summaryrefslogtreecommitdiff
path: root/lib
Commit message (Collapse)AuthorAgeFilesLines
...
* ldb: Ensure @IDXONE modes is tested in ldb.python (apy.py) testsAndrew Bartlett2020-02-251-1/+68
| | | | | | Signed-off-by: Andrew Bartlett <abartlet@samba.org> Reviewed-by: Stefan Metzmacher <metze@samba.org> (cherry picked from commit ec34a7095705592279647c5046a000e0bf052d1a)
* ldb: Add tests aimed at the SCOPE_ONELEVEL particularAndrew Bartlett2020-02-251-0/+171
| | | | | | | | BUG: https://bugzilla.samba.org/show_bug.cgi?id=14270 Signed-off-by: Andrew Bartlett <abartlet@samba.org> Reviewed-by: Stefan Metzmacher <metze@samba.org> (cherry picked from commit 167676973b7f1db563da04d54e8ce5668034081c)
* ldb: Add tests for one-level indexes in conjunction with other indexesAndrew Bartlett2020-02-251-0/+251
| | | | | | | | BUG: https://bugzilla.samba.org/show_bug.cgi?id=14270 Signed-off-by: Andrew Bartlett <abartlet@samba.org> Reviewed-by: Stefan Metzmacher <metze@samba.org> (cherry picked from commit 17bd63dbea7f6e6358f81f0ac5b9392b2321bb32)
* lib/replace: remove unused check for aio.hStefan Metzmacher2020-02-191-1/+1
| | | | | | Signed-off-by: Stefan Metzmacher <metze@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org> (cherry picked from commit c1b9bf993402f7d74f992c609ede94653e87172f)
* lib:util: Log mkdir error on correct debug levelsAndreas Schneider2020-01-311-2/+5
| | | | | | | | | | | | | | | | | For smbd we want an error and for smbclient we only want it in NOTICE debug level. The default log level of smbclient is log level 1 so we need notice to not spam the user. BUG: https://bugzilla.samba.org/show_bug.cgi?id=14253 Signed-off-by: Andreas Schneider <asn@samba.org> Reviewed-by: Guenther Deschner <gd@samba.org> Autobuild-User(master): Günther Deschner <gd@samba.org> Autobuild-Date(master): Mon Jan 27 15:55:24 UTC 2020 on sn-devel-184 (cherry picked from commit 0ad6a243b259d284064c0c5abcc7d430d55be7e1)
* CVE-2019-14907 lib/util: Do not print the failed to convert string into the logsAndrew Bartlett2020-01-211-18/+20
| | | | | | | | | | The string may be in another charset, or may be sensitive and certainly may not be terminated. It is not safe to just print. Found by Robert Święcki using a fuzzer he wrote for smbd. BUG: https://bugzilla.samba.org/show_bug.cgi?id=14208 Signed-off-by: Andrew Bartlett <abartlet@samba.org>
* util: Add detection of libunwindMartin Schwenke2020-01-212-2/+11
| | | | | | | | | | | | The current detection doesn't seem to work, so libunwind doesn't seem to be used. Signed-off-by: Martin Schwenke <martin@meltin.net> Signed-off-by: Amitay Isaacs <amitay@gmail.com> Reviewed-by: Volker Lendecke <vl@samba.org> Autobuild-User(master): Martin Schwenke <martins@samba.org> Autobuild-Date(master): Tue Jan 21 08:12:17 UTC 2020 on sn-devel-184
* fuzz_oLschema2ldif: check multiple possible NULLsDouglas Bagnall2020-01-171-0/+11
| | | | | | | | | | | Address sanitizer will object to a theoretically possible NULL dereference so we can't ignore these checks in set-up. Signed-off-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz> Reviewed-by: Andreas Schneider <asn@samba.org> Autobuild-User(master): Andreas Schneider <asn@cryptomilk.org> Autobuild-Date(master): Fri Jan 17 14:33:18 UTC 2020 on sn-devel-184
* fuzzing: check for NULL on ldb_init()Douglas Bagnall2020-01-173-2/+11
| | | | | | | We simply return 0 because failure here is not a problem with the code we are actually trying to fuzz. Without this asan is unhappy. Signed-off-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz> Reviewed-by: Andreas Schneider <asn@samba.org>
