blob: c872ebababbfde09b39f950bfef24e9ed9b1f59c [file] [log] [blame]
Eric Orth24feb5b2018-05-25 19:42:461# Copyright 2018 The Chromium Authors. All rights reserved.
2# Use of this source code is governed by a BSD-style license that can be
Yngve N. Pettersend5a75172018-07-09 06:36:563# found in the LICENSE file.
Eric Orth24feb5b2018-05-25 19:42:464
Eric Orth24feb5b2018-05-25 19:42:465import("//net/features.gni")
Max Morozf5eeca02018-12-01 18:43:306import("//testing/libfuzzer/fuzzer_test.gni")
Eric Orth24feb5b2018-05-25 19:42:467
Victor Vasilievc0110d72019-07-21 19:29:468enable_built_in_dns = !is_ios
Eric Orth24feb5b2018-05-25 19:42:469
10source_set("dns") {
11 # Due to circular dependencies, should only be depended on through //net.
Takuto Ikuta94330d9b2019-03-09 11:03:1412 visibility = [
13 "//net",
14 "//net/http:transport_security_state_generated_files",
15 ]
Eric Orth24feb5b2018-05-25 19:42:4616
17 # Internals only intended for use inside network stack (and tests).
18 friend = [
19 "//chrome/browser:test_support",
20 "//chrome/test/*",
21 "//components/certificate_transparency:unit_tests",
22 "//components/cronet/*",
23 "//net/*",
24 "//services/network/*",
25 ]
26
27 public = []
28 sources = [
29 "dns_util.cc",
30 "dns_util.h",
31 ]
32
33 if (!is_nacl) {
34 sources += [
Scott Sheehan135dadb2019-10-30 17:50:4735 "address_info.cc",
36 "address_info.h",
Eric Orth24feb5b2018-05-25 19:42:4637 "address_sorter.h",
Eric Orth59066222019-03-07 23:52:2738 "context_host_resolver.cc",
39 "context_host_resolver.h",
Cammie Smith Barnes958c7f32020-12-17 16:43:1140 "dns_alias_utility.cc",
41 "dns_alias_utility.h",
Eric Orth6432c1a82018-10-02 15:10:2542 "dns_config.cc",
Eric Orth24feb5b2018-05-25 19:42:4643 "dns_config_service.cc",
Eric Orth6432c1a82018-10-02 15:10:2544 "dns_config_service.h",
Eric Orth24feb5b2018-05-25 19:42:4645 "dns_hosts.cc",
46 "dns_hosts.h",
47 "dns_query.cc",
48 "dns_query.h",
49 "dns_reloader.cc",
50 "dns_reloader.h",
51 "dns_response.cc",
Eric Orth9cec76f2020-11-17 07:42:4252 "dns_response_result_extractor.cc",
53 "dns_response_result_extractor.h",
Steven Bingler382d7d42020-03-13 00:02:0454 "dns_server_iterator.cc",
55 "dns_server_iterator.h",
Eric Orth24feb5b2018-05-25 19:42:4656 "dns_session.cc",
57 "dns_session.h",
Eric Orth9300cc62020-08-21 00:29:3458 "dns_socket_allocator.cc",
59 "dns_socket_allocator.h",
Eric Orth24feb5b2018-05-25 19:42:4660 "dns_transaction.cc",
Eric Orthf8680ac2020-06-10 22:57:2461 "dns_udp_tracker.cc",
62 "dns_udp_tracker.h",
Eric Orth24feb5b2018-05-25 19:42:4663 "host_cache.cc",
64 "host_resolver.cc",
Eric Orth960e7062019-03-08 18:43:5465 "host_resolver_manager.cc",
Eric Orth026776a2019-01-18 00:13:2866 "host_resolver_mdns_listener_impl.cc",
67 "host_resolver_mdns_listener_impl.h",
Eric Orth9871aafa2018-10-02 19:59:1868 "host_resolver_mdns_task.cc",
69 "host_resolver_mdns_task.h",
Eric Orth24feb5b2018-05-25 19:42:4670 "host_resolver_proc.cc",
71 "host_resolver_proc.h",
Eric Orth464d51452020-10-29 14:48:2072 "https_record_rdata.cc",
Daniel McArdle4e2037e2020-06-11 22:40:5173 "httpssvc_metrics.cc",
74 "httpssvc_metrics.h",
Eric Orth24feb5b2018-05-25 19:42:4675 "mapped_host_resolver.cc",
