2
0
mirror of https://gitlab.isc.org/isc-projects/kea synced 2025-08-22 09:57:41 +00:00

[#3848] Fix fuzzers after security enforcement

This commit is contained in:
Andrei Pavel 2025-07-01 15:12:38 +03:00
parent 245776a812
commit 7142f01378
No known key found for this signature in database
GPG Key ID: D4E804481939CB21
2 changed files with 10 additions and 2 deletions

View File

@ -9,7 +9,6 @@
#include <cassert>
#include <cstdlib>
#include <iostream>
#include <list>
#include <fuzz.h>
@ -37,6 +36,7 @@ using namespace isc::process;
using namespace isc::http;
using namespace isc::http::test;
using namespace isc::util;
using namespace isc::util::file;
using namespace std;
namespace {
@ -105,6 +105,10 @@ LLVMFuzzerInitialize() {
setenv("KEA_DHCP4_FUZZING_ROTATE_PORT", "true", 0);
// The main focus is on fuzzing the raw HTTP endpoint without the authorization header.
// So bypass the enforcement.
PathChecker::enableEnforcement(false);
return 0;
}

View File

@ -9,7 +9,6 @@
#include <cassert>
#include <cstdlib>
#include <iostream>
#include <list>
#include <fuzz.h>
@ -37,6 +36,7 @@ using namespace isc::process;
using namespace isc::http;
using namespace isc::http::test;
using namespace isc::util;
using namespace isc::util::file;
using namespace std;
namespace {
@ -105,6 +105,10 @@ LLVMFuzzerInitialize() {
setenv("KEA_DHCP6_FUZZING_ROTATE_PORT", "true", 0);
// The main focus is on fuzzing the raw HTTP endpoint without the authorization header.
// So bypass the enforcement.
PathChecker::enableEnforcement(false);
return 0;
}