* texpect: Avoid duplicate sys_write()Volker Lendecke2020-01-152-19/+2
| | | | | Signed-off-by: Volker Lendecke <vl@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org>
* texpect: Reformat long lineVolker Lendecke2020-01-151-1/+4
| | | | | | | There will be more deps soon Signed-off-by: Volker Lendecke <vl@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org>
* texpect: Use lib/replace's closefrom()Volker Lendecke2020-01-151-18/+1
| | | | | Signed-off-by: Volker Lendecke <vl@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org>
* fuzz: add nmblib/parse_packet targetDouglas Bagnall2020-01-152-0/+61
| | | | | | | | | | | | We want to ensure that parse_packet() can parse a packet without crashing, and that that parsed packet won't cause trouble further down the line. Signed-off-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz> Reviewed-by: Gary Lockyer <gary@catalyst.net.nz> Autobuild-User(master): Gary Lockyer <gary@samba.org> Autobuild-Date(master): Wed Jan 15 21:24:31 UTC 2020 on sn-devel-184
* fuzz: ldb binary decode/enodeDouglas Bagnall2020-01-152-0/+54
| | | | | Signed-off-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz> Reviewed-by: Gary Lockyer <gary@catalyst.net.nz>
* fuzz: add ldb ldif fuzzerDouglas Bagnall2020-01-152-0/+52
| | | | | Signed-off-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz> Reviewed-by: Gary Lockyer <gary@catalyst.net.nz>
* fuzz: ldb_dn parsingDouglas Bagnall2020-01-152-0/+49
| | | | | Signed-off-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz> Reviewed-by: Gary Lockyer <gary@catalyst.net.nz>
* lib ldb common: Fix memory leakldb-2.1.0Gary Lockyer2020-01-151-0/+1
| | | | | | | | | | TALLOC_FREE the ldb_control allocated in ldb_parse_control_from_string when none of the cases match. Credit to OSS-Fuzz Signed-off-by: Gary Lockyer <gary@catalyst.net.nz> Reviewed-by: David Disseldorp <ddiss@samba.org>
* fuzz: add a fuzzer for parsing ldb controlsDouglas Bagnall2020-01-122-0/+51
| | | | | | | | | | We have had issues here in the past. Signed-off-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz> Reviewed-by: Andrew Bartlett <abartlet@samba.org> Autobuild-User(master): Andrew Bartlett <abartlet@samba.org> Autobuild-Date(master): Sun Jan 12 21:21:30 UTC 2020 on sn-devel-184
* ldb controls: fix typo in bypassoperational messageDouglas Bagnall2020-01-121-1/+1
| | | | | Signed-off-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz> Reviewed-by: Andrew Bartlett <abartlet@samba.org>
* fuzz_ldap_decode: do not print to stdoutDouglas Bagnall2020-01-121-1/+0
| | | | | | | The fuzzer doesn't care and it slows things down Signed-off-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz> Reviewed-by: Andrew Bartlett <abartlet@samba.org>
* decode_ndr_X_crash: always find pipe in honggfuzz fileDouglas Bagnall2020-01-121-1/+1
| | | | | Signed-off-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz> Reviewed-by: Andrew Bartlett <abartlet@samba.org>
* lib/ldb/tests: include stdint.h before cmocka.hFabrice Fontaine2019-12-186-0/+6