Eric Orth24feb5b2018-05-25 19:42:4676 "record_parsed.cc",
77 "record_rdata.cc",
Eric Orthf3495942020-01-31 21:14:1878 "resolve_context.cc",
79 "resolve_context.h",
Eric Orth24feb5b2018-05-25 19:42:4680 "serial_worker.cc",
81 "serial_worker.h",
Eric Orthde0c5662019-06-25 15:36:0282 "system_dns_config_change_notifier.cc",
83 "system_dns_config_change_notifier.h",
Eric Orth24feb5b2018-05-25 19:42:4684 ]
85
Sylvain Defresne2a262082020-09-15 11:19:5886 if (is_win) {
87 sources += [
88 "address_sorter_win.cc",
89 "dns_config_service_win.cc",
90 "dns_config_service_win.h",
91 ]
92 }
93
94 if (is_mac) {
95 sources += [
96 "dns_config_watcher_mac.cc",
97 "dns_config_watcher_mac.h",
98 "notify_watcher_mac.cc",
99 "notify_watcher_mac.h",
100 ]
101 }
102
Sergey Ulanov4593ec92019-04-09 02:06:44103 if (is_fuchsia) {
104 sources += [
105 "dns_config_service_fuchsia.cc",
106 "dns_config_service_fuchsia.h",
107 ]
108 }
Eric Orth24feb5b2018-05-25 19:42:46109
Eric Orthf18db28c92021-02-09 01:54:35110 if (is_android) {
111 sources += [
112 "dns_config_service_android.cc",
113 "dns_config_service_android.h",
114 ]
Eric Orthf79bc2e2021-04-02 22:23:06115 } else if (is_linux) {
116 sources += [
117 "dns_config_service_linux.cc",
118 "dns_config_service_linux.h",
119 ]
Eric Orthf18db28c92021-02-09 01:54:35120 } else if (is_posix) {
Sergey Ulanov4593ec92019-04-09 02:06:44121 sources += [
122 "dns_config_service_posix.cc",
123 "dns_config_service_posix.h",
124 ]
125 }
126
127 if (enable_built_in_dns) {
128 sources += [ "dns_client.cc" ]
129
130 if (is_posix || is_fuchsia) {
Eric Orth24feb5b2018-05-25 19:42:46131 sources += [
132 "address_sorter_posix.cc",
133 "address_sorter_posix.h",
134 ]
135 }
136 }
137
Eric Orth24feb5b2018-05-25 19:42:46138 if (enable_mdns) {
139 sources += [
140 "mdns_cache.cc",
141 "mdns_cache.h",
142 "mdns_client.cc",
143 "mdns_client_impl.cc",
144 "mdns_client_impl.h",
145 ]
146 }
147 }
148
Nico Webera2afc7f2020-01-13 21:06:20149 deps = [ "//net:net_deps" ]
Eric Orth24feb5b2018-05-25 19:42:46150
151 public_deps = [
152 ":dns_client",
Eric Orth168a7e52018-08-27 19:11:32153 ":host_resolver",
Eric Orth0bea1662019-03-20 19:11:22154 ":host_resolver_manager",
Eric Orth24feb5b2018-05-25 19:42:46155 ":mdns_client",
Eric Orth24feb5b2018-05-25 19:42:46156 "//net:net_public_deps",
157 ]
158
159 allow_circular_includes_from = [
160 ":dns_client",
Eric Orth168a7e52018-08-27 19:11:32161 ":host_resolver",
Eric Orth0bea1662019-03-20 19:11:22162 ":host_resolver_manager",
Eric Orth24feb5b2018-05-25 19:42:46163 ":mdns_client",
Eric Orth24feb5b2018-05-25 19:42:46164 ]
165}
166
Eric Orth168a7e52018-08-27 19:11:32167# The standard API of net/dns.
168#
169# Should typically only be used within the network service. Usage external to
170# the network service should instead use network service Mojo IPCs for host
171# resolution. See ResolveHost() in
172# /services/network/public/mojom/network_context.mojom and
173# /services/network/public/mojom/host_resolver.mojom.
174source_set("host_resolver") {
Eric Orth24feb5b2018-05-25 19:42:46175 # Due to circular dependencies, should only be depended on through //net.
