Tests from Traces: Automated Unit Test Extraction for R Filip Křikava, Jan Vitek

Total Page:16

File Type:pdf, Size:1020Kb

Tests from Traces: Automated Unit Test Extraction for R Filip Křikava, Jan Vitek Tests from traces: automated unit test extraction for R Filip Křikava, Jan Vitek To cite this version: Filip Křikava, Jan Vitek. Tests from traces: automated unit test extraction for R. 27th ACM SIG- SOFT International Symposium on Software Testing and Analysis (ISSTA 2018), Jul 2018, Amster- dam, Netherlands. pp.232-241, 10.1145/3213846.3213863. hal-02131523 HAL Id: hal-02131523 https://hal.archives-ouvertes.fr/hal-02131523 Submitted on 16 May 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Tests from Traces: Automated Unit Test Extraction for R Filip Křikava Jan Vitek Czech Technical University Northeastern University and CTU Czech Republic USA ABSTRACT This paper explores a rather simple idea, namely, can we effec- Unit tests are labor-intensive to write and maintain. This paper tively and efficiently extract test cases from program execution traces? looks into how well unit tests for a target software package can be Our motivation is that if programmers do not write comprehensive extracted from the execution traces of client code. Our objective is unit test suites, then it may be possible for a tool to extract those to reduce the effort involved in creating test suites while minimizing for them, especially when the software to test is widely used in the number and size of individual tests, and maximizing coverage. other projects. Our approach is as follows: For each project and To evaluate the viability of our approach, we select a challenging its reverse dependencies, gather all runnable artifacts, be they test target for automated test extraction, namely R, a programming lan- cases or examples, that may exercise the target, run the artifacts guage that is popular for data science applications. The challenges in an environment that records execution traces, and from those presented by R are its extreme dynamism, coerciveness, and lack traces produce unit tests and, if possible, minimize them, keeping of types. This combination decrease the efficacy of traditional test only the ones that increase code coverage. extraction techniques. We present Genthat, a tool developed over The key question we aim to answer is: how well can automated the last couple of years to non-invasively record execution traces trace-based unit test extraction actually work in practice? The metrics of R programs and extract unit tests from those traces. We have of interest are related to the quality of the extracted tests, their carried out an evaluation on 1,545 packages comprising 1.7M lines coverage of the target project, as well as the costs of the whole of code. The tests extracted by Genthat improved code coverage process. To answer this we have to pick an actual programming from the original rather low value of 267,496 lines to 700,918 lines. language and its associated software ecosystem. Any combination The running time of the generated tests is 1.9 times faster than the of language and ecosystem is likely to have its quirks, we structure code they came from. the paper so as to identify those language specific features. Concretely, this paper reports on our implementation and empir- CCS CONCEPTS ical evaluation of Genthat, a tool for automated extraction of unit tests from traces for the R statistical programming language [11]. • Software and its engineering → Software testing and de- The R software ecosystem is organized around a curated open bugging; source software repository named CRAN. For our purposes, we randomly select about 12% of the packages hosted on CRAN, or KEYWORDS 1,545 software libraries. These packages amount to approximately Test extraction, Program tracing, R 1.7M lines of code stripped of comments and empty lines. The main- ACM Reference Format: tainers of CRAN enforce the presence of so-called vignettes, these Filip Křikava and Jan Vitek. 