2022-04-21 00:48:41 +02:00
|
|
|
// Copyright 2022 Google Inc. All rights reserved.
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package cc
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
2022-06-03 04:55:15 +02:00
|
|
|
"strings"
|
2022-04-21 00:48:41 +02:00
|
|
|
"testing"
|
|
|
|
|
|
|
|
"android/soong/android"
|
|
|
|
)
|
|
|
|
|
2022-06-12 03:10:58 +02:00
|
|
|
func TestTidyFlagsWarningsAsErrors(t *testing.T) {
|
|
|
|
// The "tidy_flags" property should not contain -warnings-as-errors.
|
|
|
|
type testCase struct {
|
|
|
|
libName, bp string
|
|
|
|
errorMsg string // a negative test; must have error message
|
|
|
|
flags []string // must have substrings in tidyFlags
|
|
|
|
noFlags []string // must not have substrings in tidyFlags
|
|
|
|
}
|
|
|
|
|
|
|
|
testCases := []testCase{
|
|
|
|
{
|
|
|
|
"libfoo1",
|
|
|
|
`cc_library_shared { // no warnings-as-errors, good tidy_flags
|
|
|
|
name: "libfoo1",
|
|
|
|
srcs: ["foo.c"],
|
|
|
|
tidy_flags: ["-header-filter=dir1/"],
|
|
|
|
}`,
|
|
|
|
"",
|
|
|
|
[]string{"-header-filter=dir1/"},
|
|
|
|
[]string{"-warnings-as-errors"},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"libfoo2",
|
|
|
|
`cc_library_shared { // good use of tidy_checks_as_errors
|
|
|
|
name: "libfoo2",
|
|
|
|
srcs: ["foo.c"],
|
|
|
|
tidy_checks_as_errors: ["xyz-*", "abc"],
|
|
|
|
}`,
|
|
|
|
"",
|
|
|
|
[]string{
|
|
|
|
"-header-filter=^", // there is a default header filter
|
|
|
|
"-warnings-as-errors='xyz-*',abc,${config.TidyGlobalNoErrorChecks}",
|
|
|
|
},
|
|
|
|
[]string{},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
if NoWarningsAsErrorsInTidyFlags {
|
|
|
|
testCases = append(testCases, testCase{
|
|
|
|
"libfoo3",
|
|
|
|
`cc_library_shared { // bad use of -warnings-as-errors in tidy_flags
|
|
|
|
name: "libfoo3",
|
|
|
|
srcs: ["foo.c"],
|
|
|
|
tidy_flags: [
|
|
|
|
"-header-filters=.*",
|
|
|
|
"-warnings-as-errors=xyz-*",
|
|
|
|
],
|
|
|
|
}`,
|
|
|
|
`module "libfoo3" .*: tidy_flags: should not contain .*;` +
|
|
|
|
` use tidy_checks_as_errors instead`,
|
|
|
|
[]string{},
|
|
|
|
[]string{},
|
|
|
|
})
|
|
|
|
}
|
|
|
|
for _, test := range testCases {
|
|
|
|
if test.errorMsg != "" {
|
|
|
|
testCcError(t, test.errorMsg, test.bp)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
variant := "android_arm64_armv8-a_shared"
|
|
|
|
ctx := testCc(t, test.bp)
|
|
|
|
t.Run("caseTidyFlags", func(t *testing.T) {
|
|
|
|
flags := ctx.ModuleForTests(test.libName, variant).Rule("clangTidy").Args["tidyFlags"]
|
|
|
|
for _, flag := range test.flags {
|
|
|
|
if !strings.Contains(flags, flag) {
|
|
|
|
t.Errorf("tidyFlags %v for %s does not contain %s.", flags, test.libName, flag)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
for _, flag := range test.noFlags {
|
|
|
|
if strings.Contains(flags, flag) {
|
|
|
|
t.Errorf("tidyFlags %v for %s should not contain %s.", flags, test.libName, flag)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-06-03 04:55:15 +02:00
|
|
|
func TestTidyChecks(t *testing.T) {
|
|
|
|
// The "tidy_checks" property defines additional checks appended
|
|
|
|
// to global default. But there are some checks disabled after
|
|
|
|
// the local tidy_checks.
