[#3848] Fix fuzzers after security enforcement
Some checks failed
CodeQL / Analyze (cpp) (push) Has been cancelled
CodeQL / Analyze (python) (push) Has been cancelled

This commit is contained in:
Andrei Pavel
2025-07-01 15:12:38 +03:00
parent 245776a812
commit 7142f01378
2 changed files with 10 additions and 2 deletions

View File

@@ -9,7 +9,6 @@
#include <cassert>
#include <cstdlib>
#include <iostream>
#include <list>
#include <fuzz.h>
@@ -37,6 +36,7 @@ using namespace isc::process;
using namespace isc::http;
using namespace isc::http::test;
using namespace isc::util;
using namespace isc::util::file;
using namespace std;
namespace {
@@ -105,6 +105,10 @@ LLVMFuzzerInitialize() {
setenv("KEA_DHCP4_FUZZING_ROTATE_PORT", "true", 0);
// The main focus is on fuzzing the raw HTTP endpoint without the authorization header.
// So bypass the enforcement.
PathChecker::enableEnforcement(false);
return 0;
}

View File

@@ -9,7 +9,6 @@
#include <cassert>
#include <cstdlib>
#include <iostream>
#include <list>
#include <fuzz.h>
@@ -37,6 +36,7 @@ using namespace isc::process;
using namespace isc::http;
using namespace isc::http::test;
using namespace isc::util;
using namespace isc::util::file;
using namespace std;
namespace {
@@ -105,6 +105,10 @@ LLVMFuzzerInitialize() {
setenv("KEA_DHCP6_FUZZING_ROTATE_PORT", "true", 0);
// The main focus is on fuzzing the raw HTTP endpoint without the authorization header.
// So bypass the enforcement.
PathChecker::enableEnforcement(false);
return 0;
}