2018. Tests from Traces: Automated Unit Test are documentation with runnable examples, for all hosted libraries. Extraction for R. In Proceedings of 27th ACM SIGSOFT International Sympo- Some libraries come equipped with their own test cases. These sium on Software Testing and Analysis (ISSTA’18). ACM, New York, NY, USA, are typically coarse grained scripts whose output is compared for 10 pages. https://doi.org/10.1145/3213846.3213863 textual equality. Our aim with Genthat is to help R developers extract unit tests that can easily pinpoint the source of problems, 1 INTRODUCTION are reasonably small, provide good coverage, and execute quickly. Testing is an integral part of good software engineering practices. Furthermore, we want to help developers to automatically capture Test-driven development is routinely taught in Computer Science common usage patterns of their code in the wild. In the R code programs, yet a cursory inspection of projects on GitHub suggests hosted on CRAN, most of the code coverage comes from examples that the presence of test suites cannot be taken for granted and and vignettes, and very little is already in the form of tests. In the even when tests are available they do not always provide sufficient corpus of 1,545 packages we selected for this work, tests provide coverage or granularity needed to easily pinpoint the source of only an average of 19% coverage, whereas when examples and errors. vignettes are executed coverage is boosted to 68%. As of this writing, we are not aware of any other tool for auto- Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed matically extracting test cases for R. This likely due to the limited for profit or commercial advantage and that copies bear this notice and the full citation interest that data analysis languages have garnered in our com- on the first page. Copyrights for components of this work owned by others than the munity, and also due to features of R that make it a challenging author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission target for tooling. The language is extremely dynamic: it has no and/or a fee. Request permissions from [email protected]. type annotations to structure code, each and every operation can be ISSTA’18, July 16–21, 2018, Amsterdam, Netherlands redefined during execution, values are automatically coerced from © 2018 Copyright held by the owner/author(s). Publication rights licensed to the Association for Computing Machinery. type to type, arguments of functions are lazily evaluated and can ACM ISBN 978-1-4503-5699-2/18/07...$15.00 be coerced back to source expressions, values are modified using a https://doi.org/10.1145/3213846.3213863 ISSTA’18, July 16–21, 2018, Amsterdam, Netherlands Filip Křikava and Jan Vitek copy-on-write discipline most of the time, and reflective operations − All expressions are evaluated by-need, thus the call f(a+b) con- allow programs to manipulate most aspect of a program’s execution tains three delayed sub-expressions, one for each variable and state [9]. This combination of features has allowed developers to one for the call to plus. This means that R does not pass values build complex constructions, such as support for object-oriented to functions but rather passes unevaluated promises (the order programming, on top of the core language. Furthermore, large of evaluation of promises is part of the semantics as they can swaths of the system are written in C code and may break any have side effects). These promises can also be turned back into reasonable invariants one may hope for. code by reflection. The contributions of this paper are the description of a tool, − Most values are vectors or lists. Values can be annotated by Genthat, for automatically extracting unit tests for R, as well as key-value pairs. These annotations, coupled with reflection, are an empirical evaluation of that tool that demonstrates that for a the basic building blocks for many advanced features of R. An large corpus, 1,545 packages, it is possible to significantly improve example of this are the four different object systems that use code coverage. On average, the default tests that come with the annotations to express classes and other attributes. packages cover only 19%. After deploying Genthat we are able − R has a copy-on-write semantics for shared values. A value is to increase the coverage to 53%. This increase mostly comes from shared if it is accessible from more than one variable. This means extracting test cases from all the available executable artifacts in that side effects that change shared values are rare. This givesa the package and the artifacts from packages that depend on this functional flavor to large parts ofR. package. Genthat is surprisingly accurate, it can reproduce 80% of R is a surprisingly rich language with a rather intricate semantics, the calls executed by the scripts and it is also able to greatly reduce we can’t do it justice in the space at hand. The above summary the number and size of test cases that are retained in the extracted should suffice for the remainder of this paper. suite, running 1.9 times faster than package examples, tests and vignettes combined with only 15% less code coverage (53% vs 68%).
