Skip to content

tarantool: support luzer-based testing#14656

Merged
jonathanmetzman merged 1 commit intogoogle:masterfrom
ligurio:ligurio/test-tarantool-with-luzer
Jan 22, 2026
Merged

tarantool: support luzer-based testing#14656
jonathanmetzman merged 1 commit intogoogle:masterfrom
ligurio:ligurio/test-tarantool-with-luzer

Conversation

@ligurio
Copy link
Contributor

@ligurio ligurio commented Dec 23, 2025

@github-actions
Copy link

ligurio is integrating a new project:
- Main repo: https://github.com/ligurio/luzer
- Criticality score: 0.23719
ligurio is either the primary contact or is in the CCs list of projects/tarantool.
ligurio has previously contributed to projects/tarantool. The previous PR was #13379
ligurio is either the primary contact or is in the CCs list of projects/lua.
ligurio has previously contributed to projects/lua. The previous PR was #12685

@ligurio ligurio force-pushed the ligurio/test-tarantool-with-luzer branch from 36fbd6d to 34cfaeb Compare December 24, 2025 19:49
@ligurio ligurio force-pushed the ligurio/test-tarantool-with-luzer branch from 34cfaeb to 4ef5233 Compare January 4, 2026 11:47
@ligurio
Copy link
Contributor Author

ligurio commented Jan 4, 2026

@jonathanmetzman can we merge these changes with minimal support for luzer (luarocks in base images and fixing bad_build_check)?

From 90b4b45f982540274aedd96bbdfc2ccc22ae4ba9 Mon Sep 17 00:00:00 2001
From: Sergey Bronnikov <estetus@gmail.com>
Date: Sun, 4 Jan 2026 14:43:34 +0300
Subject: [PATCH] base-images: minimal support luzer

The patch allows testing C/C++ projects via Lua C API.
---
 infra/base-images/base-runner/Dockerfile              | 1 +
 infra/base-images/base-runner/bad_build_check         | 3 +++
 infra/base-images/base-runner/ubuntu-20-04.Dockerfile | 2 ++
 infra/base-images/base-runner/ubuntu-24-04.Dockerfile | 2 ++
 4 files changed, 8 insertions(+)

diff --git a/infra/base-images/base-runner/Dockerfile b/infra/base-images/base-runner/Dockerfile
index 5f5f455f11f1..9a4302ea7368 100644
--- a/infra/base-images/base-runner/Dockerfile
+++ b/infra/base-images/base-runner/Dockerfile
@@ -117,6 +117,7 @@ COPY --from=base-ruby /usr/local/bin/gem /usr/local/bin/gem
 COPY --from=base-ruby /usr/local/lib/ruby /usr/local/lib/ruby
 COPY --from=base-ruby /usr/local/include/ruby-3.3.0 /usr/local/include/ruby-3.3.0
 
+RUN apt-get update && apt-get install -y luarocks
 
 # Do this last to make developing these files easier/faster due to caching.
 COPY bad_build_check \
diff --git a/infra/base-images/base-runner/bad_build_check b/infra/base-images/base-runner/bad_build_check
index e3f4787e865e..137fe6576168 100755
--- a/infra/base-images/base-runner/bad_build_check
+++ b/infra/base-images/base-runner/bad_build_check
@@ -349,6 +349,9 @@ function check_mixed_sanitizers {
     echo "UNSUPPORTED ARCHITECTURE"
     exit 1
   fi
+
+  egrep luarocks $FUZZER && return 0;
+
   local ASAN_CALLS=$(objdump -dC $FUZZER | egrep "${CALL_INSN}__asan" -c)
   local DFSAN_CALLS=$(objdump -dC $FUZZER | egrep "${CALL_INSN}__dfsan" -c)
   local MSAN_CALLS=$(objdump -dC $FUZZER | egrep "${CALL_INSN}__msan" -c)
diff --git a/infra/base-images/base-runner/ubuntu-20-04.Dockerfile b/infra/base-images/base-runner/ubuntu-20-04.Dockerfile
index c421cb21a003..7207d8cb2c13 100644
--- a/infra/base-images/base-runner/ubuntu-20-04.Dockerfile
+++ b/infra/base-images/base-runner/ubuntu-20-04.Dockerfile
@@ -117,6 +117,8 @@ COPY --from=base-ruby /usr/local/bin/gem /usr/local/bin/gem
 COPY --from=base-ruby /usr/local/lib/ruby /usr/local/lib/ruby
 COPY --from=base-ruby /usr/local/include/ruby-3.3.0 /usr/local/include/ruby-3.3.0
 
+RUN apt-get update && apt-get install -y luarocks
+
 # Do this last to make developing these files easier/faster due to caching.
 COPY bad_build_check \
     coverage \
diff --git a/infra/base-images/base-runner/ubuntu-24-04.Dockerfile b/infra/base-images/base-runner/ubuntu-24-04.Dockerfile
index 2e252a25ffd8..5addb421416b 100644
--- a/infra/base-images/base-runner/ubuntu-24-04.Dockerfile
+++ b/infra/base-images/base-runner/ubuntu-24-04.Dockerfile
@@ -117,6 +117,8 @@ COPY --from=base-ruby /usr/local/bin/gem /usr/local/bin/gem
 COPY --from=base-ruby /usr/local/lib/ruby /usr/local/lib/ruby
 COPY --from=base-ruby /usr/local/include/ruby-3.3.0 /usr/local/include/ruby-3.3.0
 
+RUN apt-get update && apt-get install -y luarocks
+
 # Do this last to make developing these files easier/faster due to caching.
 COPY bad_build_check \
     coverage \

@ligurio ligurio force-pushed the ligurio/test-tarantool-with-luzer branch from 4ef5233 to d378af4 Compare January 4, 2026 16:56
@ligurio ligurio force-pushed the ligurio/test-tarantool-with-luzer branch from d378af4 to cbe9e3f Compare January 17, 2026 14:53
@ligurio
Copy link
Contributor Author

ligurio commented Jan 17, 2026

build (libfuzzer, undefined, x86_64)
build (centipede, address, x86_64)

DENABLE_ASAN=OFF -P /src/tarantool/cmake/CheckDependencies.cmake
Dependency: /lib/x86_64-linux-gnu/libc.so.6
Dependency: /lib/x86_64-linux-gnu/libdl.so.2
Dependency: /lib/x86_64-linux-gnu/libgcc_s.so.1
Dependency: /lib/x86_64-linux-gnu/libm.so.6
Dependency: /lib/x86_64-linux-gnu/libpthread.so.0
Dependency: /lib/x86_64-linux-gnu/libresolv.so.2
Dependency: /lib/x86_64-linux-gnu/librt.so.1
Dependency: /lib/x86_64-linux-gnu/libstdc++.so.6
CMake Error at /src/tarantool/cmake/CheckDependencies.cmake:52 (message):
  Blocklisted dependency: /lib/x86_64-linux-gnu/libresolv.so.2

build (afl, address, x86_64)

 /usr/bin/make  -f luzer/CMakeFiles/strip_lib_asan.dir/build.make luzer/CMakeFiles/strip_lib_asan.dir/build
make[6]: Entering directory '/src/tarantool/build/luzer/build'
[ 62%] Strip sanitizer library asan
make[6]: Leaving directory '/src/tarantool/build/luzer/build'
cd /src/tarantool/build/luzer/build/luzer && CMAKE_C_COMPILER_AR-NOTFOUND d libclang_rt.asan.a asan_preinit.cc.o asan_preinit.cpp.o
/bin/sh: 1: CMAKE_C_COMPILER_AR-NOTFOUND: not found
make[6]: *** [luzer/CMakeFiles/strip_lib_asan.dir/build.make:71: luzer/CMakeFiles/strip_lib_asan] Error 127

build (honggfuzz, address, x86_64)

