mirror of
https://gitlab.isc.org/isc-projects/kea.git
synced 2025-12-20 00:53:34 +08:00
[#3848] Fix fuzzers after security enforcement
This commit is contained in:
@@ -9,7 +9,6 @@
|
||||
#include <cassert>
|
||||
#include <cstdlib>
|
||||
#include <iostream>
|
||||
#include <list>
|
||||
|
||||
#include <fuzz.h>
|
||||
|
||||
@@ -37,6 +36,7 @@ using namespace isc::process;
|
||||
using namespace isc::http;
|
||||
using namespace isc::http::test;
|
||||
using namespace isc::util;
|
||||
using namespace isc::util::file;
|
||||
using namespace std;
|
||||
|
||||
namespace {
|
||||
@@ -105,6 +105,10 @@ LLVMFuzzerInitialize() {
|
||||
|
||||
setenv("KEA_DHCP4_FUZZING_ROTATE_PORT", "true", 0);
|
||||
|
||||
// The main focus is on fuzzing the raw HTTP endpoint without the authorization header.
|
||||
// So bypass the enforcement.
|
||||
PathChecker::enableEnforcement(false);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
@@ -9,7 +9,6 @@
|
||||
#include <cassert>
|
||||
#include <cstdlib>
|
||||
#include <iostream>
|
||||
#include <list>
|
||||
|
||||
#include <fuzz.h>
|
||||
|
||||
@@ -37,6 +36,7 @@ using namespace isc::process;
|
||||
using namespace isc::http;
|
||||
using namespace isc::http::test;
|
||||
using namespace isc::util;
|
||||
using namespace isc::util::file;
|
||||
using namespace std;
|
||||
|
||||
namespace {
|
||||
@@ -105,6 +105,10 @@ LLVMFuzzerInitialize() {
|
||||
|
||||
setenv("KEA_DHCP6_FUZZING_ROTATE_PORT", "true", 0);
|
||||
|
||||
// The main focus is on fuzzing the raw HTTP endpoint without the authorization header.
|
||||
// So bypass the enforcement.
|
||||
PathChecker::enableEnforcement(false);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
Reference in New Issue
Block a user