mirror of
https://github.com/rizsotto/scan-build.git
synced 2025-12-16 12:00:08 +01:00
run test by LLVM's lit
This commit is contained in:
1
.gitignore
vendored
Normal file
1
.gitignore
vendored
Normal file
@@ -0,0 +1 @@
|
||||
.idea
|
||||
14
.travis.yml
14
.travis.yml
@@ -20,10 +20,18 @@ addons:
|
||||
- clang-3.7
|
||||
|
||||
install:
|
||||
- pip install pep8
|
||||
- pip install pep8 lit
|
||||
|
||||
script:
|
||||
- pep8 libear libscanbuild tests
|
||||
- lit -v tests
|
||||
- python setup.py check
|
||||
- python setup.py install
|
||||
- python setup.py test
|
||||
- python setup.py sdist
|
||||
|
||||
notifications:
|
||||
webhooks:
|
||||
urls:
|
||||
- https://webhooks.gitter.im/e/c3b71470714f6eaa03bc
|
||||
on_success: change
|
||||
on_failure: always
|
||||
on_start: never
|
||||
|
||||
3
setup.py
3
setup.py
@@ -36,6 +36,5 @@ setup(
|
||||
"Programming Language :: Python :: 3.5",
|
||||
"Topic :: Software Development :: Compilers",
|
||||
"Topic :: Software Development :: Quality Assurance"
|
||||
],
|
||||
test_suite="tests.suite"
|
||||
]
|
||||
)
|
||||
|
||||
@@ -1,18 +0,0 @@
|
||||
# -*- coding: utf-8 -*-
|
||||
# The LLVM Compiler Infrastructure
|
||||
#
|
||||
# This file is distributed under the University of Illinois Open Source
|
||||
# License. See LICENSE.TXT for details.
|
||||
|
||||
import unittest
|
||||
|
||||
import tests.unit
|
||||
import tests.functional.cases
|
||||
|
||||
|
||||
def suite():
|
||||
loader = unittest.TestLoader()
|
||||
ts = unittest.TestSuite()
|
||||
ts.addTests(loader.loadTestsFromModule(tests.unit))
|
||||
ts.addTests(loader.loadTestsFromModule(tests.functional.cases))
|
||||
return ts
|
||||
@@ -1,4 +1,4 @@
|
||||
#include <clean-one.h>
|
||||
#include <one.h>
|
||||
|
||||
int do_nothing_loop()
|
||||
{
|
||||
@@ -1,4 +1,4 @@
|
||||
#include <clean-one.h>
|
||||
#include "one.h"
|
||||
|
||||
#include <stdlib.h>
|
||||
|
||||
45
tests/functional/bin/cdb_diff
Executable file
45
tests/functional/bin/cdb_diff
Executable file
@@ -0,0 +1,45 @@
|
||||
#!/usr/bin/env python
|
||||
# -*- coding: utf-8 -*-
|
||||
# The LLVM Compiler Infrastructure
|
||||
#
|
||||
# This file is distributed under the University of Illinois Open Source
|
||||
# License. See LICENSE.TXT for details.
|
||||
|
||||
import sys
|
||||
import argparse
|
||||
import json
|
||||
|
||||
|
||||
def diff(lhs, rhs):
|
||||
def create_hash(entry):
|
||||
return entry['file'][::-1] + entry['command'] + entry['directory']
|
||||
|
||||
left = {create_hash(entry): entry for entry in lhs}
|
||||
right = {create_hash(entry): entry for entry in rhs}
|
||||
result = []
|
||||
for key in left.keys():
|
||||
if key not in right:
|
||||
result.append('> {}'.format(left[key]))
|
||||
for key in right.keys():
|
||||
if key not in left:
|
||||
result.append('< {}'.format(right[key]))
|
||||
return result
|
||||
|
||||
|
||||
def main():
|
||||
""" Semantically diff two compilation databases. """
|
||||
parser = argparse.ArgumentParser()
|
||||
parser.add_argument('left', type=argparse.FileType('r'))
|
||||
parser.add_argument('right', type=argparse.FileType('r'))
|
||||
args = parser.parse_args()
|
||||
# files are open, parse the json content
|
||||
lhs = json.load(args.left)
|
||||
rhs = json.load(args.right)
|
||||
# run the diff and print the result
|
||||
results = diff(lhs, rhs)
|
||||
for result in results:
|
||||
print(result)
|
||||
return len(results)
|
||||
|
||||
|
||||
sys.exit(main())
|
||||
45
tests/functional/bin/cdb_run
Executable file
45
tests/functional/bin/cdb_run
Executable file
@@ -0,0 +1,45 @@
|
||||
#!/usr/bin/env python
|
||||
# -*- coding: utf-8 -*-
|
||||
# The LLVM Compiler Infrastructure
|
||||
#
|
||||
# This file is distributed under the University of Illinois Open Source
|
||||
# License. See LICENSE.TXT for details.
|
||||
|
||||
import os
|
||||
import sys
|
||||
import argparse
|
||||
import json
|
||||
import shlex
|
||||
import multiprocessing
|
||||
import subprocess
|
||||
|
||||
|
||||
def run(entry):
|
||||
command = shlex.split(entry['command'])
|
||||
# do respect 'CC' and 'CXX' environment variables for compiler
|
||||
env_name = 'CC' if command[0] == 'cc' else 'CXX'
|
||||
if env_name in os.environ:
|
||||
command[0] = os.environ[env_name]
|
||||
# execute the command in the given directory
|
||||
# map exit code to 0/1 to get the correct fail count
|
||||
print('exec {0} in {1}'.format(command, entry['directory']))
|
||||
return 1 if subprocess.call(command, cwd=entry['directory']) else 0
|
||||
|
||||
|
||||
def main():
|
||||
""" Execute compilation commands from a given compilation database. """
|
||||
parser = argparse.ArgumentParser()
|
||||
parser.add_argument('--parallel', type=int, default=1)
|
||||
parser.add_argument('cdb', type=argparse.FileType('r'))
|
||||
args = parser.parse_args()
|
||||
# execute compilation database entry
|
||||
failures = 0
|
||||
pool = multiprocessing.Pool(args.parallel)
|
||||
for current in pool.imap_unordered(run, json.load(args.cdb)):
|
||||
failures += current
|
||||
pool.close()
|
||||
pool.join()
|
||||
return failures
|
||||
|
||||
|
||||
sys.exit(main())
|
||||
48
tests/functional/bin/cdb_substitute
Executable file
48
tests/functional/bin/cdb_substitute
Executable file
@@ -0,0 +1,48 @@
|
||||
#!/usr/bin/env python
|
||||
# -*- coding: utf-8 -*-
|
||||
# The LLVM Compiler Infrastructure
|
||||
#
|
||||
# This file is distributed under the University of Illinois Open Source
|
||||
# License. See LICENSE.TXT for details.
|
||||
|
||||
import os
|
||||
import re
|
||||
import sys
|
||||
import random
|
||||
|
||||
|
||||
def comment(line):
|
||||
return re.match(r'^(#|//).*', line)
|
||||
|
||||
|
||||
def random_filename():
|
||||
def random_char():
|
||||
return random.choice([chr(random.randrange(ord('a'), ord('z'), 1)),
|
||||
chr(random.randrange(ord('A'), ord('Z'), 1))])
|
||||
|
||||
return ''.join(random_char() for _ in range(12))
|
||||
|
||||
|
||||
def substitute(line):
|
||||
|
||||
def lookup(key):
|
||||
return random_filename() if key == 'random' else os.environ[key]
|
||||
|
||||
requests = re.findall(r'\$\{([^\}]+)\}', line)
|
||||
if requests:
|
||||
replace = {re.escape(request): lookup(request) for request in requests}
|
||||
for key, value in replace.items():
|
||||
line = re.sub(r'\$\{' + key + r'\}', value, line)
|
||||
return line
|
||||
|
||||
|
||||
def main():
|
||||
""" Substitute environment literals in a given compilation database. """
|
||||
inputs = (line for line in sys.stdin)
|
||||
outputs = (substitute(line) for line in inputs if not comment(line))
|
||||
for line in outputs:
|
||||
sys.stdout.write(line)
|
||||
return 0
|
||||
|
||||
|
||||
sys.exit(main())
|
||||
@@ -1,71 +0,0 @@
|
||||
# -*- coding: utf-8 -*-
|
||||
# The LLVM Compiler Infrastructure
|
||||
#
|
||||
# This file is distributed under the University of Illinois Open Source
|
||||
# License. See LICENSE.TXT for details.
|
||||
|
||||
import re
|
||||
import os.path
|
||||
import subprocess
|
||||
|
||||
|
||||
def load_tests(loader, suite, pattern):
|
||||
from . import test_from_cdb
|
||||
suite.addTests(loader.loadTestsFromModule(test_from_cdb))
|
||||
from . import test_from_cmd
|
||||
suite.addTests(loader.loadTestsFromModule(test_from_cmd))
|
||||
from . import test_create_cdb
|
||||
suite.addTests(loader.loadTestsFromModule(test_create_cdb))
|
||||
from . import test_exec_anatomy
|
||||
suite.addTests(loader.loadTestsFromModule(test_exec_anatomy))
|
||||
return suite
|
||||
|
||||
|
||||
def make_args(target):
|
||||
this_dir, _ = os.path.split(__file__)
|
||||
path = os.path.normpath(os.path.join(this_dir, '..', 'src'))
|
||||
return ['make', 'SRCDIR={}'.format(path), 'OBJDIR={}'.format(target), '-f',
|
||||
os.path.join(path, 'build', 'Makefile')]
|
||||
|
||||
|
||||
def silent_call(cmd, *args, **kwargs):
|
||||
kwargs.update({'stdout': subprocess.PIPE, 'stderr': subprocess.STDOUT})
|
||||
return subprocess.call(cmd, *args, **kwargs)
|
||||
|
||||
|
||||
def silent_check_call(cmd, *args, **kwargs):
|
||||
kwargs.update({'stdout': subprocess.PIPE, 'stderr': subprocess.STDOUT})
|
||||
return subprocess.check_call(cmd, *args, **kwargs)
|
||||
|
||||
|
||||
def call_and_report(analyzer_cmd, build_cmd):
|
||||
child = subprocess.Popen(analyzer_cmd + ['-v'] + build_cmd,
|
||||
universal_newlines=True,
|
||||
stdout=subprocess.PIPE,
|
||||
stderr=subprocess.STDOUT)
|
||||
|
||||
pattern = re.compile('Report directory created: (.+)')
|
||||
directory = None
|
||||
for line in child.stdout.readlines():
|
||||
match = pattern.search(line)
|
||||
if match and match.lastindex == 1:
|
||||
directory = match.group(1)
|
||||
break
|
||||
child.stdout.close()
|
||||
child.wait()
|
||||
|
||||
return child.returncode, directory
|
||||
|
||||
|
||||
def check_call_and_report(analyzer_cmd, build_cmd):
|
||||
exit_code, result = call_and_report(analyzer_cmd, build_cmd)
|
||||
if exit_code != 0:
|
||||
raise subprocess.CalledProcessError(
|
||||
exit_code, analyzer_cmd + build_cmd, None)
|
||||
else:
|
||||
return result
|
||||
|
||||
|
||||
def create_empty_file(filename):
|
||||
with open(filename, 'a') as handle:
|
||||
pass
|
||||
0
tests/functional/cases/analyze/exit_code_failed.ft
Normal file
0
tests/functional/cases/analyze/exit_code_failed.ft
Normal file
57
tests/functional/cases/intercept/broken_build.sh
Normal file
57
tests/functional/cases/intercept/broken_build.sh
Normal file
@@ -0,0 +1,57 @@
|
||||
#!/usr/bin/env bash
|
||||
# RUN: intercept-build --override-compiler --cdb %t.json.wrapper sh %s
|
||||
# RUN: cdb_diff %t.json.wrapper %T/broken_build.json.expected
|
||||
#
|
||||
# when library preload disabled, it falls back to use compiler wrapper
|
||||
#
|
||||
# RUN: intercept-build --cdb %t.json.preload sh %s
|
||||
# RUN: cdb_diff %t.json.preload %T/broken_build.json.expected
|
||||
|
||||
set -o errexit
|
||||
set -o nounset
|
||||
set -o xtrace
|
||||
|
||||
cd "${test_input_dir}"
|
||||
${CC} -c -o ${test_output_dir}/main.o main.c
|
||||
cd "${test_input_dir}/clean"
|
||||
${CC} -c -o ${test_output_dir}/clean_one.o -Iinclude one.c
|
||||
cd "${test_input_dir}"
|
||||
${CXX} -c -o ${test_output_dir}/clean_two.o -I ./clean/include clean/two.c
|
||||