 + [[ honggfuzz != libfuzzer ]]
+ return
/src/build.sh: line 119: return: can only `return' from a function or sourced script
ERROR:__main__:Building fuzzers failed.

build (libfuzzer, address, x86_64)

Broken fuzz targets 16

/tmp/not-out/tmpu_glwdq1/table_pack_test -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null
Unsupported version.
/tmp/not-out/tmpu_glwdq1/table_pack_test -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null
Unsupported version.
/tmp/not-out/tmpu_glwdq1/math_tointeger_test -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null
Unsupported version.
/tmp/not-out/tmpu_glwdq1/math_tointeger_test -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null
Unsupported version.
/tmp/not-out/tmpu_glwdq1/string_pack_test -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null
Unsupported version.
/tmp/not-out/tmpu_glwdq1/string_pack_test -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null
Unsupported version.
/tmp/not-out/tmpu_glwdq1/utf8_codepoint_test -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null
Unsupported version.
/tmp/not-out/tmpu_glwdq1/utf8_char_test -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null
Unsupported version.
/tmp/not-out/tmpu_glwdq1/utf8_char_test -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null
Unsupported version.
/tmp/not-out/tmpu_glwdq1/string_packsize_test -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null
Unsupported version.

<snipped>

BAD BUILD: /tmp/not-out/tmpu_glwdq1/test_engine seems to have either startup crash or exit:
vm.mmap_rnd_bits = 28
/tmp/not-out/tmpu_glwdq1/test_engine -- -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null
Can't open script /tmp/not-out/tmpu_glwdq1/test/fuzz/lua/test_engine.lua: No such file or directory

BAD BUILD: /tmp/not-out/tmpu_glwdq1/misc_sysprof_test seems to have either startup crash or exit:
/tmp/not-out/tmpu_glwdq1/misc_sysprof_test.lua:20: profiler misuse: profiler is disabled {"type":"LuajitError","trace":[{"file":"src/lua/utils.c","line":700}]}

@ligurio ligurio force-pushed the ligurio/test-tarantool-with-luzer branch from cbe9e3f to 5e8a341 Compare January 17, 2026 17:11
ligurio added a commit to ligurio/lunapark that referenced this pull request Jan 17, 2026
@ligurio ligurio force-pushed the ligurio/test-tarantool-with-luzer branch from 5e8a341 to 4b7cd29 Compare January 17, 2026 19:55
ligurio added a commit to ligurio/nanodata that referenced this pull request Jan 17, 2026
centipede and AFL

 CMake Error at /src/tarantool/cmake/CheckDependencies.cmake:52 (message):
  Blocklisted dependency: /lib/x86_64-linux-gnu/libresolv.so.2

Needed by google/oss-fuzz#14656

NO_CHANGELOG=build
NO_DOC=build
NO_TEST=build
@ligurio ligurio force-pushed the ligurio/test-tarantool-with-luzer branch from 8491215 to 59594af Compare January 17, 2026 21:05
ligurio added a commit to ligurio/nanodata that referenced this pull request Jan 17, 2026
centipede and AFL

 CMake Error at /src/tarantool/cmake/CheckDependencies.cmake:52 (message):
  Blocklisted dependency: /lib/x86_64-linux-gnu/libresolv.so.2

Needed by google/oss-fuzz#14656

NO_CHANGELOG=build
NO_DOC=build
NO_TEST=build
@ligurio ligurio force-pushed the ligurio/test-tarantool-with-luzer branch 2 times, most recently from e0bdb7d to c2cf58f Compare January 17, 2026 22:18
ligurio added a commit to ligurio/nanodata that referenced this pull request Jan 18, 2026
centipede and AFL

 CMake Error at /src/tarantool/cmake/CheckDependencies.cmake:52 (message):
  Blocklisted dependency: /lib/x86_64-linux-gnu/libresolv.so.2

