1# Copyright (c) 2023-2025 Huawei Device Co., Ltd. 2# Licensed under the Apache License, Version 2.0 (the "License"); 3# you may not use this file except in compliance with the License. 4# You may obtain a copy of the License at 5# 6# http://www.apache.org/licenses/LICENSE-2.0 7# 8# Unless required by applicable law or agreed to in writing, software 9# distributed under the License is distributed on an "AS IS" BASIS, 10# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 11# See the License for the specific language governing permissions and 12# limitations under the License. 13 14import("//build/config/features.gni") 15import("//build/test.gni") 16import("//foundation/filemanagement/storage_service/storage_service_aafwk.gni") 17 18ohos_fuzztest("StorageDaemonDeleteShareFileFuzzTest") { 19 module_out_path = "storage_service/storage_service" 20 fuzz_config_file = "${storage_service_path}/test/fuzztest/storagedaemondeletesharefile_fuzzer" 21 include_dirs = [ 22 "${storage_service_common_path}/include", 23 "${storage_daemon_path}/include", 24 "${storage_daemon_path}/include/crypto", 25 "${storage_daemon_path}/include/ipc", 26 "${storage_daemon_path}/include/quota", 27 "${storage_daemon_path}/include/user", 28 "${storage_daemon_path}/include/utils", 29 "${storage_interface_path}/innerkits/storage_manager/native", 30 ] 31 cflags = [ 32 "-g", 33 "-O0", 34 "-Wno-unused-variable", 35 "-fno-omit-frame-pointer", 36 ] 37 sources = [ 38 "${storage_daemon_path}/crypto/src/key_manager.cpp", 39 "${storage_daemon_path}/ipc/src/storage_daemon.cpp", 40 "${storage_daemon_path}/quota/quota_manager.cpp", 41 "${storage_daemon_path}/user/src/mount_manager.cpp", 42 "${storage_daemon_path}/user/src/mount_manager_ext.cpp", 43 "${storage_daemon_path}/user/src/user_manager.cpp", 44 "${storage_daemon_path}/utils/file_utils.cpp", 45 "${storage_daemon_path}/utils/hi_audit.cpp", 46 "${storage_daemon_path}/utils/mount_argument_utils.cpp", 47 "${storage_daemon_path}/utils/storage_radar.cpp", 48 "${storage_daemon_path}/utils/storage_statistics_radar.cpp", 49 "${storage_daemon_path}/utils/storage_xcollie.cpp", 50 "${storage_daemon_path}/utils/string_utils.cpp", 51 "${storage_daemon_path}/utils/zip_util.cpp", 52 "${storage_manager_path}/innerkits_impl/src/storage_file_raw_data.cpp", 53 "${storage_service_path}/test/fuzztest/storagedaemondeletesharefile_fuzzer/storagedaemondeletesharefile_fuzzer.cpp", 54 ] 55 56 defines = [ 57 "STORAGE_LOG_TAG = \"storage_service\"", 58 "STORAGE_DAEMON_FUZZ_TEST", 59 ] 60 deps = [ 61 "${storage_daemon_path}:storage_common_utils", 62 "${storage_daemon_path}/libfscrypt:libfscryptutils", 63 ] 64 65 external_deps = [ 66 "ability_base:zuri", 67 "ability_runtime:abilitykit_native", 68 "app_file_service:fileshare_native", 69 "app_file_service:fileuri_native", 70 "app_file_service:sandbox_helper_native", 71 "bundle_framework:appexecfwk_core", 72 "cJSON:cjson", 73 "c_utils:utils", 74 "eventhandler:libeventhandler", 75 "hicollie:libhicollie", 76 "hilog:libhilog", 77 "hisysevent:libhisysevent", 78 "huks:libhukssdk", 79 "init:libbegetutil", 80 "ipc:ipc_single", 81 "safwk:system_ability_fwk", 82 "samgr:samgr_proxy", 83 "zlib:shared_libz", 84 ] 85 86 if (storage_service_cloud_fuse) { 87 defines += [ "DFS_SERVICE" ] 88 external_deps += [ "dfs_service:cloud_daemon_kit_inner" ] 89 } 90 91 if (enable_user_auth_framework) { 92 defines += [ "USER_AUTH_FRAMEWORK" ] 93 external_deps += [ "user_auth_framework:userauth_client" ] 94 } 95 96 if (enable_tee_client) { 97 defines += [ "RECOVER_KEY_TEE_ENVIRONMENT" ] 98 external_deps += [ "tee_client:libteec" ] 99 } 100 101 if (enable_huks_hdi) { 102 defines += [ "HUKS_IDL_ENVIRONMENT" ] 103 external_deps += [ "drivers_interface_huks:libhuks_proxy_1.1", ] 104 } 105 106 use_exceptions = true 107} 108 109group("fuzztest") { 110 testonly = true 111 deps = [ ":StorageDaemonDeleteShareFileFuzzTest" ] 112} 113