-
Notifications
You must be signed in to change notification settings - Fork 322
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Continuous fuzzing #289
Comments
Sounds like a good idea. I am missing the continuous fuzzing. |
Sure. To proceed, please leave the email addresses for maintainers to receive bug reports, and I will setup integration. |
Wow this is complicated to set up :/ |
yeah, can be tricky. If you need me to set it up, let me know, I have it ready already |
It is a prerequisite for using S2 in ClickHouse. |
All fuzzing has been migrated to Go 1.18 Fuzzing and there is 500K iteration fuzzing running on every PR now. I still have no objection to adding oss-fuzz. |
Wow! It means that the concern is resolved completely. Thank you! |
Okay, I will get a PR up on OSS-Fuzz this weekend for integration. |
@AdamKorcz I don't know if a complication is that is has several Fuzz tests, and as you can see I run them both with and without assembly I have an extended corpus from running them here. I try to keep the "public", in repo, corpus reasonably small, since it impacts the download size. It could be set up with a script that has If there is any way I can help, let me know. The go.yaml contains all the fuzz tests that are relevant. |
I feel that I am about to get into trouble with adding a seed file. (I have removed that line for now) Since your PR lists files to copy. I was thinking of adding a For dictionaries that is needed for the tests I could embed them in the binary with These are the solutions with the least disruptive updates I can think of, that also would require the least maintenance. |
Hello,
I see that Compress is being fuzzed which is awesome!
I would like to suggest setting up continuous fuzzing by way of Googles oss-fuzz infrastructure. Continuous fuzzing will help with running the fuzzers regularly as well as fuzzing for deeper bugs that take longer time to discover.
Oss-fuzz is a free service that is offered with an implied expectation that found bugs are fixed, so that the resources spent on fuzzing Compress go towards fixing bugs. I will be happy to integrate Compress into oss-fuzz. All I need are the email addresses for the maintainers that should receive potential bug reports. Note that these email addresses will be added to a public list that can be amended at any time.
The text was updated successfully, but these errors were encountered: