-
Notifications
You must be signed in to change notification settings - Fork 17
/
Copy pathentity-validation.rs
87 lines (80 loc) · 2.84 KB
/
entity-validation.rs
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
/*
* Copyright Cedar Contributors
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* https://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#![no_main]
use cedar_drt::*;
use cedar_drt_inner::*;
use cedar_policy_core::extensions::Extensions;
use cedar_policy_generators::{
hierarchy::Hierarchy, hierarchy::HierarchyGenerator, schema::Schema, settings::ABACSettings,
};
use libfuzzer_sys::arbitrary::{self, Arbitrary, Unstructured};
use log::{debug, info};
use serde::Serialize;
/// Input expected by this fuzz target
#[derive(Debug, Clone, Serialize)]
pub struct FuzzTargetInput {
/// generated schema
#[serde(skip)]
pub schema: Schema,
/// generated hierarchy
#[serde(skip)]
pub hierarchy: Hierarchy,
}
/// settings for this fuzz target
const SETTINGS: ABACSettings = ABACSettings {
match_types: false,
enable_extensions: true,
max_depth: 7,
max_width: 7,
enable_additional_attributes: true,
enable_like: true,
enable_action_groups_and_attrs: true,
enable_arbitrary_func_call: true,
enable_unknowns: false,
enable_action_in_constraints: true,
enable_unspecified_apply_spec: true,
// It's *not* Ok to enable this flag because this target will otherwise throw unknown extension function errors.
enable_datetime_extension: false,
};
impl<'a> Arbitrary<'a> for FuzzTargetInput {
fn arbitrary(u: &mut Unstructured<'a>) -> arbitrary::Result<Self> {
let schema: Schema = Schema::arbitrary(SETTINGS.clone(), u)?;
let hierarchy = schema.arbitrary_hierarchy(u)?;
Ok(Self { schema, hierarchy })
}
fn try_size_hint(
depth: usize,
) -> arbitrary::Result<(usize, Option<usize>), arbitrary::MaxRecursionReached> {
Ok(arbitrary::size_hint::and_all(&[
Schema::arbitrary_size_hint(depth)?,
HierarchyGenerator::size_hint(depth),
]))
}
}
fuzz_target!(|input: FuzzTargetInput| {
initialize_log();
let def_impl = LeanDefinitionalEngine::new();
// generate a schema
if let Ok(schema) = ValidatorSchema::try_from(input.schema) {
debug!("Schema: {:?}", schema);
if let Ok(entities) = Entities::try_from(input.hierarchy) {
let (_, total_dur) = time_function(|| {
run_ent_val_test(&def_impl, schema, entities, Extensions::all_available())
});
info!("{}{}", TOTAL_MSG, total_dur.as_nanos());
}
}
});