2019-03-28 15:10:57 +01:00
|
|
|
// Copyright 2019 Google Inc. All rights reserved.
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package android
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"regexp"
|
2020-09-29 17:01:08 +02:00
|
|
|
"sort"
|
2019-03-28 15:10:57 +01:00
|
|
|
"strings"
|
|
|
|
"sync"
|
2020-01-14 13:42:08 +01:00
|
|
|
|
|
|
|
"github.com/google/blueprint"
|
2019-03-28 15:10:57 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
// Enforces visibility rules between modules.
|
|
|
|
//
|
2019-05-31 15:00:04 +02:00
|
|
|
// Multi stage process:
|
|
|
|
// * First stage works bottom up, before defaults expansion, to check the syntax of the visibility
|
|
|
|
// rules that have been specified.
|
|
|
|
//
|
|
|
|
// * Second stage works bottom up to extract the package info for each package and store them in a
|
|
|
|
// map by package name. See package.go for functionality for this.
|
|
|
|
//
|
|
|
|
// * Third stage works bottom up to extract visibility information from the modules, parse it,
|
2019-03-28 15:10:57 +01:00
|
|
|
// create visibilityRule structures and store them in a map keyed by the module's
|
|
|
|
// qualifiedModuleName instance, i.e. //<pkg>:<name>. The map is stored in the context rather
|
|
|
|
// than a global variable for testing. Each test has its own Config so they do not share a map
|
2019-05-31 15:00:04 +02:00
|
|
|
// and so can be run in parallel. If a module has no visibility specified then it uses the
|
|
|
|
// default package visibility if specified.
|
2019-03-28 15:10:57 +01:00
|
|
|
//
|
2019-05-31 15:00:04 +02:00
|
|
|
// * Fourth stage works top down and iterates over all the deps for each module. If the dep is in
|
2019-03-28 15:10:57 +01:00
|
|
|
// the same package then it is automatically visible. Otherwise, for each dep it first extracts
|
|
|
|
// its visibilityRule from the config map. If one could not be found then it assumes that it is
|
|
|
|
// publicly visible. Otherwise, it calls the visibility rule to check that the module can see
|
|
|
|
// the dependency. If it cannot then an error is reported.
|
|
|
|
//
|
|
|
|
// TODO(b/130631145) - Make visibility work properly with prebuilts.
|
|
|
|
|
|
|
|
// Patterns for the values that can be specified in visibility property.
|
|
|
|
const (
|
|
|
|
packagePattern = `//([^/:]+(?:/[^/:]+)*)`
|
|
|
|
namePattern = `:([^/:]+)`
|
|
|
|
visibilityRulePattern = `^(?:` + packagePattern + `)?(?:` + namePattern + `)?$`
|
|
|
|
)
|
|
|
|
|
|
|
|
var visibilityRuleRegexp = regexp.MustCompile(visibilityRulePattern)
|
|
|
|
|
2024-02-07 20:28:26 +01:00
|
|
|
type visibilityModuleReference struct {
|
|
|
|
name qualifiedModuleName
|
|
|
|
isPartitionModule bool
|
|
|
|
}
|
|
|
|
|
|
|
|
func createVisibilityModuleReference(name, dir, typ string) visibilityModuleReference {
|
|
|
|
isPartitionModule := false
|
|
|
|
switch typ {
|
|
|
|
case "android_filesystem", "android_system_image":
|
|
|
|
isPartitionModule = true
|
|
|
|
}
|
|
|
|
return visibilityModuleReference{
|
|
|
|
name: createQualifiedModuleName(name, dir),
|
|
|
|
isPartitionModule: isPartitionModule,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-03-28 15:10:57 +01:00
|
|
|
// A visibility rule is associated with a module and determines which other modules it is visible
|
|
|
|
// to, i.e. which other modules can depend on the rule's module.
|
|
|
|
type visibilityRule interface {
|
|
|
|
// Check to see whether this rules matches m.
|
|
|
|
// Returns true if it does, false otherwise.
|
2024-02-07 20:28:26 +01:00
|
|
|
matches(m visibilityModuleReference) bool
|
2019-03-28 15:10:57 +01:00
|
|
|
|
|
|
|
String() string
|
|
|
|
}
|
|
|
|
|
2019-05-31 15:00:04 +02:00
|
|
|
// Describes the properties provided by a module that contain visibility rules.
|
|
|
|
type visibilityPropertyImpl struct {
|
Refactor visibility to support visibility on defaults modules
Existing modules, either general one or package ones have a single
visibility property, called visibility in general, and
default_visibility on package, that controls access to that module, or
in the case of package sets the default visibility of all modules in
that package. The property is checked and gathered during the similarly
named phases of visibility processing.
The defaults module will be different as it will have two properties.
The first, visibility, will not affect the visibility of the module, it
only affects the visibility of modules that 'extend' the defaults. So,
it will need checking but not parsing. The second property,
defaults_visibility, will affect the visibility of the module and so
will need both checking and parsing.
The current implementation does not handle those cases because:
1) It does not differentiate between the property that affects the
module and those that do not. It checks and gathers all of them with
the last property gathered overriding the rules for the previous
properties.
2) It relies on overriding methods in MethodBase in order to change the
default behavior for the package module. That works because
packageModule embeds ModuleBase but will not work for
DefaultsModuleBase as it does not embed ModuleBase and instead is
embedded alongside it so attempting to override a method in
MethodBase leads to ambiguity.
This change addresses the issues as follows:
1) It adds a new visibility() []string method to get access to the
primary visibility rules, i.e. the ones that affect the module.
2) It adds two fields, 'visibilityPropertyInfo []visibilityProperty'
to provide information about all the properties that need checking,
and 'primaryVisibilityProperty visibilityProperty' to specify the
property that affects the module.
The PackageFactory() and InitAndroidModule(Module) functions are
modified to initialize the fields. The override of the
visibilityProperties() method for packageModule is removed and the
default implementations of visibilityProperties() and visibility()
on ModuleBase return information from the two new fields.