176 # Limit visibility to //net and other source_sets with the same access
177 # restriction.
178 visibility = [
179 ":dns",
dalykbd726ee2019-05-30 01:44:06180 ":dns_client",
Eric Orth0bea1662019-03-20 19:11:22181 ":host_resolver_manager",
Eric Orth24feb5b2018-05-25 19:42:46182 ":mdns_client",
183 "//net",
184 ]
185
Ryan Sleevia9d6aa62019-07-26 13:32:18186 # Restricted access so we can keep track of all usage external to the
Eric Orth168a7e52018-08-27 19:11:32187 # network stack and network service.
188 friend = [
Eric Orth168a7e52018-08-27 19:11:32189 # chromecast/browser/url_request_context_factory.cc
190 # URLRequestContext creation for chromecast.
191 "//chromecast/browser",
192
Eric Orth168a7e52018-08-27 19:11:32193 # URLRequestContext and HttpNetworkSession::Context creation for iOS.
194 "//ios/components/io_thread",
195 "//ios/web/shell",
196 "//ios/web_view:*",
197
198 # Tests and test support.
199 "//chrome/browser:test_support",
200 "//chrome/test:browser_tests",
Eric Orth1556c382018-11-08 06:05:02201 "//chrome/test:unit_tests",
Eric Orth168a7e52018-08-27 19:11:32202 "//components/grpc_support/test:unit_tests",
203 "//content/shell:content_shell_lib",
204
205 # Stand-alone tools.
Eric Orth168a7e52018-08-27 19:11:32206 "//google_apis/gcm:mcs_probe",
207
208 # Network stack/service.
209 "//components/certificate_transparency/*",
210 "//components/cronet/*",
211 "//net/*",
212 "//services/network/*",
Matt Menked60f16ec2018-11-07 20:18:26213
214 # The proxy resolution service uses its own host cache and HostResolver Mojo
215 # wrapper.
216 "//services/proxy_resolver/*",
Eric Orth168a7e52018-08-27 19:11:32217 ]
218
Eric Orth24feb5b2018-05-25 19:42:46219 sources = []
220 public = []
221
222 if (!is_nacl) {
Eric Orth168a7e52018-08-27 19:11:32223 sources += [
Eric Orth6432c1a82018-10-02 15:10:25224 "dns_config.h",
Eric Orth24feb5b2018-05-25 19:42:46225 "host_cache.h",
226 "host_resolver.h",
Matt Menke92cc72f12019-10-25 01:11:11227 "host_resolver_source.h",
Eric Orth24feb5b2018-05-25 19:42:46228 "mapped_host_resolver.h",
229 ]
230 }
231
232 deps = [
233 "//net:net_deps",
Eric Orth192e3bb2018-11-14 19:30:32234 "//net/dns/public",
Eric Orth24feb5b2018-05-25 19:42:46235 ]
Nico Webera2afc7f2020-01-13 21:06:20236 public_deps = [ "//net:net_public_deps" ]
Eric Orth89bce392020-09-25 21:36:19237
238 allow_circular_includes_from = [ "//net/dns/public" ]
Eric Orth24feb5b2018-05-25 19:42:46239}
240
Eric Orth0bea1662019-03-20 19:11:22241# Shared mostly-global handler of HostResolver requests.
242#
243# Typically should only be directly interacted with by NetworkService (or other
244# mostly-global creators of request contexts), standalone tools, and tests. Host
245# resolution should generally instead go through HostResolvers received from
246# URLRequestContext or network service Mojo IPCs.
247source_set("host_resolver_manager") {
248 # Due to circular dependencies, should only be depended on through //net.
249 # Limit visibility to //net and other source_sets with the same access
250 # restriction.
251 visibility = [
252 ":dns",
253 ":host_resolver",
254 "//net",
255 ]
256
Ryan Sleevia9d6aa62019-07-26 13:32:18257 # Restricted access so we can keep track of all usage external to the
Eric Orth0bea1662019-03-20 19:11:22258 # network stack and network service.
259 friend = [
Eric Orth89f8c0d2019-04-08 16:42:45260 # chromecast/browser/url_request_context_factory.cc
261 # URLRequestContext creation for chromecast.
262 "//chromecast/browser",
263
Eric Orth4e55b362019-05-07 22:00:03264 # Tests and test support.