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This fix the following build failures: [2466/3864] Linking bin/default/lib/ldb/ldbmodify In file included from /home/buildroot/autobuild/instance-0/output-1/host/opt/ext-toolchain/lib/gcc/mips64el-buildroot-linux-uclibc/5.5.0/include/stdint.h:9:0, from ../../lib/tevent/tevent.h:31, from ../../lib/ldb/include/ldb.h:51, from ../../lib/ldb/tests/test_ldb_dn.c:25: /home/buildroot/autobuild/instance-0/output-1/host/mips64el-buildroot-linux-uclibc/sysroot/usr/include/stdint.h:122:27: error: conflicting types for 'uintptr_t' typedef unsigned long int uintptr_t; ^ In file included from ../../lib/ldb/tests/test_ldb_dn.c:23:0: /home/buildroot/autobuild/instance-0/output-1/host/mips64el-buildroot-linux-uclibc/sysroot/usr/include/cmocka.h:132:28: note: previous declaration of 'uintptr_t' was here typedef unsigned int uintptr_t; ^ In file included from /home/buildroot/autobuild/instance-0/output-1/host/opt/ext-toolchain/lib/gcc/mips64el-buildroot-linux-uclibc/5.5.0/include/stdint.h:9:0, from ../../lib/tevent/tevent.h:31, from ../../lib/ldb/tests/ldb_key_value_test.c:48: /home/buildroot/autobuild/instance-0/output-1/host/mips64el-buildroot-linux-uclibc/sysroot/usr/include/stdint.h:122:27: error: conflicting types for 'uintptr_t' typedef unsigned long int uintptr_t; ^ In file included from ../../lib/ldb/tests/ldb_key_value_test.c:43:0: /home/buildroot/autobuild/instance-0/output-1/host/mips64el-buildroot-linux-uclibc/sysroot/usr/include/cmocka.h:132:28: note: previous declaration of 'uintptr_t' was here typedef unsigned int uintptr_t; ^ Fixes: - http://autobuild.buildroot.org/results/9507739b3d5d51024ee9c60b74c2f85d5004e7e2 BUG: https://bugzilla.samba.org/show_bug.cgi?id=14218 Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com> Reviewed-by: Uri Simchoni <uri@samba.org> Reviewed-by: Andreas Schneider <asn@samba.org>
* lib/replace: prefer <sys/xattr.h> over <attr/xattr.h>Ralph Boehme2019-12-181-3/+3
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This prevents the following compile error that may happens if "system/filesys.h" is included before "system/capability.h" on Ubuntu 16.04: [1802/4407] Compiling source3/lib/system.c In file included from ../../lib/replace/system/filesys.h:112:0, from ../../source3/include/vfs.h:29, from ../../source3/include/smb.h:150, from ../../source3/include/includes.h:284, from ../../source3/lib/system.c:23: /usr/include/x86_64-linux-gnu/sys/xattr.h:32:3: error: expected identifier before numeric constant XATTR_CREATE = 1, /* set value, fail if attr already exists. */ ^ The above error is from compiling a source tree which includes a change that adds an include "system/filesys.h" to the top of "source3/include/vfs.h". "source3/lib/system.c" has the following includes: #include "includes.h" #include "system/syslog.h" #include "system/capability.h" #include "system/passwd.h" #include "system/filesys.h" #include "../lib/util/setid.h" The first include of "includes.h" pulls in "vfs.h" which will pull in "system/filesys.h" with the mentioned change. "system/filesys.h" pulls in <attr/xattr.h> which has this define #define XATTR_CREATE 0x1 Later in "source3/lib/system.c" "system/capability.h" is included which includes <sys/xattr.h> on Ubuntu 16.04 (not in later versions of glibc). This defines the XATTR_* values as an enum: enum { XATTR_CREATE = 1, /* set value, fail if attr already exists. */ XATTR_REPLACE = 2 /* set value, fail if attr does not exist. */ }; The previous define of XATTR_CREATE as 1 makes this enum { 1 = 1, /* set value, fail if attr already exists. */ 2 = 2 /* set value, fail if attr does not exist. */ }; which is invalid C. The compiler error diagnostic is a bit confusing, as it prints the original enum from the include file. See also: <https://bugs.freedesktop.org/show_bug.cgi?id=78741> <https://bugs.launchpad.net/ubuntu/+source/attr/+bug/1288091> <https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=756097> Signed-off-by: Ralph Boehme <slow@samba.org> Reviewed-by: Björn Baumbach <bb@samba.org>
