Roman Ognev
e5eb732cd5
(cherry picked from commit 664f83b2b7
)
Signed-off-by: Roman Ognev <r.ognev@yadro.com>
Signed-off-by: Alex Vanin <a.vanin@yadro.com>
88 lines
1.7 KiB
Go
88 lines
1.7 KiB
Go
//go:build gofuzz
|
|
// +build gofuzz
|
|
|
|
package auth
|
|
|
|
import (
|
|
"strings"
|
|
"testing"
|
|
"time"
|
|
|
|
"git.frostfs.info/TrueCloudLab/frostfs-s3-gw/creds/accessbox"
|
|
oid "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/object/id"
|
|
"github.com/aws/aws-sdk-go/aws/credentials"
|
|
utils "github.com/trailofbits/go-fuzz-utils"
|
|
)
|
|
|
|
const (
|
|
fuzzSuccessExitCode = 0
|
|
fuzzFailExitCode = -1
|
|
)
|
|
|
|
func InitFuzzAuthenticate() {
|
|
}
|
|
|
|
func DoFuzzAuthenticate(input []byte) int {
|
|
// FUZZER INIT
|
|
if len(input) < 100 {
|
|
return fuzzFailExitCode
|
|
}
|
|
|
|
tp, err := utils.NewTypeProvider(input)
|
|
if err != nil {
|
|
return fuzzFailExitCode
|
|
}
|
|
|
|
var accessKeyAddr oid.Address
|
|
err = tp.Fill(accessKeyAddr)
|
|
if err != nil {
|
|
return fuzzFailExitCode
|
|
}
|
|
|
|
accessKeyID := strings.ReplaceAll(accessKeyAddr.String(), "/", "0")
|
|
secretKey, err := tp.GetString()
|
|
awsCreds := credentials.NewStaticCredentials(accessKeyID, secretKey, "")
|
|
|
|
reqData := RequestData{
|
|
Method: "GET",
|
|
Endpoint: "http://localhost:8084",
|
|
Bucket: "my-bucket",
|
|
Object: "@obj/name",
|
|
}
|
|
presignData := PresignData{
|
|
Service: "s3",
|
|
Region: "spb",
|
|
Lifetime: 10 * time.Minute,
|
|
SignTime: time.Now().UTC(),
|
|
}
|
|
|
|
req, err := PresignRequest(awsCreds, reqData, presignData)
|
|
if req == nil {
|
|
return fuzzFailExitCode
|
|
}
|
|
|
|
expBox := &accessbox.Box{
|
|
Gate: &accessbox.GateData{
|
|
SecretKey: secretKey,
|
|
},
|
|
}
|
|
|
|
mock := newTokensFrostfsMock()
|
|
mock.addBox(accessKeyAddr, expBox)
|
|
|
|
c := &Center{
|
|
cli: mock,
|
|
reg: NewRegexpMatcher(authorizationFieldRegexp),
|
|
postReg: NewRegexpMatcher(postPolicyCredentialRegexp),
|
|
}
|
|
|
|
_, _ = c.Authenticate(req)
|
|
|
|
return fuzzSuccessExitCode
|
|
}
|
|
|
|
func FuzzAuthenticate(f *testing.F) {
|
|
f.Fuzz(func(t *testing.T, data []byte) {
|
|
DoFuzzAuthenticate(data)
|
|
})
|
|
}
|