265 "//components/cronet:cronet_common_unittests",
266
Eric Orth0bea1662019-03-20 19:11:22267 # Network stack/service.
268 "//net/*",
269 "//services/network/*",
270 ]
271
272 sources = []
273 public = []
274
275 if (!is_nacl) {
276 sources += [ "host_resolver_manager.h" ]
277 }
278
279 deps = [
280 ":host_resolver",
281 "//net:net_deps",
282 "//net/dns/public",
283 ]
Nico Webera2afc7f2020-01-13 21:06:20284 public_deps = [ "//net:net_public_deps" ]
Eric Orth0bea1662019-03-20 19:11:22285}
286
Eric Orth1556c382018-11-08 06:05:02287# DnsClient interfaces. Primarily intended as part of the implementation of the
Eric Orth24feb5b2018-05-25 19:42:46288# standard HostResolver interface, but can be used as an alternative external
289# interface for advanced usage.
Eric Orth24feb5b2018-05-25 19:42:46290source_set("dns_client") {
291 # Due to circular dependencies, should only be depended on through //net.
292 # Limit visibility to //net and other source_sets with the same access
293 # restriction.
294 visibility = [
295 ":dns",
296 ":mdns_client",
297 "//net",
298 ]
299
Ryan Sleevia9d6aa62019-07-26 13:32:18300 # Restricted access so we can keep track of all usage external to the
Eric Orth24feb5b2018-05-25 19:42:46301 # network stack.
302 friend = [
Eric Orth1556c382018-11-08 06:05:02303 # chrome/browser/local_discovery/service_discovery_client_impl.cc
304 # Result parsing utilities for parsing results read through MdnsClient.
305 # TODO(crbug.com/874662): Remove once migrated to network service.
Eric Orth24feb5b2018-05-25 19:42:46306 "//chrome/browser",
Eric Orth1556c382018-11-08 06:05:02307
308 # chrome/browser/chromeos/smb_client/discovery/mdns_host_locator.cc
309 # Result parsing for results read through MdnsClient.
310 # TODO(crbug.com/902531): Remove once migrated to network service.
Eric Orth24feb5b2018-05-25 19:42:46311 "//chrome/browser/chromeos",
Eric Orth1556c382018-11-08 06:05:02312
313 # Tests and test support
314 "//chrome/browser:test_support",
Eric Orth24feb5b2018-05-25 19:42:46315 "//chrome/test/*",
Eric Orth1556c382018-11-08 06:05:02316
317 # Network stack/service
Eric Orth24feb5b2018-05-25 19:42:46318 "//components/certificate_transparency/*",
319 "//net/*",
Eric Orth168a7e52018-08-27 19:11:32320 "//services/network/*",
Eric Orth24feb5b2018-05-25 19:42:46321 ]
322
323 sources = []
324 public = []
325
326 if (!is_nacl) {
327 sources += [
328 "dns_client.h",
329 "dns_response.h",
330 "dns_transaction.h",
Eric Orth464d51452020-10-29 14:48:20331 "https_record_rdata.h",
Eric Orth24feb5b2018-05-25 19:42:46332 "record_parsed.h",
333 "record_rdata.h",
334 ]
335 }
336
337 deps = [
dalykbd726ee2019-05-30 01:44:06338 ":host_resolver",
Eric Orth24feb5b2018-05-25 19:42:46339 "//net:net_deps",
340 ]
341 public_deps = [
342 "//net:net_public_deps",
Eric Orth8afaf152018-11-07 21:01:26343 "//net/dns/public",
Eric Orth24feb5b2018-05-25 19:42:46344 ]
345}
346
347# MdnsClient interfaces.
Eric Orth24feb5b2018-05-25 19:42:46348source_set("mdns_client") {
349 # Due to circular dependencies, should only be depended on through //net.
350 # Limit visibility to //net and other source_sets with the same access
351 # restriction.
352 visibility = [
353 ":dns",
354 "//net",
355 ]
356
Ryan Sleevia9d6aa62019-07-26 13:32:18357 # Restricted access so we can keep track of all usage external to the
Eric Orth24feb5b2018-05-25 19:42:46358 # network stack.
359 friend = [
Eric Orth1556c382018-11-08 06:05:02360 # chrome/browser/local_discovery/service_discovery_client_mdns.h
361 # chrome/browser/local_discovery/service_discovery_client_impl.h
362 # Makes MDNS queries using MDnsClient.
363 # TODO(crbug.com/874662): Remove once migrated to network service.
Eric Orth24feb5b2018-05-25 19:42:46364 "//chrome/browser",
Eric Orth1556c382018-11-08 06:05:02365
366 # chrome/tools/service_discovery_sniffer/service_discovery_sniffer.cc
367 # Creates MDnsClient instance and passes to ServiceDiscoveryClientImpl.
368 # TODO(crbug.com/874662): Remove once discovery client migrated.
Eric Orth24feb5b2018-05-25 19:42:46369 "//chrome/tools/service_discovery_sniffer",
Eric Orth1556c382018-11-08 06:05:02370
371 # chrome/browser/chromeos/smb_client/discovery/mdns_host_locator.h
372 # chrome/browser/chromeos/smb_client/discovery/mdns_host_locator.cc
373 # Makes MDNS queries using MDnsClient.
374 # TODO(crbug.com/902531): Remove once migrated to network service.
375 "//chrome/browser/chromeos",
376
377 # Tests and test support
378 "//chrome/browser:test_support",
379
380 # Network stack/service
Eric Orth24feb5b2018-05-25 19:42:46381 "//net/*",
Qingsi Wangc2213d5d2018-11-02 01:28:12382 "//services/network/*",
Eric Orth24feb5b2018-05-25 19:42:46383 ]
384
385 public = []
386 sources = []
387
388 if (!is_nacl && enable_mdns) {
389 sources += [ "mdns_client.h" ]
390 }
391
392 deps = [
393 ":dns_client",
Eric Orth168a7e52018-08-27 19:11:32394 ":host_resolver",
Eric Orth24feb5b2018-05-25 19:42:46395 "//net:net_deps",
396 ]
Nico Webera2afc7f2020-01-13 21:06:20397 public_deps = [ "//net:net_public_deps" ]
Eric Orth24feb5b2018-05-25 19:42:46398}
399
Eric Orth24feb5b2018-05-25 19:42:46400source_set("tests") {
401 testonly = true
402 sources = [
Scott Sheehan135dadb2019-10-30 17:50:47403 "address_info_unittest.cc",
Eric Orth5233c3a2019-04-08 17:01:14404 "context_host_resolver_unittest.cc",
Cammie Smith Barnes958c7f32020-12-17 16:43:11405 "dns_alias_utility_unittest.cc",
Eric Orth24feb5b2018-05-25 19:42:46406 "dns_config_service_unittest.cc",
Eric Orth24feb5b2018-05-25 19:42:46407 "dns_hosts_unittest.cc",
408 "dns_query_unittest.cc",
Eric Orth9cec76f2020-11-17 07:42:42409 "dns_response_result_extractor_unittest.cc",
Eric Orth24feb5b2018-05-25 19:42:46410 "dns_response_unittest.cc",
Eric Orth9300cc62020-08-21 00:29:34411 "dns_socket_allocator_unittest.cc",
Eric Orth24feb5b2018-05-25 19:42:46412 "dns_transaction_unittest.cc",
Eric Orthf8680ac2020-06-10 22:57:24413 "dns_udp_tracker_unittest.cc",
Eric Orth24feb5b2018-05-25 19:42:46414 "dns_util_unittest.cc",
415 "host_cache_unittest.cc",
Eric Orth960e7062019-03-08 18:43:54416 "host_resolver_manager_unittest.cc",
Eric Orth464d51452020-10-29 14:48:20417 "https_record_rdata_unittest.cc",
Daniel McArdle4e2037e2020-06-11 22:40:51418 "httpssvc_metrics_unittest.cc",