The InitDefaultsModule is updated to also initialize the two new
fields. It uses nil for primaryVisibilityProperty for now but that
will be changed to return defaults_visibility. It also uses the
commonProperties structure created for the defaults directly instead
of having to search for it through properties().
Changed the visibilityProperty to take a pointer to the property that
can be used to retrieve the value rather than a lambda function.
Bug: 130796911
Test: m nothing
Change-Id: Icadd470a5f692a48ec61de02bf3dfde3e2eea2ef
2019-07-24 15:24:38 +02:00
|
|
|
name string
|
|
|
|
stringsProperty *[]string
|
2019-05-31 15:00:04 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
type visibilityProperty interface {
|
|
|
|
getName() string
|
|
|
|
getStrings() []string
|
|
|
|
}
|
|
|
|
|
Refactor visibility to support visibility on defaults modules
Existing modules, either general one or package ones have a single
visibility property, called visibility in general, and
default_visibility on package, that controls access to that module, or
in the case of package sets the default visibility of all modules in
that package. The property is checked and gathered during the similarly
named phases of visibility processing.
The defaults module will be different as it will have two properties.
The first, visibility, will not affect the visibility of the module, it
only affects the visibility of modules that 'extend' the defaults. So,
it will need checking but not parsing. The second property,
defaults_visibility, will affect the visibility of the module and so
will need both checking and parsing.
The current implementation does not handle those cases because:
1) It does not differentiate between the property that affects the
module and those that do not. It checks and gathers all of them with
the last property gathered overriding the rules for the previous
properties.
2) It relies on overriding methods in MethodBase in order to change the
default behavior for the package module. That works because
packageModule embeds ModuleBase but will not work for
DefaultsModuleBase as it does not embed ModuleBase and instead is
embedded alongside it so attempting to override a method in
MethodBase leads to ambiguity.
This change addresses the issues as follows:
1) It adds a new visibility() []string method to get access to the
primary visibility rules, i.e. the ones that affect the module.
2) It adds two fields, 'visibilityPropertyInfo []visibilityProperty'
to provide information about all the properties that need checking,
and 'primaryVisibilityProperty visibilityProperty' to specify the
property that affects the module.
The PackageFactory() and InitAndroidModule(Module) functions are
modified to initialize the fields. The override of the
visibilityProperties() method for packageModule is removed and the
default implementations of visibilityProperties() and visibility()
on ModuleBase return information from the two new fields.
The InitDefaultsModule is updated to also initialize the two new
fields. It uses nil for primaryVisibilityProperty for now but that
will be changed to return defaults_visibility. It also uses the
commonProperties structure created for the defaults directly instead
of having to search for it through properties().
Changed the visibilityProperty to take a pointer to the property that
can be used to retrieve the value rather than a lambda function.
Bug: 130796911
Test: m nothing
Change-Id: Icadd470a5f692a48ec61de02bf3dfde3e2eea2ef
2019-07-24 15:24:38 +02:00
|
|
|
func newVisibilityProperty(name string, stringsProperty *[]string) visibilityProperty {
|
2019-05-31 15:00:04 +02:00
|
|
|
return visibilityPropertyImpl{
|
Refactor visibility to support visibility on defaults modules
Existing modules, either general one or package ones have a single
visibility property, called visibility in general, and
default_visibility on package, that controls access to that module, or
in the case of package sets the default visibility of all modules in
that package. The property is checked and gathered during the similarly
named phases of visibility processing.
The defaults module will be different as it will have two properties.
The first, visibility, will not affect the visibility of the module, it
only affects the visibility of modules that 'extend' the defaults. So,
it will need checking but not parsing. The second property,
defaults_visibility, will affect the visibility of the module and so
will need both checking and parsing.
The current implementation does not handle those cases because:
1) It does not differentiate between the property that affects the
module and those that do not. It checks and gathers all of them with
the last property gathered overriding the rules for the previous
properties.
2) It relies on overriding methods in MethodBase in order to change the
default behavior for the package module. That works because
packageModule embeds ModuleBase but will not work for
DefaultsModuleBase as it does not embed ModuleBase and instead is
embedded alongside it so attempting to override a method in
MethodBase leads to ambiguity.
This change addresses the issues as follows:
1) It adds a new visibility() []string method to get access to the
primary visibility rules, i.e. the ones that affect the module.
2) It adds two fields, 'visibilityPropertyInfo []visibilityProperty'
to provide information about all the properties that need checking,
and 'primaryVisibilityProperty visibilityProperty' to specify the
property that affects the module.
The PackageFactory() and InitAndroidModule(Module) functions are
modified to initialize the fields. The override of the
visibilityProperties() method for packageModule is removed and the
default implementations of visibilityProperties() and visibility()
on ModuleBase return information from the two new fields.
The InitDefaultsModule is updated to also initialize the two new
fields. It uses nil for primaryVisibilityProperty for now but that
will be changed to return defaults_visibility. It also uses the
commonProperties structure created for the defaults directly instead
of having to search for it through properties().
Changed the visibilityProperty to take a pointer to the property that
can be used to retrieve the value rather than a lambda function.
Bug: 130796911
Test: m nothing
Change-Id: Icadd470a5f692a48ec61de02bf3dfde3e2eea2ef
2019-07-24 15:24:38 +02:00
|
|
|
name: name,
|
|
|
|
stringsProperty: stringsProperty,
|
2019-05-31 15:00:04 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (p visibilityPropertyImpl) getName() string {
|
|
|
|
return p.name
|
|
|
|
}
|
|
|
|
|
|
|
|
func (p visibilityPropertyImpl) getStrings() []string {
|
Refactor visibility to support visibility on defaults modules
Existing modules, either general one or package ones have a single
visibility property, called visibility in general, and
default_visibility on package, that controls access to that module, or
in the case of package sets the default visibility of all modules in
that package. The property is checked and gathered during the similarly
named phases of visibility processing.
The defaults module will be different as it will have two properties.
