• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1# Copyright (c) 2025 Huawei Device Co., Ltd.
2# Licensed under the Apache License, Version 2.0 (the "License");
3# you may not use this file except in compliance with the License.
4# You may obtain a copy of the License at
5#
6#     http://www.apache.org/licenses/LICENSE-2.0
7#
8# Unless required by applicable law or agreed to in writing, software
9# distributed under the License is distributed on an "AS IS" BASIS,
10# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
11# See the License for the specific language governing permissions and
12# limitations under the License.
13
14import("//build/config/features.gni")
15import("//build/test.gni")
16import("//foundation/filemanagement/storage_service/storage_service_aafwk.gni")
17
18ohos_fuzztest("StorageDaemonProviderFuzzTest") {
19  module_out_path = "storage_service/storage_service"
20  fuzz_config_file = "${storage_service_path}/test/fuzztest/storagedaemonprovider_fuzzer"
21  include_dirs = [
22    "${storage_service_common_path}/include",
23    "${storage_daemon_path}/include",
24    "${storage_daemon_path}/include/crypto",
25    "${storage_daemon_path}/include/ipc",
26    "${storage_daemon_path}/include/quota",
27    "${storage_daemon_path}/include/user",
28    "${storage_daemon_path}/include/utils",
29    "${storage_interface_path}/innerkits/storage_manager/native",
30  ]
31  cflags = [
32    "-g",
33    "-O0",
34    "-Wno-unused-variable",
35    "-fno-omit-frame-pointer",
36  ]
37  sources = [
38    "${storage_daemon_path}/crypto/src/key_manager.cpp",
39    "${storage_daemon_path}/ipc/src/storage_daemon.cpp",
40    "${storage_daemon_path}/ipc/src/storage_daemon_provider.cpp",
41    "${storage_daemon_path}/quota/quota_manager.cpp",
42    "${storage_daemon_path}/user/src/mount_manager.cpp",
43    "${storage_daemon_path}/user/src/mount_manager_ext.cpp",
44    "${storage_daemon_path}/user/src/user_manager.cpp",
45    "${storage_daemon_path}/utils/string_utils.cpp",
46    "${storage_daemon_path}/observer/appstate_observer.cpp",
47    "${storage_manager_path}/innerkits_impl/src/storage_file_raw_data.cpp",
48    "${storage_service_path}/test/fuzztest/storagedaemonprovider_fuzzer/storagedaemonprovider_fuzzer.cpp",
49  ]
50
51  defines = [
52    "STORAGE_LOG_TAG = \"storage_service\"",
53    "STORAGE_DAEMON_FUZZ_TEST",
54  ]
55  deps = [
56    "${storage_daemon_path}:storage_common_utils",
57    "${storage_daemon_path}:storage_daemon_ipc",
58    "${storage_daemon_path}/libfscrypt:libfscryptutils",
59
60  ]
61
62  external_deps = [
63    "ability_base:zuri",
64    "ability_runtime:abilitykit_native",
65    "app_file_service:fileshare_native",
66    "app_file_service:fileuri_native",
67    "app_file_service:sandbox_helper_native",
68    "bundle_framework:appexecfwk_core",
69    "cJSON:cjson",
70    "c_utils:utils",
71    "eventhandler:libeventhandler",
72    "hicollie:libhicollie",
73    "hilog:libhilog",
74    "hisysevent:libhisysevent",
75    "huks:libhukssdk",
76    "init:libbegetutil",
77    "ipc:ipc_single",
78    "safwk:system_ability_fwk",
79    "samgr:samgr_proxy",
80    "zlib:shared_libz",
81  ]
82
83  if (storage_service_cloud_fuse) {
84    defines += [ "DFS_SERVICE" ]
85    external_deps += [ "dfs_service:cloud_daemon_kit_inner" ]
86  }
87
88  if (enable_user_auth_framework) {
89    defines += [ "USER_AUTH_FRAMEWORK" ]
90    external_deps += [ "user_auth_framework:userauth_client" ]
91  }
92
93  if (enable_tee_client) {
94    defines += [ "RECOVER_KEY_TEE_ENVIRONMENT" ]
95    external_deps += [ "tee_client:libteec" ]
96  }
97  if (storage_service_media_fuse) {
98    defines += [ "STORAGE_SERVICE_MEDIA_FUSE" ]
99    external_deps += [ "ability_runtime:app_manager" ]
100  }
101  use_exceptions = true
102}
103
104group("fuzztest") {
105  testonly = true
106  deps = [ ":StorageDaemonProviderFuzzTest" ]
107}
108