Eric Orth24feb5b2018-05-25 19:42:46419 "mapped_host_resolver_unittest.cc",
420 "record_parsed_unittest.cc",
421 "record_rdata_unittest.cc",
Eric Orthf3495942020-01-31 21:14:18422 "resolve_context_unittest.cc",
Eric Orth24feb5b2018-05-25 19:42:46423 "serial_worker_unittest.cc",
Eric Orthde0c5662019-06-25 15:36:02424 "system_dns_config_change_notifier_unittest.cc",
Eric Orth24feb5b2018-05-25 19:42:46425 ]
426
Sylvain Defresne2a262082020-09-15 11:19:58427 if (is_win) {
428 sources += [ "dns_config_service_win_unittest.cc" ]
429 }
430
Eric Orthf18db28c92021-02-09 01:54:35431 if (is_android) {
432 sources += [ "dns_config_service_android_unittest.cc" ]
Eric Orthf79bc2e2021-04-02 22:23:06433 } else if (is_linux) {
434 sources += [ "dns_config_service_linux_unittest.cc" ]
Eric Orthf18db28c92021-02-09 01:54:35435 } else if (is_posix) {
Eric Orth24feb5b2018-05-25 19:42:46436 sources += [ "dns_config_service_posix_unittest.cc" ]
437 }
438
439 if (enable_built_in_dns) {
Eric Orth394db1732019-08-27 20:09:39440 sources += [
441 "address_sorter_unittest.cc",
442 "dns_client_unittest.cc",
443 ]
Eric Orth24feb5b2018-05-25 19:42:46444 if (is_posix || is_fuchsia) {
445 sources += [ "address_sorter_posix_unittest.cc" ]
446 }
447 }
448
Eric Orth24feb5b2018-05-25 19:42:46449 if (enable_mdns) {
450 sources += [
451 "mdns_cache_unittest.cc",
452 "mdns_client_unittest.cc",
453 ]
454 }
455
456 deps = [
457 "//base",
458 "//net",
459 "//net:test_support",
460 "//testing/gmock",
461 "//testing/gtest",
462 ]
Eric Orth24feb5b2018-05-25 19:42:46463}
464
465source_set("test_support") {
Eric Orthaf82b49a2020-02-01 01:48:50466 visibility = [ "//net:test_support" ]
Eric Orth24feb5b2018-05-25 19:42:46467 testonly = true
468 sources = [
Scott Sheehan135dadb2019-10-30 17:50:47469 "address_info_test_util.cc",
Eric Orth24feb5b2018-05-25 19:42:46470 "dns_test_util.cc",
471 "mock_host_resolver.cc",
Eric Orthde0c5662019-06-25 15:36:02472 "test_dns_config_service.cc",
Eric Orth24feb5b2018-05-25 19:42:46473 ]
474 public = [
Scott Sheehan135dadb2019-10-30 17:50:47475 "address_info_test_util.h",
Eric Orth24feb5b2018-05-25 19:42:46476 "dns_test_util.h",
477 "mock_host_resolver.h",
Eric Orthde0c5662019-06-25 15:36:02478 "test_dns_config_service.h",
Eric Orth24feb5b2018-05-25 19:42:46479 ]
480
481 if (enable_mdns) {
Eric Orth9871aafa2018-10-02 19:59:18482 sources += [
483 "mock_mdns_client.cc",
484 "mock_mdns_socket_factory.cc",
485 ]
486 public += [
487 "mock_mdns_client.h",
488 "mock_mdns_socket_factory.h",
489 ]
Eric Orth24feb5b2018-05-25 19:42:46490 }
491
492 deps = [
493 "//base",
494 "//net",
495 "//testing/gmock",
496 "//testing/gtest",
497 ]
498}
499
Max Morozc3dc6fc2019-08-29 20:04:28500if (use_fuzzing_engine) {
501 # fuzzer_test targets are no-op when |use_fuzzing_engine| is false. Fuzzer
502 # support targets should be disabled too.