|
|
|
|
bp := `
|
|
|
|
cc_library_shared { // has global checks + extraGlobalChecks
|
|
|
|
name: "libfoo_1",
|
|
|
|
srcs: ["foo.c"],
|
|
|
|
}
|
|
|
|
cc_library_shared { // has only local checks + extraGlobalChecks
|
|
|
|
name: "libfoo_2",
|
|
|
|
srcs: ["foo.c"],
|
|
|
|
tidy_checks: ["-*", "xyz-*"],
|
|
|
|
}
|
|
|
|
cc_library_shared { // has global checks + local checks + extraGlobalChecks
|
|
|
|
name: "libfoo_3",
|
|
|
|
srcs: ["foo.c"],
|
|
|
|
tidy_checks: ["-abc*", "xyz-*", "mycheck"],
|
|
|
|
}
|
|
|
|
cc_library_shared { // has only local checks after "-*" + extraGlobalChecks
|
|
|
|
name: "libfoo_4",
|
|
|
|
srcs: ["foo.c"],
|
|
|
|
tidy_checks: ["-abc*", "xyz-*", "mycheck", "-*", "xyz-*"],
|
|
|
|
}`
|
|
|
|
ctx := testCc(t, bp)
|
|
|
|
|
|
|
|
globalChecks := "-checks=${config.TidyDefaultGlobalChecks},"
|
|
|
|
firstXyzChecks := "-checks='-*','xyz-*',"
|
|
|
|
localXyzChecks := "'-*','xyz-*'"
|
|
|
|
localAbcChecks := "'-abc*','xyz-*',mycheck"
|
2022-06-10 02:58:41 +02:00
|
|
|
extraGlobalChecks := ",${config.TidyGlobalNoChecks}"
|
2022-06-03 04:55:15 +02:00
|
|
|
testCases := []struct {
|
|
|
|
libNumber int // 1,2,3,...
|
|
|
|
checks []string // must have substrings in -checks
|
|
|
|
noChecks []string // must not have substrings in -checks
|
|
|
|
}{
|
|
|
|
{1, []string{globalChecks, extraGlobalChecks}, []string{localXyzChecks, localAbcChecks}},
|
|
|
|
{2, []string{firstXyzChecks, extraGlobalChecks}, []string{globalChecks, localAbcChecks}},
|
|
|
|
{3, []string{globalChecks, localAbcChecks, extraGlobalChecks}, []string{localXyzChecks}},
|
|
|
|
{4, []string{firstXyzChecks, extraGlobalChecks}, []string{globalChecks, localAbcChecks}},
|
|
|
|
}
|
|
|
|
t.Run("caseTidyChecks", func(t *testing.T) {
|
|
|
|
variant := "android_arm64_armv8-a_shared"
|
|
|
|
for _, test := range testCases {
|
|
|
|
libName := fmt.Sprintf("libfoo_%d", test.libNumber)
|
|
|
|
flags := ctx.ModuleForTests(libName, variant).Rule("clangTidy").Args["tidyFlags"]
|
|
|
|
splitFlags := strings.Split(flags, " ")
|
|
|
|
foundCheckFlag := false
|
|
|
|
for _, flag := range splitFlags {
|
|
|
|
if strings.HasPrefix(flag, "-checks=") {
|
|
|
|
foundCheckFlag = true
|
|
|
|
for _, check := range test.checks {
|
|
|
|
if !strings.Contains(flag, check) {
|
|
|
|
t.Errorf("tidyFlags for %s does not contain %s.", libName, check)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
for _, check := range test.noChecks {
|
|
|
|
if strings.Contains(flag, check) {
|
|
|
|
t.Errorf("tidyFlags for %s should not contain %s.", libName, check)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !foundCheckFlag {
|
|
|
|
t.Errorf("tidyFlags for %s does not contain -checks=.", libName)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2022-04-21 00:48:41 +02:00
|
|
|
func TestWithTidy(t *testing.T) {
|
|
|
|
// When WITH_TIDY=1 or (ALLOW_LOCAL_TIDY_TRUE=1 and local tidy:true)
|
|
|
|
// a C++ library should depend on .tidy files.