Needed by google/oss-fuzz#14656

NO_CHANGELOG=build
NO_DOC=build
NO_TEST=build
@ligurio ligurio force-pushed the ligurio/test-tarantool-with-luzer branch 3 times, most recently from 211cb13 to e7ecc68 Compare January 19, 2026 07:32
ligurio added a commit to ligurio/luzer that referenced this pull request Jan 19, 2026
The luzer library requires `ar` (archiver tool) for rebuilding
libFuzzer archive. By default, CMAKE_C_COMPILER_AR is used. However,
in OSS Fuzz environment (afl, address, x86_64) CMAKE_C_COMPILER_AR
returns CMAKE_C_COMPILER_AR-NOTFOUND [1]. The patch adds
a fallback to CMAKE_AR that successfully finds `ar` at the same
environment.

Also, there is the following note regarding both CMake variables -
CMAKE_AR vs. CMAKE_C_COMPILER_AR:

- CMAKE_AR is a general variable for the default archiver tool.
- CMAKE_C_COMPILER_AR is specific to the C language's toolchain.
  When certain features like Interprocedural Optimization (LTO)
  are enabled, CMake might favor the language-specific
  CMAKE_C_COMPILER_AR (or CMAKE_CXX_COMPILER_AR for C++) over the
  generic CMAKE_AR.

1. google/oss-fuzz#14656 (comment)

Needed for google/oss-fuzz#14656
ligurio added a commit to ligurio/lunapark that referenced this pull request Jan 19, 2026
The new version contains changes [1][2] required for OSS Fuzz
support.

1. ligurio/luzer#73
2. ligurio/luzer#76

Needed for tarantool/tarantool#12097
Needed for tarantool/tarantool#11250
Needed for google/oss-fuzz#14656
Related to google/oss-fuzz#13782
ligurio added a commit to ligurio/lunapark that referenced this pull request Jan 19, 2026
ligurio added a commit to ligurio/lunapark that referenced this pull request Jan 19, 2026
ligurio added a commit to ligurio/lunapark that referenced this pull request Jan 19, 2026
The patch add a check for presence of string.buffer module to the
tests. The module string.buffer built into LuaJIT, but not
available in Tarantool and before the patch the tests were failed.

Needed for #google/oss-fuzz#14656
ligurio added a commit to ligurio/lunapark that referenced this pull request Jan 19, 2026
The patch add a check for presence of string.buffer module to the
tests. The module string.buffer built into LuaJIT, but not
available in Tarantool and before the patch the tests were failed.

Needed for #google/oss-fuzz#14656
ligurio added a commit to ligurio/lunapark that referenced this pull request Jan 19, 2026
The new version contains changes [1][2] required for OSS Fuzz
support.

1. ligurio/luzer#73
2. ligurio/luzer#76

Needed for tarantool/tarantool#12097
Needed for tarantool/tarantool#11250
Needed for google/oss-fuzz#14656
Related to google/oss-fuzz#13782
ligurio added a commit to ligurio/lunapark that referenced this pull request Jan 19, 2026
@jonathanmetzman jonathanmetzman merged commit 07442a2 into google:master Jan 22, 2026
16 checks passed
@ligurio ligurio deleted the ligurio/test-tarantool-with-luzer branch January 22, 2026 17:15
ranok pushed a commit to ranok/oss-fuzz that referenced this pull request Jan 22, 2026
- [x] ~~Depends on google#13929~~
- [x] ~~Depends on ligurio/luzer#74
- [x] ~~Depends on ligurio/luzer#76
- [x] ~~Depends on ligurio/luzer#78
- [x] ~~Depends on ligurio/lunapark#163
- [x] Depends on tarantool/tarantool#12097
ligurio added a commit to ligurio/nanodata that referenced this pull request Jan 25, 2026
The patch updates the checks for profilers support in Lua fuzzing
tests.