503 source_set("fuzzer_test_support") {
504 testonly = true
505 sources = [
506 "fuzzed_host_resolver_util.cc",
507 "fuzzed_host_resolver_util.h",
508 ]
509 deps = [
510 "//base",
511 "//base/test:test_support",
512 "//net",
513 ]
514 }
Eric Orth24feb5b2018-05-25 19:42:46515}
516
Daniel McArdlebeba04c522020-05-05 20:49:17517fuzzer_test("net_dns_host_cache_fuzzer") {
518 sources = [ "host_cache_fuzzer.cc" ]
519 deps = [
520 "//base",
521 "//net",
522 "//net:net_fuzzer_test_support",
523 ]
524 dict = "//testing/libfuzzer/fuzzers/dicts/json.dict"
525}
526
Eric Orth24feb5b2018-05-25 19:42:46527fuzzer_test("net_dns_hosts_parse_fuzzer") {
Nico Webera2afc7f2020-01-13 21:06:20528 sources = [ "dns_hosts_parse_fuzzer.cc" ]
Eric Orth24feb5b2018-05-25 19:42:46529 deps = [
530 "//base",
531 "//net",
532 "//net:net_fuzzer_test_support",
533 ]
534 dict = "//net/data/fuzzer_dictionaries/net_dns_hosts_parse_fuzzer.dict"
535}
536
Eric Orth59fa4b22020-10-29 17:35:32537fuzzer_test("net_dns_https_record_rdata_fuzzer") {
538 sources = [ "https_record_rdata_fuzzer.cc" ]
539 deps = [
540 "//base",
541 "//net",
542 "//net:net_fuzzer_test_support",
543 ]
544 dict = "//net/data/fuzzer_dictionaries/net_dns_record_fuzzer.dict"
545}
546
Daniel McArdle96b6dcc2020-04-13 22:34:41547fuzzer_test("net_dns_integrity_record_fuzzer") {
548 sources = [ "integrity_record_fuzzer.cc" ]
549 deps = [
550 "//base",
551 "//net",
552 "//net:net_fuzzer_test_support",
553 ]
554}
555
Eric Orth24feb5b2018-05-25 19:42:46556fuzzer_test("net_dns_record_fuzzer") {
Nico Webera2afc7f2020-01-13 21:06:20557 sources = [ "dns_record_fuzzer.cc" ]
Eric Orth24feb5b2018-05-25 19:42:46558 deps = [
559 "//base",
560 "//net",
561 "//net:net_fuzzer_test_support",
562 ]
563 dict = "//net/data/fuzzer_dictionaries/net_dns_record_fuzzer.dict"
564}
565
Qingsi Wangecd69252018-09-27 21:35:55566fuzzer_test("net_dns_query_parse_fuzzer") {
Nico Webera2afc7f2020-01-13 21:06:20567 sources = [ "dns_query_parse_fuzzer.cc" ]
Qingsi Wangecd69252018-09-27 21:35:55568 deps = [
569 "//base",
570 "//net",
571 "//net:net_fuzzer_test_support",
572 ]
573 dict = "//net/data/fuzzer_dictionaries/net_dns_record_fuzzer.dict"
574}
575
Qingsi Wang65841072018-10-09 01:14:45576fuzzer_test("net_dns_response_fuzzer") {
Nico Webera2afc7f2020-01-13 21:06:20577 sources = [ "dns_response_fuzzer.cc" ]
Qingsi Wang65841072018-10-09 01:14:45578 deps = [
579 "//base",
580 "//net",
581 "//net:net_fuzzer_test_support",
582 ]
583 dict = "//net/data/fuzzer_dictionaries/net_dns_record_fuzzer.dict"
584}
585
Eric Orth960e7062019-03-08 18:43:54586fuzzer_test("net_host_resolver_manager_fuzzer") {
Nico Webera2afc7f2020-01-13 21:06:20587 sources = [ "host_resolver_manager_fuzzer.cc" ]
Eric Orth24feb5b2018-05-25 19:42:46588 deps = [
589 "//base",
590 "//net",
591 "//net:net_fuzzer_test_support",
592 "//net:test_support",
593 ]
Eric Orth960e7062019-03-08 18:43:54594 dict = "//net/data/fuzzer_dictionaries/net_host_resolver_manager_fuzzer.dict"
Eric Orth24feb5b2018-05-25 19:42:46595}
Max Morozf5eeca02018-12-01 18:43:30596
597if (is_win) {
598 fuzzer_test("net_dns_parse_domain_ascii_win_fuzzer") {
Nico Webera2afc7f2020-01-13 21:06:20599 sources = [ "dns_parse_domain_ascii_win_fuzzer.cc" ]
Max Morozf5eeca02018-12-01 18:43:30600 deps = [
601 "//base",
602 "//net",
603 "//net:net_fuzzer_test_support",
604 ]
Max Morozcd52e3f2019-10-10 20:04:47605 dict = "//net/data/fuzzer_dictionaries/net_dns_hosts_parse_fuzzer.dict"
606 seed_corpus = "//net/data/fuzzer_data/dns_parse_domain_ascii_win_fuzzer"
Max Morozf5eeca02018-12-01 18:43:30607 }
608}