mirror of https://github.com/grpc/grpc.git
The new FuzzTest based fuzzing infrastructure automatically samples each fuzzer a little bit at test time, so we don't need a different CI job for this anymore. PiperOrigin-RevId: 720239914pull/38570/head
parent
4c7c1fa883
commit
27f09059e9
5 changed files with 0 additions and 135 deletions
@ -1,22 +0,0 @@ |
||||
#! /bin/bash -ex |
||||
# Copyright 2022 The gRPC Authors |
||||
# |
||||
# Licensed under the Apache License, Version 2.0 (the "License"); |
||||
# you may not use this file except in compliance with the License. |
||||
# You may obtain a copy of the License at |
||||
# |
||||
# http://www.apache.org/licenses/LICENSE-2.0 |
||||
# |
||||
# Unless required by applicable law or agreed to in writing, software |
||||
# distributed under the License is distributed on an "AS IS" BASIS, |
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
||||
# See the License for the specific language governing permissions and |
||||
# limitations under the License. |
||||
|
||||
dir=$(dirname "${0}") |
||||
cd "${dir}/../.." |
||||
# TODO(ctiller): this always reports success (the `|| true` below). |
||||
# this is because we're still building this out, and that detail should |
||||
# be corrected before we turn this live. |
||||
tools/bazel test `tools/bazel query "attr(tags, '\\bgrpc-fuzzer\\b', //test/...)"` \ |
||||
-c dbg --config fuzzer_asan --test_output=errors || true |
@ -1,27 +0,0 @@ |
||||
#!/usr/bin/env bash |
||||
# Copyright 2017 gRPC authors. |
||||
# |
||||
# Licensed under the Apache License, Version 2.0 (the "License"); |
||||
# you may not use this file except in compliance with the License. |
||||
# You may obtain a copy of the License at |
||||
# |
||||
# http://www.apache.org/licenses/LICENSE-2.0 |
||||
# |
||||
# Unless required by applicable law or agreed to in writing, software |
||||
# distributed under the License is distributed on an "AS IS" BASIS, |
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
||||
# See the License for the specific language governing permissions and |
||||
# limitations under the License. |
||||
|
||||
set -ex |
||||
|
||||
# Enter the gRPC repo root |
||||
cd $(dirname $0)/../../.. |
||||
|
||||
cat tools/internal_ci/linux/grpc_sample_fuzzers_failure_explanation.txt |
||||
|
||||
source tools/internal_ci/helper_scripts/prepare_build_linux_rc |
||||
|
||||
export DOCKERFILE_DIR=tools/dockerfile/test/cxx_debian11_x64 |
||||
export DOCKER_RUN_SCRIPT=tools/internal_ci/linux/grpc_sample_fuzzers_in_docker.sh |
||||
exec tools/run_tests/dockerize/build_and_run_docker.sh |
@ -1,31 +0,0 @@ |
||||
******************************************************************************* |
||||
******************************************************************************* |
||||
******************************************************************************* |
||||
******************************************************************************* |
||||
******************************************************************************* |
||||
|
||||
|
||||
HEY THIS TEST IS FAILING AND I DONT KNOW HOW TO REPRODUCE IT?? |
||||
|
||||
At the point when this file was authored, I had no idea how to get the crash |
||||
artifacts out of bazel/the fuzzer/kokoro/somewhere and onto your machine. |
||||
|
||||
Without that this seemed like a problem - why check whether fuzzers pass if |
||||
we can't debug them? |
||||
|
||||
My thinking is this: if we can find an example that fails within a few minutes |
||||
in CI, we can probably do likewise on your machine. |
||||
|
||||
Try: |
||||
|
||||
bazel build path/to/fuzzer --config=fuzzer_asan -c dbg |
||||
bazel-bin/path/to/fuzzer path/to/fuzzer_corpus -jobs=$CPUS -workers=$CPUS |
||||
|
||||
You should see whatever failure this CI job found before terribly long. |
||||
|
||||
|
||||
******************************************************************************* |
||||
******************************************************************************* |
||||
******************************************************************************* |
||||
******************************************************************************* |
||||
******************************************************************************* |
@ -1,28 +0,0 @@ |
||||
#!/usr/bin/env bash |
||||
# Copyright 2022 The gRPC Authors |
||||
# |
||||
# Licensed under the Apache License, Version 2.0 (the "License"); |
||||
# you may not use this file except in compliance with the License. |
||||
# You may obtain a copy of the License at |
||||
# |
||||
# http://www.apache.org/licenses/LICENSE-2.0 |
||||
# |
||||
# Unless required by applicable law or agreed to in writing, software |
||||
# distributed under the License is distributed on an "AS IS" BASIS, |
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
||||
# See the License for the specific language governing permissions and |
||||
# limitations under the License. |
||||
|
||||
set -ex |
||||
|
||||
# Enter the gRPC repo root |
||||
cd $(dirname $0)/../../.. |
||||
|
||||
# some extra pip packages are needed for the check_on_pr.py script to work |
||||
# TODO(jtattermusch): avoid needing to install these pip packages each time |
||||
time python3 -m pip install --user -r tools/internal_ci/helper_scripts/requirements.linux_perf.txt |
||||
|
||||
tools/run_tests/start_port_server.py |
||||
|
||||
tools/internal_ci/linux/run_if_c_cpp_modified.sh tools/fuzzing/sample_fuzzers.sh \ |
||||
-d "origin/$KOKORO_GITHUB_PULL_REQUEST_TARGET_BRANCH" |
@ -1,27 +0,0 @@ |
||||
# Copyright 2022 The gRPC Authors |
||||
# |
||||
# Licensed under the Apache License, Version 2.0 (the "License"); |
||||
# you may not use this file except in compliance with the License. |
||||
# You may obtain a copy of the License at |
||||
# |
||||
# http://www.apache.org/licenses/LICENSE-2.0 |
||||
# |
||||
# Unless required by applicable law or agreed to in writing, software |
||||
# distributed under the License is distributed on an "AS IS" BASIS, |
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
||||
# See the License for the specific language governing permissions and |
||||
# limitations under the License. |
||||
|
||||
# Config file for the internal CI (in protobuf text format) |
||||
|
||||
# Location of the continuous shell script in repository. |
||||
build_file: "grpc/tools/internal_ci/linux/grpc_sample_fuzzers.sh" |
||||
timeout_mins: 120 |
||||
action { |
||||
define_artifacts { |
||||
regex: "**/*sponge_log.*" |
||||
regex: "**/test.log" |
||||
regex: "github/grpc/reports/**" |
||||
regex: "**/crash-*" |
||||
} |
||||
} |
Loading…
Reference in new issue