The first, visibility, will not affect the visibility of the module, it
only affects the visibility of modules that 'extend' the defaults. So,
it will need checking but not parsing. The second property,
defaults_visibility, will affect the visibility of the module and so
will need both checking and parsing.
The current implementation does not handle those cases because:
1) It does not differentiate between the property that affects the
module and those that do not. It checks and gathers all of them with
the last property gathered overriding the rules for the previous
properties.
2) It relies on overriding methods in MethodBase in order to change the
default behavior for the package module. That works because
packageModule embeds ModuleBase but will not work for
DefaultsModuleBase as it does not embed ModuleBase and instead is
embedded alongside it so attempting to override a method in
MethodBase leads to ambiguity.
This change addresses the issues as follows:
1) It adds a new visibility() []string method to get access to the
primary visibility rules, i.e. the ones that affect the module.
2) It adds two fields, 'visibilityPropertyInfo []visibilityProperty'
to provide information about all the properties that need checking,
and 'primaryVisibilityProperty visibilityProperty' to specify the
property that affects the module.
The PackageFactory() and InitAndroidModule(Module) functions are
modified to initialize the fields. The override of the
visibilityProperties() method for packageModule is removed and the
default implementations of visibilityProperties() and visibility()
on ModuleBase return information from the two new fields.
The InitDefaultsModule is updated to also initialize the two new
fields. It uses nil for primaryVisibilityProperty for now but that
will be changed to return defaults_visibility. It also uses the
commonProperties structure created for the defaults directly instead
of having to search for it through properties().
Changed the visibilityProperty to take a pointer to the property that
can be used to retrieve the value rather than a lambda function.
Bug: 130796911
Test: m nothing
Change-Id: Icadd470a5f692a48ec61de02bf3dfde3e2eea2ef
2019-07-24 15:24:38 +02:00
|
|
|
return *p.stringsProperty
|
2019-05-31 15:00:04 +02:00
|
|
|
}
|
|
|
|
|
2019-05-17 23:42:02 +02:00
|
|
|
// A compositeRule is a visibility rule composed from a list of atomic visibility rules.
|
|
|
|
//
|
|
|
|
// The list corresponds to the list of strings in the visibility property after defaults expansion.
|
|
|
|
// Even though //visibility:public is not allowed together with other rules in the visibility list
|
|
|
|
// of a single module, it is allowed here to permit a module to override an inherited visibility
|
|
|
|
// spec with public visibility.
|
|
|
|
//
|
|
|
|
// //visibility:private is not allowed in the same way, since we'd need to check for it during the
|
|
|
|
// defaults expansion to make that work. No non-private visibility rules are allowed in a
|
|
|
|
// compositeRule containing a privateRule.
|
|
|
|
//
|
2019-03-28 15:10:57 +01:00
|
|
|
// This array will only be [] if all the rules are invalid and will behave as if visibility was
|
|
|
|
// ["//visibility:private"].
|
|
|
|
type compositeRule []visibilityRule
|
|
|
|
|
2024-02-07 20:28:26 +01:00
|
|
|
var _ visibilityRule = compositeRule{}
|
|
|
|
|
2019-03-28 15:10:57 +01:00
|
|
|
// A compositeRule matches if and only if any of its rules matches.
|
2024-02-07 20:28:26 +01:00
|
|
|
func (c compositeRule) matches(m visibilityModuleReference) bool {
|
2019-03-28 15:10:57 +01:00
|
|
|
for _, r := range c {
|
|
|
|
if r.matches(m) {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2019-05-31 15:00:04 +02:00
|
|
|
func (c compositeRule) String() string {
|
2019-12-05 15:31:48 +01:00
|
|
|
return "[" + strings.Join(c.Strings(), ", ") + "]"
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c compositeRule) Strings() []string {
|
2019-05-31 15:00:04 +02:00
|
|
|
s := make([]string, 0, len(c))
|
|
|
|
for _, r := range c {
|
2019-03-28 15:10:57 +01:00
|
|
|
s = append(s, r.String())
|
|
|
|
}
|
2019-12-05 15:31:48 +01:00
|
|
|
return s
|
2019-03-28 15:10:57 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// A packageRule is a visibility rule that matches modules in a specific package (i.e. directory).
|
|
|
|
type packageRule struct {
|
|
|
|
pkg string
|
|
|
|
}
|
|
|
|
|
2024-02-07 20:28:26 +01:00
|
|
|
var _ visibilityRule = packageRule{}
|
|
|
|
|
|
|
|
func (r packageRule) matches(m visibilityModuleReference) bool {
|
|
|
|
return m.name.pkg == r.pkg
|
2019-03-28 15:10:57 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
func (r packageRule) String() string {
|
2020-05-13 02:54:21 +02:00
|
|
|
return fmt.Sprintf("//%s", r.pkg) // :__pkg__ is the default, so skip it.
|
2019-03-28 15:10:57 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// A subpackagesRule is a visibility rule that matches modules in a specific package (i.e.
|
|
|
|
// directory) or any of its subpackages (i.e. subdirectories).
|
|
|
|
type subpackagesRule struct {
|
|
|
|
pkgPrefix string
|
|
|
|
}
|
|
|
|
|
2024-02-07 20:28:26 +01:00
|
|
|
var _ visibilityRule = subpackagesRule{}
|
|
|
|
|
|
|
|
func (r subpackagesRule) matches(m visibilityModuleReference) bool {
|
|
|
|
return isAncestor(r.pkgPrefix, m.name.pkg)
|
2019-03-28 15:10:57 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
func isAncestor(p1 string, p2 string) bool {
|
2023-01-12 19:36:17 +01:00
|
|
|
// Equivalent to strings.HasPrefix(p2+"/", p1+"/"), but without the string copies
|
|
|
|
// The check for a trailing slash is so that we don't consider sibling
|
|
|
|
// directories with common prefixes to be ancestors, e.g. "fooo/bar" should not be
|
|
|
|
// a descendant of "foo".
