blob: 6983a5287c4b9615a5b02db44e5c8ff51ec18191 [file] [log] [blame]
#!/bin/bash
# Copyright 2022 The Centipede Authors.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# Prints "$@" and terminates the current shell.
function die() {
echo "FATAL: $*" >&2
# Kill our own shell or, if we're in a subshell, kill the parent (main) shell.
kill $$
# If we're in a subshell, exit it.
exit 1
}
# Executes a command line specified in $@ with a file operation, e.g.
# `rm <file>`. If a bundled executable `fileutil` is available, passed the
# command to it for extended file handling capabilities. Otherwise, just
# executes the command.
function fileop() {
"$@"
}
# Returns the path to Centipede TEST_SRCDIR subdirectory.
function fuzztest::internal::get_centipede_test_srcdir() {
set -u
echo "${TEST_SRCDIR}/${TEST_WORKSPACE}/centipede"
}
function get_system_binary_path() {
set -u
local -r name=$1
local path
path="$(which "${name}")"
if (( $? != 0 )); then
die "${name} must be installed and findable via" \
"PATH: use install_dependencies_debian.sh to fix"
fi
echo "${path}"
}
# Returns the path to llvm-symbolizer.
function fuzztest::internal::get_llvm_symbolizer_path() {
get_system_binary_path "llvm-symbolizer"
}
# Returns the path to objdump.
function fuzztest::internal::get_objdump_path() {
get_system_binary_path "objdump"
}
# If the var named "$1" is unset, then sets it to "$2". If the var is set,
# doesn't change it. In either case, verifies that the final value is a path to
# an executable file.
function fuzztest::internal::maybe_set_var_to_executable_path() {
local var_name="$1"
local path="$2"
if [[ -n "${!var_name:-}" ]]; then
echo "Not overriding ${var_name} -- already set to '${!var_name}'" >&2
else
echo "Setting ${var_name} to '${path}'" >&2
eval "$(printf "${var_name}=%q" "${path}")"
fi
if ! [[ -x "${!var_name}" ]]; then
die "Path '${!var_name}' doesn't exist or is not executable"
fi
}
# Same as fuzztest::internal::maybe_set_var_to_executable_path(), but "$2" should be
# a command line that builds the executable and prints its path to stdout.
# TODO(ussuri): Reduce code duplication with the above.
function fuzztest::internal::maybe_set_var_to_built_executable_path() {
local var_name="$1"
local bazel_build_cmd="$2"
if [[ -n "${!var_name:-}" ]]; then
echo "Not overriding ${var_name} -- already set to '${!var_name}'" >&2
else
echo "Setting ${var_name} to output of '${bazel_build_cmd}'" >&2
eval "$(printf "${var_name}=%q" "$(set -e; ${bazel_build_cmd})")"
fi
if ! [[ -x "${!var_name}" ]]; then
die "Path '${!var_name}' doesn't exist or is not executable"
fi
}
# Makes sure that an empty directory "$1" exists. Works for local and CNS.
function fuzztest::internal::ensure_empty_dir() {
fileop mkdir -p "$1"
fileop rm -R -f "${1:?}"/*
}
function _assert_regex_in_file_impl() {
local -r regex="$1"
local -r file="$2"
local -r expected_found="$3"
# Make the shell option change below local.
local -r saved_opts="$(set +o)"
set -o pipefail
if ! fileop ls "${file}" > /dev/null; then
die "Expected file ${file} doesn't exist"
fi
local found
if grep -q -- "${regex}" <(fileop cat "${file}"); then
found=1
else
found=0
fi
if ((found != expected_found)); then
echo
echo ">>>>>>>>>> BEGIN ${file} >>>>>>>>>>"
fileop cat "${file}"
echo "<<<<<<<<<< END ${file} <<<<<<<<<<"
echo
if ((expected_found)); then
die "^^^ File ${file} doesn't contain expected regex /${regex}/"
else
die "^^^ File ${file} contains unexpected regex /${regex}/"
fi
fi
eval "${saved_opts}"
}
# Makes sure that string "$1" exists in file "$2". Works for local and CNS.
function fuzztest::internal::assert_regex_in_file() {
local -r regex="$1"
local -r file="$2"
_assert_regex_in_file_impl "${regex}" "${file}" 1
}
function fuzztest::internal::assert_regex_not_in_file() {
local -r regex="$1"
local -r file="$2"
_assert_regex_in_file_impl "${regex}" "${file}" 0
}
# For each of the logs in "$@", asserts that fuzzing started and successfully
# completed.
function fuzztest::internal::assert_fuzzing_success() {
for log in "$@"; do
fuzztest::internal::assert_regex_in_file "centipede.*init-done:" "${log}"
fuzztest::internal::assert_regex_in_file "centipede.*end-fuzz:" "${log}"
done
}
# Returns a random free port on the local machine.
function fuzztest::internal::get_random_free_port() {
# Create an array with all ports in the range [1024..65535] (ports [0..1023]
# are reserved) and append all ports in the same range that are currently in
# use. This results in the used ports appearing twice in the array.
declare -ra ports=(
{1024..65535}
$(netstat -tan | perl -ne '/.+?:+(\d{1,5}) .+/; if ($1 >= 1024) { print $1; }')
)
# Sort, dedupe and shuffle the array: this leaves randomly ordered free ports.
# `shuf -n 1` returns the first element and stops.
echo "${ports[@]}" | tr ' ' '\n' | sort | uniq -u | shuf -n 1
}