mirror of
https://gitlab.isc.org/isc-projects/kea
synced 2025-08-22 09:57:41 +00:00
[#3848] Fix fuzzers after security enforcement
This commit is contained in:
parent
245776a812
commit
7142f01378
@ -9,7 +9,6 @@
|
||||
#include <cassert>
|
||||
#include <cstdlib>
|
||||
#include <iostream>
|
||||
#include <list>
|
||||
|
||||
#include <fuzz.h>
|
||||
|
||||
@ -37,6 +36,7 @@ using namespace isc::process;
|
||||
using namespace isc::http;
|
||||
using namespace isc::http::test;
|
||||
using namespace isc::util;
|
||||
using namespace isc::util::file;
|
||||
using namespace std;
|
||||
|
||||
namespace {
|
||||
@ -105,6 +105,10 @@ LLVMFuzzerInitialize() {
|
||||
|
||||
setenv("KEA_DHCP4_FUZZING_ROTATE_PORT", "true", 0);
|
||||
|
||||
// The main focus is on fuzzing the raw HTTP endpoint without the authorization header.
|
||||
// So bypass the enforcement.
|
||||
PathChecker::enableEnforcement(false);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
@ -9,7 +9,6 @@
|
||||
#include <cassert>
|
||||
#include <cstdlib>
|
||||
#include <iostream>
|
||||
#include <list>
|
||||
|
||||
#include <fuzz.h>
|
||||
|
||||
@ -37,6 +36,7 @@ using namespace isc::process;
|
||||
using namespace isc::http;
|
||||
using namespace isc::http::test;
|
||||
using namespace isc::util;
|
||||
using namespace isc::util::file;
|
||||
using namespace std;
|
||||
|
||||
namespace {
|
||||
@ -105,6 +105,10 @@ LLVMFuzzerInitialize() {
|
||||
|
||||
setenv("KEA_DHCP6_FUZZING_ROTATE_PORT", "true", 0);
|
||||
|
||||
// The main focus is on fuzzing the raw HTTP endpoint without the authorization header.
|
||||
// So bypass the enforcement.
|
||||
PathChecker::enableEnforcement(false);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user