|
|
|
|
testCases := []struct {
|
|
|
|
withTidy, allowLocalTidyTrue string // "_" means undefined
|
|
|
|
needTidyFile []bool // for {libfoo_0, libfoo_1} and {libbar_0, libbar_1}
|
|
|
|
}{
|
|
|
|
{"_", "_", []bool{false, false, false}},
|
|
|
|
{"_", "0", []bool{false, false, false}},
|
|
|
|
{"_", "1", []bool{false, true, false}},
|
|
|
|
{"_", "true", []bool{false, true, false}},
|
|
|
|
{"0", "_", []bool{false, false, false}},
|
|
|
|
{"0", "1", []bool{false, true, false}},
|
|
|
|
{"1", "_", []bool{true, true, false}},
|
|
|
|
{"1", "false", []bool{true, true, false}},
|
|
|
|
{"1", "1", []bool{true, true, false}},
|
|
|
|
{"true", "_", []bool{true, true, false}},
|
|
|
|
}
|
|
|
|
bp := `
|
|
|
|
cc_library_shared {
|
|
|
|
name: "libfoo_0", // depends on .tidy if WITH_TIDY=1
|
|
|
|
srcs: ["foo.c"],
|
|
|
|
}
|
|
|
|
cc_library_shared { // depends on .tidy if WITH_TIDY=1 or ALLOW_LOCAL_TIDY_TRUE=1
|
|
|
|
name: "libfoo_1",
|
|
|
|
srcs: ["foo.c"],
|
|
|
|
tidy: true,
|
|
|
|
}
|
|
|
|
cc_library_shared { // no .tidy
|
|
|
|
name: "libfoo_2",
|
|
|
|
srcs: ["foo.c"],
|
|
|
|
tidy: false,
|
|
|
|
}
|
|
|
|
cc_library_static {
|
|
|
|
name: "libbar_0", // depends on .tidy if WITH_TIDY=1
|
|
|
|
srcs: ["bar.c"],
|
|
|
|
}
|
|
|
|
cc_library_static { // depends on .tidy if WITH_TIDY=1 or ALLOW_LOCAL_TIDY_TRUE=1
|
|
|
|
name: "libbar_1",
|
|
|
|
srcs: ["bar.c"],
|
|
|
|
tidy: true,
|
|
|
|
}
|
|
|
|
cc_library_static { // no .tidy
|
|
|
|
name: "libbar_2",
|
|
|
|
srcs: ["bar.c"],
|
|
|
|
tidy: false,
|
|
|
|
}`
|
|
|
|
for index, test := range testCases {
|
|
|
|
testName := fmt.Sprintf("case%d,%v,%v", index, test.withTidy, test.allowLocalTidyTrue)
|
|
|
|
t.Run(testName, func(t *testing.T) {
|
|
|
|
testEnv := map[string]string{}
|
|
|
|
if test.withTidy != "_" {
|
|
|
|
testEnv["WITH_TIDY"] = test.withTidy
|
|
|
|
}
|
|
|
|
if test.allowLocalTidyTrue != "_" {
|
|
|
|
testEnv["ALLOW_LOCAL_TIDY_TRUE"] = test.allowLocalTidyTrue
|
|
|
|
}
|
|
|
|
ctx := android.GroupFixturePreparers(prepareForCcTest, android.FixtureMergeEnv(testEnv)).RunTestWithBp(t, bp)
|
|
|
|
for n := 0; n < 3; n++ {
|
|
|
|
checkLibraryRule := func(foo, variant, ruleName string) {
|
|
|
|
libName := fmt.Sprintf("lib%s_%d", foo, n)
|
|
|
|
tidyFile := "out/soong/.intermediates/" + libName + "/" + variant + "/obj/" + foo + ".tidy"
|
|
|
|
depFiles := ctx.ModuleForTests(libName, variant).Rule(ruleName).Validations.Strings()
|
|
|
|
if test.needTidyFile[n] {
|
|
|
|
android.AssertStringListContains(t, libName+" needs .tidy file", depFiles, tidyFile)
|
|
|
|
} else {
|
|
|
|
android.AssertStringListDoesNotContain(t, libName+" does not need .tidy file", depFiles, tidyFile)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
checkLibraryRule("foo", "android_arm64_armv8-a_shared", "ld")
|
|
|
|
checkLibraryRule("bar", "android_arm64_armv8-a_static", "ar")
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|