Related to tarantool#12215
Needed for tarantool#11250
Needed for google/oss-fuzz#14656

NO_CHANGELOG=testing
NO_DOC=testing
ligurio added a commit to ligurio/nanodata that referenced this pull request Jan 26, 2026
There is a whitelist with allowed dependencies for static build.
libresolv is allowed when Clang with enabled AddressSanitizer is
used. The build is failed in some OSS Fuzz configurations
(libfuzzer-undefined-x86_64 and centipede-address-x86_64) [1]
because libresolv is blocklisted:

 CMake Error at /src/tarantool/cmake/CheckDependencies.cmake:52 (message):
  Blocklisted dependency: /lib/x86_64-linux-gnu/libresolv.so.2

The patch adds libresolv to a whitelist when CMake variable
OSS_FUZZ is defined.

1. google/oss-fuzz#14656 (comment)

Needed by google/oss-fuzz#14656
Part of tarantool#12097

NO_CHANGELOG=build
NO_DOC=build
NO_TEST=build

(cherry picked from commit c5e04b6)
ligurio added a commit to ligurio/nanodata that referenced this pull request Jan 26, 2026
There is a whitelist with allowed dependencies for static build.
libresolv is allowed when Clang with enabled AddressSanitizer is
used. The build is failed in some OSS Fuzz configurations
(libfuzzer-undefined-x86_64 and centipede-address-x86_64) [1]
because libresolv is blocklisted:

 CMake Error at /src/tarantool/cmake/CheckDependencies.cmake:52 (message):
  Blocklisted dependency: /lib/x86_64-linux-gnu/libresolv.so.2

The patch adds libresolv to a whitelist when CMake variable
OSS_FUZZ is defined.

1. google/oss-fuzz#14656 (comment)

Needed by google/oss-fuzz#14656
Part of tarantool#12097

NO_CHANGELOG=build
NO_DOC=build
NO_TEST=build

(cherry picked from commit c5e04b6)
ligurio added a commit to ligurio/nanodata that referenced this pull request Jan 26, 2026
There is a whitelist with allowed dependencies for static build.
libresolv is allowed when Clang with enabled AddressSanitizer is
used. The build is failed in some OSS Fuzz configurations
(libfuzzer-undefined-x86_64 and centipede-address-x86_64) [1]
because libresolv is blocklisted:

 CMake Error at /src/tarantool/cmake/CheckDependencies.cmake:52 (message):
  Blocklisted dependency: /lib/x86_64-linux-gnu/libresolv.so.2

The patch adds libresolv to a whitelist when CMake variable
OSS_FUZZ is defined.

1. google/oss-fuzz#14656 (comment)

Needed by google/oss-fuzz#14656
Part of tarantool#12097

NO_CHANGELOG=build
NO_DOC=build
NO_TEST=build

(cherry picked from commit c5e04b6)
ligurio added a commit to ligurio/nanodata that referenced this pull request Jan 26, 2026
There is a whitelist with allowed dependencies for static build.
libresolv is allowed when Clang with enabled AddressSanitizer is
used. The build is failed in some OSS Fuzz configurations
(libfuzzer-undefined-x86_64 and centipede-address-x86_64) [1]
because libresolv is blocklisted:

 CMake Error at /src/tarantool/cmake/CheckDependencies.cmake:52 (message):
  Blocklisted dependency: /lib/x86_64-linux-gnu/libresolv.so.2

The patch adds libresolv to a whitelist when CMake variable
OSS_FUZZ is defined.

1. google/oss-fuzz#14656 (comment)

Needed by google/oss-fuzz#14656
Part of tarantool#12097

NO_CHANGELOG=build
NO_DOC=build
NO_TEST=build

(cherry picked from commit c5e04b6)
ligurio added a commit to ligurio/nanodata that referenced this pull request Jan 27, 2026
There is a whitelist with allowed dependencies for static build.
libresolv is allowed when Clang with enabled AddressSanitizer is
used. The build is failed in some OSS Fuzz configurations
(libfuzzer-undefined-x86_64 and centipede-address-x86_64) [1]
because libresolv is blocklisted:

 CMake Error at /src/tarantool/cmake/CheckDependencies.cmake:52 (message):
  Blocklisted dependency: /lib/x86_64-linux-gnu/libresolv.so.2

The patch adds libresolv to a whitelist when CMake variable
OSS_FUZZ is defined.

