| OLD | NEW |
| 1 # Copyright 2015 The Chromium Authors. All rights reserved. | 1 # Copyright 2015 The Chromium Authors. All rights reserved. |
| 2 # Use of this source code is governed by a BSD-style license that can be | 2 # Use of this source code is governed by a BSD-style license that can be |
| 3 # found in the LICENSE file. | 3 # found in the LICENSE file. |
| 4 | 4 |
| 5 # Defines fuzzer_test. | 5 # Defines fuzzer_test. |
| 6 # | 6 # |
| 7 import("//build/config/features.gni") | 7 import("//build/config/features.gni") |
| 8 import("//build/config/sanitizers/sanitizers.gni") | 8 import("//build/config/sanitizers/sanitizers.gni") |
| 9 import("//testing/test.gni") | 9 import("//testing/test.gni") |
| 10 | 10 |
| (...skipping 19 matching lines...) Expand all Loading... |
| 30 if (!disable_libfuzzer && | 30 if (!disable_libfuzzer && |
| 31 (use_libfuzzer || use_afl || use_drfuzz || is_linux)) { | 31 (use_libfuzzer || use_afl || use_drfuzz || is_linux)) { |
| 32 assert(defined(invoker.sources), "Need sources in $target_name.") | 32 assert(defined(invoker.sources), "Need sources in $target_name.") |
| 33 | 33 |
| 34 test_deps = [ "//testing/libfuzzer:libfuzzer_main" ] | 34 test_deps = [ "//testing/libfuzzer:libfuzzer_main" ] |
| 35 | 35 |
| 36 if (defined(invoker.deps)) { | 36 if (defined(invoker.deps)) { |
| 37 test_deps += invoker.deps | 37 test_deps += invoker.deps |
| 38 } | 38 } |
| 39 | 39 |
| 40 if (defined(invoker.seed_corpus)) { | 40 if (defined(invoker.seed_corpus) || defined(invoker.seed_corpuses)) { |
| 41 assert(!(defined(invoker.seed_corpus) && defined(invoker.seed_corpuses)), |
| 42 "Do not use both seed_corpus and seed_corpuses for $target_name.") |
| 43 |
| 41 out = "$root_build_dir/$target_name" + "_seed_corpus.zip" | 44 out = "$root_build_dir/$target_name" + "_seed_corpus.zip" |
| 42 | 45 |
| 43 action(target_name + "_seed_corpus") { | 46 action(target_name + "_seed_corpus") { |
| 44 script = "//testing/libfuzzer/archive_corpus.py" | 47 script = "//testing/libfuzzer/archive_corpus.py" |
| 48 |
| 45 args = [ | 49 args = [ |
| 46 "--corpus", | |
| 47 rebase_path(invoker.seed_corpus), | |
| 48 "--output", | 50 "--output", |
| 49 rebase_path(out), | 51 rebase_path(out), |
| 50 ] | 52 ] |
| 51 | 53 |
| 54 if (defined(invoker.seed_corpus)) { |
| 55 args += [ rebase_path(invoker.seed_corpus) ] |
| 56 } |
| 57 |
| 58 if (defined(invoker.seed_corpuses)) { |
| 59 foreach(seed_corpus_path, invoker.seed_corpuses) { |
| 60 args += [ rebase_path(seed_corpus_path) ] |
| 61 } |
| 62 } |
| 63 |
| 52 outputs = [ | 64 outputs = [ |
| 53 out, | 65 out, |
| 54 ] | 66 ] |
| 67 |
| 55 deps = [ | 68 deps = [ |
| 56 "//testing/libfuzzer:seed_corpus", | 69 "//testing/libfuzzer:seed_corpus", |
| 57 ] | 70 ] |
| 58 } | 71 } |
| 59 | 72 |
| 60 test_deps += [ ":" + target_name + "_seed_corpus" ] | 73 test_deps += [ ":" + target_name + "_seed_corpus" ] |
| 61 } | 74 } |
| 62 | 75 |
| 63 if (defined(invoker.dict) || defined(invoker.libfuzzer_options)) { | 76 if (defined(invoker.dict) || defined(invoker.libfuzzer_options)) { |
| 64 if (defined(invoker.dict)) { | 77 if (defined(invoker.dict)) { |
| (...skipping 78 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 143 assert(invoker.seed_corpus == [] || invoker.seed_corpus != []) | 156 assert(invoker.seed_corpus == [] || invoker.seed_corpus != []) |
| 144 } | 157 } |
| 145 assert(!defined(invoker.check_includes) || invoker.check_includes != []) | 158 assert(!defined(invoker.check_includes) || invoker.check_includes != []) |
| 146 assert(!defined(invoker.include_dirs) || invoker.include_dirs != []) | 159 assert(!defined(invoker.include_dirs) || invoker.include_dirs != []) |
| 147 assert(!defined(invoker.defines) || invoker.defines != []) | 160 assert(!defined(invoker.defines) || invoker.defines != []) |
| 148 | 161 |
| 149 group(target_name) { | 162 group(target_name) { |
| 150 } | 163 } |
| 151 } | 164 } |
| 152 } | 165 } |
| OLD | NEW |