Skip to content

Add array support to flatbuffers domain #1693

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: main
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 3 additions & 0 deletions .github/workflows/cmake_test.yml
Original file line number Diff line number Diff line change
Expand Up @@ -77,6 +77,7 @@ jobs:
-D CMAKE_CXX_COMPILER_LAUNCHER=ccache \
-D CMAKE_BUILD_TYPE=RelWithDebug \
-D FUZZTEST_BUILD_TESTING=on \
-D FUZZTEST_BUILD_FLATBUFFERS=on \
&& cmake --build build -j $(nproc) \
&& ctest --test-dir build -j $(nproc) --output-on-failure
- name: Run all tests in default mode with gcc
Expand All @@ -90,6 +91,7 @@ jobs:
-D CMAKE_CXX_COMPILER_LAUNCHER=ccache \
-D CMAKE_BUILD_TYPE=RelWithDebug \
-D FUZZTEST_BUILD_TESTING=on \
-D FUZZTEST_BUILD_FLATBUFFERS=on \
&& cmake --build build_gcc -j $(nproc) \
&& ctest --test-dir build_gcc -j $(nproc) --output-on-failure
- name: Run end-to-end tests in fuzzing mode
Expand All @@ -104,6 +106,7 @@ jobs:
-D CMAKE_BUILD_TYPE=RelWithDebug \
-D FUZZTEST_FUZZING_MODE=on \
-D FUZZTEST_BUILD_TESTING=on \
-D FUZZTEST_BUILD_FLATBUFFERS=on \
&& cmake --build build -j $(nproc) \
&& ctest --test-dir build -j $(nproc) --output-on-failure -R "functional_test"
- name: Save new cache based on main
Expand Down
1 change: 1 addition & 0 deletions CMakeLists.txt
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,7 @@ cmake_minimum_required(VERSION 3.19)
project(fuzztest)

option(FUZZTEST_BUILD_TESTING "Building the tests." OFF)
option(FUZZTEST_BUILD_FLATBUFFERS "Building the flatbuffers support." OFF)
option(FUZZTEST_FUZZING_MODE "Building the fuzztest in fuzzing mode." OFF)
set(FUZZTEST_COMPATIBILITY_MODE "" CACHE STRING "Compatibility mode. Available options: <empty>, libfuzzer")
set(CMAKE_CXX_STANDARD 17)
Expand Down
6 changes: 4 additions & 2 deletions MODULE.bazel
Original file line number Diff line number Diff line change
Expand Up @@ -35,6 +35,10 @@ bazel_dep(
name = "platforms",
version = "0.0.10",
)
bazel_dep(
name = "flatbuffers",
version = "25.2.10"
)
# GoogleTest is not a dev dependency, because it's needed when FuzzTest is used
# with GoogleTest integration (e.g., googletest_adaptor). Note that the FuzzTest
# framework can be used without GoogleTest integration as well.
Expand All @@ -48,8 +52,6 @@ bazel_dep(
name = "protobuf",
version = "31.1",
)
# TODO(lszekeres): Make this a dev dependency, as the protobuf library is only
# required for testing.
bazel_dep(
name = "rules_proto",
version = "7.1.0",
Expand Down
17 changes: 17 additions & 0 deletions cmake/BuildDependencies.cmake
Original file line number Diff line number Diff line change
Expand Up @@ -35,6 +35,9 @@ set(proto_TAG v30.2)
set(nlohmann_json_URL https://github.com/nlohmann/json.git)
set(nlohmann_json_TAG v3.11.3)

set(flatbuffers_URL https://github.com/google/flatbuffers.git)
set(flatbuffers_TAG v25.2.10)

if(POLICY CMP0135)
cmake_policy(SET CMP0135 NEW)
set(CMAKE_POLICY_DEFAULT_CMP0135 NEW)
Expand Down Expand Up @@ -64,6 +67,14 @@ FetchContent_Declare(
URL_HASH MD5=${antlr_cpp_MD5}
)

if (FUZZTEST_BUILD_FLATBUFFERS)
FetchContent_Declare(
flatbuffers
GIT_REPOSITORY ${flatbuffers_URL}
GIT_TAG ${flatbuffers_TAG}
)
endif()

if (FUZZTEST_BUILD_TESTING)

FetchContent_Declare(
Expand Down Expand Up @@ -101,3 +112,9 @@ if (FUZZTEST_BUILD_TESTING)
FetchContent_MakeAvailable(nlohmann_json)

endif ()

if (FUZZTEST_BUILD_FLATBUFFERS)
set(FLATBUFFERS_BUILD_TESTS OFF)
set(FLATBUFFERS_BUILD_INSTALL OFF)
FetchContent_MakeAvailable(flatbuffers)
endif()
189 changes: 188 additions & 1 deletion cmake/FuzzTestHelpers.cmake
Original file line number Diff line number Diff line change
Expand Up @@ -338,4 +338,191 @@ function(fuzztest_proto_library)

add_library(fuzztest::${FUZZTEST_PROTO_LIB_NAME} ALIAS ${_NAME})

endfunction()
endfunction()

# fuzztest_flatbuffers_generate_headers()
#
# Modified version of `flatbuffers_generate_headers`
# from https://github.com/google/flatbuffers/blob/master/CMake/BuildFlatBuffers.cmake
# Supports having the embedded schema header in the output set.
#
# Creates a target that can be linked against that generates flatbuffer headers.
#
# This function takes a target name and a list of schemas. You can also specify
# other flagc flags using the FLAGS option to change the behavior of the flatc
# tool.
#
# When the target_link_libraries is done within a different directory than
# flatbuffers_generate_headers is called, then the target should also be dependent
# the custom generation target called fuzztest_GENERATE_<TARGET>.
#
# Arguments:
# TARGET: The name of the target to generate.
# SCHEMAS: The list of schema files to generate code for.
# BINARY_SCHEMAS_DIR: Optional. The directory in which to generate binary
# schemas. Binary schemas will only be generated if a path is provided.
# INCLUDE: Optional. Search for includes in the specified paths. (Use this
# instead of "-I <path>" and the FLAGS option so that CMake is aware of
# the directories that need to be searched).
# INCLUDE_PREFIX: Optional. The directory in which to place the generated
# files. Use this instead of the --include-prefix option.
# FLAGS: Optional. A list of any additional flags that you would like to pass
# to flatc.
# TESTONLY: When added, this target will only be built if both
# BUILD_TESTING=ON and FUZZTEST_BUILD_TESTING=ON.
#
# Example:
#
# fuzztest_flatbuffers_library(
# TARGET my_generated_headers_target
# INCLUDE_PREFIX ${MY_INCLUDE_PREFIX}"
# SCHEMAS ${MY_SCHEMA_FILES}
# BINARY_SCHEMAS_DIR "${MY_BINARY_SCHEMA_DIRECTORY}"
# FLAGS --gen-object-api)
#
# target_link_libraries(MyExecutableTarget
# PRIVATE fuzztest_my_generated_headers_target
# )
#
# Optional (only needed within different directory):
# add_dependencies(app fuzztest_GENERATE_my_generated_headers_target)
function(fuzztest_flatbuffers_generate_headers)
# Parse function arguments.
set(options TESTONLY)
set(one_value_args
"TARGET"
"INCLUDE_PREFIX"
"BINARY_SCHEMAS_DIR")
set(multi_value_args
"SCHEMAS"
"INCLUDE"
"FLAGS")
cmake_parse_arguments(
PARSE_ARGV 0
FLATBUFFERS_GENERATE_HEADERS
"${options}"
"${one_value_args}"
"${multi_value_args}")

if(FLATBUFFERS_GENERATE_HEADERS_TESTONLY AND NOT (BUILD_TESTING AND FUZZTEST_BUILD_TESTING))
return()
endif()

# Test if including from FindFlatBuffers
if(FLATBUFFERS_FLATC_EXECUTABLE)
set(FLATC_TARGET "")
set(FLATC ${FLATBUFFERS_FLATC_EXECUTABLE})
elseif(TARGET flatbuffers::flatc)
set(FLATC_TARGET flatbuffers::flatc)
set(FLATC flatbuffers::flatc)
else()
set(FLATC_TARGET flatc)
set(FLATC flatc)
endif()

set(working_dir "${CMAKE_CURRENT_SOURCE_DIR}")