1. google/oss-fuzz#14656 (comment)

Needed by google/oss-fuzz#14656
Part of tarantool#12097

NO_CHANGELOG=build
NO_DOC=build
NO_TEST=build

(cherry picked from commit c5e04b6)
ligurio added a commit to ligurio/nanodata that referenced this pull request Jan 27, 2026
There is a whitelist with allowed dependencies for static build.
libresolv is allowed when Clang with enabled AddressSanitizer is
used. The build is failed in some OSS Fuzz configurations
(libfuzzer-undefined-x86_64 and centipede-address-x86_64) [1]
because libresolv is blocklisted:

 CMake Error at /src/tarantool/cmake/CheckDependencies.cmake:52 (message):
  Blocklisted dependency: /lib/x86_64-linux-gnu/libresolv.so.2

The patch adds libresolv to a whitelist when CMake variable
OSS_FUZZ is defined.

1. google/oss-fuzz#14656 (comment)

Needed by google/oss-fuzz#14656
Part of tarantool#12097

NO_CHANGELOG=build
NO_DOC=build
NO_TEST=build

(cherry picked from commit c5e04b6)
sergepetrenko pushed a commit to tarantool/tarantool that referenced this pull request Jan 27, 2026
There is a whitelist with allowed dependencies for static build.
libresolv is allowed when Clang with enabled AddressSanitizer is
used. The build is failed in some OSS Fuzz configurations
(libfuzzer-undefined-x86_64 and centipede-address-x86_64) [1]
because libresolv is blocklisted:

 CMake Error at /src/tarantool/cmake/CheckDependencies.cmake:52 (message):
  Blocklisted dependency: /lib/x86_64-linux-gnu/libresolv.so.2

The patch adds libresolv to a whitelist when CMake variable
OSS_FUZZ is defined.

1. google/oss-fuzz#14656 (comment)

Needed by google/oss-fuzz#14656
Part of #12097

NO_CHANGELOG=build
NO_DOC=build
NO_TEST=build

(cherry picked from commit c5e04b6)
sergepetrenko pushed a commit to tarantool/tarantool that referenced this pull request Jan 28, 2026
There is a whitelist with allowed dependencies for static build.
libresolv is allowed when Clang with enabled AddressSanitizer is
used. The build is failed in some OSS Fuzz configurations
(libfuzzer-undefined-x86_64 and centipede-address-x86_64) [1]
because libresolv is blocklisted:

 CMake Error at /src/tarantool/cmake/CheckDependencies.cmake:52 (message):
  Blocklisted dependency: /lib/x86_64-linux-gnu/libresolv.so.2

The patch adds libresolv to a whitelist when CMake variable
OSS_FUZZ is defined.

1. google/oss-fuzz#14656 (comment)

Needed by google/oss-fuzz#14656
Part of #12097

NO_CHANGELOG=build
NO_DOC=build
NO_TEST=build

(cherry picked from commit c5e04b6)
ligurio added a commit to ligurio/nanodata that referenced this pull request Jan 29, 2026
Build script in OSS Fuzz has steps (introduced in the PR [1])
that requires changes that are absent in release/3.2 and the build
became broken:

NO_WRAP
+ unset OSS_FUZZ
+ cp build/test/fuzz/lua-tests/src/tests/lapi/lib.lua /github/workspace/build-out
cp: cannot stat 'build/test/fuzz/lua-tests/src/tests/lapi/lib.lua': No such file or directory
2026-01-29 08:56:31,745 - root - ERROR - Building fuzzers failed.
NO_WRAP

The patch fixes broken build by creating a file
`build/test/fuzz/lua-tests/src/tests/lapi/lib.lua` and a fake
target `copy_tests`.

