// Copyright 2022 Google Inc. All rights reserved. // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. package cc import ( "fmt" "strings" "testing" "android/soong/android" ) func TestTidyFlagsWarningsAsErrors(t *testing.T) { // The "tidy_flags" property should not contain -warnings-as-errors. type testCase struct { libName, bp string errorMsg string // a negative test; must have error message flags []string // must have substrings in tidyFlags noFlags []string // must not have substrings in tidyFlags } testCases := []testCase{ { "libfoo1", `cc_library_shared { // no warnings-as-errors, good tidy_flags name: "libfoo1", srcs: ["foo.c"], tidy_flags: ["-header-filter=dir1/"], }`, "", []string{"-header-filter=dir1/"}, []string{"-warnings-as-errors"}, }, { "libfoo2", `cc_library_shared { // good use of tidy_checks_as_errors name: "libfoo2", srcs: ["foo.c"], tidy_checks_as_errors: ["xyz-*", "abc"], }`, "", []string{ "-header-filter=^", // there is a default header filter "-warnings-as-errors='xyz-*',abc,${config.TidyGlobalNoErrorChecks}", }, []string{}, }, } if NoWarningsAsErrorsInTidyFlags { testCases = append(testCases, testCase{ "libfoo3", `cc_library_shared { // bad use of -warnings-as-errors in tidy_flags name: "libfoo3", srcs: ["foo.c"], tidy_flags: [ "-header-filters=.*", "-warnings-as-errors=xyz-*", ], }`, `module "libfoo3" .*: tidy_flags: should not contain .*;` + ` use tidy_checks_as_errors instead`, []string{}, []string{}, }) } for _, test := range testCases { if test.errorMsg != "" { testCcError(t, test.errorMsg, test.bp) continue } variant := "android_arm64_armv8-a_shared" ctx := testCc(t, test.bp) t.Run("caseTidyFlags", func(t *testing.T) { flags := ctx.ModuleForTests(test.libName, variant).Rule("clangTidy").Args["tidyFlags"] for _, flag := range test.flags { if !strings.Contains(flags, flag) { t.Errorf("tidyFlags %v for %s does not contain %s.", flags, test.libName, flag) } } for _, flag := range test.noFlags { if strings.Contains(flags, flag) { t.Errorf("tidyFlags %v for %s should not contain %s.", flags, test.libName, flag) } } }) } } func TestTidyChecks(t *testing.T) { // The "tidy_checks" property defines additional checks appended // to global default. But there are some checks disabled after // the local tidy_checks. bp := ` cc_library_shared { // has global checks + extraGlobalChecks name: "libfoo_1", srcs: ["foo.c"], } cc_library_shared { // has only local checks + extraGlobalChecks name: "libfoo_2", srcs: ["foo.c"], tidy_checks: ["-*", "xyz-*"], } cc_library_shared { // has global checks + local checks + extraGlobalChecks name: "libfoo_3", srcs: ["foo.c"], tidy_checks: ["-abc*", "xyz-*", "mycheck"], } cc_library_shared { // has only local checks after "-*" + extraGlobalChecks name: "libfoo_4", srcs: ["foo.c"], tidy_checks: ["-abc*", "xyz-*", "mycheck", "-*", "xyz-*"], }` ctx := testCc(t, bp) globalChecks := "-checks=${config.TidyDefaultGlobalChecks}," firstXyzChecks := "-checks='-*','xyz-*'," localXyzChecks := "'-*','xyz-*'" localAbcChecks := "'-abc*','xyz-*',mycheck" extraGlobalChecks := ",${config.TidyGlobalNoChecks}" testCases := []struct { libNumber int // 1,2,3,... checks []string // must have substrings in -checks noChecks []string // must not have substrings in -checks }{ {1, []string{globalChecks, extraGlobalChecks}, []string{localXyzChecks, localAbcChecks}}, {2, []string{firstXyzChecks, extraGlobalChecks}, []string{globalChecks, localAbcChecks}}, {3, []string{globalChecks, localAbcChecks, extraGlobalChecks}, []string{localXyzChecks}}, {4, []string{firstXyzChecks, extraGlobalChecks}, []string{globalChecks, localAbcChecks}}, } t.Run("caseTidyChecks", func(t *testing.T) { variant := "android_arm64_armv8-a_shared" for _, test := range testCases { libName := fmt.Sprintf("libfoo_%d", test.libNumber) flags := ctx.ModuleForTests(libName, variant).Rule("clangTidy").Args["tidyFlags"] splitFlags := strings.Split(flags, " ") foundCheckFlag := false for _, flag := range splitFlags { if strings.HasPrefix(flag, "-checks=") { foundCheckFlag = true for _, check := range test.checks { if !strings.Contains(flag, check) { t.Errorf("tidyFlags for %s does not contain %s.", libName, check) } } for _, check := range test.noChecks { if strings.Contains(flag, check) { t.Errorf("tidyFlags for %s should not contain %s.", libName, check) } } break } } if !foundCheckFlag { t.Errorf("tidyFlags for %s does not contain -checks=.", libName) } } }) } func TestWithTidy(t *testing.T) { // When WITH_TIDY=1 or (ALLOW_LOCAL_TIDY_TRUE=1 and local tidy:true) // a C++ library should depend on .tidy files. testCases := []struct { withTidy, allowLocalTidyTrue string // "_" means undefined needTidyFile []bool // for {libfoo_0, libfoo_1} and {libbar_0, libbar_1} }{ {"_", "_", []bool{false, false, false}}, {"_", "0", []bool{false, false, false}}, {"_", "1", []bool{false, true, false}}, {"_", "true", []bool{false, true, false}}, {"0", "_", []bool{false, false, false}}, {"0", "1", []bool{false, true, false}}, {"1", "_", []bool{true, true, false}}, {"1", "false", []bool{true, true, false}}, {"1", "1", []bool{true, true, false}}, {"true", "_", []bool{true, true, false}}, } bp := ` cc_library_shared { name: "libfoo_0", // depends on .tidy if WITH_TIDY=1 srcs: ["foo.c"], } cc_library_shared { // depends on .tidy if WITH_TIDY=1 or ALLOW_LOCAL_TIDY_TRUE=1 name: "libfoo_1", srcs: ["foo.c"], tidy: true, } cc_library_shared { // no .tidy name: "libfoo_2", srcs: ["foo.c"], tidy: false, } cc_library_static { name: "libbar_0", // depends on .tidy if WITH_TIDY=1 srcs: ["bar.c"], } cc_library_static { // depends on .tidy if WITH_TIDY=1 or ALLOW_LOCAL_TIDY_TRUE=1 name: "libbar_1", srcs: ["bar.c"], tidy: true, } cc_library_static { // no .tidy name: "libbar_2", srcs: ["bar.c"], tidy: false, }` for index, test := range testCases { testName := fmt.Sprintf("case%d,%v,%v", index, test.withTidy, test.allowLocalTidyTrue) t.Run(testName, func(t *testing.T) { testEnv := map[string]string{} if test.withTidy != "_" { testEnv["WITH_TIDY"] = test.withTidy } if test.allowLocalTidyTrue != "_" { testEnv["ALLOW_LOCAL_TIDY_TRUE"] = test.allowLocalTidyTrue } ctx := android.GroupFixturePreparers(prepareForCcTest, android.FixtureMergeEnv(testEnv)).RunTestWithBp(t, bp) for n := 0; n < 3; n++ { checkLibraryRule := func(foo, variant, ruleName string) { libName := fmt.Sprintf("lib%s_%d", foo, n) tidyFile := "out/soong/.intermediates/" + libName + "/" + variant + "/obj/" + foo + ".tidy" depFiles := ctx.ModuleForTests(libName, variant).Rule(ruleName).Validations.Strings() if test.needTidyFile[n] { android.AssertStringListContains(t, libName+" needs .tidy file", depFiles, tidyFile) } else { android.AssertStringListDoesNotContain(t, libName+" does not need .tidy file", depFiles, tidyFile) } } checkLibraryRule("foo", "android_arm64_armv8-a_shared", "ld") checkLibraryRule("bar", "android_arm64_armv8-a_static", "ar") } }) } } func TestWithGeneratedCode(t *testing.T) { bp := ` cc_library_shared { name: "libfoo", srcs: ["foo_1.y", "foo_2.yy", "foo_3.l", "foo_4.ll", "foo_5.proto", "foo_6.aidl", "foo_7.rscript", "foo_8.fs", "foo_9.sysprop", "foo_src.cpp"], tidy: true, }` variant := "android_arm64_armv8-a_shared" testEnv := map[string]string{} testEnv["ALLOW_LOCAL_TIDY_TRUE"] = "1" ctx := android.GroupFixturePreparers(prepareForCcTest, android.FixtureMergeEnv(testEnv)).RunTestWithBp(t, bp) t.Run("tidy should be only run for source code, not for generated code", func(t *testing.T) { depFiles := ctx.ModuleForTests("libfoo", variant).Rule("ld").Validations.Strings() tidyFileForCpp := "out/soong/.intermediates/libfoo/" + variant + "/obj/foo_src.tidy" android.AssertArrayString(t, "only one .tidy file for source code should exist for libfoo", []string{tidyFileForCpp}, depFiles) }) }