# Generate the include files parameters.
set(include_params "")
foreach (include_dir ${FLATBUFFERS_GENERATE_HEADERS_INCLUDE})
set(include_params -I ${include_dir} ${include_params})
endforeach()

# Create a directory to place the generated code.
set(generated_target_dir "${CMAKE_CURRENT_BINARY_DIR}")
set(generated_include_dir "${generated_target_dir}")
if (NOT ${FLATBUFFERS_GENERATE_HEADERS_INCLUDE_PREFIX} STREQUAL "")
set(generated_include_dir "${generated_include_dir}/${FLATBUFFERS_GENERATE_HEADERS_INCLUDE_PREFIX}")
list(APPEND FLATBUFFERS_GENERATE_HEADERS_FLAGS
"--include-prefix" ${FLATBUFFERS_GENERATE_HEADERS_INCLUDE_PREFIX})
endif()

set(generated_custom_commands)

# Create rules to generate the code for each schema.
foreach(schema ${FLATBUFFERS_GENERATE_HEADERS_SCHEMAS})
get_filename_component(filename ${schema} NAME_WE)
set(generated_include "${generated_include_dir}/${filename}_generated.h")
# Add the embedded schema header in the output set if requested.
if("${FLATBUFFERS_GENERATE_HEADERS_FLAGS}" MATCHES "--bfbs-gen-embed")
list(APPEND generated_include "${generated_include_dir}/${filename}_bfbs_generated.h")
endif()

# Generate files for grpc if needed
set(generated_source_file)
if("${FLATBUFFERS_GENERATE_HEADERS_FLAGS}" MATCHES "--grpc")
# Check if schema file contain a rpc_service definition
file(STRINGS ${schema} has_grpc REGEX "rpc_service")
if(has_grpc)
list(APPEND generated_include "${generated_include_dir}/${filename}.grpc.fb.h")
set(generated_source_file "${generated_include_dir}/${filename}.grpc.fb.cc")
endif()
endif()

add_custom_command(
OUTPUT ${generated_include} ${generated_source_file}
COMMAND ${FLATC} ${FLATC_ARGS}
-o ${generated_include_dir}
${include_params}
-c ${schema}
${FLATBUFFERS_GENERATE_HEADERS_FLAGS}
DEPENDS ${FLATC_TARGET} ${schema}
WORKING_DIRECTORY "${working_dir}"
COMMENT "Building ${schema} flatbuffers...")
list(APPEND all_generated_header_files ${generated_include})
list(APPEND all_generated_source_files ${generated_source_file})
list(APPEND generated_custom_commands "${generated_include}" "${generated_source_file}")

# Generate the binary flatbuffers schemas if instructed to.
if (NOT ${FLATBUFFERS_GENERATE_HEADERS_BINARY_SCHEMAS_DIR} STREQUAL "")
set(binary_schema
"${FLATBUFFERS_GENERATE_HEADERS_BINARY_SCHEMAS_DIR}/${filename}.bfbs")
add_custom_command(
OUTPUT ${binary_schema}
COMMAND ${FLATC} -b --schema
-o ${FLATBUFFERS_GENERATE_HEADERS_BINARY_SCHEMAS_DIR}
${include_params}
${schema}
DEPENDS ${FLATC_TARGET} ${schema}
WORKING_DIRECTORY "${working_dir}")
list(APPEND generated_custom_commands "${binary_schema}")
list(APPEND all_generated_binary_files ${binary_schema})
endif()
endforeach()

# Create an additional target as add_custom_command scope is only within same directory (CMakeFile.txt)
set(generate_target fuzztest_GENERATE_${FLATBUFFERS_GENERATE_HEADERS_TARGET})
add_custom_target(${generate_target} ALL
DEPENDS ${generated_custom_commands}
COMMENT "Generating flatbuffer target fuzztest_${FLATBUFFERS_GENERATE_HEADERS_TARGET}")

