view tests/test-fuzz-targets.t @ 40775:4e02f25f31c6

match: test for overflow error in pattern If a single pattern is too large to handle, we raise an exception. This case is now doctested.
author Boris Feld <boris.feld@octobus.net>
date Thu, 22 Nov 2018 17:16:05 +0100
parents 46dcb9f14900
children 6c01fad8de32
line wrap: on
line source

#require test-repo

  $ cd $TESTDIR/../contrib/fuzz

#if clang-libfuzzer
  $ make -s clean all
#endif
#if no-clang-libfuzzer clang-6.0
  $ make -s clean all CC=clang-6.0 CXX=clang++-6.0
#endif
#if no-clang-libfuzzer no-clang-6.0
  $ exit 80
#endif

Just run the fuzzers for five seconds each to verify it works at all.
  $ ./bdiff -max_total_time 5
  $ ./mpatch -max_total_time 5
  $ ./xdiff -max_total_time 5