Brian Anderson

Results 207 issues of Brian Anderson

### What problem does your feature solve? The Soroban fuzzing experience could be better, but probably can't be improved much without switching to a different fuzzing engine. Soroban has support...

### What problem does your feature solve? Right now we have direct support for fuzz testing via cargo-fuzz and proptesting via proptest-arbitrary-interop. This support mainly consists of implementations of [`Arbitrary`](https://docs.rs/arbitrary),...

### What problem does your feature solve? Fuzz testing currently requires compiling contracts to native code. Wasm code is a black box to the fuzzer and it gets no feedback...

There have been several reports that attempting to compile a `cargo-fuzz` test on macos fails to link. Possibly arm-specific. Discord thread: https://discord.com/channels/897514728459468821/1141102329085567048/1141102329085567048 Some examples: ``` = note: LC_ALL="C" PATH="/Users/tylervanderhoeven/.rustup/toolchains/nightly-aarch64-apple-darwin/lib/rustlib/aarch64-apple-darwin/bin:/Users/tylervanderhoeven/miniconda3/bin:/Users/tylervanderhoeven/miniconda3/condabin:/opt/homebrew/opt/[email protected]/bin:target/bin:/Users/tylervanderhoeven/bin:/opt/homebrew/bin:/usr/local/bin:/usr/local/bin:/Users/tylervanderhoeven/Library/pnpm:/Users/tylervanderhoeven/.yarn/bin:/Users/tylervanderhoeven/.config/yarn/global/node_modules/.bin:/Users/tylervanderhoeven/.deno/bin:/opt/homebrew/bin:/opt/homebrew/sbin:/usr/local/bin:/System/Cryptexes/App/usr/bin:/usr/bin:/bin:/usr/sbin:/sbin:/usr/local/MacGPG2/bin:/Library/Apple/usr/bin:/var/run/com.apple.security.cryptexd/codex.system/bootstrap/usr/local/bin:/var/run/com.apple.security.cryptexd/codex.system/bootstrap/usr/bin:/var/run/com.apple.security.cryptexd/codex.system/bootstrap/usr/appleinternal/bin:/Users/tylervanderhoeven/.cargo/bin:/Users/tylervanderhoeven/.yarn/bin:/Users/tylervanderhoeven/.config/yarn/global/node_modules/.bin:/Users/tylervanderhoeven/.deno/bin:/opt/homebrew/bin:/opt/homebrew/sbin:/usr/local/bin:/System/Cryptexes/App/usr/bin:/usr/bin:/bin:/usr/sbin:/sbin:/usr/local/MacGPG2/bin:/Library/Apple/usr/bin:/var/run/com.apple.security.cryptexd/codex.system/bootstrap/usr/local/bin:/var/run/com.apple.security.cryptexd/codex.system/bootstrap/usr/bin:/var/run/com.apple.security.cryptexd/codex.system/bootstrap/usr/appleinternal/bin:/Users/tylervanderhoeven/.cargo/bin:/opt/homebrew/opt/llvm/bin" VSLANG="1033"...

bug

### What problem does your feature solve? Soroban contracts provide metadata to introspect contracts, enough to automatically generate randomized calls to the methods of a contract. I have been suggested...

### What problem does your feature solve? Our fuzzing docs emphasize the ability to convert fuzz tests to proptests using https://github.com/graydon/proptest-arbitrary-interop In my brief look at the quality of input...

### What version are you using? v20.0.0-rc1 4639f5adffb20b3f3fa6c1aebefa6a9152f7718d ### What did you do? ```rust #[contracttype] #[derive(Clone, Debug, Eq, PartialEq)] struct Tuples { tuple: (u32, u32), } ``` ### What did...

bug

This example uses snapshots to reset the environment, but the way it initializes the first environment should not be recommended: ``` fn setup() -> Env { let snapshot = {...

bug

I'm not confident that the conversions are correct. We need some tests that take input and output files with extended-unicode paths, both tests of the api, and of the wasm-opt...

re https://github.com/brson/wasm-opt-rs/issues/154 We are fixing this issue with LLVM namespace conflicts by adding an optional "dwarf" feature, and testing in both configurations, but don't currently have a place to put...