# Set up interface library
add_library(fuzztest_${FLATBUFFERS_GENERATE_HEADERS_TARGET} INTERFACE)
add_dependencies(
fuzztest_${FLATBUFFERS_GENERATE_HEADERS_TARGET}
${FLATC}
${FLATBUFFERS_GENERATE_HEADERS_SCHEMAS})
target_include_directories(
fuzztest_${FLATBUFFERS_GENERATE_HEADERS_TARGET}
INTERFACE ${generated_target_dir})

# Organize file layout for IDEs.
source_group(
TREE "${generated_target_dir}"
PREFIX "Flatbuffers/Generated/Headers Files"
FILES ${all_generated_header_files})
source_group(
TREE "${generated_target_dir}"
PREFIX "Flatbuffers/Generated/Source Files"
FILES ${all_generated_source_files})
source_group(
TREE ${working_dir}
PREFIX "Flatbuffers/Schemas"
FILES ${FLATBUFFERS_GENERATE_HEADERS_SCHEMAS})
if (NOT ${FLATBUFFERS_GENERATE_HEADERS_BINARY_SCHEMAS_DIR} STREQUAL "")
source_group(
TREE "${FLATBUFFERS_GENERATE_HEADERS_BINARY_SCHEMAS_DIR}"
PREFIX "Flatbuffers/Generated/Binary Schemas"
FILES ${all_generated_binary_files})
endif()
endfunction()
1 change: 1 addition & 0 deletions cmake/generate_cmake_from_bazel.py
Original file line number Diff line number Diff line change
Expand Up @@ -66,6 +66,7 @@
"@abseil-cpp//absl/types:optional": "absl::optional",
"@abseil-cpp//absl/types:span": "absl::span",
"@abseil-cpp//absl/types:variant": "absl::variant",
"@flatbuffers//:runtime_cc": "flatbuffers",
"@googletest//:gtest": "GTest::gtest",
"@googletest//:gtest_main": "GTest::gmock_main",
"@protobuf//:protobuf": "protobuf::libprotobuf",
Expand Down
19 changes: 19 additions & 0 deletions domain_tests/BUILD
Original file line number Diff line number Diff line change
Expand Up @@ -37,6 +37,25 @@ cc_test(
],
)

cc_test(
name = "arbitrary_domains_flatbuffers_test",
srcs = ["arbitrary_domains_flatbuffers_test.cc"],
deps = [
":domain_testing",
"@abseil-cpp//absl/container:flat_hash_map",
"@abseil-cpp//absl/log:check",
"@abseil-cpp//absl/random",
"@com_google_fuzztest//fuzztest:domain",
"@com_google_fuzztest//fuzztest:flatbuffers",
"@com_google_fuzztest//fuzztest:fuzztest_macros",
"@com_google_fuzztest//fuzztest/internal:meta",
"@com_google_fuzztest//fuzztest/internal:serialization",
"@com_google_fuzztest//fuzztest/internal:test_flatbuffers_cc_fbs",
"@flatbuffers//:runtime_cc",
"@googletest//:gtest_main",
],
)

cc_test(
name = "arbitrary_domains_protobuf_test",
srcs = ["arbitrary_domains_protobuf_test.cc"],
Expand Down
24 changes: 24 additions & 0 deletions domain_tests/CMakeLists.txt
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,30 @@ fuzztest_cc_test(
GTest::gmock_main
)

if (FUZZTEST_BUILD_FLATBUFFERS)
fuzztest_cc_test(
NAME
arbitrary_domains_flatbuffers_test
SRCS
"arbitrary_domains_flatbuffers_test.cc"
DEPS
absl::flat_hash_set
absl::random_bit_gen_ref
absl::random_random
absl::strings
flatbuffers
fuzztest::domain
fuzztest::domain_testing
fuzztest::flatbuffers
fuzztest::fuzztest_macros
GTest::gmock_main
fuzztest_test_flatbuffers_headers
)
add_dependencies(fuzztest_arbitrary_domains_flatbuffers_test
fuzztest_GENERATE_test_flatbuffers_headers
)
endif()

fuzztest_cc_test(
NAME
arbitrary_domains_protobuf_test
Expand Down
Loading
Loading