41 RPCFuzzTestingSetup(
const ChainType chain_type,
const std::vector<const char*>& extra_args) :
TestingSetup{chain_type, extra_args}
45 void CallRPC(
const std::string& rpc_method,
const std::vector<std::string>& arguments)
52 }
catch (
const std::runtime_error&) {
58 std::vector<std::string> GetRPCCommands()
const 64 RPCFuzzTestingSetup* rpc_testing_setup =
nullptr;
65 std::string g_limit_to_rpc_command;
70 const std::vector<std::string> RPC_COMMANDS_NOT_SAFE_FOR_FUZZING{
79 "generatetodescriptor",
91 const std::vector<std::string> RPC_COMMANDS_SAFE_FOR_FUZZING{
95 "combinerawtransaction",
99 "createrawtransaction",
101 "decoderawtransaction",
104 "descriptorprocesspsbt",
128 "getconnectioncount",
134 "getmempoolancestors",
135 "getmempooldescendants",
144 "getprioritisedtransactions",
151 "gettxspendingprevout",
160 "prioritisetransaction",
166 "sendrawtransaction",
169 "signmessagewithprivkey",
170 "signrawtransactionwithkey",
174 "syncwithvalidationinterfacequeue",
183 "waitforblockheight",
189 const size_t max_string_length = 4096;
190 const size_t max_base58_bytes_length{64};
193 fuzzed_data_provider,
208 r = fuzzed_data_provider.
ConsumeBool() ?
"true" :
"false";
252 std::optional<CBlock> opt_block = ConsumeDeserializable<CBlock>(fuzzed_data_provider);
257 data_stream << *opt_block;
262 std::optional<CBlockHeader> opt_block_header = ConsumeDeserializable<CBlockHeader>(fuzzed_data_provider);
263 if (!opt_block_header) {
267 data_stream << *opt_block_header;
272 std::optional<CMutableTransaction> opt_tx = ConsumeDeserializable<CMutableTransaction>(fuzzed_data_provider);
277 data_stream << *opt_tx;
282 std::optional<PartiallySignedTransaction> opt_psbt = ConsumeDeserializable<PartiallySignedTransaction>(fuzzed_data_provider);
287 data_stream << *opt_psbt;
311 std::vector<std::string> scalar_arguments;
313 scalar_arguments.push_back(ConsumeScalarRPCArgument(fuzzed_data_provider));
315 return "[\"" +
Join(scalar_arguments,
"\",\"") +
"\"]";
320 return fuzzed_data_provider.
ConsumeBool() ? ConsumeScalarRPCArgument(fuzzed_data_provider) : ConsumeArrayRPCArgument(fuzzed_data_provider);
323 RPCFuzzTestingSetup* InitializeRPCFuzzTestingSetup()
325 static const auto setup = MakeNoLogFileContext<RPCFuzzTestingSetup>();
333 rpc_testing_setup = InitializeRPCFuzzTestingSetup();
334 const std::vector<std::string> supported_rpc_commands = rpc_testing_setup->GetRPCCommands();
335 for (
const std::string& rpc_command : supported_rpc_commands) {
336 const bool safe_for_fuzzing = std::find(RPC_COMMANDS_SAFE_FOR_FUZZING.begin(), RPC_COMMANDS_SAFE_FOR_FUZZING.end(), rpc_command) != RPC_COMMANDS_SAFE_FOR_FUZZING.end();
337 const bool not_safe_for_fuzzing = std::find(RPC_COMMANDS_NOT_SAFE_FOR_FUZZING.begin(), RPC_COMMANDS_NOT_SAFE_FOR_FUZZING.end(), rpc_command) != RPC_COMMANDS_NOT_SAFE_FOR_FUZZING.end();
338 if (!(safe_for_fuzzing || not_safe_for_fuzzing)) {
339 std::cerr <<
"Error: RPC command \"" << rpc_command <<
"\" not found in RPC_COMMANDS_SAFE_FOR_FUZZING or RPC_COMMANDS_NOT_SAFE_FOR_FUZZING. Please update " << __FILE__ <<
".\n";
342 if (safe_for_fuzzing && not_safe_for_fuzzing) {
343 std::cerr <<
"Error: RPC command \"" << rpc_command <<
"\" found in *both* RPC_COMMANDS_SAFE_FOR_FUZZING and RPC_COMMANDS_NOT_SAFE_FOR_FUZZING. Please update " << __FILE__ <<
".\n";
347 const char* limit_to_rpc_command_env = std::getenv(
"LIMIT_TO_RPC_COMMAND");
348 if (limit_to_rpc_command_env !=
nullptr) {
349 g_limit_to_rpc_command = std::string{limit_to_rpc_command_env};
358 if (!g_limit_to_rpc_command.empty() && rpc_command != g_limit_to_rpc_command) {
361 const bool safe_for_fuzzing = std::find(RPC_COMMANDS_SAFE_FOR_FUZZING.begin(), RPC_COMMANDS_SAFE_FOR_FUZZING.end(), rpc_command) != RPC_COMMANDS_SAFE_FOR_FUZZING.end();
362 if (!safe_for_fuzzing) {
365 std::vector<std::string> arguments;
367 arguments.push_back(ConsumeRPCArgument(fuzzed_data_provider));
370 rpc_testing_setup->CallRPC(rpc_command, arguments);
371 }
catch (
const UniValue& json_rpc_error) {
375 if (0 == error_msg.rfind(
"Internal bug detected", 0)) {
377 assert(error_msg.find(
"trigger_internal_bug") != std::string::npos);
static const int SERIALIZE_TRANSACTION_NO_WITNESS
A flag that is ORed into the protocol version to designate that a transaction should be (un)serialize...
CPubKey GetPubKey() const
Compute the public key from a private key.
#define LIMITED_WHILE(condition, limit)
Can be used to limit a theoretically unbounded loop.
std::string EncodeBase64(Span< const unsigned char > input)
const std::string & get_str() const
std::string EncodeBase58(Span< const unsigned char > input)
Why base-58 instead of standard base-64 encoding?
UniValue RPCConvertValues(const std::string &strMethod, const std::vector< std::string > &strParams)
Convert positional arguments to command-specific RPC representation.
UniValue execute(const JSONRPCRequest &request) const
Execute a method.
const UniValue & find_value(std::string_view key) const
void SetMockTime(int64_t nMockTimeIn)
DEPRECATED Use SetMockTime with chrono type.
void SetRPCWarmupFinished()
std::string ToString(const T &t)
Locale-independent version of std::to_string.
std::string HexStr(const Span< const uint8_t > s)
Convert a span of bytes to a lower-case hexadecimal string.
static UniValue CallRPC(BaseRequestHandler *rh, const std::string &strMethod, const std::vector< std::string > &args, const std::optional< std::string > &rpcwallet={})
Double ended buffer combining vector and stream-like interfaces.
std::string ConsumeRandomLengthString(size_t max_length)
std::string ToString() const
std::string EncodeBase58Check(Span< const unsigned char > input)
Encode a byte span into a base58-encoded string, including checksum.
int64_t ConsumeTime(FuzzedDataProvider &fuzzed_data_provider, const std::optional< int64_t > &min, const std::optional< int64_t > &max) noexcept
auto Join(const C &container, const S &separator, UnaryOp unary_op)
Join all container items.
static const int PROTOCOL_VERSION
network protocol versioning
constexpr auto MakeUCharSpan(V &&v) -> decltype(UCharSpanCast(Span
Like the Span constructor, but for (const) unsigned char member types only.
FUZZ_TARGET(rpc,.init=initialize_rpc)
std::string EncodeDestination(const CTxDestination &dest)
size_t CallOneOf(FuzzedDataProvider &fuzzed_data_provider, Callables... callables)
An encapsulated private key.
uint160 ConsumeUInt160(FuzzedDataProvider &fuzzed_data_provider) noexcept
uint256 ConsumeUInt256(FuzzedDataProvider &fuzzed_data_provider) noexcept
std::vector< std::string > listCommands() const
Returns a list of registered commands.
std::string EncodeSecret(const CKey &key)
CTxDestination ConsumeTxDestination(FuzzedDataProvider &fuzzed_data_provider) noexcept
Testing setup that configures a complete environment.
CKey ConsumePrivateKey(FuzzedDataProvider &fuzzed_data_provider, std::optional< bool > compressed) noexcept
bool IsValid() const
Check whether this private key is valid.
std::string EncodeBase32(Span< const unsigned char > input, bool pad)
Base32 encode.