Skip to content

Commit 7142f01

Browse files
committed
[#3848] Fix fuzzers after security enforcement
1 parent 245776a commit 7142f01

File tree

2 files changed

+10
-2
lines changed

2 files changed

+10
-2
lines changed

fuzz/fuzz_http_endpoint_kea_dhcp4.cc

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,6 @@
99
#include <cassert>
1010
#include <cstdlib>
1111
#include <iostream>
12-
#include <list>
1312

1413
#include <fuzz.h>
1514

@@ -37,6 +36,7 @@ using namespace isc::process;
3736
using namespace isc::http;
3837
using namespace isc::http::test;
3938
using namespace isc::util;
39+
using namespace isc::util::file;
4040
using namespace std;
4141

4242
namespace {
@@ -105,6 +105,10 @@ LLVMFuzzerInitialize() {
105105

106106
setenv("KEA_DHCP4_FUZZING_ROTATE_PORT", "true", 0);
107107

108+
// The main focus is on fuzzing the raw HTTP endpoint without the authorization header.
109+
// So bypass the enforcement.
110+
PathChecker::enableEnforcement(false);
111+
108112
return 0;
109113
}
110114

fuzz/fuzz_http_endpoint_kea_dhcp6.cc

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,6 @@
99
#include <cassert>
1010
#include <cstdlib>
1111
#include <iostream>
12-
#include <list>
1312

1413
#include <fuzz.h>
1514

@@ -37,6 +36,7 @@ using namespace isc::process;
3736
using namespace isc::http;
3837
using namespace isc::http::test;
3938
using namespace isc::util;
39+
using namespace isc::util::file;
4040
using namespace std;
4141

4242
namespace {
@@ -105,6 +105,10 @@ LLVMFuzzerInitialize() {
105105

106106
setenv("KEA_DHCP6_FUZZING_ROTATE_PORT", "true", 0);
107107

108+
// The main focus is on fuzzing the raw HTTP endpoint without the authorization header.
109+
// So bypass the enforcement.
110+
PathChecker::enableEnforcement(false);
111+
108112
return 0;
109113
}
110114

0 commit comments

Comments
 (0)