Recommended publications
  • Navigating the Next Evolution of Application Development Using Distributed Tracing
    Navigating the Next Evolution of Application Development Using Distributed Tracing Navigating the Next Evolution of Application Development 1 Table of Contents Introduction ...........................................................................................................................................................................................3 How has software been built? Waterfall vs. DevOps ................................................................................. ............................. 4 The next evolution: Microservices ................................................................................................................................................5 What will you need to do differently to capitalizeon modern application development? ..........................................6 Get started with Epsagon on AWS ...............................................................................................................................................8 Case Study: Bastian Solutions .......................................................................................................................................................9 Learn More ..........................................................................................................................................................................................10 Navigating the Next Evolution of Application Development 2 Introduction Building and maintaining a competitive edge often requires you to evolve with your customers’
    [Show full text]
  • Traceability Establishment and Visualization of Software Artefacts in Devops Practice: a Survey
    (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 10, No. 7, 2019 Traceability Establishment and Visualization of Software Artefacts in DevOps Practice: A Survey D. A. Meedeniya1, I. D. Rubasinghe2, I. Perera3 Dept. of Computer Science and Engineering, University of Moratuwa, Sri Lanka Abstract—DevOps based software process has become the artefacts in the SDLC [2][3]. There are different forms of popular with the vision of an effective collaboration between the relationships between the homogeneous and heterogeneous development and operations teams that continuously integrates software artefacts. Some artefacts may be highly coupled, and the frequent changes. Traceability manages the artefact some may depend on other artefacts in different degrees, consistency during a software process. This paper explores the unidirectionally or bidirectionally. Thus, software artefacts trace-link creation and visualization between software artefacts, consistency management helps to fine-tune the software existing tool support, quality aspects and the applicability in a process. The incomplete, outdated software artefacts and their DevOps environment. As the novelty of this study, we identify the inconsistencies mislead both the development and maintenance challenges that limit the traceability considerations in DevOps process. Thus, artefact management is essential such that the and suggest research directions. Our methodology consists of changes are accurately propagated to the impacted artefacts concept identification, state-of-practice exploration and analytical review. Despite the existing related work, there is a without creating inconsistencies. Traceability is the potential to lack of tool support for the traceability management between relate artefacts considering their relationships [4][5]; thus, a heterogeneous artefacts in software development with DevOps solution for artefact management.
    [Show full text]
  • Linuxcon North America 2012
    LinuxCon North America 2012 LTTng 2.0 : Tracing, Analysis and Views for Performance and Debugging. E-mail: [email protected] Mathieu Desnoyers August 29th, 2012 1 > Presenter ● Mathieu Desnoyers ● EfficiOS Inc. ● http://www.efficios.com ● Author/Maintainer of ● LTTng, LTTng-UST, Babeltrace, Userspace RCU Mathieu Desnoyers August 29th, 2012 2 > Content ● Tracing benefits, ● LTTng 2.0 Linux kernel and user-space tracers, ● LTTng 2.0 usage scenarios & viewers, ● New features ready for LTTng 2.1, ● Conclusion Mathieu Desnoyers August 29th, 2012 3 > Benefits of low-impact tracing in a multi-core world ● Understanding interaction between ● Kernel ● Libraries ● Applications ● Virtual Machines ● Debugging ● Performance tuning ● Monitoring Mathieu Desnoyers August 29th, 2012 4 > Tracing use-cases ● Telecom ● Operator, engineer tracing systems concurrently with different instrumentation sets. ● In development and production phases. ● High-availability, high-throughput servers ● Development and production: ensure high performance, low-latency in production. ● Embedded ● System development and production stages. Mathieu Desnoyers August 29th, 2012 5 > LTTng 2.0 ● Rich ecosystem of projects, ● Key characteristics of LTTng 2.0: – Small impact on the traced system, fast, user- oriented features. ● Interfacing with: Common Trace Format (CTF) Interoperability Between Tracing Tools Tracing Well With Others: Integration with the Common Trace Format (CTF), of GDB Tracepoints Into Trace Tools, Mathieu Desnoyers, EfficiOS, Stan Shebs, Mentor Graphics,
    [Show full text]
  • System Wide Tracing and Profiling in Linux
    SYSTEM WIDE TRACING AND PROFILING IN LINUX Nadav Amit Agenda • System counters inspection • Profiling with Linux perf tool • Tracing using ftrace Disclaimer • Introductory level presentation • We are not going to cover many tools • We are not going to get deep into the implementation of the tools • I am not an expert on many of the issues Collect Statistics • First step in analyzing the system behavior • Option 1: Resource statistics tools • iostat, vmstat, netstat, ifstat • dstat Examples: dstat --vm --aio • dstat • dstat --udp --tcp --socket • dstat --vm --aio dstat --udp --tcp --socket Watch system behavior online • Option 2: Sample the counter • top • Use –H switch for thread specific • Use ‘f’ to choose additional fields: page faults, last used processor • Use ‘1’ to turn off cumulative mode • iotop • Remember to run as sudoer top Inspect Raw Counters • Option 3: Go to the raw counters • General • /proc/stat • /proc/meminfo • /proc/interrupts • Process specific • /proc/[pid]/statm – process memory • /proc/[pid]/stat – process execution times • /proc/[pid]/status – human readable • Device specific • /sys/block/[dev]/stat • /proc/dev/net • Hardware • smartctl /proc/interrupts /sys/block/[dev]/stat Name units description ---- ----- ----------- read I/Os requests number of read I/Os processed read merges requests number of read I/Os merged with in-queue I/O read sectors sectors number of sectors read read ticks milliseconds total wait time for read requests write I/Os requests number of write I/Os processed write merges requests number
    [Show full text]
  • Debugging and Profiling with Arm Tools
    Debugging and Profiling with Arm Tools [email protected] • Ryan Hulguin © 2018 Arm Limited • 4/21/2018 Agenda • Introduction to Arm Tools • Remote Client Setup • Debugging with Arm DDT • Other Debugging Tools • Break • Examples with DDT • Lunch • Profiling with Arm MAP • Examples with MAP • Obtaining Support 2 © 2018 Arm Limited Introduction to Arm HPC Tools © 2018 Arm Limited Arm Forge An interoperable toolkit for debugging and profiling • The de-facto standard for HPC development • Available on the vast majority of the Top500 machines in the world • Fully supported by Arm on x86, IBM Power, Nvidia GPUs and Arm v8-A. Commercially supported by Arm • State-of-the art debugging and profiling capabilities • Powerful and in-depth error detection mechanisms (including memory debugging) • Sampling-based profiler to identify and understand bottlenecks Fully Scalable • Available at any scale (from serial to petaflopic applications) Easy to use by everyone • Unique capabilities to simplify remote interactive sessions • Innovative approach to present quintessential information to users Very user-friendly 4 © 2018 Arm Limited Arm Performance Reports Characterize and understand the performance of HPC application runs Gathers a rich set of data • Analyses metrics around CPU, memory, IO, hardware counters, etc. • Possibility for users to add their own metrics Commercially supported by Arm • Build a culture of application performance & efficiency awareness Accurate and astute • Analyses data and reports the information that matters to users insight • Provides simple guidance to help improve workloads’ efficiency • Adds value to typical users’ workflows • Define application behaviour and performance expectations Relevant advice • Integrate outputs to various systems for validation (e.g.
    [Show full text]
  • Bidirectional Tracing of Requirements in Embedded Software Development
    Bidirectional Tracing of Requirements in Embedded Software Development Barbara Draxler _________________________________ Fachbereich Informatik Universität Salzburg Abstract Nowadays, the increased complexity of embedded systems applications re- quires a systematic process of software development for embedded systems. An important difficulty in applying classical software engineering processes in this respect is ensuring that specific requirements of safety and real-time properties, which are usually posed at the beginning of the development, are met in the final implementation. This difficulty stems from the fact that requirements engineering in general is not mature in the established soft- ware development models. Nevertheless, several manufacturers have recently started to employ available requirements engineering methods for embedded software. The aim of this report is to provide insight into manufacturer practices in this respect. The report provides an analysis of the current state-of-art of requirements engineering in embedded real-time systems with respect to re- quirements traceability. Actual examples of requirements traceability and requirements engineering are analyzed against current research in require- ments traceability and requirements engineering. This report outlines the principles and the problems of traceability. Fur- thermore, current research on new traceability methods is presented. The importance of requirements traceability in real-time systems is highlighted and related significant research issues in requirements engineering are out- lined. To gain an insight in how traceability can aid process improvement, the viewpoint of CMMI towards requirements engineering and traceability is described. A short introduction in popular tracing tools that support require- ments engineering and especially traceability is given. Examples of traceabil- ity in the development of real-time systems at the Austrian company AVL are presented.
