ConfInLog: Leveraging Software Logs to Infer Configuration Constraints
Misconfigurations have become the dominant causes of software failures in recent years, drawing tremendous attention for their increasing prevalence and severity. Configuration constraints can preemptively avoid misconfiguration by defining the conditions that configuration options should satisfy. Documentation is the main source of configuration constraints, but it might be incomplete or inconsistent with the source code. In this regard, prior researches have focused on obtaining configuration constraints from software source code through static analysis. However, the difficulty in pointer analysis and context comprehension prevents them from collecting accurate and comprehensive constraints. In this paper, we observed that software logs often contain configuration constraints. We conducted an empirical study and summarized patterns of configuration-related log messages. Guided by the study, we designed and implemented ConfInLog, a static tool to infer configuration constraints from log messages. ConfInLog first selects configuration-related log messages from source code by using the summarized patterns, then infers constraints from log messages based on the summarized natural language patterns. To evaluate the effectiveness of ConfInLog, we applied our tool on seven popular open-source software systems. ConfInLog successfully inferred 22~163 constraints, in which 59.5%~61.6% could not be inferred by the state-of-the-art work. Finally, we submitted 67 documentation patches regarding the constraints inferred by ConfInLog. The constraints in 29 patches have been confirmed by the developers, among which 10 patches have been accepted.
Fri 21 MayDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
02:00 - 02:40
|ConfInLog: Leveraging Software Logs to Infer Configuration Constraints
Shulin Zhou National University of Defense Technology, Xiaodong Liu National University of Defense Technology, Shanshan Li National University of Defense Technology, Zhouyang Jia National University of Defense Technology, Yuanliang Zhang National University of Defense Technology, Teng Wang National University of Defense Technology, China, Wang Li National University of Defense Technology, Xiangke Liao National University of Defense Technology, ChinaPre-print Media Attached
|Using Grammar Patterns to Interpret Test Method Name Evolution
Anthony Peruma Rochester Institute of Technology, Emily Hu , Jiajun Chen , Eman Abdullah AlOmar Rochester Institute of Technology, USA, Mohamed Wiem Mkaouer Rochester Institute of Technology, Christian D. Newman Rochester Institute of TechnologyPre-print Media Attached
|Keywords Guided Method Name Generation
ResearchPre-print Media Attached
|Automated Comment Update: How Far are We?
Bo Lin National University of Defense Technology, Shangwen Wang National University of Defense Technology, Kui Liu Huawei Software Engineering Application Technology Lab, Xiaoguang Mao National University of Defense Technology, Tegawendé F. Bissyandé SnT, University of LuxembourgPre-print Media Attached