* lib/fuzzing and librpc: Do not generate fuzzers for pointless targetsAndrew Bartlett2019-12-181-3/+0
| | | | | | | | | We need to focus the fuzzing effort on reachable code, and these IDL are just historical artifacts, many are entirely [todo] and have no samba client nor server. Signed-off-by: Andrew Bartlett <abartlet@samba.org> Reviewed-by: Gary Lockyer <gary@catalyst.net.nz>
* lib/fuzzer: Allow coverage build for oss-fuzzAndrew Bartlett2019-12-181-0/+3
| | | | | | | | This still does not seem to be enough but it is one step towards a working coverage build. Signed-off-by: Andrew Bartlett <abartlet@samba.org> Reviewed-by: Gary Lockyer <gary@catalyst.net.nz>
* lib ldb: fix use after freeGary Lockyer2019-12-181-1/+1
| | | | | | | | | Fix ASAN detected use after free. No security implications as the talloc_free is followed immediately by the print statement and the value printed is an integer Signed-off-by: Gary Lockyer <gary@catalyst.net.nz> Reviewed-by: Andrew Bartlett <abartlet@samba.org>
* lib/fuzzing: Allow load of fuzz inputs as files on the command lineAndrew Bartlett2019-12-181-0/+14
| | | | | | | This is easier to put under gdb. Signed-off-by: Andrew Bartlett <abartlet@samba.org> Reviewed-by: Gary Lockyer <gary@catalyst.net.nz>
* lib/fuzzing: Initialise st buffer in fuzz_ndr_XAndrew Bartlett2019-12-181-0/+10
| | | | | | | | | | | | | | | | | | | | | | | An NDR pull of a function will fill in either the in. or out. elements of this structure, but never both. However, some structures have size_is() in the out. that reference the in. elements. This is the reason for the --context-file option in ndrdump. We have a special handler in the fuzzing case embedded in the pidl-generated output to cope with this, by filling in pointers for elements declared [ref,in] but it relies on the in-side (at least) of the buffer being zeroed. So zero the buffer before we start. Sadly this means things like valgrind can not find a use of uninitialised data, but that is a price we have to pay. Credit to OSS-Fuzz Signed-off-by: Andrew Bartlett <abartlet@samba.org> Reviewed-by: Gary Lockyer <gary@catalyst.net.nz>
* lib/replace: work around an API conflict between ncurses and XFS xattr APIRalph Boehme2019-12-121-6/+4
| | | | | | | | | | | | | | | | | | | | | Compile error: [4530/4693] Compiling source3/utils/regedit_list.c In file included from ../../source3/utils/regedit_list.h:24, from ../../source3/utils/regedit_list.c:20: /usr/include/curses.h:611:28: error: conflicting types for ‘attr_get’ 611 | extern NCURSES_EXPORT(int) attr_get (attr_t *, NCURSES_PAIRS_T *, void *); /* generated */ | ^~~~~~~~ compilation terminated due to -Wfatal-errors. Both ncurses and XFS xattr API provide a get_attr() function. As a workaround avoid including <sys|attr/attributes.h> if <attr|sys/xattr.h> is present. Signed-off-by: Ralph Boehme <slow@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org> Autobuild-User(master): Jeremy Allison <jra@samba.org> Autobuild-Date(master): Thu Dec 12 20:22:51 UTC 2019 on sn-devel-184
* lib/krb5_wrap: Remove unused smb_krb5_get_allowed_weak_crypto()Andrew Bartlett2019-12-112-52/+0
| | | | | | | | Signed-off-by: Andrew Bartlett <abartlet@samba.org> Reviewed-by: Isaac Boukris <iboukris@samba.org> Autobuild-User(master): Isaac Boukris <iboukris@samba.org> Autobuild-Date(master): Wed Dec 11 22:18:47 UTC 2019 on sn-devel-184
* lib/fuzzing: Fix argument order to ldb_filter_from_tree in fuzz_ldb_parse_treeAndrew Bartlett2019-12-111-1/+1
