diff --git a/test/server/server_corpus/clusterfuzz-testcase-server_fuzz_test-5763613693837312 b/test/server/server_corpus/clusterfuzz-testcase-server_fuzz_test-5763613693837312 new file mode 100644 index 000000000000..9c3fe726b36d --- /dev/null +++ b/test/server/server_corpus/clusterfuzz-testcase-server_fuzz_test-5763613693837312 @@ -0,0 +1,7 @@ +stats_sinks { + typed_config { + type_url: "type.googleapis.com/envoy.api.v2.route.Route" + value: "\022*J :222222\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\t2871770\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\0378\377\377\377\377\377\377\377\377 8\377\377\377\377\377\377\377\377\37722222222222222222220\022" + } +} +header_prefix: "type.googleapis.com/envoy.api.v2.route.Route" diff --git a/test/server/server_fuzz_test.cc b/test/server/server_fuzz_test.cc index 53db522ebbb0..2ee39d2f8d88 100644 --- a/test/server/server_fuzz_test.cc +++ b/test/server/server_fuzz_test.cc @@ -37,6 +37,9 @@ makeHermeticPathsAndPorts(Fuzz::PerTestEnvironment& test_env, // we lose here. If we don't sanitize here, we get flakes due to port bind conflicts, file // conflicts, etc. output.clear_admin(); + // The header_prefix is a write-once then read-only singleton that persists across tests. We clear + // this field so that fuzz tests don't fail over multiple iterations. + output.clear_header_prefix(); if (output.has_runtime()) { output.mutable_runtime()->set_symlink_root(test_env.temporaryPath("")); }