mirror of
https://gitlab.gnome.org/GNOME/glib.git
synced 2024-11-06 17:36:14 +01:00
4136db0a8c
Now that the implementation of it is significantly more complex, involving pointer arithmetic, it should probably be fuzzed. It’s not an API which is obviously used to handle untrusted input, but some users of GLib might do so. Signed-off-by: Philip Withnall <pwithnall@gnome.org>
79 lines
2.5 KiB
Meson
79 lines
2.5 KiB
Meson
# Copyright 2018 pdknsk
|
||
# Copyright 2020, 2021, 2022 Endless OS Foundation, LLC
|
||
#
|
||
# SPDX-License-Identifier: LGPL-2.1-or-later
|
||
#
|
||
# This library is free software; you can redistribute it and/or
|
||
# modify it under the terms of the GNU Lesser General Public
|
||
# License as published by the Free Software Foundation; either
|
||
# version 2.1 of the License, or (at your option) any later version.
|
||
#
|
||
# This library is distributed in the hope that it will be useful,
|
||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||
# Lesser General Public License for more details.
|
||
#
|
||
# You should have received a copy of the GNU Lesser General Public
|
||
# License along with this library; if not, see <http://www.gnu.org/licenses/>.
|
||
|
||
fuzz_targets = [
|
||
'fuzz_bookmark',
|
||
'fuzz_canonicalize_filename',
|
||
'fuzz_date_parse',
|
||
'fuzz_date_time_new_from_iso8601',
|
||
'fuzz_dbus_message',
|
||
'fuzz_inet_address_mask_new_from_string',
|
||
'fuzz_inet_address_new_from_string',
|
||
'fuzz_inet_socket_address_new_from_string',
|
||
'fuzz_key',
|
||
'fuzz_network_address_parse',
|
||
'fuzz_network_address_parse_uri',
|
||
'fuzz_paths',
|
||
'fuzz_resolver',
|
||
'fuzz_string',
|
||
'fuzz_uri_escape',
|
||
'fuzz_uri_parse',
|
||
'fuzz_uri_parse_params',
|
||
'fuzz_utf8_normalize',
|
||
'fuzz_utf8_validate',
|
||
'fuzz_uuid_string_is_valid',
|
||
'fuzz_variant_binary',
|
||
'fuzz_variant_binary_byteswap',
|
||
'fuzz_variant_text',
|
||
]
|
||
|
||
deps = [libgmodule_dep, libgio_dep, libglib_dep, libgobject_dep]
|
||
|
||
extra_sources = []
|
||
extra_c_args = cc.get_supported_arguments('-Werror=unused-function')
|
||
|
||
# Links in a static library provided by oss-fuzz, else a standalone driver.
|
||
# https://google.github.io/oss-fuzz/getting-started/new-project-guide/#buildsh-script-environment
|
||
have_fuzzing_engine = false
|
||
if have_cxx
|
||
fuzzing_engine = cxx.find_library('FuzzingEngine', required : get_option('oss_fuzz'))
|
||
have_fuzzing_engine = fuzzing_engine.found()
|
||
endif
|
||
if have_fuzzing_engine
|
||
deps += fuzzing_engine
|
||
else
|
||
extra_sources += 'driver.c'
|
||
endif
|
||
|
||
foreach target_name : fuzz_targets
|
||
exe = executable(target_name, [extra_sources, target_name + '.c'],
|
||
c_args : extra_c_args,
|
||
dependencies : deps,
|
||
)
|
||
|
||
# If the FuzzingEngine isn’t available, build some unit tests to check that
|
||
# the fuzzing files do basically work. This doesn’t do any actual fuzzing though.
|
||
# Pass in the README as an arbitrary fuzzing input, just so we have something.
|
||
if build_tests and not have_fuzzing_engine
|
||
test(target_name, exe,
|
||
args : files('README.md'),
|
||
suite : 'fuzzing',
|
||
)
|
||
endif
|
||
endforeach
|