| | | | | | | | | | Found by the oss-fuzz CI tooling. Signed-off-by: Andrew Bartlett <abartlet@samba.org> Reviewed-by: Gary Lockyer <gary@samba.org> Autobuild-User(master): Andrew Bartlett <abartlet@samba.org> Autobuild-Date(master): Wed Dec 11 04:21:28 UTC 2019 on sn-devel-184
* lib/fuzzing: Split up automatically build fuzzers into TYPE_{IN,OUT,STRUCT}Andrew Bartlett2019-12-112-3/+19
| | | | | | | | | | | | The advise is that a fuzz target should be as small as possible so we split this up. Splitting up by function would build too many fuzzers, but this should help a little. See for example: https://github.com/google/fuzzing/blob/master/docs/good-fuzz-target.md#large-apis Signed-off-by: Andrew Bartlett <abartlet@samba.org> Reviewed-by: Gary Lockyer <gary@samba.org>
* lib/fuzzing: Ensure mem_ctx is freed each time fuzz_ldb_parse_tree is runAndrew Bartlett2019-12-111-2/+3
| | | | | Signed-off-by: Andrew Bartlett <abartlet@samba.org> Reviewed-by: Gary Lockyer <gary@samba.org>
* autobuild: extend autobuild with samba-fuzz job to build the fuzzers in AFL ↵Andrew Bartlett2019-12-112-1/+31
| | | | | | | | | | | | | mode using oss-fuzz scripts This helps ensure the build_samba.sh file keeps working and the fuzzers build (because they are excluded from the main build). This is not in the default autobuild because it uses too much space on sn-devel (4GB). Signed-off-by: Andrew Bartlett <abartlet@samba.org> Reviewed-by: Gary Lockyer <gary@samba.org>
* lib:crypto: Build intel aes-ni only if GnuTLS doesn't provide AES CMACAndreas Schneider2019-12-101-1/+2
| | | | | | | | Signed-off-by: Andreas Schneider <asn@samba.org> Reviewed-by: Andrew Bartlett <abartlet@samba.org> Autobuild-User(master): Andreas Schneider <asn@cryptomilk.org> Autobuild-Date(master): Tue Dec 10 20:30:57 UTC 2019 on sn-devel-184
* lib:crypto: Only build AES code if we need AES CMACAndreas Schneider2019-12-101-1/+2
| | | | | Signed-off-by: Andreas Schneider <asn@samba.org> Reviewed-by: Andrew Bartlett <abartlet@samba.org>
* lib:crypto: Remove our implementation of AES GCMAndreas Schneider2019-12-105-570/+0
| | | | | | | We require GnuTLS >= 3.4.7 which provides AES GCM. Signed-off-by: Andreas Schneider <asn@samba.org> Reviewed-by: Andrew Bartlett <abartlet@samba.org>
* lib:crypto: Remove our implementation of AES CCMAndreas Schneider2019-12-105-645/+0
| | | | | | | We require GnuTLS >= 3.4.7 which provides AES CCM. Signed-off-by: Andreas Schneider <asn@samba.org> Reviewed-by: Andrew Bartlett <abartlet@samba.org>
* bootstrap: Add chrpath as a required packageAndrew Bartlett2019-12-101-3/+0
| | | | | | | | | | | This is used to test build.sh, part of the oss-fuzz integration, and so also that we correctly build our fuzzers. Signed-off-by: Andrew Bartlett <abartlet@samba.org> Reviewed-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz> Autobuild-User(master): Andrew Bartlett <abartlet@samba.org> Autobuild-Date(master): Tue Dec 10 09:15:43 UTC 2019 on sn-devel-184
* lib/fuzzing Truncate the original files after RUNPATH manipulation in build.shAndrew Bartlett2019-12-101-0/+3
| | | | | | | This saves space on the rackspace runners in particular. Signed-off-by: Andrew Bartlett <abartlet@samba.org> Reviewed-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
* lib/fuzzing Add comments to explain RUNPATH manipulation in build.shAndrew Bartlett2019-12-101-0/+5
| | | | | Signed-off-by: Andrew Bartlett <abartlet@samba.org> Reviewed-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