cd "${test_input_dir}/broken"
|
||||
${CC} -c -o ${test_output_dir}/broken_one.o one.c || true
|
||||
cd "${test_input_dir}"
|
||||
${CXX} -c -o ${test_output_dir}/broken_two.o broken/two.c || true
|
||||
|
||||
cat > ${test_output_dir}/broken_build.json.expected << EOF
|
||||
[
|
||||
{
|
||||
"directory": "${test_input_dir}",
|
||||
"command": "cc -c -o ${test_output_dir}/main.o main.c",
|
||||
"file": "${test_input_dir}/main.c"
|
||||
}
|
||||
,
|
||||
{
|
||||
"directory": "${test_input_dir}/clean",
|
||||
"command": "cc -c -o ${test_output_dir}/clean_one.o -Iinclude one.c",
|
||||
"file": "${test_input_dir}/clean/one.c"
|
||||
}
|
||||
,
|
||||
{
|
||||
"directory": "${test_input_dir}",
|
||||
"command": "c++ -c -o ${test_output_dir}/clean_two.o -I ./clean/include clean/two.c",
|
||||
"file": "${test_input_dir}/clean/two.c"
|
||||
}
|
||||
,
|
||||
{
|
||||
"directory": "${test_input_dir}/broken",
|
||||
"command": "cc -c -o ${test_output_dir}/broken_one.o one.c",
|
||||
"file": "${test_input_dir}/broken/one.c"
|
||||
}
|
||||
,
|
||||
{
|
||||
"directory": "${test_input_dir}",
|
||||
"command": "c++ -c -o ${test_output_dir}/broken_two.o broken/two.c",
|
||||
"file": "${test_input_dir}/broken/two.c"
|
||||
}
|
||||
]
|
||||
EOF
|
||||
@@ -0,0 +1,23 @@
|
||||
#!/usr/bin/env bash
|
||||
# REQUIRES: preload
|
||||
# RUN: intercept-build --cdb %t.json.result sh %s
|
||||
# RUN: cdb_diff %T/clean_env_build_intercept.sh.json %t.json.result
|
||||
|
||||
set -o errexit
|
||||
set -o nounset
|
||||
set -o xtrace
|
||||
|
||||
CC=$(which clang)
|
||||
|
||||
cd ${test_input_dir}
|
||||
env - ${CC} -c -o ${test_output_dir}/clean_env_main.o main.c
|
||||
|
||||
cat > ${test_output_dir}/clean_env_build_intercept.sh.json << EOF
|
||||
[
|
||||
{
|
||||
"directory": "${test_input_dir}",
|
||||
"command": "cc -c -o ${test_output_dir}/clean_env_main.o main.c",
|
||||
"file": "${test_input_dir}/main.c"
|
||||
}
|
||||
]
|
||||
EOF
|
||||
@@ -0,0 +1,86 @@
|
||||
#!/usr/bin/env bash
|
||||
# RUN: sh %s
|
||||
# this script run the whole test, not other control from lit
|
||||
|
||||
set -o errexit
|
||||
set -o nounset
|
||||
set -o xtrace
|
||||
|
||||
PREFIX="${test_output_dir}/output_handling"
|
||||
|
||||
cat > ${PREFIX}.compile_main.sh << EOF
|
||||
set -o errexit
|
||||
set -o nounset
|
||||
set -o xtrace
|
||||
|
||||
cd "${test_input_dir}"
|
||||
\${CC} -c -o ${test_output_dir}/main.o main.c
|
||||
EOF
|
||||
|
||||
cat > ${PREFIX}.compile_dirty.sh << EOF
|
||||
set -o errexit
|
||||
set -o nounset
|
||||
set -o xtrace
|
||||
|
||||
cd "${test_input_dir}/dirty"
|
||||
\${CC} -c -o ${test_output_dir}/dirty_one.o one.c
|
||||
\${CC} -c -o ${test_output_dir}/dirty_two.o two.c
|
||||
EOF
|
||||
|
||||
cat > ${PREFIX}.main.json << EOF
|
||||
[
|
||||
{
|
||||
"directory": "${test_input_dir}",
|
||||
"command": "cc -c -o ${test_output_dir}/main.o main.c",
|
||||
"file": "${test_input_dir}/main.c"
|
||||
}
|
||||
]
|
||||
EOF
|
||||
|
||||
cat > ${PREFIX}.dirty.json << EOF
|
||||
[
|
||||
{
|
||||
"directory": "${test_input_dir}/dirty",
|
||||
"command": "cc -c -o ${test_output_dir}/dirty_one.o one.c",
|
||||
"file": "${test_input_dir}/dirty/one.c"
|
||||
}
|
||||
,
|
||||
{
|
||||
"directory": "${test_input_dir}/dirty",
|
||||
"command": "cc -c -o ${test_output_dir}/dirty_two.o two.c",
|
||||
"file": "${test_input_dir}/dirty/two.c"
|
||||
}
|
||||
]
|
||||
EOF
|
||||
|
||||
cat > ${PREFIX}.final.json << EOF
|
||||
[
|
||||
{
|
||||
"directory": "${test_input_dir}",
|
||||
"command": "cc -c -o ${test_output_dir}/main.o main.c",
|
||||
"file": "${test_input_dir}/main.c"
|
||||
}
|
||||
,
|
||||
{
|
||||
"directory": "${test_input_dir}/dirty",
|
||||
"command": "cc -c -o ${test_output_dir}/dirty_one.o one.c",
|
||||
"file": "${test_input_dir}/dirty/one.c"
|
||||
}
|
||||
,
|
||||
{
|
||||
"directory": "${test_input_dir}/dirty",
|
||||
"command": "cc -c -o ${test_output_dir}/dirty_two.o two.c",
|
||||
"file": "${test_input_dir}/dirty/two.c"
|
||||
}
|
||||
]
|
||||
EOF
|
||||
|
||||
# preparation: create a simple compilation database
|
||||
intercept-build --cdb ${PREFIX}.json sh ${PREFIX}.compile_main.sh
|
||||
cdb_diff ${PREFIX}.main.json ${PREFIX}.json
|
||||
# overwrite the previously created compilation database
|
||||
intercept-build --cdb ${PREFIX}.json sh ${PREFIX}.compile_dirty.sh
|
||||
cdb_diff ${PREFIX}.dirty.json ${PREFIX}.json
|
||||
# append to the previously created compilation database
|
||||
intercept-build --cdb ${PREFIX}.json --append sh ${PREFIX}.compile_main.sh
|
||||
cdb_diff ${PREFIX}.final.json ${PREFIX}.json
|
||||
@@ -8,9 +8,10 @@
|
||||
#include "config.h"
|
||||
|
||||
#include <sys/wait.h>
|
||||
#include <unistd.h>
|
||||
#include <ctype.h>
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <unistd.h>
|
||||
#include <paths.h>
|
||||
|
||||
#if defined HAVE_POSIX_SPAWN || defined HAVE_POSIX_SPAWNP
|
||||
@@ -265,10 +266,39 @@ void call_posix_spawnp() {
|
||||
#endif
|
||||
|
||||
int main(int argc, char *const argv[]) {
|
||||
if (argc != 2)
|
||||
exit(EXIT_FAILURE);
|
||||
|
||||
expected_out_open(argv[1]);
