[fuzz] added fuzzer for network filter "ext_authz" #11702
[fuzz] added fuzzer for network filter "ext_authz" #11702asraa merged 11 commits intoenvoyproxy:masterfrom
Conversation
Signed-off-by: jianwen <jianwendong@google.com>
Signed-off-by: jianwen <jianwendong@google.com>
Signed-off-by: jianwen <jianwendong@google.com>
Signed-off-by: jianwen <jianwendong@google.com>
Signed-off-by: jianwen <jianwendong@google.com>
Signed-off-by: jianwen <jianwendong@google.com>
test/extensions/filters/network/ext_authz/ext_authz_fuzz_test.cc
Outdated
Show resolved
Hide resolved
"resultCaseToCheckStatus" function. Signed-off-by: jianwen <jianwendong@google.com>
test/extensions/filters/network/ext_authz/ext_authz_fuzz_test.cc
Outdated
Show resolved
Hide resolved
| filter_callbacks.connection_.raiseEvent(Network::ConnectionEvent::RemoteClose); | ||
| break; | ||
| } | ||
| case envoy::extensions::filters::network::ext_authz::Action::kLocalClose: { |
There was a problem hiding this comment.
Is there a contract about this? If the we have a LocalClose and then try to call onData, what happens?
There was a problem hiding this comment.
Is there a contract about this? If the we have a LocalClose and then try to call onData, what happens?
LocalClose and RemoteClose will have the same effect on the filter: if there is a call which is being processed, the filter will cancel it. And stats info will change config_->stats().active_.dec(); No other effect on following onData().
variable addr Signed-off-by: jianwen <jianwendong@google.com>
Signed-off-by: jianwen <jianwendong@google.com>
Signed-off-by: jianwen <jianwendong@google.com>
|
I think you may need to merge master to fix the coverage CI failure. |
Merge remote-tracking branch 'upstream/master' into ext_authz_fuzz Signed-off-by: jianwen <jianwendong@google.com>
Thanks! Merged. |
|
@dio Can you take a quick look at this? It's a fuzzer we're writing for ext_authz network filter |
|
This pull request has been automatically marked as stale because it has not had activity in the last 7 days. It will be closed in 7 days if no further activity occurs. Please feel free to give a status update now, ping for review, or re-open when it's ready. Thank you for your contributions! |
Added fuzz test code for network filter ext_authz. Added test input protobuf. Added two simple test cases. After running for one minute with libfuzzer: Line coverage for the .cc and .h files of ext_authz is 94.9 % Function coverage for the .cc and .h files of ext_authz is 81.2% Signed-off-by: jianwen <jianwendong@google.com> Signed-off-by: scheler <santosh.cheler@appdynamics.com>
Commit Message:
Additional Description:
Added fuzz test code for network filter
ext_authz. Added test input protobuf. Added two simple test cases.Risk Level: Low
Testing:
After running for one minute with libfuzzer:
Line coverage for the .cc and .h files of
ext_authzis 94.9 %Function coverage for the .cc and .h files of
ext_authzis 81.2%Running with libfuzzer(compiled with
optparameter), some output:#[1001] NEW cov: 52728 ft: 68301 corp: 231/89Kb lim: 4096 exec/s: 250 rss: 263Mb L: 516/1547 MS: 1 CustomCrossOver-
#[2001] NEW cov: 53794 ft: 76654 corp: 358/194Kb lim: 4096 exec/s: 250 rss: 339Mb L: 2186/2280 MS: 5 CustomCrossOver-CustomCrossOver-CustomCrossOver-InsertRepeatedBytes-Custom-
#[3002] NEW cov: 54462 ft: 81081 corp: 447/283Kb lim: 4096 exec/s: 230 rss: 417Mb L: 1199/2486 MS: 7 Custom-ChangeBinInt-Custom-CopyPart-EraseBytes-ChangeByte-Custom-
#[5132] NEW cov: 54812 ft: 87536 corp: 575/441Kb lim: 4096 exec/s: 233 rss: 575Mb L: 1150/3625 MS: 4 Custom-CustomCrossOver-InsertRepeatedBytes-Custom-
/cc @asraa
/cc @samkerner