OLD | NEW |
1 # Copyright 2015 The Chromium Authors. All rights reserved. | 1 # Copyright 2015 The Chromium Authors. All rights reserved. |
2 # Use of this source code is governed by a BSD-style license that can be | 2 # Use of this source code is governed by a BSD-style license that can be |
3 # found in the LICENSE file. | 3 # found in the LICENSE file. |
4 | 4 |
5 # Defines fuzzer_test. | 5 # Defines fuzzer_test. |
6 # | 6 # |
7 import("//build/config/features.gni") | 7 import("//build/config/features.gni") |
8 import("//build/config/sanitizers/sanitizers.gni") | 8 import("//build/config/sanitizers/sanitizers.gni") |
9 import("//testing/test.gni") | 9 import("//testing/test.gni") |
10 | 10 |
(...skipping 19 matching lines...) Expand all Loading... |
30 if (!disable_libfuzzer && | 30 if (!disable_libfuzzer && |
31 (use_libfuzzer || use_afl || use_drfuzz || is_linux)) { | 31 (use_libfuzzer || use_afl || use_drfuzz || is_linux)) { |
32 assert(defined(invoker.sources), "Need sources in $target_name.") | 32 assert(defined(invoker.sources), "Need sources in $target_name.") |
33 | 33 |
34 test_deps = [ "//testing/libfuzzer:libfuzzer_main" ] | 34 test_deps = [ "//testing/libfuzzer:libfuzzer_main" ] |
35 | 35 |
36 if (defined(invoker.deps)) { | 36 if (defined(invoker.deps)) { |
37 test_deps += invoker.deps | 37 test_deps += invoker.deps |
38 } | 38 } |
39 | 39 |
40 if (defined(invoker.seed_corpus)) { | 40 if (defined(invoker.seed_corpus) || defined(invoker.seed_corpuses)) { |
| 41 assert(!(defined(invoker.seed_corpus) && defined(invoker.seed_corpuses)), |
| 42 "Do not use both seed_corpus and seed_corpuses for $target_name.") |
| 43 |
41 out = "$root_build_dir/$target_name" + "_seed_corpus.zip" | 44 out = "$root_build_dir/$target_name" + "_seed_corpus.zip" |
42 | 45 |
43 action(target_name + "_seed_corpus") { | 46 action(target_name + "_seed_corpus") { |
44 script = "//testing/libfuzzer/archive_corpus.py" | 47 script = "//testing/libfuzzer/archive_corpus.py" |
| 48 |
45 args = [ | 49 args = [ |
46 "--corpus", | |
47 rebase_path(invoker.seed_corpus), | |
48 "--output", | 50 "--output", |
49 rebase_path(out), | 51 rebase_path(out), |
50 ] | 52 ] |
51 | 53 |
| 54 if (defined(invoker.seed_corpus)) { |
| 55 args += [ rebase_path(invoker.seed_corpus) ] |
| 56 } |
| 57 |
| 58 if (defined(invoker.seed_corpuses)) { |
| 59 foreach(seed_corpus_path, invoker.seed_corpuses) { |
| 60 args += [ rebase_path(seed_corpus_path) ] |
| 61 } |
| 62 } |
| 63 |
52 outputs = [ | 64 outputs = [ |
53 out, | 65 out, |
54 ] | 66 ] |
| 67 |
55 deps = [ | 68 deps = [ |
56 "//testing/libfuzzer:seed_corpus", | 69 "//testing/libfuzzer:seed_corpus", |
57 ] | 70 ] |
58 } | 71 } |
59 | 72 |
60 test_deps += [ ":" + target_name + "_seed_corpus" ] | 73 test_deps += [ ":" + target_name + "_seed_corpus" ] |
61 } | 74 } |
62 | 75 |
63 if (defined(invoker.dict) || defined(invoker.libfuzzer_options)) { | 76 if (defined(invoker.dict) || defined(invoker.libfuzzer_options)) { |
64 if (defined(invoker.dict)) { | 77 if (defined(invoker.dict)) { |
(...skipping 78 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
143 assert(invoker.seed_corpus == [] || invoker.seed_corpus != []) | 156 assert(invoker.seed_corpus == [] || invoker.seed_corpus != []) |
144 } | 157 } |
145 assert(!defined(invoker.check_includes) || invoker.check_includes != []) | 158 assert(!defined(invoker.check_includes) || invoker.check_includes != []) |
146 assert(!defined(invoker.include_dirs) || invoker.include_dirs != []) | 159 assert(!defined(invoker.include_dirs) || invoker.include_dirs != []) |
147 assert(!defined(invoker.defines) || invoker.defines != []) | 160 assert(!defined(invoker.defines) || invoker.defines != []) |
148 | 161 |
149 group(target_name) { | 162 group(target_name) { |
150 } | 163 } |
151 } | 164 } |
152 } | 165 } |
OLD | NEW |