[dev.fuzz] cmd/go: stream output when fuzzing

Previously, 'go test' streamed output when there were no package
arguments or when benchmarking. This CL expands that to include
fuzzing to ensure that coordinator progress messages are printed.

This change tweaks tests and output a little bit: the output is
slightly different depending on whether it was streamed or buffered in
'go test'.

Fixes golang/go#47603

Change-Id: I387470062cf0620f5c7f214b6f54039c921912c4
Reviewed-on: https://go-review.googlesource.com/c/go/+/344831
Trust: Jay Conrod <jayconrod@google.com>
Trust: Katie Hockman <katie@golang.org>
Run-TryBot: Jay Conrod <jayconrod@google.com>
Reviewed-by: Katie Hockman <katie@golang.org>
This commit is contained in:
Jay Conrod 2021-08-24 15:58:03 -07:00
parent 37f5885f29
commit f0668e7c8c
4 changed files with 40 additions and 38 deletions

View File

@ -1206,10 +1206,10 @@ func (c *runCache) builderRunTest(b *work.Builder, ctx context.Context, a *work.
}
var buf bytes.Buffer
if len(pkgArgs) == 0 || (testBench != "") {
if len(pkgArgs) == 0 || testBench != "" || testFuzz != "" {
// Stream test output (no buffering) when no package has
// been given on the command line (implicit current directory)
// or when benchmarking.
// or when benchmarking or fuzzing.
// No change to stdout.
} else {
// If we're only running a single package under test or if parallelism is

View File

@ -13,9 +13,9 @@ stdout '^ok'
# Matches none for fuzzing but will run the fuzz target as a test.
go test -fuzz ThisWillNotMatch -fuzztime 1x standalone_fuzz_test.go
! stdout '^ok.*\[no tests to run\]'
! stdout '^ok.*no tests to run'
stdout '^ok'
stdout '\[no targets to fuzz\]'
stdout 'no targets to fuzz'
[short] stop
@ -26,16 +26,16 @@ stdout '^ok'
# Matches no fuzz targets.
go test -run ThisWillNotMatch standalone_fuzz_test.go
stdout '^ok.*\[no tests to run\]'
! stdout '\[no targets to fuzz\]'
stdout '^ok.*no tests to run'
! stdout 'no targets to fuzz'
# Matches more than one fuzz target for fuzzing.
go test -fuzz Fuzz -fuzztime 1x multiple_fuzz_test.go
# The tests should run, but not be fuzzed
! stdout '\[no tests to run\]'
! stdout '\[no targets to fuzz\]'
! stdout 'no tests to run'
! stdout 'no targets to fuzz'
stdout ok
stdout '\[will not fuzz, -fuzz matches more than one target\]'
stdout 'will not fuzz, -fuzz matches more than one target'
-- standalone_fuzz_test.go --
package standalone_fuzz

View File

@ -561,12 +561,12 @@ func runFuzzTargets(deps testDeps, fuzzTargets []InternalFuzzTarget, deadline ti
//
// If fuzzing is disabled (-test.fuzz is not set), runFuzzing
// returns immediately.
func runFuzzing(deps testDeps, fuzzTargets []InternalFuzzTarget) (ran, ok bool) {
func runFuzzing(deps testDeps, fuzzTargets []InternalFuzzTarget) (ran bool, matched int, ok bool) {
// TODO(katiehockman,jayconrod): Should we do something special to make sure
// we don't print f.Log statements again with runFuzzing, since we already
// would have printed them when we ran runFuzzTargets (ie. seed corpus run)?
if len(fuzzTargets) == 0 || *matchFuzz == "" {
return false, true
return false, 0, true
}
m := newMatcher(deps.MatchString, *matchFuzz, "-test.fuzz")
tctx := newTestContext(1, m)
@ -588,41 +588,39 @@ func runFuzzing(deps testDeps, fuzzTargets []InternalFuzzTarget) (ran, ok bool)
root.chatty = newChattyPrinter(root.w)
}
var target *InternalFuzzTarget
var f *F
var targetName string
for i := range fuzzTargets {
ft := &fuzzTargets[i]
testName, matched, _ := tctx.match.fullName(nil, ft.Name)
if !matched {
name, ok, _ := tctx.match.fullName(nil, fuzzTargets[i].Name)
if !ok {
continue
}
if target != nil {
fmt.Fprintln(os.Stderr, "testing: warning: -fuzz matches more than one target, won't fuzz")
return false, true
}
target = ft
f = &F{
common: common{
signal: make(chan bool),
barrier: nil, // T.Parallel has no effect when fuzzing.
name: testName,
parent: &root,
level: root.level + 1,
chatty: root.chatty,
},
fuzzContext: fctx,
testContext: tctx,
}
f.w = indenter{&f.common}
matched++
target = &fuzzTargets[i]
targetName = name
}
if target == nil {
return false, true
if matched != 1 {
return false, matched, true
}
f := &F{
common: common{
signal: make(chan bool),
barrier: nil, // T.Parallel has no effect when fuzzing.
name: targetName,
parent: &root,
level: root.level + 1,
chatty: root.chatty,
},
fuzzContext: fctx,
testContext: tctx,
}
f.w = indenter{&f.common}
if f.chatty != nil {
f.chatty.Updatef(f.name, "=== FUZZ %s\n", f.name)
}
go fRunner(f, target.Fn)
<-f.signal
return f.ran, !f.failed
return f.ran, matched, !f.failed
}
// fRunner wraps a call to a fuzz target and ensures that cleanup functions are

View File

@ -1618,9 +1618,13 @@ func (m *M) Run() (code int) {
}
}
fuzzingRan, fuzzingOk := runFuzzing(m.deps, m.fuzzTargets)
fuzzingRan, fuzzingMatched, fuzzingOk := runFuzzing(m.deps, m.fuzzTargets)
if *matchFuzz != "" && !fuzzingRan {
fmt.Fprintln(os.Stderr, "testing: warning: no targets to fuzz")
if fuzzingMatched == 0 {
fmt.Fprintln(os.Stderr, "testing: warning: no targets to fuzz")
} else {
fmt.Fprintln(os.Stderr, "testing: warning: will not fuzz, -fuzz matches more than one target")
}
}
if !*isFuzzWorker && !fuzzingOk {
fmt.Println("FAIL")