|
||||
char *workdir = NULL;
|
||||
char *output = NULL;
|
||||
int c = 0;
|
||||
|
||||
opterr = 0;
|
||||
while ((c = getopt (argc, argv, "C:o:")) != -1) {
|
||||
switch (c) {
|
||||
case 'C':
|
||||
workdir = optarg;
|
||||
break;
|
||||
case 'o':
|
||||
output = optarg;
|
||||
break;
|
||||
case '?':
|
||||
if (optopt == 'C' || optopt == 'o')
|
||||
fprintf (stderr, "Option -%c requires an argument.\n", optopt);
|
||||
else if (isprint (optopt))
|
||||
fprintf (stderr, "Unknown option `-%c'.\n", optopt);
|
||||
else
|
||||
fprintf (stderr, "Unknown option character `\\x%x'.\n", optopt);
|
||||
return 1;
|
||||
default:
|
||||
abort();
|
||||
}
|
||||
}
|
||||
for (int index = optind; index < argc; ++index)
|
||||
printf ("Non-option argument %s\n", argv[index]);
|
||||
|
||||
if (workdir != NULL) {
|
||||
chdir(workdir);
|
||||
}
|
||||
expected_out_open(output);
|
||||
#ifdef HAVE_EXECV
|
||||
call_execv();
|
||||
#endif
|
||||
6
tests/functional/cases/intercept/exec/run_exec_test.sh
Normal file
6
tests/functional/cases/intercept/exec/run_exec_test.sh
Normal file
@@ -0,0 +1,6 @@
|
||||
#!/usr/bin/env bash
|
||||
# REQUIRES: preload
|
||||
# RUN: cmake -B%T -H%S
|
||||
# RUN: make -C %T
|
||||
# RUN: intercept-build --cdb %T/result.json %T/exec -C %T -o expected.json
|
||||
# RUN: cdb_diff %T/result.json %T/expected.json
|
||||
64
tests/functional/cases/intercept/flags_are_filtered.sh
Normal file
64
tests/functional/cases/intercept/flags_are_filtered.sh
Normal file
@@ -0,0 +1,64 @@
|
||||
#!/usr/bin/env bash
|
||||
# RUN: intercept-build --cdb %t.json.result sh %s
|
||||
# RUN: cdb_diff %T/flags_are_filtered.sh.json %t.json.result
|
||||
|
||||
set -o errexit
|
||||
set -o nounset
|
||||
set -o xtrace
|
||||
|
||||
# set up unique names for this test
|
||||
PREFIX=flagfiltering
|
||||
# set up platform specific linker options
|
||||
if [ `uname -o | grep -i linux` ]; then
|
||||
LD_FLAGS="-o ${test_output_dir}/lib${PREFIX}.so -shared -Wl,-soname,${PREFIX}"
|
||||
elif [ `uname -o | grep -i darwin` ]; then
|
||||
LD_FLAGS="-o ${test_output_dir}/lib${PREFIX}.dylib -dynamiclib -install_name @rpath/${PREFIX}"
|
||||
fi
|
||||
|
||||
cd ${test_input_dir}
|
||||
|
||||
# non compilation calls shall not be in the result
|
||||
${CC} -### -c main.c 2> /dev/null
|
||||
${CC} -E -o "${test_output_dir}/$$.i" main.c
|
||||
${CC} -S -o "${test_output_dir}/$$.asm" main.c
|
||||
${CC} -c -o "${test_output_dir}/$$.d" -M main.c
|
||||
${CC} -c -o "${test_output_dir}/$$.d" -MM main.c
|
||||
|
||||
# preprocessor flags shall be filtered
|
||||
${CC} -c -o "${test_output_dir}/${PREFIX}_clean_one.o" -fpic -Iclean/include -MD -MT target -MF "${test_output_dir}/${PREFIX}_clean_one.d" clean/one.c
|
||||
${CC} -c -o "${test_output_dir}/${PREFIX}_clean_two.o" -fpic -Iclean/include -MMD -MQ target -MF "${test_output_dir}/${PREFIX}_clean_two.d" clean/two.c
|
||||
|
||||
# linking shall not in the result
|
||||
${CC} ${LD_FLAGS} "${test_output_dir}/${PREFIX}_clean_one.o" "${test_output_dir}/${PREFIX}_clean_two.o"
|
||||
|
||||
# linker flags shall be filtered
|
||||
${CC} -o "${test_output_dir}/${PREFIX}_one" "-l${PREFIX}" "-L${test_output_dir}" main.c
|
||||
${CC} -o "${test_output_dir}/${PREFIX}_two" -l ${PREFIX} -L ${test_output_dir} main.c
|
||||
|
||||
cat > ${test_output_dir}/flags_are_filtered.sh.json << EOF
|
||||
[
|
||||
{
|
||||
"directory": "${test_input_dir}",
|
||||
"command": "cc -c -o ${test_output_dir}/${PREFIX}_clean_one.o -fpic -Iclean/include clean/one.c",
|
||||
"file": "${test_input_dir}/clean/one.c"
|
||||
}
|
||||
,
|
||||
{
|
||||
"directory": "${test_input_dir}",
|
||||
"command": "cc -c -o ${test_output_dir}/${PREFIX}_clean_two.o -fpic -Iclean/include clean/two.c",
|
||||
"file": "${test_input_dir}/clean/two.c"
|
||||
}
|
||||
,
|
||||
{
|
||||
"directory": "${test_input_dir}",
|
||||
"command": "cc -c -o ${test_output_dir}/${PREFIX}_one main.c",
|
||||
"file": "${test_input_dir}/main.c"
|
||||
}
|
||||
,
|
||||
{
|
||||
"directory": "${test_input_dir}",
|
||||
"command": "cc -c -o ${test_output_dir}/${PREFIX}_two main.c",
|
||||
"file": "${test_input_dir}/main.c"
|
||||
}
|
||||
]
|
||||
EOF
|
||||
13
tests/functional/cases/intercept/lit.local.cfg
Normal file
13
tests/functional/cases/intercept/lit.local.cfg
Normal file
@@ -0,0 +1,13 @@
|
||||
# -*- coding: utf-8 -*-
|
||||
# The LLVM Compiler Infrastructure
|
||||
#
|
||||
# This file is distributed under the University of Illinois Open Source
|
||||
# License. See LICENSE.TXT for details.
|
||||
|
||||
import os.path
|
||||
import lit.util
|
||||
|
||||
# test_source_root: The root path where tests are located.
|
||||
this_dir = os.path.dirname(__file__)
|
||||
|
||||
config.environment['test_output_dir'] = os.path.join(this_dir, 'Output')
|
||||
@@ -0,0 +1,32 @@
|
||||
#!/usr/bin/env bash
|
||||
# RUN: intercept-build --cdb %t.json.result sh %s
|
||||
# RUN: cdb_diff %T/multiple_source_single_command.sh.json %t.json.result
|
||||
|
||||
set -o errexit
|
||||
set -o nounset
|
||||
set -o xtrace
|
||||
|
||||
cd ${test_input_dir}
|
||||
${CC} -o ${test_output_dir}/all_in_one main.c dirty/one.c dirty/two.c
|
||||
|
||||
cat > ${test_output_dir}/multiple_source_single_command.sh.json << EOF
|
||||
[
|
||||
{
|
||||
"directory": "${test_input_dir}",
|
||||
"command": "cc -c -o ${test_output_dir}/all_in_one main.c",
|
||||
"file": "${test_input_dir}/main.c"
|
||||
}
|
||||
,
|
||||
{
|
||||
"directory": "${test_input_dir}",
|
||||
"command": "cc -c -o ${test_output_dir}/all_in_one dirty/one.c",
|
||||
"file": "${test_input_dir}/dirty/one.c"
|
||||
}
|
||||
,
|
||||
{
|
||||
"directory": "${test_input_dir}",
|
||||
"command": "cc -c -o ${test_output_dir}/all_in_one dirty/two.c",
|
||||
"file": "${test_input_dir}/dirty/two.c"
|
||||
}
|
||||
]
|
||||
EOF
|
||||
59
tests/functional/cases/intercept/parallel_build.sh
Normal file
59
tests/functional/cases/intercept/parallel_build.sh
Normal file
@@ -0,0 +1,59 @@
|
||||
#!/usr/bin/env bash
|
||||
# RUN: intercept-build --override-compiler --cdb %t.json.wrapper sh %s
|
||||
# RUN: cdb_diff %t.json.wrapper %T/parallel_build.json.expected
|
||||
#
|
||||
# when library preload disabled, it falls back to use compiler wrapper
|
||||
#
|
||||
# RUN: intercept-build --cdb %t.json.preload sh %s
|
||||
# RUN: cdb_diff %t.json.preload %T/parallel_build.json.expected
|
||||
|
||||
set -o errexit
|
||||
set -o nounset
|
||||
set -o xtrace
|
||||
|
||||
cd "${test_input_dir}"
|
||||
${CC} -c -o ${test_output_dir}/main.o main.c &
|
||||
cd "${test_input_dir}/clean"
|
||||
${CC} -c -o ${test_output_dir}/clean_one.o -Iinclude one.c &
|
||||
cd "${test_input_dir}"
|
||||
${CXX} -c -o ${test_output_dir}/clean_two.o -I ./clean/include clean/two.c &
|
||||
cd "${test_input_dir}/dirty"
|
||||
${CC} -c -o ${test_output_dir}/dirty_one.o -Wall one.c &
|
||||
cd "${test_input_dir}"
|
||||
${CXX} -c -o ${test_output_dir}/dirty_two.o -Wall dirty/two.c &
|
||||
|
||||
wait
|
||||
|
||||
cat > ${test_output_dir}/parallel_build.json.expected << EOF
|
||||
[
|
||||
{
|
||||
"directory": "${test_input_dir}",
|
||||
"command": "cc -c -o ${test_output_dir}/main.o main.c",
|
||||
"file": "${test_input_dir}/main.c"
|
||||
}
|
||||
,
|
||||
{
|
||||
"directory": "${test_input_dir}/clean",
|
||||
"command": "cc -c -o ${test_output_dir}/clean_one.o -Iinclude one.c",
|
||||
"file": "${test_input_dir}/clean/one.c"
|
||||
}
|
||||
,
|
||||
{
|
||||
"directory": "${test_input_dir}",
|
||||
"command": "c++ -c -o ${test_output_dir}/clean_two.o -I ./clean/include clean/two.c",
|
||||
"file": "${test_input_dir}/clean/two.c"
|
||||
}
|
||||
,
|
||||
{
|
||||
"directory": "${test_input_dir}/dirty",
|
||||
"command": "cc -c -o ${test_output_dir}/dirty_one.o -Wall one.c",
|
||||
"file": "${test_input_dir}/dirty/one.c"
|
||||
}
|
||||
,
|
||||
{
|
||||
"directory": "${test_input_dir}",
|
||||
"command": "c++ -c -o ${test_output_dir}/dirty_two.o -Wall dirty/two.c",
|
||||
"file": "${test_input_dir}/dirty/two.c"
|
||||
}
|
||||
]
|
||||
EOF
|
||||
57
tests/functional/cases/intercept/successful_build.sh
Normal file
57
tests/functional/cases/intercept/successful_build.sh
Normal file
@@ -0,0 +1,57 @@
|
||||
#!/usr/bin/env bash
|
||||
# RUN: intercept-build --override-compiler --cdb %t.json.wrapper sh %s
|
||||
# RUN: cdb_diff %t.json.wrapper %T/successful_build.json.expected
|
||||
#
|
||||
# when library preload disabled, it falls back to use compiler wrapper
|
||||
#
|
||||
# RUN: intercept-build --cdb %t.json.preload sh %s
|
||||
# RUN: cdb_diff %t.json.preload %T/successful_build.json.expected
|
||||
|
||||
set -o errexit
|
||||
set -o nounset
|
||||
set -o xtrace
|
||||
|
||||
cd "${test_input_dir}"
|
||||
${CC} -c -o ${test_output_dir}/main.o main.c
|
||||
cd "${test_input_dir}/clean"
|
||||
${CC} -c -o ${test_output_dir}/clean_one.o -Iinclude one.c
|
||||
cd "${test_input_dir}"
|
||||
${CXX} -c -o ${test_output_dir}/clean_two.o -I ./clean/include clean/two.c
|
||||
cd "${test_input_dir}/dirty"
|
||||
${CC} -c -o ${test_output_dir}/dirty_one.o -Wall one.c
|
||||
cd "${test_input_dir}"
|
||||
${CXX} -c -o ${test_output_dir}/dirty_two.o -Wall dirty/two.c
|
||||
|
||||
cat > ${test_output_dir}/successful_build.json.expected << EOF
|
||||
[
|
||||
{
|
||||
"directory": "${test_input_dir}",
|
||||
"command": "cc -c -o ${test_output_dir}/main.o main.c",
|
||||
"file": "${test_input_dir}/main.c"
|
||||
}
|
||||
,
|
||||
{
|
||||
"directory": "${test_input_dir}/clean",
|
||||
"command": "cc -c -o ${test_output_dir}/clean_one.o -Iinclude one.c",
|
||||
"file": "${test_input_dir}/clean/one.c"
|
||||
}
|
||||
,
|
||||
{
|
||||
"directory": "${test_input_dir}",
|
||||
"command": "c++ -c -o ${test_output_dir}/clean_two.o -I ./clean/include clean/two.c",
|
||||
"file": "${test_input_dir}/clean/two.c"
|
||||
}
|
||||
,
|
||||
{
|
||||
"directory": "${test_input_dir}/dirty",
|
||||
"command": "cc -c -o ${test_output_dir}/dirty_one.o -Wall one.c",
|
||||
"file": "${test_input_dir}/dirty/one.c"
|
||||
}
|
||||
,
|
||||
{
|
||||
"directory": "${test_input_dir}",
|
||||
"command": "c++ -c -o ${test_output_dir}/dirty_two.o -Wall dirty/two.c",
|
||||
"file": "${test_input_dir}/dirty/two.c"
|
||||
}
|
||||
]
|
||||
EOF
|
||||
0
tests/functional/cases/report/report_dir_kept.ft
Normal file
0
tests/functional/cases/report/report_dir_kept.ft
Normal file
0
tests/functional/cases/report/report_failures.ft
Normal file
0
tests/functional/cases/report/report_failures.ft
Normal file
0
tests/functional/cases/report/report_title_set.ft
Normal file
0
tests/functional/cases/report/report_title_set.ft
Normal file
@@ -1,195 +0,0 @@
|
||||
# -*- coding: utf-8 -*-
|
||||
# The LLVM Compiler Infrastructure
|
||||
#
|
||||
# This file is distributed under the University of Illinois Open Source
|
||||
# License. See LICENSE.TXT for details.
|
||||
|
||||
import libear
|
||||
from . import make_args, silent_check_call, silent_call, create_empty_file
|
||||
import unittest
|
||||
|
||||
import os.path
|
||||
import json
|
||||
|
||||
|
||||
class CompilationDatabaseTest(unittest.TestCase):
|
||||
@staticmethod
|
||||
def run_intercept(tmpdir, args):
|
||||
result = os.path.join(tmpdir, 'cdb.json')
|
||||
make = make_args(tmpdir) + args
|
||||
silent_check_call(
|
||||
['intercept-build', '--cdb', result] + make)
|
||||
return result
|
||||
|
||||
@staticmethod
|
||||
def count_entries(filename):
|
||||
with open(filename, 'r') as handler:
|
||||
content = json.load(handler)
|
||||
return len(content)
|
||||
|
||||
def test_successful_build(self):
|
||||
with libear.temporary_directory() as tmpdir:
|
||||
result = self.run_intercept(tmpdir, ['build_regular'])
|
||||
self.assertTrue(os.path.isfile(result))
|
||||
self.assertEqual(5, self.count_entries(result))
|
||||
|
||||
def test_successful_build_with_wrapper(self):
|
||||
with libear.temporary_directory() as tmpdir:
|
||||
result = os.path.join(tmpdir, 'cdb.json')
|
||||
make = make_args(tmpdir) + ['build_regular']
|
||||
silent_check_call(['intercept-build', '--cdb', result,
|
||||
'--override-compiler'] + make)
|
||||
self.assertTrue(os.path.isfile(result))
|
||||
self.assertEqual(5, self.count_entries(result))
|
||||
|
||||
@unittest.skipIf(os.getenv('TRAVIS'), 'ubuntu make return -11')
|
||||
def test_successful_build_parallel(self):
|
||||
with libear.temporary_directory() as tmpdir:
|
||||
result = self.run_intercept(tmpdir, ['-j', '4', 'build_regular'])
|
||||
self.assertTrue(os.path.isfile(result))
|
||||
self.assertEqual(5, self.count_entries(result))
|
||||
|
||||
@unittest.skipIf(os.getenv('TRAVIS'), 'ubuntu env remove clang from path')
|
||||
def test_successful_build_on_empty_env(self):
|
||||
with libear.temporary_directory() as tmpdir:
|
||||
result = os.path.join(tmpdir, 'cdb.json')
|
||||
make = make_args(tmpdir) + ['CC=clang', 'build_regular']
|
||||
silent_check_call(['intercept-build', '--cdb', result,
|
||||
'env', '-'] + make)
|
||||
self.assertTrue(os.path.isfile(result))
|
||||
self.assertEqual(5, self.count_entries(result))
|
||||
|
||||
def test_successful_build_all_in_one(self):
|
||||
with libear.temporary_directory() as tmpdir:
|
||||
result = self.run_intercept(tmpdir, ['build_all_in_one'])
|
||||
self.assertTrue(os.path.isfile(result))
|
||||
self.assertEqual(5, self.count_entries(result))
|
||||
|
||||
def test_not_successful_build(self):
|
||||
with libear.temporary_directory() as tmpdir:
|
||||
result = os.path.join(tmpdir, 'cdb.json')
|
||||
make = make_args(tmpdir) + ['build_broken']
|
||||
silent_call(
|
||||
['intercept-build', '--cdb', result] + make)
|
||||
self.assertTrue(os.path.isfile(result))
|
||||
self.assertEqual(2, self.count_entries(result))
|
||||
|
||||
|
||||
class ExitCodeTest(unittest.TestCase):
|
||||
@staticmethod
|
||||
def run_intercept(tmpdir, target):
|
||||
result = os.path.join(tmpdir, 'cdb.json')
|
||||
make = make_args(tmpdir) + [target]
|
||||
return silent_call(
|
||||
['intercept-build', '--cdb', result] + make)
|
||||
|
||||
def test_successful_build(self):
|
||||
with libear.temporary_directory() as tmpdir:
|
||||
exitcode = self.run_intercept(tmpdir, 'build_clean')
|
||||
self.assertFalse(exitcode)
|
||||
|
||||
def test_not_successful_build(self):
|
||||
with libear.temporary_directory() as tmpdir:
|
||||
exitcode = self.run_intercept(tmpdir, 'build_broken')
|
||||
self.assertTrue(exitcode)
|
||||
|
||||
def test_intercept_help(self):
|
||||
exitcode = silent_call(['intercept-build', '--help'])
|
||||
self.assertFalse(exitcode)
|
||||
|
||||
|
||||
class ResumeFeatureTest(unittest.TestCase):
|
||||
@staticmethod
|
||||
def run_intercept(tmpdir, target, args):
|
||||
result = os.path.join(tmpdir, 'cdb.json')
|
||||
make = make_args(tmpdir) + [target]
|
||||
silent_check_call(
|
||||
['intercept-build', '--cdb', result] + args + make)
|
||||
return result
|
||||
|
||||
@staticmethod
|
||||
def count_entries(filename):
|
||||
with open(filename, 'r') as handler:
|
||||
content = json.load(handler)
|
||||
return len(content)
|
||||
|
||||
def test_overwrite_existing_cdb(self):
|
||||
with libear.temporary_directory() as tmpdir:
|
||||
result = self.run_intercept(tmpdir, 'build_clean', [])
|
||||
self.assertTrue(os.path.isfile(result))
|
||||
result = self.run_intercept(tmpdir, 'build_regular', [])
|
||||
self.assertTrue(os.path.isfile(result))
|
||||
self.assertEqual(2, self.count_entries(result))
|
||||
|
||||
def test_append_to_existing_cdb(self):
|
||||
with libear.temporary_directory() as tmpdir:
|
||||
result = self.run_intercept(tmpdir, 'build_clean', [])
|
||||
self.assertTrue(os.path.isfile(result))
|
||||
result = self.run_intercept(tmpdir, 'build_regular', ['--append'])
|
||||
self.assertTrue(os.path.isfile(result))
|
||||
self.assertEqual(5, self.count_entries(result))
|
||||
|
||||
|
||||
class ResultFormatingTest(unittest.TestCase):
|
||||
@staticmethod
|
||||
def run_intercept(tmpdir, command):
|
||||
result = os.path.join(tmpdir, 'cdb.json')
|
||||
silent_check_call(
|
||||
['intercept-build', '--cdb', result] + command,
|
||||
cwd=tmpdir)
|
||||
with open(result, 'r') as handler:
|
||||
content = json.load(handler)
|
||||
return content
|
||||
|
||||
def assert_creates_number_of_entries(self, command, count):
|
||||
with libear.temporary_directory() as tmpdir:
|
||||
filename = os.path.join(tmpdir, 'test.c')
|
||||
create_empty_file(filename)
|
||||
command.append(filename)
|
||||
cmd = ['sh', '-c', ' '.join(command)]
|
||||
cdb = self.run_intercept(tmpdir, cmd)
|
||||
self.assertEqual(count, len(cdb))
|
||||
|
||||
def test_filter_preprocessor_only_calls(self):
|
||||
self.assert_creates_number_of_entries(['cc', '-c'], 1)
|
||||
self.assert_creates_number_of_entries(['cc', '-c', '-E'], 0)
|
||||
self.assert_creates_number_of_entries(['cc', '-c', '-M'], 0)
|
||||
self.assert_creates_number_of_entries(['cc', '-c', '-MM'], 0)
|
||||
|
||||
def assert_command_creates_entry(self, command, expected):
|
||||
with libear.temporary_directory() as tmpdir:
|
||||
filename = os.path.join(tmpdir, command[-1])
|
||||
create_empty_file(filename)
|
||||
cmd = ['sh', '-c', ' '.join(command)]
|
||||
cdb = self.run_intercept(tmpdir, cmd)
|
||||
self.assertEqual(' '.join(expected), cdb[0]['command'])
|
||||
|
||||
def test_filter_preprocessor_flags(self):
|
||||
self.assert_command_creates_entry(
|
||||
['cc', '-c', '-MD', 'test.c'],
|
||||
['cc', '-c', 'test.c'])
|
||||
self.assert_command_creates_entry(
|
||||
['cc', '-c', '-MMD', 'test.c'],
|
||||
['cc', '-c', 'test.c'])
|
||||
self.assert_command_creates_entry(
|
||||
['cc', '-c', '-MD', '-MF', 'test.d', 'test.c'],
|
||||
['cc', '-c', 'test.c'])
|
||||
|
||||
def test_pass_language_flag(self):
|
||||
self.assert_command_creates_entry(
|
||||
['cc', '-c', '-x', 'c', 'test.c'],
|
||||
['cc', '-c', '-x', 'c', 'test.c'])
|
||||
self.assert_command_creates_entry(
|
||||
['cc', '-c', 'test.c'],
|
||||
['cc', '-c', 'test.c'])
|
||||
|
||||
def test_pass_arch_flags(self):
|
||||
self.assert_command_creates_entry(
|
||||
['clang', '-c', 'test.c'],
|
||||
['cc', '-c', 'test.c'])
|
||||
self.assert_command_creates_entry(
|
||||
['clang', '-c', '-arch', 'i386', 'test.c'],
|
||||
['cc', '-c', '-arch', 'i386', 'test.c'])
|
||||
self.assert_command_creates_entry(
|
||||
['clang', '-c', '-arch', 'i386', '-arch', 'armv7l', 'test.c'],
|
||||
['cc', '-c', '-arch', 'i386', '-arch', 'armv7l', 'test.c'])
|
||||
@@ -1,50 +0,0 @@
|
||||
# -*- coding: utf-8 -*-
|
||||
# The LLVM Compiler Infrastructure
|
||||
#
|
||||
# This file is distributed under the University of Illinois Open Source
|
||||
# License. See LICENSE.TXT for details.
|
||||
|
||||
import libear
|
||||
import unittest
|
||||
|
||||
import os.path
|
||||
import subprocess
|
||||
import json
|
||||
|
||||
|
||||
def run(source_dir, target_dir):
|
||||
def execute(cmd):
|
||||
return subprocess.check_call(cmd,
|
||||
cwd=target_dir,
|
||||
stdout=subprocess.PIPE,
|
||||
stderr=subprocess.STDOUT)
|
||||
|
||||
execute(['cmake', source_dir])
|
||||
execute(['make'])
|
||||
|
||||
result_file = os.path.join(target_dir, 'result.json')
|
||||
expected_file = os.path.join(target_dir, 'expected.json')
|
||||
execute(['intercept-build', '--cdb', result_file, './exec',
|
||||
expected_file])
|
||||
return expected_file, result_file
|
||||
|
||||
|
||||
class ExecAnatomyTest(unittest.TestCase):
|
||||
def assertEqualJson(self, expected, result):
|
||||
def read_json(filename):
|
||||
with open(filename) as handler:
|
||||
return json.load(handler)
|
||||
|
||||
lhs = read_json(expected)
|
||||
rhs = read_json(result)
|
||||
for item in lhs:
|
||||
self.assertTrue(rhs.count(item))
|
||||
for item in rhs:
|
||||
self.assertTrue(lhs.count(item))
|
||||
|
||||
def test_all_exec_calls(self):
|
||||
this_dir, _ = os.path.split(__file__)
|
||||
source_dir = os.path.normpath(os.path.join(this_dir, '..', 'exec'))
|
||||
with libear.temporary_directory() as tmp_dir:
|
||||
expected, result = run(source_dir, tmp_dir)
|
||||
self.assertEqualJson(expected, result)
|
||||
@@ -1,182 +0,0 @@
|
||||
# -*- coding: utf-8 -*-
|
||||
# The LLVM Compiler Infrastructure
|
||||
#
|
||||
# This file is distributed under the University of Illinois Open Source
|
||||
# License. See LICENSE.TXT for details.
|
||||
|
||||
import libear
|
||||
from . import call_and_report
|
||||
import unittest
|
||||
|
||||
import os.path
|
||||
import string
|
||||
import glob
|
||||
|
||||
|
||||
def prepare_cdb(name, target_dir):
|
||||
target_file = 'build_{0}.json'.format(name)
|
||||
this_dir, _ = os.path.split(__file__)
|
||||
path = os.path.normpath(os.path.join(this_dir, '..', 'src'))
|
||||
source_dir = os.path.join(path, 'compilation_database')
|
||||
source_file = os.path.join(source_dir, target_file + '.in')
|
||||
target_file = os.path.join(target_dir, 'compile_commands.json')
|
||||
with open(source_file, 'r') as in_handle:
|
||||
with open(target_file, 'w') as out_handle:
|
||||
for line in in_handle:
|
||||
temp = string.Template(line)
|
||||
out_handle.write(temp.substitute(path=path))
|
||||
return target_file
|
||||
|
||||
|
||||
def run_analyzer(directory, cdb, args):
|
||||
cmd = ['analyze-build', '--cdb', cdb, '--output', directory] \
|
||||
+ args
|
||||
return call_and_report(cmd, [])
|
||||
|
||||
|
||||
class OutputDirectoryTest(unittest.TestCase):
|
||||
def test_regular_keeps_report_dir(self):
|
||||
with libear.temporary_directory() as tmpdir:
|
||||
cdb = prepare_cdb('regular', tmpdir)
|
||||
exit_code, reportdir = run_analyzer(tmpdir, cdb, [])
|
||||
self.assertTrue(os.path.isdir(reportdir))
|
||||
|
||||
def test_clear_deletes_report_dir(self):
|
||||
with libear.temporary_directory() as tmpdir:
|
||||
cdb = prepare_cdb('clean', tmpdir)
|
||||
exit_code, reportdir = run_analyzer(tmpdir, cdb, [])
|
||||
self.assertFalse(os.path.isdir(reportdir))
|
||||
|
||||
def test_clear_keeps_report_dir_when_asked(self):
|
||||
with libear.temporary_directory() as tmpdir:
|
||||
cdb = prepare_cdb('clean', tmpdir)
|
||||
exit_code, reportdir = run_analyzer(tmpdir, cdb, ['--keep-empty'])
|
||||
self.assertTrue(os.path.isdir(reportdir))
|
||||
|
||||
|
||||
class ExitCodeTest(unittest.TestCase):
|
||||
def test_regular_does_not_set_exit_code(self):
|
||||
with libear.temporary_directory() as tmpdir:
|
||||
cdb = prepare_cdb('regular', tmpdir)
|
||||
exit_code, __ = run_analyzer(tmpdir, cdb, [])
|
||||
self.assertFalse(exit_code)
|
||||
|
||||
def test_clear_does_not_set_exit_code(self):
|
||||
with libear.temporary_directory() as tmpdir:
|
||||
cdb = prepare_cdb('clean', tmpdir)
|
||||
exit_code, __ = run_analyzer(tmpdir, cdb, [])
|
||||
self.assertFalse(exit_code)
|
||||
|
||||
def test_regular_sets_exit_code_if_asked(self):
|
||||
with libear.temporary_directory() as tmpdir:
|
||||
cdb = prepare_cdb('regular', tmpdir)
|
||||
exit_code, __ = run_analyzer(tmpdir, cdb, ['--status-bugs'])
|
||||
self.assertTrue(exit_code)
|
||||
|
||||
def test_clear_does_not_set_exit_code_if_asked(self):
|
||||
with libear.temporary_directory() as tmpdir:
|
||||
cdb = prepare_cdb('clean', tmpdir)
|
||||
exit_code, __ = run_analyzer(tmpdir, cdb, ['--status-bugs'])
|
||||
self.assertFalse(exit_code)
|
||||
|
||||
def test_regular_sets_exit_code_if_asked_from_plist(self):
|
||||
with libear.temporary_directory() as tmpdir:
|
||||
cdb = prepare_cdb('regular', tmpdir)
|
||||
exit_code, __ = run_analyzer(
|
||||
tmpdir, cdb, ['--status-bugs', '--plist'])
|
||||
self.assertTrue(exit_code)