|
|
|
|
return strings.HasPrefix(p2, p1) && (len(p2) == len(p1) || p2[len(p1)] == '/')
|
2019-03-28 15:10:57 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
func (r subpackagesRule) String() string {
|
|
|
|
return fmt.Sprintf("//%s:__subpackages__", r.pkgPrefix)
|
|
|
|
}
|
|
|
|
|
2019-05-17 23:42:02 +02:00
|
|
|
// visibilityRule for //visibility:public
|
|
|
|
type publicRule struct{}
|
|
|
|
|
2024-02-07 20:28:26 +01:00
|
|
|
var _ visibilityRule = publicRule{}
|
|
|
|
|
|
|
|
func (r publicRule) matches(_ visibilityModuleReference) bool {
|
2019-05-17 23:42:02 +02:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r publicRule) String() string {
|
|
|
|
return "//visibility:public"
|
|
|
|
}
|
|
|
|
|
|
|
|
// visibilityRule for //visibility:private
|
|
|
|
type privateRule struct{}
|
|
|
|
|
2024-02-07 20:28:26 +01:00
|
|
|
var _ visibilityRule = privateRule{}
|
|
|
|
|
|
|
|
func (r privateRule) matches(_ visibilityModuleReference) bool {
|
2019-05-17 23:42:02 +02:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r privateRule) String() string {
|
|
|
|
return "//visibility:private"
|
|
|
|
}
|
|
|
|
|
2024-02-07 20:28:26 +01:00
|
|
|
// visibilityRule for //visibility:any_partition
|
|
|
|
type anyPartitionRule struct{}
|
|
|
|
|
|
|
|
var _ visibilityRule = anyPartitionRule{}
|
|
|
|
|
|
|
|
func (r anyPartitionRule) matches(m visibilityModuleReference) bool {
|
|
|
|
return m.isPartitionModule
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r anyPartitionRule) String() string {
|
|
|
|
return "//visibility:any_partition"
|
|
|
|
}
|
|
|
|
|
2019-03-28 15:10:57 +01:00
|
|
|
var visibilityRuleMap = NewOnceKey("visibilityRuleMap")
|
|
|
|
|
|
|
|
// The map from qualifiedModuleName to visibilityRule.
|
2020-02-19 17:10:09 +01:00
|
|
|
func moduleToVisibilityRuleMap(config Config) *sync.Map {
|
|
|
|
return config.Once(visibilityRuleMap, func() interface{} {
|
2019-03-28 15:10:57 +01:00
|
|
|
return &sync.Map{}
|
|
|
|
}).(*sync.Map)
|
|
|
|
}
|
|
|
|
|
2020-01-14 13:42:08 +01:00
|
|
|
// Marker interface that identifies dependencies that are excluded from visibility
|
|
|
|
// enforcement.
|
|
|
|
type ExcludeFromVisibilityEnforcementTag interface {
|
|
|
|
blueprint.DependencyTag
|
|
|
|
|
|
|
|
// Method that differentiates this interface from others.
|
|
|
|
ExcludeFromVisibilityEnforcement()
|
|
|
|
}
|
|
|
|
|
2021-03-07 14:20:38 +01:00
|
|
|
// The visibility mutators.
|
|
|
|
var PrepareForTestWithVisibility = FixtureRegisterWithContext(registerVisibilityMutators)
|
2021-02-27 12:59:02 +01:00
|
|
|
|
2021-03-07 14:20:38 +01:00
|
|
|
func registerVisibilityMutators(ctx RegistrationContext) {
|
|
|
|
ctx.PreArchMutators(RegisterVisibilityRuleChecker)
|
2021-02-27 12:59:02 +01:00
|
|
|
ctx.PreArchMutators(RegisterVisibilityRuleGatherer)
|
|
|
|
ctx.PostDepsMutators(RegisterVisibilityRuleEnforcer)
|
2021-03-07 14:20:38 +01:00
|
|
|
}
|
2021-02-27 12:59:02 +01:00
|
|
|
|
2019-05-17 23:42:02 +02:00
|
|
|
// The rule checker needs to be registered before defaults expansion to correctly check that
|
|
|
|
// //visibility:xxx isn't combined with other packages in the same list in any one module.
|
2019-12-05 15:31:48 +01:00
|
|
|
func RegisterVisibilityRuleChecker(ctx RegisterMutatorsContext) {
|
2019-05-17 23:42:02 +02:00
|
|
|
ctx.BottomUp("visibilityRuleChecker", visibilityRuleChecker).Parallel()
|
|
|
|
}
|
|
|
|
|
2019-05-31 15:00:04 +02:00
|
|
|
// Registers the function that gathers the visibility rules for each module.
|
|
|
|
//
|
2019-03-28 15:10:57 +01:00
|
|
|
// Visibility is not dependent on arch so this must be registered before the arch phase to avoid
|
2019-05-17 23:42:02 +02:00
|
|
|
// having to process multiple variants for each module. This goes after defaults expansion to gather
|
2019-05-31 15:00:04 +02:00
|
|
|
// the complete visibility lists from flat lists and after the package info is gathered to ensure
|
|
|
|
// that default_visibility is available.
|
2019-12-05 15:31:48 +01:00
|
|
|
func RegisterVisibilityRuleGatherer(ctx RegisterMutatorsContext) {
|
2019-03-28 15:10:57 +01:00
|
|
|
ctx.BottomUp("visibilityRuleGatherer", visibilityRuleGatherer).Parallel()
|
|
|
|
}
|
|
|
|
|
|
|
|
// This must be registered after the deps have been resolved.
|
2019-12-05 15:31:48 +01:00
|
|
|
func RegisterVisibilityRuleEnforcer(ctx RegisterMutatorsContext) {
|
2019-03-28 15:10:57 +01:00
|
|
|
ctx.TopDown("visibilityRuleEnforcer", visibilityRuleEnforcer).Parallel()
|
|
|
|
}
|
|
|
|
|
2019-05-17 23:42:02 +02:00
|
|
|
// Checks the per-module visibility rule lists before defaults expansion.
|
|
|
|
func visibilityRuleChecker(ctx BottomUpMutatorContext) {
|
2024-02-07 20:28:26 +01:00
|
|
|
visibilityProperties := ctx.Module().visibilityProperties()
|
|
|
|
for _, p := range visibilityProperties {
|
|
|
|
if visibility := p.getStrings(); visibility != nil {
|
|
|
|
checkRules(ctx, ctx.ModuleDir(), p.getName(), visibility)
|
2019-03-28 15:10:57 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-05-31 15:00:04 +02:00
|
|
|
func checkRules(ctx BaseModuleContext, currentPkg, property string, visibility []string) {
|
2019-03-28 15:10:57 +01:00
|
|
|
ruleCount := len(visibility)
|
|
|
|
if ruleCount == 0 {
|
|
|
|
// This prohibits an empty list as its meaning is unclear, e.g. it could mean no visibility and
|
|
|
|
// it could mean public visibility. Requiring at least one rule makes the owner's intent
|
|
|
|
// clearer.
|
2019-05-31 15:00:04 +02:00
|
|
|
ctx.PropertyErrorf(property, "must contain at least one visibility rule")
|
2019-05-17 23:42:02 +02:00
|
|
|
return
|
2019-03-28 15:10:57 +01:00
|
|
|
}
|
|
|
|
|
2020-05-05 20:19:22 +02:00
|
|
|
for i, v := range visibility {
|
2020-05-01 19:13:36 +02:00
|
|
|
ok, pkg, name := splitRule(ctx, v, currentPkg, property)
|
2019-03-28 15:10:57 +01:00
|
|
|
if !ok {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
if pkg == "visibility" {
|
|
|
|
switch name {
|
2024-03-12 11:34:29 +01:00
|
|
|
case "private", "public":
|
|
|
|
case "any_partition":
|
|
|
|
// any_partition can be used with another visibility fields
|
|
|
|
continue
|
2019-03-28 15:10:57 +01:00
|
|
|
case "legacy_public":
|
2019-05-31 15:00:04 +02:00
|
|
|
ctx.PropertyErrorf(property, "//visibility:legacy_public must not be used")
|
2019-05-17 23:42:02 +02:00
|
|
|
continue
|
2020-05-05 20:19:22 +02:00
|
|
|
case "override":
|
|
|
|
// This keyword does not create a rule so pretend it does not exist.
|
|
|
|
ruleCount -= 1
|
2019-03-28 15:10:57 +01:00
|
|
|
default:
|
2019-05-31 15:00:04 +02:00
|
|
|
ctx.PropertyErrorf(property, "unrecognized visibility rule %q", v)
|
2019-03-28 15:10:57 +01:00
|
|
|
continue
|
|
|
|
}
|
2020-05-05 20:19:22 +02:00
|
|
|
if name == "override" {
|
|
|
|
if i != 0 {
|
|
|
|
ctx.PropertyErrorf(property, `"%v" may only be used at the start of the visibility rules`, v)
|
|
|
|
}
|
|
|
|
} else if ruleCount != 1 {
|
2019-05-31 15:00:04 +02:00
|
|
|
ctx.PropertyErrorf(property, "cannot mix %q with any other visibility rules", v)
|
2019-05-17 23:42:02 +02:00
|
|
|
continue
|
|
|
|
}
|
2019-03-28 15:10:57 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// If the current directory is not in the vendor tree then there are some additional
|
|
|
|
// restrictions on the rules.
|
|
|
|
if !isAncestor("vendor", currentPkg) {
|
|
|
|
if !isAllowedFromOutsideVendor(pkg, name) {
|
2019-05-31 15:00:04 +02:00
|
|
|
ctx.PropertyErrorf(property,
|
2019-03-28 15:10:57 +01:00
|
|
|
"%q is not allowed. Packages outside //vendor cannot make themselves visible to specific"+
|
|
|
|
" targets within //vendor, they can only use //vendor:__subpackages__.", v)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
}
|
2019-05-17 23:42:02 +02:00
|
|
|
}
|
|
|
|
}
|
2019-03-28 15:10:57 +01:00
|
|
|
|
2019-05-17 23:42:02 +02:00
|
|
|
// Gathers the flattened visibility rules after defaults expansion, parses the visibility
|
|
|
|
// properties, stores them in a map by qualifiedModuleName for retrieval during enforcement.
|
|
|
|
//
|
|
|
|
// See ../README.md#Visibility for information on the format of the visibility rules.
|
|
|
|
func visibilityRuleGatherer(ctx BottomUpMutatorContext) {
|
2024-02-07 20:28:26 +01:00
|
|
|
m := ctx.Module()
|
2019-05-17 23:42:02 +02:00
|
|
|
|
2019-05-31 15:00:04 +02:00
|
|
|
qualifiedModuleId := m.qualifiedModuleId(ctx)
|
|
|
|
currentPkg := qualifiedModuleId.pkg
|
2019-05-17 23:42:02 +02:00
|
|
|
|
Refactor visibility to support visibility on defaults modules
Existing modules, either general one or package ones have a single
visibility property, called visibility in general, and
default_visibility on package, that controls access to that module, or
in the case of package sets the default visibility of all modules in
that package. The property is checked and gathered during the similarly
named phases of visibility processing.
The defaults module will be different as it will have two properties.
The first, visibility, will not affect the visibility of the module, it
only affects the visibility of modules that 'extend' the defaults. So,
it will need checking but not parsing. The second property,
defaults_visibility, will affect the visibility of the module and so
will need both checking and parsing.
The current implementation does not handle those cases because:
1) It does not differentiate between the property that affects the
module and those that do not. It checks and gathers all of them with
the last property gathered overriding the rules for the previous
properties.
2) It relies on overriding methods in MethodBase in order to change the
default behavior for the package module. That works because
packageModule embeds ModuleBase but will not work for
DefaultsModuleBase as it does not embed ModuleBase and instead is
embedded alongside it so attempting to override a method in
MethodBase leads to ambiguity.
This change addresses the issues as follows:
1) It adds a new visibility() []string method to get access to the
primary visibility rules, i.e. the ones that affect the module.
2) It adds two fields, 'visibilityPropertyInfo []visibilityProperty'
to provide information about all the properties that need checking,
and 'primaryVisibilityProperty visibilityProperty' to specify the
property that affects the module.
The PackageFactory() and InitAndroidModule(Module) functions are
modified to initialize the fields. The override of the
visibilityProperties() method for packageModule is removed and the
default implementations of visibilityProperties() and visibility()
on ModuleBase return information from the two new fields.
The InitDefaultsModule is updated to also initialize the two new
fields. It uses nil for primaryVisibilityProperty for now but that
will be changed to return defaults_visibility. It also uses the
commonProperties structure created for the defaults directly instead
of having to search for it through properties().
Changed the visibilityProperty to take a pointer to the property that
can be used to retrieve the value rather than a lambda function.
Bug: 130796911
Test: m nothing
Change-Id: Icadd470a5f692a48ec61de02bf3dfde3e2eea2ef
2019-07-24 15:24:38 +02:00
|
|
|
// Parse the visibility rules that control access to the module and store them by id
|
|
|
|
// for use when enforcing the rules.
|
2020-05-01 19:13:36 +02:00
|
|
|
primaryProperty := m.base().primaryVisibilityProperty
|
|
|
|
if primaryProperty != nil {
|
|
|
|
if visibility := primaryProperty.getStrings(); visibility != nil {
|
|
|
|
rule := parseRules(ctx, currentPkg, primaryProperty.getName(), visibility)
|
|
|
|
if rule != nil {
|
|
|
|
moduleToVisibilityRuleMap(ctx.Config()).Store(qualifiedModuleId, rule)
|
|
|
|
}
|
2019-05-17 23:42:02 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-01 19:13:36 +02:00
|
|
|
func parseRules(ctx BaseModuleContext, currentPkg, property string, visibility []string) compositeRule {
|
2019-05-17 23:42:02 +02:00
|
|
|
rules := make(compositeRule, 0, len(visibility))
|
|
|
|
hasPrivateRule := false
|
2020-02-19 17:10:09 +01:00
|
|
|
hasPublicRule := false
|
2019-05-17 23:42:02 +02:00
|
|
|
hasNonPrivateRule := false
|
|
|
|
for _, v := range visibility {
|
2020-05-01 19:13:36 +02:00
|
|
|
ok, pkg, name := splitRule(ctx, v, currentPkg, property)
|
2019-05-17 23:42:02 +02:00
|
|
|
if !ok {
|
2019-03-28 15:10:57 +01:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2019-05-17 23:42:02 +02:00
|
|
|
var r visibilityRule
|
|
|
|
isPrivateRule := false
|
|
|
|
if pkg == "visibility" {
|
|
|
|
switch name {
|
|
|
|
case "private":
|
|
|
|
r = privateRule{}
|
|
|
|
isPrivateRule = true
|
|
|
|
case "public":
|
|
|
|
r = publicRule{}
|
2020-02-19 17:10:09 +01:00
|
|
|
hasPublicRule = true
|
2020-05-05 20:19:22 +02:00
|
|
|
case "override":
|
|
|
|
// Discard all preceding rules and any state based on them.
|
|
|
|
rules = nil
|
|
|
|
hasPrivateRule = false
|
|
|
|
hasPublicRule = false
|
|
|
|
hasNonPrivateRule = false
|
|
|
|
// This does not actually create a rule so continue onto the next rule.
|
|
|
|
continue
|
2024-02-07 20:28:26 +01:00
|
|
|
case "any_partition":
|
|
|
|
r = anyPartitionRule{}
|
2019-05-17 23:42:02 +02:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
switch name {
|
|
|
|
case "__pkg__":
|
|
|
|
r = packageRule{pkg}
|
|
|
|
case "__subpackages__":
|
|
|
|
r = subpackagesRule{pkg}
|
|
|
|
default:
|
2020-10-15 17:42:01 +02:00
|
|
|
ctx.PropertyErrorf(property, "invalid visibility pattern %q. Must match "+
|
|
|
|
" //<package>:<scope>, //<package> or :<scope> "+
|
|
|
|
"where <scope> is one of \"__pkg__\", \"__subpackages__\"",
|
|
|
|
v)
|
2019-05-17 23:42:02 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if isPrivateRule {
|
|
|
|
hasPrivateRule = true
|
|
|
|
} else {
|
|
|
|
hasNonPrivateRule = true
|
|
|
|
}
|
|
|
|
|
2019-03-28 15:10:57 +01:00
|
|
|
rules = append(rules, r)
|
|
|
|
}
|
|
|
|
|
2019-05-17 23:42:02 +02:00
|
|
|
if hasPrivateRule && hasNonPrivateRule {
|
|
|
|
ctx.PropertyErrorf("visibility",
|
|
|
|
"cannot mix \"//visibility:private\" with any other visibility rules")
|
|
|
|
return compositeRule{privateRule{}}
|
|
|
|
}
|
|
|
|
|
2020-02-19 17:10:09 +01:00
|
|
|
if hasPublicRule {
|
|
|
|
// Public overrides all other rules so just return it.
|
|
|
|
return compositeRule{publicRule{}}
|
|
|
|
}
|
|
|
|
|
2019-03-28 15:10:57 +01:00
|
|
|
return rules
|
|
|
|
}
|
|
|
|
|
|
|
|
func isAllowedFromOutsideVendor(pkg string, name string) bool {
|
|
|
|
if pkg == "vendor" {
|
2024-02-07 20:28:26 +01:00
|
|
|
return name == "__subpackages__"
|
2019-03-28 15:10:57 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return !isAncestor("vendor", pkg)
|
|
|
|
}
|
|
|
|
|
2020-05-01 19:13:36 +02:00
|
|
|
func splitRule(ctx BaseModuleContext, ruleExpression string, currentPkg, property string) (bool, string, string) {
|
2019-03-28 15:10:57 +01:00
|
|
|
// Make sure that the rule is of the correct format.