    [Show full text]
  • Traceability in Agile Software Projects
    Traceability in Agile software projects Master of Science Thesis in Software Engineering & Management VUONG HOANG DUC University of Gothenburg Chalmers University of Technology Department of Computer Science and Engineering Göteborg, Sweden, May 2013 The Author grants to Chalmers University of Technology and University of Gothenburg the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Author shall, when transferring the rights of the Work to a third party (for example a publisher or a company), acknowledge the third party about this agreement. If the Author has signed a copyright agreement with a third party regarding the Work, the Author warrants hereby that he/she has obtained any necessary permission from this third party to let Chalmers University of Technology and University of Gothenburg store the Work electronically and make it accessible on the Internet. Traceability in Agile software projects VUONG.HOANG DUC VUONG. HOANG DUC, May 2013. Examiner: CHRISTIAN.BERGER University of Gothenburg Chalmers University of Technology Department of Computer Science and Engineering SE-412 96 Göteborg Sweden Telephone + 46 (0)31-772 1000 ABSTRACT Context: Software applications have been penetrating every corner of our daily life in the past decades. This condition demands high quality software. Traceability activities have been recognized as important factors supporting various activities during the development process of a software system with the aim of improving software quality.
    [Show full text]
  • Distributed Architecture for an Integrated Development Environment, Large Trace Analysis, and Visualization
    sensors Article Distributed Architecture for an Integrated Development Environment, Large Trace Analysis, and Visualization Yonni Chen Kuang Piao 1, Naser Ezzati-jivan 2,* and Michel R. Dagenais 1 1 Computer Engineering and Software Engineering Department, Ecole Polytechnique Montreal, Montreal, QC h3t 1j4, Canada; [email protected] (Y.C.K.P.); [email protected] (M.R.D.) 2 Computer Science Department, Brock University, St. Catharines, ON l22 3a1, Canada * Correspondence: [email protected] Abstract: Integrated development environments (IDEs) provide many useful tools such as a code editor, a compiler, and a debugger for creating software. These tools are highly sophisticated, and their development requires a significant effort. Traditionally, an IDE supports different programming languages via plugins that are not usually reusable in other IDEs. Given the high complexity and constant evolution of popular programming languages, such as C++ and even Java, the effort to update those plugins has become unbearable. Thus, recent work aims to modularize IDEs and reuse the existing parser implementation directly in compilers. However, when IDE debugging tools are insufficient at detecting performance defects in large and multithreaded systems, developers must use tracing and trace visualization tools in their software development process. Those tools are often standalone applications and do not interoperate with the new modular IDEs, thus losing the power and the benefits of many features provided by the IDE. The structure and use cases of tracing tools, with the potentially massive execution traces, significantly differ from the other tools in IDEs. Thus, it is a considerable challenge, one which has not been addressed previously, to integrate them into the new modular IDEs.
    [Show full text]
  • Devops/Continuous Delivery Tooling
    DevOps/Continuous Delivery Tooling Launchpad for the Digital Enterprise Report Summary ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) Research Report Written by Julie Craig, Research Director, Application Management Spring 2017 Sponsored by: IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Report Summary – DevOps/Continuous Delivery Tooling: Launchpad for the Digital Enterprise Table of Contents Overview .....................................................................................................................................................1 10 Key Takeaways ........................................................................................................................................2 DevOps and Continuous Delivery: People, Processes, and Technology Interacting Across the Lifecycle .....3 Automation Supporting DevOps and Continuous Delivery in the Digital Enterprise ................................3 Background and Methodology ...................................................................................................................5 Digital Business in 2017 ..............................................................................................................................5 Technology Landscapes ................................................................................................................................6 Automation and Tooling for the Digital Business ........................................................................................7 Continuous Delivery .................................................................................................................................11
    [Show full text]
  • Requirements Traceability and the Effect on the System Development Lifecycle (SDLC)
    Requirements Traceability and the Effect on the System Development Lifecycle (SDLC) by Glenn A. Stout (STOUT) DISS 725: Systems Development Process Spring Cluster, 2001 Research Paper 2 Glenn A. Stout (STOUT) Table of Contents Overview........................................................................................................................................3 Purpose..........................................................................................................................................3 Traceability....................................................................................................................................3 Traceability and Traceability Item Defined...............................................................................4 Traceability Links..................................................................................................................4 Traditional Requirements Gathering.............................................................................................5 In General..................................................................................................................................5 Engaging in the Practice of Tracing Requirements.......................................................................6 Software Requirements Specification (SRS).............................................................................6 Use Case Methodology..............................................................................................................7
    [Show full text]
  • Monitoring, Tracing, Debugging (Under Construction)
    Monitoring, Tracing, Debugging (Under Construction) I was already tempted to drop this topic from my lecture on operating systems when I found Stephan Siemen's article "Top Speed" in Linux World 10/2003. He mentions a whole range of useful tools for performance tracking and bug finding on Linux and I decided to take his list and give some additional background on how these things work.After being a unix kernel hacker for some year I moved into user space and started to develop more and more user level code. I soon realized that the style of development used for kernel hacking is quite different to the one needed for servers, frameworks and applications. Some concepts still apply, like logging events. Others change, e.g. using garbage collectors. Some of the tools that made the biggest impression where Pure Atria's Purify (now IBM Rational) - object code instrumentation the easy way. And the Visual Age (now Eclipse) Debugger which made me give up on printf/println style of finding bugs. Look at the resource section at the end for links. Introduction 2 / 30 Goals 1. A word on monitoring, tracing, debugging. 2. Modern approaches for tracing, logging and auditing. 3. Understanding interfaces within and between programs and environments. Remember: every problem in computer science is solved with one more level of indirection. And interfaces are the locations where program flow can be re-directed. 4. Monitoring Levels 5. Different techniques for monitoring 6. Performance and memory tracking. How garbage collection works will be explained in detail in our session on virtual memory.
    [Show full text]
  • Recovering Traceability Links in Software Artifact Management Systems Using Information Retrieval Methods
    13 Recovering Traceability Links in Software Artifact Management Systems using Information Retrieval Methods ANDREA DE LUCIA, FAUSTO FASANO, ROCCO OLIVETO, and GENOVEFFA TORTORA University of Salerno The main drawback of existing software artifact management systems is the lack of automatic or semi-automatic traceability link generation and maintenance. We have improved an artifact management system with a traceability recovery tool based on Latent Semantic Indexing (LSI), an information retrieval technique. We have assessed LSI to identify strengths and limitations of using information retrieval techniques for traceability recovery and devised the need for an incremental approach. The method and the tool have been evaluated during the development of seventeen software projects involving about 150 students. We observed that although tools based on information retrieval provide a useful support for the identification of traceability links during software development, they are still far to support a complete semi-automatic recovery of all links. The results of our experience have also shown that such tools can help to identify quality problems in the textual description of traced artifacts. Categories and Subject Descriptors: D.2.7 [Software Engineering]: Distribution, Maintenance, and Enhancement; D.2.9 [Software Engineering]: Management—Software configuration man- agement; G.1.3 [Numerical Analysis]: Numerical Linear Algebra—Singular value decomposition; H.3.1 [Information Storage and Retrieval]: Content Analysis and Indexing—indexing methods; H.3.3 [Information Storage and Retrieval]: Information Search and Retrieval General Terms: Documentation, Management Additional Key Words and Phrases: Software artifact management, traceability management, impact analysis, latent semantic indexing ACM Reference Format: De Lucia, A., Fasano, F., Oliveto, R., and Tortora, G.
    [Show full text]