From 835310428cb7f7464354645be4f12304fdd945d9 Mon Sep 17 00:00:00 2001 From: Naveen <172697+naveensrinivasan@users.noreply.github.com> Date: Sat, 10 Dec 2022 05:30:53 -0600 Subject: [PATCH] Fuzz tests - hashedrekord (#1224) - Included fuzztest for hashedrekord Signed-off-by: naveensrinivasan <172697+naveensrinivasan@users.noreply.github.com> Signed-off-by: naveensrinivasan <172697+naveensrinivasan@users.noreply.github.com> Signed-off-by: Naveen <172697+naveensrinivasan@users.noreply.github.com> --- pkg/types/hashedrekord/fuzz_test.go | 44 +++++++++++++++++++++++++++++ tests/oss_fuzz.sh | 1 + 2 files changed, 45 insertions(+) create mode 100644 pkg/types/hashedrekord/fuzz_test.go mode change 100755 => 100644 tests/oss_fuzz.sh diff --git a/pkg/types/hashedrekord/fuzz_test.go b/pkg/types/hashedrekord/fuzz_test.go new file mode 100644 index 000000000..01953b58d --- /dev/null +++ b/pkg/types/hashedrekord/fuzz_test.go @@ -0,0 +1,44 @@ +// +// Copyright 2022 The Sigstore Authors. +// +// Licensed under the Apache License, Version 2.0 (the "License"); +// you may not use this file except in compliance with the License. +// You may obtain a copy of the License at +// +// http://www.apache.org/licenses/LICENSE-2.0 +// +// Unless required by applicable law or agreed to in writing, software +// distributed under the License is distributed on an "AS IS" BASIS, +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +// See the License for the specific language governing permissions and +// limitations under the License. + +package hashedrekord + +import ( + "context" + "net/url" + "testing" + + "github.com/sigstore/rekor/pkg/types" +) + +func FuzzHashedRekord(f *testing.F) { + f.Fuzz(func(t *testing.T, version, artifact, pkiFormat, scheme, host, path string, signature, authentication []byte) { + ctx := context.Background() + hrd := New() + u := url.URL{Scheme: scheme, Host: host, Path: path} + + props := types.ArtifactProperties{ArtifactHash: artifact, PKIFormat: pkiFormat, + SignatureBytes: signature, AdditionalAuthenticatedData: authentication, ArtifactPath: &u, + SignaturePath: &u, PublicKeyPaths: []*url.URL{&u}} + entry, err := hrd.CreateProposedEntry(ctx, version, props) + if err != nil { + t.Skip("skipping fuzz test due to error: ", err) + } + _, err = hrd.UnmarshalEntry(entry) + if err != nil { + t.Skip("skipping fuzz test due to unmarshal error: ", err) + } + }) +} diff --git a/tests/oss_fuzz.sh b/tests/oss_fuzz.sh old mode 100755 new mode 100644 index 002b61076..4c77498a6 --- a/tests/oss_fuzz.sh +++ b/tests/oss_fuzz.sh @@ -27,6 +27,7 @@ compile_native_go_fuzzer github.com/sigstore/rekor/pkg/sharding FuzzValidateUUID compile_native_go_fuzzer github.com/sigstore/rekor/pkg/sharding FuzzValidateTreeID FuzzValidateTreeID compile_native_go_fuzzer github.com/sigstore/rekor/pkg/sharding FuzzValidateEntryID FuzzValidateEntryID compile_native_go_fuzzer github.com/sigstore/rekor/pkg/types/alpine FuzzPackageUnmarshal FuzzPackageUnmarshal +compile_native_go_fuzzer github.com/sigstore/rekor/pkg/types/hashedrekord FuzzHashedRekord FuzzHashedRekord compile_native_go_fuzzer github.com/sigstore/rekor/pkg/types/intoto FuzzIntotoCreateProposedEntry FuzzIntotoCreateProposedEntry compile_native_go_fuzzer github.com/sigstore/rekor/pkg/types/tuf FuzzTufCreateProposedEntry FuzzTufCreateProposedEntry compile_native_go_fuzzer github.com/sigstore/rekor/pkg/types/rfc3161 FuzzRfc3161CreateProposedEntry FuzzRfc3161CreateProposedEntry