|
|
|
|
matches := visibilityRuleRegexp.FindStringSubmatch(ruleExpression)
|
|
|
|
if ruleExpression == "" || matches == nil {
|
2020-05-01 19:13:36 +02:00
|
|
|
// Visibility rule is invalid so ignore it. Keep going rather than aborting straight away to
|
|
|
|
// ensure all the rules on this module are checked.
|
|
|
|
ctx.PropertyErrorf(property,
|
|
|
|
"invalid visibility pattern %q must match"+
|
2020-10-15 17:42:01 +02:00
|
|
|
" //<package>:<scope>, //<package> or :<scope> "+
|
|
|
|
"where <scope> is one of \"__pkg__\", \"__subpackages__\"",
|
2020-05-01 19:13:36 +02:00
|
|
|
ruleExpression)
|
2019-03-28 15:10:57 +01:00
|
|
|
return false, "", ""
|
|
|
|
}
|
|
|
|
|
|
|
|
// Extract the package and name.
|
|
|
|
pkg := matches[1]
|
|
|
|
name := matches[2]
|
|
|
|
|
|
|
|
// Normalize the short hands
|
|
|
|
if pkg == "" {
|
|
|
|
pkg = currentPkg
|
|
|
|
}
|
|
|
|
if name == "" {
|
|
|
|
name = "__pkg__"
|
|
|
|
}
|
|
|
|
|
|
|
|
return true, pkg, name
|
|
|
|
}
|
|
|
|
|
|
|
|
func visibilityRuleEnforcer(ctx TopDownMutatorContext) {
|
2024-02-07 20:28:26 +01:00
|
|
|
qualified := createVisibilityModuleReference(ctx.ModuleName(), ctx.ModuleDir(), ctx.ModuleType())
|
2019-03-28 15:10:57 +01:00
|
|
|
|
|
|
|
// Visit all the dependencies making sure that this module has access to them all.
|
|
|
|
ctx.VisitDirectDeps(func(dep Module) {
|
2020-01-14 13:42:08 +01:00
|
|
|
// Ignore dependencies that have an ExcludeFromVisibilityEnforcementTag
|
|
|
|
tag := ctx.OtherModuleDependencyTag(dep)
|
|
|
|
if _, ok := tag.(ExcludeFromVisibilityEnforcementTag); ok {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-03-28 15:10:57 +01:00
|
|
|
depName := ctx.OtherModuleName(dep)
|
|
|
|
depDir := ctx.OtherModuleDir(dep)
|
|
|
|
depQualified := qualifiedModuleName{depDir, depName}
|
|
|
|
|
|
|
|
// Targets are always visible to other targets in their own package.
|
2024-02-07 20:28:26 +01:00
|
|
|
if depQualified.pkg == qualified.name.pkg {
|
2019-03-28 15:10:57 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-02-19 17:10:09 +01:00
|
|
|
rule := effectiveVisibilityRules(ctx.Config(), depQualified)
|
2020-09-29 17:00:55 +02:00
|
|
|
if !rule.matches(qualified) {
|
2020-10-15 20:46:38 +02:00
|
|
|
ctx.ModuleErrorf("depends on %s which is not visible to this module\nYou may need to add %q to its visibility", depQualified, "//"+ctx.ModuleDir())
|
2019-05-31 15:00:04 +02:00
|
|
|
}
|
2019-03-28 15:10:57 +01:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2020-09-29 17:00:55 +02:00
|
|
|
// Default visibility is public.
|
|
|
|
var defaultVisibility = compositeRule{publicRule{}}
|
|
|
|
|
|
|
|
// Return the effective visibility rules.
|
|
|
|
//
|
|
|
|
// If no rules have been specified this will return the default visibility rule
|
|
|
|
// which is currently //visibility:public.
|
2020-02-19 17:10:09 +01:00
|
|
|
func effectiveVisibilityRules(config Config, qualified qualifiedModuleName) compositeRule {
|
|
|
|
moduleToVisibilityRule := moduleToVisibilityRuleMap(config)
|
2019-12-05 15:31:48 +01:00
|
|
|
value, ok := moduleToVisibilityRule.Load(qualified)
|
|
|
|
var rule compositeRule
|
|
|
|
if ok {
|
|
|
|
rule = value.(compositeRule)
|
|
|
|
} else {
|
2024-02-07 20:28:26 +01:00
|
|
|
rule = packageDefaultVisibility(moduleToVisibilityRule, qualified)
|
2019-12-05 15:31:48 +01:00
|
|
|
}
|
2020-09-29 17:00:55 +02:00
|
|
|
|
|
|
|
// If no rule is specified then return the default visibility rule to avoid
|
|
|
|
// every caller having to treat nil as public.
|
|
|
|
if rule == nil {
|
|
|
|
rule = defaultVisibility
|
|
|
|
}
|
2019-12-05 15:31:48 +01:00
|
|
|
return rule
|
|
|
|
}
|
|
|
|
|
2022-05-16 21:20:04 +02:00
|
|
|
func createQualifiedModuleName(moduleName, dir string) qualifiedModuleName {
|
2019-03-28 15:10:57 +01:00
|
|
|
qualified := qualifiedModuleName{dir, moduleName}
|
|
|
|
return qualified
|
|
|
|
}
|
2019-06-20 17:38:08 +02:00
|
|
|
|
2024-02-07 20:28:26 +01:00
|
|
|
func packageDefaultVisibility(moduleToVisibilityRule *sync.Map, moduleId qualifiedModuleName) compositeRule {
|
2019-06-20 17:38:08 +02:00
|
|
|
packageQualifiedId := moduleId.getContainingPackageId()
|
|
|
|
for {
|
|
|
|
value, ok := moduleToVisibilityRule.Load(packageQualifiedId)
|
|
|
|
if ok {
|
|
|
|
return value.(compositeRule)
|
|
|
|
}
|
|
|
|
|
|
|
|
if packageQualifiedId.isRootPackage() {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
packageQualifiedId = packageQualifiedId.getContainingPackageId()
|
|
|
|
}
|
|
|
|
}
|
2019-12-05 15:31:48 +01:00
|
|
|
|
2020-09-29 17:01:08 +02:00
|
|
|
type VisibilityRuleSet interface {
|
|
|
|
// Widen the visibility with some extra rules.
|
|
|
|
Widen(extra []string) error
|
|
|
|
|
|
|
|
Strings() []string
|
|
|
|
}
|
|
|
|
|
|
|
|
type visibilityRuleSet struct {
|
|
|
|
rules []string
|
|
|
|
}
|
|
|
|
|
|
|
|
var _ VisibilityRuleSet = (*visibilityRuleSet)(nil)
|
|
|
|
|
|
|
|
func (v *visibilityRuleSet) Widen(extra []string) error {
|
|
|
|
// Check the extra rules first just in case they are invalid. Otherwise, if
|
|
|
|
// the current visibility is public then the extra rules will just be ignored.
|
|
|
|
if len(extra) == 1 {
|
|
|
|
singularRule := extra[0]
|
|
|
|
switch singularRule {
|
|
|
|
case "//visibility:public":
|
|
|
|
// Public overrides everything so just discard any existing rules.
|
|
|
|
v.rules = extra
|
|
|
|
return nil
|
|
|
|
case "//visibility:private":
|
|
|
|
// Extending rule with private is an error.
|
|
|
|
return fmt.Errorf("%q does not widen the visibility", singularRule)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(v.rules) == 1 {
|
|
|
|
switch v.rules[0] {
|
|
|
|
case "//visibility:public":
|
|
|
|
// No point in adding rules to something which is already public.
|
|
|
|
return nil
|
|
|
|
case "//visibility:private":
|
|
|
|
// Adding any rules to private means it is no longer private so the
|
|
|
|
// private can be discarded.
|
|
|
|
v.rules = nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
v.rules = FirstUniqueStrings(append(v.rules, extra...))
|
|
|
|
sort.Strings(v.rules)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (v *visibilityRuleSet) Strings() []string {
|
|
|
|
return v.rules
|
|
|
|
}
|
|
|
|
|
2019-12-05 15:31:48 +01:00
|
|
|
// Get the effective visibility rules, i.e. the actual rules that affect the visibility of the
|
|
|
|
// property irrespective of where they are defined.
|
|
|
|
//
|
|
|
|
// Includes visibility rules specified by package default_visibility and/or on defaults.
|
|
|
|
// Short hand forms, e.g. //:__subpackages__ are replaced with their full form, e.g.
|
|
|
|
// //package/containing/rule:__subpackages__.
|
2020-09-29 17:01:08 +02:00
|
|
|
func EffectiveVisibilityRules(ctx BaseModuleContext, module Module) VisibilityRuleSet {
|
2019-12-05 15:31:48 +01:00
|
|
|
moduleName := ctx.OtherModuleName(module)
|
|
|
|
dir := ctx.OtherModuleDir(module)
|
|
|
|
qualified := qualifiedModuleName{dir, moduleName}
|
|
|
|
|
2020-02-19 17:10:09 +01:00
|
|
|
rule := effectiveVisibilityRules(ctx.Config(), qualified)
|
2019-12-05 15:31:48 +01:00
|
|
|
|
2024-02-07 20:28:26 +01:00
|
|
|
currentModule := createVisibilityModuleReference(moduleName, dir, ctx.OtherModuleType(module))
|
|
|
|
|
2020-05-13 03:20:06 +02:00
|
|
|
// Modules are implicitly visible to other modules in the same package,
|
|
|
|
// without checking the visibility rules. Here we need to add that visibility
|
|
|
|
// explicitly.
|
2024-02-07 20:28:26 +01:00
|
|
|
if !rule.matches(currentModule) {
|
2020-05-13 23:11:40 +02:00
|
|
|
if len(rule) == 1 {
|
|
|
|
if _, ok := rule[0].(privateRule); ok {
|
|
|
|
// If the rule is //visibility:private we can't append another
|
|
|
|
// visibility to it. Semantically we need to convert it to a package
|
|
|
|
// visibility rule for the location where the result is used, but since
|
|
|
|
// modules are implicitly visible within the package we get the same
|
|
|
|
// result without any rule at all, so just make it an empty list to be
|
|
|
|
// appended below.
|
2020-09-29 17:00:55 +02:00
|
|
|
rule = nil
|
2020-05-13 23:11:40 +02:00
|
|
|
}
|
|
|
|
}
|
2020-05-13 03:20:06 +02:00
|
|
|
rule = append(rule, packageRule{dir})
|
|
|
|
}
|
|
|
|
|
2020-09-29 17:01:08 +02:00
|
|
|
return &visibilityRuleSet{rule.Strings()}
|
2019-12-05 15:31:48 +01:00
|
|
|
}
|
2020-05-01 18:52:01 +02:00
|
|
|
|
|
|
|
// Clear the default visibility properties so they can be replaced.
|
|
|
|
func clearVisibilityProperties(module Module) {
|
|
|
|
module.base().visibilityPropertyInfo = nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Add a property that contains visibility rules so that they are checked for
|
|
|
|
// correctness.
|
|
|
|
func AddVisibilityProperty(module Module, name string, stringsProperty *[]string) {
|
|
|
|
addVisibilityProperty(module, name, stringsProperty)
|
|
|
|
}
|
|
|
|
|
|
|
|
func addVisibilityProperty(module Module, name string, stringsProperty *[]string) visibilityProperty {
|
|
|
|
base := module.base()
|
|
|
|
property := newVisibilityProperty(name, stringsProperty)
|
|
|
|
base.visibilityPropertyInfo = append(base.visibilityPropertyInfo, property)
|
|
|
|
return property
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set the primary visibility property.
|
|
|
|
//
|
|
|
|
// Also adds the property to the list of properties to be validated.
|
|
|
|
func setPrimaryVisibilityProperty(module Module, name string, stringsProperty *[]string) {
|
|
|
|
module.base().primaryVisibilityProperty = addVisibilityProperty(module, name, stringsProperty)
|
|
|
|
}
|