* lib/fuzzing: Support an oss-fuzz build with either address or undefined ↵Andrew Bartlett2019-12-101-1/+17
| | | | | | | | | | | | | | | | behaviour sanitizers Add handler for $SANITIZER in build.sh This allows a build with the undefined behaviour sanitizer. Otherwise we fail the oss-fuzz CI because the UBSan build links with ASan. Once this in in then https://github.com/google/oss-fuzz/pull/3094 can be merged to oss-fuzz. Signed-off-by: Andrew Bartlett <abartlet@samba.org> Reviewed-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
* lib/fuzzing: Remove oss-fuzz build.sh stub from the Samba repoAndrew Bartlett2019-12-102-7/+0
| | | | | | | | | | | | | We need to ship the stub build.sh in the oss-fuzz repo, not ours. This is because otherwise the travis CI checks skip the build (it thinks we are not set up yet, or have been disabled). See https://github.com/google/oss-fuzz/pull/3094 for the PR creating a similar file there. This is very similar to how janus-gateway operates, so this is an accepted pattern. Signed-off-by: Andrew Bartlett <abartlet@samba.org> Reviewed-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
* oss-fuzz: Align build.sh sh parameters with pattern from the oss-fuzz projectAndrew Bartlett2019-12-101-1/+1
| | | | | | | | | | We should run build_samba.sh with -eux to ensure we exit on failure, refuse to use an unset varible and print the commands we are running. (The suggested build.sh on the oss-fuzz side uses -eu). Signed-off-by: Andrew Bartlett <abartlet@samba.org> Reviewed-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
* fuzz/decode_ndr_X_crash: -f to filter crashes by regexDouglas Bagnall2019-12-101-0/+12
| | | | | | | | | | | If you go: $ ./lib/fuzzing/decode_ndr_X_crash -H HONGGFUZZ_REPORT.txt -f 'SIG[^V]' > ./crash.sh you will get all the crashes and not the timeouts (which have SIGVTALARM). Signed-off-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz> Reviewed-by: Andrew Bartlett <abartlet@samba.org>
* lib/fuzzing: Add mode for the AFL fuzzerAndrew Bartlett2019-12-103-13/+83
| | | | | | | | This is helpful for ensuring the fuzzers still compile in autobuild as no library support is required. Signed-off-by: Andrew Bartlett <abartlet@samba.org> Reviewed-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
* lib/fuzzing: Also confirm we can make a string filter from the parsed tree ↵Andrew Bartlett2019-12-101-0/+2
| | | | | | | | | | | | | in fuzz_ldb_parse_tree This also avoids tree being an unused variable. This is similar to doing an ndr_push() in ndr_fuzz_X, it catches some of the cases where the parse is successful but the application code could misinterpret the structure. Signed-off-by: Andrew Bartlett <abartlet@samba.org> Reviewed-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
* lib/fuzzing: Tell the compiler we know we are ignoring errors in fuzz_reg_parseAndrew Bartlett2019-12-101-2/+1
| | | | | Signed-off-by: Andrew Bartlett <abartlet@samba.org> Reviewed-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
* lib/fuzzer: Allow building a fuzz binary for just one interfaceAndrew Bartlett2019-12-102-4/+37
| | | | | | | This helps direct the fuzzer at a particular function that we are concerned about. Signed-off-by: Andrew Bartlett <abartlet@samba.org> Reviewed-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
* lib/fuzzer: Remove rudundent install=False flag from fuzz_ndr_X build ruleAndrew Bartlett2019-12-101-1/+0
| | | | | Signed-off-by: Andrew Bartlett <abartlet@samba.org> Reviewed-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz>