2016-09-27 00:45:04 +02:00
|
|
|
// Copyright 2016 Google Inc. All rights reserved.
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package config
|
|
|
|
|
|
|
|
import (
|
2016-11-02 22:50:21 +01:00
|
|
|
"android/soong/android"
|
2018-03-12 21:24:09 +01:00
|
|
|
"strings"
|
2016-09-27 00:45:04 +02:00
|
|
|
)
|
|
|
|
|
2022-06-12 03:10:58 +02:00
|
|
|
var (
|
2022-06-13 05:28:00 +02:00
|
|
|
// Some clang-tidy checks have bugs or don't work for Android.
|
2022-06-12 03:10:58 +02:00
|
|
|
// They are disabled here, overriding any locally selected checks.
|
|
|
|
globalNoCheckList = []string{
|
|
|
|
// https://b.corp.google.com/issues/153464409
|
|
|
|
// many local projects enable cert-* checks, which
|
|
|
|
// trigger bugprone-reserved-identifier.
|
|
|
|
"-bugprone-reserved-identifier*,-cert-dcl51-cpp,-cert-dcl37-c",
|
|
|
|
// http://b/153757728
|
|
|
|
"-readability-qualified-auto",
|
|
|
|
// http://b/193716442
|
|
|
|
"-bugprone-implicit-widening-of-multiplication-result",
|
|
|
|
// Too many existing functions trigger this rule, and fixing it requires large code
|
|
|
|
// refactoring. The cost of maintaining this tidy rule outweighs the benefit it brings.
|
|
|
|
"-bugprone-easily-swappable-parameters",
|
|
|
|
// http://b/216364337 - TODO: Follow-up after compiler update to
|
|
|
|
// disable or fix individual instances.
|
|
|
|
"-cert-err33-c",
|
2022-08-09 07:40:50 +02:00
|
|
|
// http://b/241125373
|
|
|
|
"-bugprone-unchecked-optional-access",
|
2022-06-12 03:10:58 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Some clang-tidy checks are included in some tidy_checks_as_errors lists,
|
|
|
|
// but not all warnings are fixed/suppressed yet. These checks are not
|
|
|
|
// disabled in the TidyGlobalNoChecks list, so we can see them and fix/suppress them.
|
|
|
|
globalNoErrorCheckList = []string{
|
2022-08-09 07:40:50 +02:00
|
|
|
// http://b/241997913
|
|
|
|
"-bugprone-assignment-in-if-condition",
|
2022-06-12 03:10:58 +02:00
|
|
|
// http://b/155034972
|
|
|
|
"-bugprone-branch-clone",
|
2022-08-09 07:40:50 +02:00
|
|
|
// http://b/155034563
|
|
|
|
"-bugprone-signed-char-misuse",
|
|
|
|
// http://b/241819232
|
|
|
|
"-misc-const-correctness",
|
2022-06-12 03:10:58 +02:00
|
|
|
}
|
|
|
|
)
|
|
|
|
|
2016-09-27 00:45:04 +02:00
|
|
|
func init() {
|
2021-01-15 01:51:49 +01:00
|
|
|
// Many clang-tidy checks like altera-*, llvm-*, modernize-*
|
|
|
|
// are not designed for Android source code or creating too
|
|
|
|
// many (false-positive) warnings. The global default tidy checks
|
|
|
|
// should include only tested groups and exclude known noisy checks.
|
|
|
|
// See https://clang.llvm.org/extra/clang-tidy/checks/list.html
|
2018-03-12 21:24:09 +01:00
|
|
|
pctx.VariableFunc("TidyDefaultGlobalChecks", func(ctx android.PackageVarContext) string {
|
|
|
|
if override := ctx.Config().Getenv("DEFAULT_GLOBAL_TIDY_CHECKS"); override != "" {
|
|
|
|
return override
|
2016-11-02 22:50:21 +01:00
|
|
|
}
|
2021-01-20 03:28:18 +01:00
|
|
|
checks := strings.Join([]string{
|
2021-01-14 20:48:49 +01:00
|
|
|
"-*",
|
2021-01-15 01:51:49 +01:00
|
|
|
"android-*",
|
|
|
|
"bugprone-*",
|
|
|
|
"cert-*",
|
2021-01-14 20:48:49 +01:00
|
|
|
"clang-diagnostic-unused-command-line-argument",
|
2022-05-18 00:26:34 +02:00
|
|
|
// Select only google-* checks that do not have thousands of warnings.
|
|
|
|
// Add more such checks when we clean up source code.
|
|
|
|
// "google-build-using-namespace",
|
|
|
|
// "google-default-arguments",
|
|
|
|
// "google-explicit-constructor",
|
|
|
|
// "google-global-names-in-headers",
|
|
|
|
// "google-runtime-int",
|
|
|
|
"google-build-explicit-make-pair",
|
|
|
|
"google-build-namespaces",
|
|
|
|
"google-runtime-operator",
|
|
|
|
"google-upgrade-*",
|
2021-01-15 01:51:49 +01:00
|
|
|
"misc-*",
|
|
|
|
"performance-*",
|
|
|
|
"portability-*",
|
2022-08-09 07:40:50 +02:00
|
|
|
"-bugprone-assignment-in-if-condition",
|
2021-09-11 10:14:36 +02:00
|
|
|
"-bugprone-easily-swappable-parameters",
|
2020-03-03 21:05:22 +01:00
|
|
|
"-bugprone-narrowing-conversions",
|
2022-08-09 07:40:50 +02:00
|
|
|
"-misc-const-correctness",
|
2021-01-15 01:51:49 +01:00
|
|
|
"-misc-no-recursion",
|
|
|
|
"-misc-non-private-member-variables-in-classes",
|
|
|
|
"-misc-unused-parameters",
|
2022-05-10 01:01:10 +02:00
|
|
|
"-performance-no-int-to-ptr",
|
2021-01-15 01:51:49 +01:00
|
|
|
// the following groups are excluded by -*
|
|
|
|
// -altera-*
|
|
|
|
// -cppcoreguidelines-*
|
|
|
|
// -darwin-*
|
|
|
|
// -fuchsia-*
|
|
|
|
// -hicpp-*
|
|
|
|
// -llvm-*
|
|
|
|
// -llvmlibc-*
|
|
|
|
// -modernize-*
|
|
|
|
// -mpi-*
|
|
|
|
// -objc-*
|
|
|
|
// -readability-*
|
|
|
|
// -zircon-*
|
2018-03-12 21:24:09 +01:00
|
|
|
}, ",")
|
2021-01-20 03:28:18 +01:00
|
|
|
// clang-analyzer-* checks are too slow to be in the default for WITH_TIDY=1.
|
|
|
|
// nightly builds add CLANG_ANALYZER_CHECKS=1 to run those checks.
|
2022-02-08 01:44:13 +01:00
|
|
|
// The insecureAPI.DeprecatedOrUnsafeBufferHandling warning does not apply to Android.
|
2021-01-20 03:28:18 +01:00
|
|
|
if ctx.Config().IsEnvTrue("CLANG_ANALYZER_CHECKS") {
|
2022-02-08 01:44:13 +01:00
|
|
|
checks += ",clang-analyzer-*,-clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling"
|
2021-01-20 03:28:18 +01:00
|
|
|
}
|
|
|
|
return checks
|
2016-11-02 22:50:21 +01:00
|
|
|
})
|
2016-09-27 00:45:04 +02:00
|
|
|
|
|
|
|
// There are too many clang-tidy warnings in external and vendor projects.
|
|
|
|
// Enable only some google checks for these projects.
|
2018-03-12 21:24:09 +01:00
|
|
|
pctx.VariableFunc("TidyExternalVendorChecks", func(ctx android.PackageVarContext) string {
|
|
|
|
if override := ctx.Config().Getenv("DEFAULT_EXTERNAL_VENDOR_TIDY_CHECKS"); override != "" {
|
|
|
|
return override
|
2016-11-02 22:50:21 +01:00
|
|
|
}
|
|
|
|
return strings.Join([]string{
|
|
|
|
"-*",
|
2018-08-15 20:28:38 +02:00
|
|
|
"clang-diagnostic-unused-command-line-argument",
|
2022-05-18 00:26:34 +02:00
|
|
|
"google-build-explicit-make-pair",
|
|
|
|
"google-build-namespaces",
|
|
|
|
"google-runtime-operator",
|
|
|
|
"google-upgrade-*",
|
2018-03-12 21:24:09 +01:00
|
|
|
}, ",")
|
2016-11-02 22:50:21 +01:00
|
|
|
})
|
2016-09-27 00:45:04 +02:00
|
|
|
|
2022-06-10 02:58:41 +02:00
|
|
|
pctx.VariableFunc("TidyGlobalNoChecks", func(ctx android.PackageVarContext) string {
|
2022-06-12 03:10:58 +02:00
|
|
|
return strings.Join(globalNoCheckList, ",")
|
|
|
|
})
|
|
|
|
|
|
|
|
pctx.VariableFunc("TidyGlobalNoErrorChecks", func(ctx android.PackageVarContext) string {
|
|
|
|
return strings.Join(globalNoErrorCheckList, ",")
|
2022-06-10 02:58:41 +02:00
|
|
|
})
|
|
|
|
|
2021-02-11 06:56:03 +01:00
|
|
|
// To reduce duplicate warnings from the same header files,
|
|
|
|
// header-filter will contain only the module directory and
|
|
|
|
// those specified by DEFAULT_TIDY_HEADER_DIRS.
|
2018-09-21 18:38:17 +02:00
|
|
|
pctx.VariableFunc("TidyDefaultHeaderDirs", func(ctx android.PackageVarContext) string {
|
2021-02-11 06:56:03 +01:00
|
|
|
return ctx.Config().Getenv("DEFAULT_TIDY_HEADER_DIRS")
|
2018-09-21 18:38:17 +02:00
|
|
|
})
|
2018-09-22 00:12:44 +02:00
|
|
|
|
|
|
|
// Use WTIH_TIDY_FLAGS to pass extra global default clang-tidy flags.
|
|
|
|
pctx.VariableFunc("TidyWithTidyFlags", func(ctx android.PackageVarContext) string {
|
|
|
|
return ctx.Config().Getenv("WITH_TIDY_FLAGS")
|
|
|
|
})
|
2016-09-27 00:45:04 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
type PathBasedTidyCheck struct {
|
|
|
|
PathPrefix string
|
|
|
|
Checks string
|
|
|
|
}
|
|
|
|
|
|
|
|
const tidyDefault = "${config.TidyDefaultGlobalChecks}"
|
|
|
|
const tidyExternalVendor = "${config.TidyExternalVendorChecks}"
|
2021-08-30 22:32:29 +02:00
|
|
|
const tidyDefaultNoAnalyzer = "${config.TidyDefaultGlobalChecks},-clang-analyzer-*"
|
2016-09-27 00:45:04 +02:00
|
|
|
|
|
|
|
// This is a map of local path prefixes to the set of default clang-tidy checks
|
|
|
|
// to be used.
|
|
|
|
// The last matched local_path_prefix should be the most specific to be used.
|
|
|
|
var DefaultLocalTidyChecks = []PathBasedTidyCheck{
|
|
|
|
{"external/", tidyExternalVendor},
|
|
|
|
{"external/google", tidyDefault},
|
|
|
|
{"external/webrtc", tidyDefault},
|
2021-09-06 04:53:15 +02:00
|
|
|
{"external/googletest/", tidyExternalVendor},
|
2016-09-27 00:45:04 +02:00
|
|
|
{"frameworks/compile/mclinker/", tidyExternalVendor},
|
|
|
|
{"hardware/qcom", tidyExternalVendor},
|
|
|
|
{"vendor/", tidyExternalVendor},
|
|
|
|
{"vendor/google", tidyDefault},
|
2022-05-05 23:09:12 +02:00
|
|
|
{"vendor/google_arc/libs/org.chromium.arc.mojom", tidyExternalVendor},
|
2016-09-27 00:45:04 +02:00
|
|
|
{"vendor/google_devices", tidyExternalVendor},
|
|
|
|
}
|
|
|
|
|
|
|
|
var reversedDefaultLocalTidyChecks = reverseTidyChecks(DefaultLocalTidyChecks)
|
|
|
|
|
|
|
|
func reverseTidyChecks(in []PathBasedTidyCheck) []PathBasedTidyCheck {
|
|
|
|
ret := make([]PathBasedTidyCheck, len(in))
|
|
|
|
for i, check := range in {
|
|
|
|
ret[len(in)-i-1] = check
|
|
|
|
}
|
|
|
|
return ret
|
|
|
|
}
|
|
|
|
|
|
|
|
func TidyChecksForDir(dir string) string {
|
2021-09-06 04:53:15 +02:00
|
|
|
dir = dir + "/"
|
2016-09-27 00:45:04 +02:00
|
|
|
for _, pathCheck := range reversedDefaultLocalTidyChecks {
|
|
|
|
if strings.HasPrefix(dir, pathCheck.PathPrefix) {
|
|
|
|
return pathCheck.Checks
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return tidyDefault
|
|
|
|
}
|
2021-08-30 22:32:29 +02:00
|
|
|
|
2022-06-10 02:58:41 +02:00
|
|
|
// Returns a globally disabled tidy checks, overriding locally selected checks.
|
|
|
|
func TidyGlobalNoChecks() string {
|
2022-06-12 03:10:58 +02:00
|
|
|
if len(globalNoCheckList) > 0 {
|
|
|
|
return ",${config.TidyGlobalNoChecks}"
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
// Returns a globally allowed/no-error tidy checks, appended to -warnings-as-errors.
|
|
|
|
func TidyGlobalNoErrorChecks() string {
|
|
|
|
if len(globalNoErrorCheckList) > 0 {
|
|
|
|
return ",${config.TidyGlobalNoErrorChecks}"
|
|
|
|
}
|
|
|
|
return ""
|
2022-06-10 02:58:41 +02:00
|
|
|
}
|
|
|
|
|
2021-08-30 22:32:29 +02:00
|
|
|
func TidyFlagsForSrcFile(srcFile android.Path, flags string) string {
|
|
|
|
// Disable clang-analyzer-* checks globally for generated source files
|
|
|
|
// because some of them are too huge. Local .bp files can add wanted
|
|
|
|
// clang-analyzer checks through the tidy_checks property.
|
|
|
|
// Need to do this patch per source file, because some modules
|
|
|
|
// have both generated and organic source files.
|
|
|
|
if _, ok := srcFile.(android.WritablePath); ok {
|
|
|
|
if strings.Contains(flags, tidyDefault) {
|
|
|
|
return strings.ReplaceAll(flags, tidyDefault, tidyDefaultNoAnalyzer)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return flags
|
|
|
|
}
|