]> git.ipfire.org Git - people/ms/suricata.git/blame - README.md
userguide: update buffers list for lua-scripting
[people/ms/suricata.git] / README.md
CommitLineData
65a3ff81
VJ
1Suricata
2========
3
9cf1d290 4[![Fuzzing Status](https://oss-fuzz-build-logs.storage.googleapis.com/badges/suricata.svg)](https://bugs.chromium.org/p/oss-fuzz/issues/list?sort=-opened&can=1&q=proj:suricata)
1e9934cf 5[![codecov](https://codecov.io/gh/OISF/suricata/branch/master/graph/badge.svg?token=QRyyn2BSo1)](https://codecov.io/gh/OISF/suricata)
9cf1d290 6
65a3ff81 7Introduction
12849fa9 8------------
65a3ff81
VJ
9
10Suricata is a network IDS, IPS and NSM engine.
11
12
13Installation
12849fa9 14------------
65a3ff81
VJ
15
16https://redmine.openinfosecfoundation.org/projects/suricata/wiki/Suricata_Installation
17
18User Guide
12849fa9 19----------
65a3ff81 20
2e8678a5 21You can follow the [Suricata user guide](https://suricata.readthedocs.io/en/latest/) to get started.
d709bf49
PL
22
23Our deprecated (but still useful) user guide is also [available](https://redmine.openinfosecfoundation.org/projects/suricata/wiki/Suricata_User_Guide).
65a3ff81
VJ
24
25
26Contributing
12849fa9 27------------
65a3ff81
VJ
28
29We're happily taking patches and other contributions. Please see https://redmine.openinfosecfoundation.org/projects/suricata/wiki/Contributing for how to get started.
30
6d9733a7
PL
31Suricata is a complex piece of software dealing with mostly untrusted input. Mishandling this input will have serious consequences:
32
33* in IPS mode a crash may knock a network offline;
34* in passive mode a compromise of the IDS may lead to loss of critical and confidential data;
35* missed detection may lead to undetected compromise of the network.
36
37In other words, we think the stakes are pretty high, especially since in many common cases the IDS/IPS will be directly reachable by an attacker.
65a3ff81
VJ
38
39For this reason, we have developed a QA process that is quite extensive. A consequence is that contributing to Suricata can be a somewhat lengthy process.
40
41On a high level, the steps are:
42
431. Travis-CI based build & unit testing. This runs automatically when a pull request is made.
44
452. Review by devs from the team and community
46
473. QA runs
48
49
50
0f1c8711 51
12849fa9 52### Overview of Suricata's QA steps
65a3ff81
VJ
53
54Trusted devs and core team members are able to submit builds to our (semi) public Buildbot instance. It will run a series of build tests and a regression suite to confirm no existing features break.
55
56The final QA run takes a few hours minimally, and is started by Victor. It currently runs:
57
58- extensive build tests on different OS', compilers, optimization levels, configure features
59- static code analysis using cppcheck, scan-build
60- runtime code analysis using valgrind, DrMemory, AddressSanitizer, LeakSanitizer
61- regression tests for past bugs
62- output validation of logging
63- unix socket testing
64- pcap based fuzz testing using ASAN and LSAN
65
66Next to these tests, based on the type of code change further tests can be run manually:
67
68- traffic replay testing (multi-gigabit)
69- large pcap collection processing (multi-terabytes)
293eebd9 70- fuzz testing (might take multiple days or even weeks)
65a3ff81
VJ
71- pcap based performance testing
72- live performance testing
73- various other manual tests based on evaluation of the proposed changes
74
75
76It's important to realize that almost all of the tests above are used as acceptance tests. If something fails, it's up to you to address this in your code.
77
78
79One step of the QA is currently run post-merge. We submit builds to the Coverity Scan program. Due to limitations of this (free) service, we can submit once a day max.
80Of course it can happen that after the merge the community will find issues. For both cases we request you to help address the issues as they may come up.
81
82
83
84
12849fa9 85### FAQ
65a3ff81
VJ
86
87__Q: Will you accept my PR?__
88
89A: That depends on a number of things, including the code quality. With new features it also depends on whether the team and/or the community think the feature is useful, how much it affects other code and features, the risk of performance regressions, etc.
90
91
92__Q: When will my PR be merged?__
93
94A: It depends, if it's a major feature or considered a high risk change, it will probably go into the next major version.
95
96
97__Q: Why was my PR closed?__
98
99A: As documented in the Suricata Github workflow here https://redmine.openinfosecfoundation.org/projects/suricata/wiki/Github_work_flow, we expect a new pull request for every change.
100
101Normally, the team (or community) will give feedback on a pull request after which it is expected to be replaced by an improved PR. So look at the comments. If you disagree with the comments we can still discuss them in the closed PR.
102
103If the PR was closed without comments it's likely due to QA failure. If the Travis-CI check failed, the PR should be fixed right away. No need for a discussion about it, unless you believe the QA failure is incorrect.
104
105
106__Q: the compiler/code analyser/tool is wrong, what now?__
107
0f1c8711 108A: To assist in the automation of the QA, we're not accepting warnings or errors to stay. In some cases this could mean that we add a suppression if the tool supports that (e.g. valgrind, DrMemory). Some warnings can be disabled. In some exceptional cases the only 'solution' is to refactor the code to work around a static code checker limitation false positive. While frustrating, we prefer this over leaving warnings in the output. Warnings tend to get ignored and then increase risk of hiding other warnings.
65a3ff81
VJ
109
110
111__Q: I think your QA test is wrong__
112
1bc738fb 113A: If you really think it is, we can discuss how to improve it. But don't come to this conclusion too quickly, more often it's the code that turns out to be wrong.
65a3ff81
VJ
114
115
116__Q: do you require signing of a contributor license agreement?__
117
118A: Yes, we do this to keep the ownership of Suricata in one hand: the Open Information Security Foundation. See http://suricata-ids.org/about/open-source/ and http://suricata-ids.org/about/contribution-agreement/