1. google/oss-fuzz#14656

NO_CHANGELOG=build
NO_DOC=build
NO_TEST=build
ligurio added a commit to ligurio/nanodata that referenced this pull request Jan 29, 2026
Build script in OSS Fuzz has steps (introduced in the PR [1])
that requires changes that are absent in release/3.2 and the build
became broken:

NO_WRAP
+ unset OSS_FUZZ
+ cp build/test/fuzz/lua-tests/src/tests/lapi/lib.lua /github/workspace/build-out
cp: cannot stat 'build/test/fuzz/lua-tests/src/tests/lapi/lib.lua': No such file or directory
2026-01-29 08:56:31,745 - root - ERROR - Building fuzzers failed.
NO_WRAP

The patch fixes broken build by creating a file
`build/test/fuzz/lua-tests/src/tests/lapi/lib.lua` and a fake
target `copy_tests`.

1. google/oss-fuzz#14656

NO_CHANGELOG=build
NO_DOC=build
NO_TEST=build

(cherry picked from commit ef1d205)
sergepetrenko pushed a commit to tarantool/tarantool that referenced this pull request Jan 29, 2026
Build script in OSS Fuzz has steps (introduced in the PR [1])
that requires changes that are absent in release/3.2 and the build
became broken:

NO_WRAP
+ unset OSS_FUZZ
+ cp build/test/fuzz/lua-tests/src/tests/lapi/lib.lua /github/workspace/build-out
cp: cannot stat 'build/test/fuzz/lua-tests/src/tests/lapi/lib.lua': No such file or directory
2026-01-29 08:56:31,745 - root - ERROR - Building fuzzers failed.
NO_WRAP

The patch fixes broken build by creating a file
`build/test/fuzz/lua-tests/src/tests/lapi/lib.lua` and a fake
target `copy_tests`.

1. google/oss-fuzz#14656

NO_CHANGELOG=build
NO_DOC=build
NO_TEST=build
sergepetrenko pushed a commit to tarantool/tarantool that referenced this pull request Jan 29, 2026
Build script in OSS Fuzz has steps (introduced in the PR [1])
that requires changes that are absent in release/3.2 and the build
became broken:

NO_WRAP
+ unset OSS_FUZZ
+ cp build/test/fuzz/lua-tests/src/tests/lapi/lib.lua /github/workspace/build-out
cp: cannot stat 'build/test/fuzz/lua-tests/src/tests/lapi/lib.lua': No such file or directory
2026-01-29 08:56:31,745 - root - ERROR - Building fuzzers failed.
NO_WRAP

The patch fixes broken build by creating a file
`build/test/fuzz/lua-tests/src/tests/lapi/lib.lua` and a fake
target `copy_tests`.

1. google/oss-fuzz#14656

NO_CHANGELOG=build
NO_DOC=build
NO_TEST=build

(cherry picked from commit ef1d205)
ligurio added a commit to ligurio/oss-fuzz that referenced this pull request Jan 30, 2026
ligurio added a commit to ligurio/oss-fuzz that referenced this pull request Jan 30, 2026
ligurio added a commit to ligurio/oss-fuzz that referenced this pull request Jan 30, 2026
ligurio added a commit to ligurio/oss-fuzz that referenced this pull request Jan 30, 2026
ligurio added a commit to ligurio/oss-fuzz that referenced this pull request Jan 30, 2026
DavidKorczynski pushed a commit that referenced this pull request Jan 30, 2026
ligurio added a commit to ligurio/oss-fuzz that referenced this pull request Feb 9, 2026
ligurio added a commit to ligurio/oss-fuzz that referenced this pull request Feb 9, 2026
DavidKorczynski pushed a commit that referenced this pull request Feb 10, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants