Skip to content

Commit

Permalink
Fuzz tests - hashedrekord (#1224)
Browse files Browse the repository at this point in the history
- Included fuzztest for hashedrekord

Signed-off-by: naveensrinivasan <172697+naveensrinivasan@users.noreply.github.com>

Signed-off-by: naveensrinivasan <172697+naveensrinivasan@users.noreply.github.com>
Signed-off-by: Naveen <172697+naveensrinivasan@users.noreply.github.com>
  • Loading branch information
naveensrinivasan committed Dec 10, 2022
1 parent 0a3f871 commit 8353104
Show file tree
Hide file tree
Showing 2 changed files with 45 additions and 0 deletions.
44 changes: 44 additions & 0 deletions pkg/types/hashedrekord/fuzz_test.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,44 @@
//
// Copyright 2022 The Sigstore Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.

package hashedrekord

import (
"context"
"net/url"
"testing"

"github.com/sigstore/rekor/pkg/types"
)

func FuzzHashedRekord(f *testing.F) {
f.Fuzz(func(t *testing.T, version, artifact, pkiFormat, scheme, host, path string, signature, authentication []byte) {
ctx := context.Background()
hrd := New()
u := url.URL{Scheme: scheme, Host: host, Path: path}

props := types.ArtifactProperties{ArtifactHash: artifact, PKIFormat: pkiFormat,
SignatureBytes: signature, AdditionalAuthenticatedData: authentication, ArtifactPath: &u,
SignaturePath: &u, PublicKeyPaths: []*url.URL{&u}}
entry, err := hrd.CreateProposedEntry(ctx, version, props)
if err != nil {
t.Skip("skipping fuzz test due to error: ", err)
}
_, err = hrd.UnmarshalEntry(entry)
if err != nil {
t.Skip("skipping fuzz test due to unmarshal error: ", err)
}
})
}
1 change: 1 addition & 0 deletions tests/oss_fuzz.sh
100755 → 100644
Original file line number Diff line number Diff line change
Expand Up @@ -27,6 +27,7 @@ compile_native_go_fuzzer github.com/sigstore/rekor/pkg/sharding FuzzValidateUUID
compile_native_go_fuzzer github.com/sigstore/rekor/pkg/sharding FuzzValidateTreeID FuzzValidateTreeID
compile_native_go_fuzzer github.com/sigstore/rekor/pkg/sharding FuzzValidateEntryID FuzzValidateEntryID
compile_native_go_fuzzer github.com/sigstore/rekor/pkg/types/alpine FuzzPackageUnmarshal FuzzPackageUnmarshal
compile_native_go_fuzzer github.com/sigstore/rekor/pkg/types/hashedrekord FuzzHashedRekord FuzzHashedRekord
compile_native_go_fuzzer github.com/sigstore/rekor/pkg/types/intoto FuzzIntotoCreateProposedEntry FuzzIntotoCreateProposedEntry
compile_native_go_fuzzer github.com/sigstore/rekor/pkg/types/tuf FuzzTufCreateProposedEntry FuzzTufCreateProposedEntry
compile_native_go_fuzzer github.com/sigstore/rekor/pkg/types/rfc3161 FuzzRfc3161CreateProposedEntry FuzzRfc3161CreateProposedEntry
Expand Down

0 comments on commit 8353104

Please sign in to comment.