-
Notifications
You must be signed in to change notification settings - Fork 1.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fuzzing: add fuzzers from cncf-fuzzing #6569
Conversation
a5f46b9
to
7e6608e
Compare
|
@AdamKorcz this is great, thanks :) How are these being used? How can we trigger fuzz tests ourselves? |
ca76a5f
to
5628c3c
Compare
|
Thanks from me as well @AdamKorcz 😄 I'm also been doing some fuzz testing with our integration tests here. I think it's definitely a good idea for us to have fuzz testing at both the unit and integration level. As a project, I think we should be using the same underlying fuzz testing library, so we need to decide on either Also notice you are using a personal fork of the upstream |
That is great!
I have not used gofuzz extensively. When I tried it (a couple of years ago) I found it to be ineffective. The project is more or less unmaintained, and I am not able to improve it. All projects here use go-fuzz-headers (along with containerd, Istio and non-CNCF projects as well): https://github.com/cncf/cncf-fuzzing/tree/main/projects.
This is because my branch has breaking changes that I want to upstream. I should do that within 1-2 weeks. |
They are running continuously on OSS-Fuzz
You can run them locally with |
Codecov ReportPatch coverage has no change and project coverage change:
Additional details and impacted files@@ Coverage Diff @@
## master #6569 +/- ##
==========================================
- Coverage 64.99% 64.87% -0.12%
==========================================
Files 228 232 +4
Lines 20823 20646 -177
==========================================
- Hits 13533 13395 -138
+ Misses 6163 6135 -28
+ Partials 1127 1116 -11 ☔ View full report in Codecov by Sentry. |
Thanks, I am very interested to know what was ineffective. This package is now heavily used in our integration tests and we should change that now to avoid a larger rewrite in future if it is not good enough.
👍 |
| @@ -0,0 +1,75 @@ | |||
| /* | |||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Because fuzz tests can be compute-intensive, should we add a build tag so they're only run when those tests are invoked?
for example, build tag fuzztesting and then we add a command to the makefile make test-fuzz?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
+1
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If you run the fuzzers without the -fuzz flag, then they will run as unit tests, and as such, I don't believe a dedicated make rule is necessary to run the fuzzers.
Signed-off-by: AdamKorcz <adam@adalogics.com>
Signed-off-by: AdamKorcz <adam@adalogics.com>
Signed-off-by: AdamKorcz <adam@adalogics.com>
Signed-off-by: AdamKorcz <adam@adalogics.com>
Signed-off-by: AdamKorcz <adam@adalogics.com>
|
The failing CI tests look unrelated to me. |
|
This pull request has been automatically marked as stale because it has not had activity in the last 60 days. It will be closed in 7 days if no further activity occurs. Please feel free to give a status update now, ping for review, or re-open when it's ready. Thank you for your contributions! |
|
This pull request has been automatically closed because it has not had activity in the last 67 days. Please feel free to give a status update now, ping for review, or re-open when it's ready. Thank you for your contributions! |
Description
Issue reference
Moves the fuzzers to Daprs repository from cncf-fuzzing.
cc @ItalyPaleAle
Checklist
Please make sure you've completed the relevant tasks for this PR, out of the following list: