From 67f6df37be49d7ba84e132ab2cd3a5e1f1c0b8b7 Mon Sep 17 00:00:00 2001 From: secsys-go <104196919+secsys-go@users.noreply.github.com> Date: Sun, 1 Oct 2023 05:29:57 +0800 Subject: [PATCH] add fuzz driver based on TestUseRouterParentDisallow (#2217) --- .../TestUseRouterParentDisallow_fuzz_test.go | 55 +++++++++++++++++++ 1 file changed, 55 insertions(+) create mode 100644 core/router/TestUseRouterParentDisallow_fuzz_test.go diff --git a/core/router/TestUseRouterParentDisallow_fuzz_test.go b/core/router/TestUseRouterParentDisallow_fuzz_test.go new file mode 100644 index 0000000000..a1ad3fd9f1 --- /dev/null +++ b/core/router/TestUseRouterParentDisallow_fuzz_test.go @@ -0,0 +1,55 @@ +package router_test + +import ( + "github.com/kataras/iris/v12" + "github.com/kataras/iris/v12/httptest" + "testing" +) + +func FuzzTestUseRouterParentDisallow(f *testing.F) { + f.Add("no_userouter_allowed", "always", "_2", "_3", "/index", "/", "/user") + f.Fuzz(func(t *testing.T, data1 string, data2 string, data3 string, data4 string, data5 string, + data6 string, data7 string) { + app := iris.New() + app.UseRouter(func(ctx iris.Context) { + ctx.WriteString(data2) + ctx.Next() + }) + app.Get(data5, func(ctx iris.Context) { + ctx.WriteString(data1) + }) + + app.SetPartyMatcher(func(ctx iris.Context, p iris.Party) bool { + // modifies the PartyMatcher to not match any UseRouter, + // tests should receive the handlers response alone. + return false + }) + + app.PartyFunc(data6, func(p iris.Party) { // it's the same instance of app. + p.UseRouter(func(ctx iris.Context) { + ctx.WriteString(data3) + ctx.Next() + }) + p.Get(data6, func(ctx iris.Context) { + ctx.WriteString(data1) + }) + }) + + app.PartyFunc(data7, func(p iris.Party) { + p.UseRouter(func(ctx iris.Context) { + ctx.WriteString(data4) + ctx.Next() + }) + + p.Get(data6, func(ctx iris.Context) { + ctx.WriteString(data1) + }) + }) + + e := httptest.New(t, app) + e.GET(data5) + e.GET(data6) + e.GET(data7) + + }) +}