) => *size,
})
.collect();
let checker = WriteChecker::new(total_size);
let mut writer = op.writer_with(&path);
if let Some(buffer) = input.buffer {
writer = writer.chunk(buffer);
} else if let Some(min_size) = op.info().full_capability().write_multi_min_size {
writer = writer.chunk(min_size);
}
if let Some(concurrent) = input.concurrent {
writer = writer.concurrent(concurrent);
}
let mut writer = writer.await?;
for chunk in checker.chunks() {
writer.write(chunk.clone()).await?;
}
writer.close().await?;
let result = op.read(&path).await?.to_bytes();
checker.check(&result);
op.delete(&path).await?;
Ok(())
}
fuzz_target!(|input: FuzzInput| {
let _ = logforth::starter_log::stderr().try_apply();
let op = init_test_service().expect("operator init must succeed");
if let Some(op) = op {
if !op.info().full_capability().write_can_multi {
log::warn!("service doesn't support write multi, skip fuzzing");
return;
}
TEST_RUNTIME.block_on(async {
fuzz_writer(op, input.clone())
.await
.unwrap_or_else(|err| panic!("fuzz reader must succeed: {err:?}"));
})
}
});