|
||||
|
||||
def test_clear_does_not_set_exit_code_if_asked_from_plist(self):
|
||||
with libear.temporary_directory() as tmpdir:
|
||||
cdb = prepare_cdb('clean', tmpdir)
|
||||
exit_code, __ = run_analyzer(
|
||||
tmpdir, cdb, ['--status-bugs', '--plist'])
|
||||
self.assertFalse(exit_code)
|
||||
|
||||
|
||||
class OutputFormatTest(unittest.TestCase):
|
||||
@staticmethod
|
||||
def get_html_count(directory):
|
||||
return len(glob.glob(os.path.join(directory, 'report-*.html')))
|
||||
|
||||
@staticmethod
|
||||
def get_plist_count(directory):
|
||||
return len(glob.glob(os.path.join(directory, 'report-*.plist')))
|
||||
|
||||
def test_default_creates_html_report(self):
|
||||
with libear.temporary_directory() as tmpdir:
|
||||
cdb = prepare_cdb('regular', tmpdir)
|
||||
exit_code, reportdir = run_analyzer(tmpdir, cdb, [])
|
||||
self.assertTrue(
|
||||
os.path.exists(os.path.join(reportdir, 'index.html')))
|
||||
self.assertEqual(self.get_html_count(reportdir), 2)
|
||||
self.assertEqual(self.get_plist_count(reportdir), 0)
|
||||
|
||||
def test_plist_and_html_creates_html_report(self):
|
||||
with libear.temporary_directory() as tmpdir:
|
||||
cdb = prepare_cdb('regular', tmpdir)
|
||||
exit_code, reportdir = run_analyzer(tmpdir, cdb, ['--plist-html'])
|
||||
self.assertTrue(
|
||||
os.path.exists(os.path.join(reportdir, 'index.html')))
|
||||
self.assertEqual(self.get_html_count(reportdir), 2)
|
||||
self.assertEqual(self.get_plist_count(reportdir), 5)
|
||||
|
||||
def test_plist_does_not_creates_html_report(self):
|
||||
with libear.temporary_directory() as tmpdir:
|
||||
cdb = prepare_cdb('regular', tmpdir)
|
||||
exit_code, reportdir = run_analyzer(tmpdir, cdb, ['--plist'])
|
||||
self.assertFalse(
|
||||
os.path.exists(os.path.join(reportdir, 'index.html')))
|
||||
self.assertEqual(self.get_html_count(reportdir), 0)
|
||||
self.assertEqual(self.get_plist_count(reportdir), 5)
|
||||
|
||||
|
||||
class FailureReportTest(unittest.TestCase):
|
||||
def test_broken_creates_failure_reports(self):
|
||||
with libear.temporary_directory() as tmpdir:
|
||||
cdb = prepare_cdb('broken', tmpdir)
|
||||
exit_code, reportdir = run_analyzer(tmpdir, cdb, [])
|
||||
self.assertTrue(
|
||||
os.path.isdir(os.path.join(reportdir, 'failures')))
|
||||
|
||||
def test_broken_does_not_creates_failure_reports(self):
|
||||
with libear.temporary_directory() as tmpdir:
|
||||
cdb = prepare_cdb('broken', tmpdir)
|
||||
exit_code, reportdir = run_analyzer(
|
||||
tmpdir, cdb, ['--no-failure-reports'])
|
||||
self.assertFalse(
|
||||
os.path.isdir(os.path.join(reportdir, 'failures')))
|
||||
|
||||
|
||||
class TitleTest(unittest.TestCase):
|
||||
def assertTitleEqual(self, directory, expected):
|
||||
import re
|
||||
patterns = [
|
||||
re.compile(r'<title>(?P<page>.*)</title>'),
|
||||
re.compile(r'<h1>(?P<head>.*)</h1>')
|
||||
]
|
||||
result = dict()
|
||||
|
||||
index = os.path.join(directory, 'index.html')
|
||||
with open(index, 'r') as handler:
|
||||
for line in handler.readlines():
|
||||
for regex in patterns:
|
||||
match = regex.match(line.strip())
|
||||
if match:
|
||||
result.update(match.groupdict())
|
||||
break
|
||||
self.assertEqual(result['page'], result['head'])
|
||||
self.assertEqual(result['page'], expected)
|
||||
|
||||
def test_default_title_in_report(self):
|
||||
with libear.temporary_directory() as tmpdir:
|
||||
cdb = prepare_cdb('broken', tmpdir)
|
||||
exit_code, reportdir = run_analyzer(tmpdir, cdb, [])
|
||||
self.assertTitleEqual(reportdir, 'src - analyzer results')
|
||||
|
||||
def test_given_title_in_report(self):
|
||||
with libear.temporary_directory() as tmpdir:
|
||||
cdb = prepare_cdb('broken', tmpdir)
|
||||
exit_code, reportdir = run_analyzer(
|
||||
tmpdir, cdb, ['--html-title', 'this is the title'])
|
||||
self.assertTitleEqual(reportdir, 'this is the title')
|
||||
@@ -1,118 +0,0 @@
|
||||
# -*- coding: utf-8 -*-
|
||||
# The LLVM Compiler Infrastructure
|
||||
#
|
||||
# This file is distributed under the University of Illinois Open Source
|
||||
# License. See LICENSE.TXT for details.
|
||||
|
||||
import libear
|
||||
from . import make_args, check_call_and_report, create_empty_file
|
||||
import unittest
|
||||
|
||||
import os
|
||||
import os.path
|
||||
import glob
|
||||
|
||||
|
||||
class OutputDirectoryTest(unittest.TestCase):
|
||||
|
||||
@staticmethod
|
||||
def run_analyzer(outdir, args, cmd):
|
||||
return check_call_and_report(
|
||||
['scan-build', '--intercept-first', '-o', outdir] + args,
|
||||
cmd)
|
||||
|
||||
def test_regular_keeps_report_dir(self):
|
||||
with libear.temporary_directory() as tmpdir:
|
||||
make = make_args(tmpdir) + ['build_regular']
|
||||
outdir = self.run_analyzer(tmpdir, [], make)
|
||||
self.assertTrue(os.path.isdir(outdir))
|
||||
|
||||
def test_clear_deletes_report_dir(self):
|
||||
with libear.temporary_directory() as tmpdir:
|
||||
make = make_args(tmpdir) + ['build_clean']
|
||||
outdir = self.run_analyzer(tmpdir, [], make)
|
||||
self.assertFalse(os.path.isdir(outdir))
|
||||
|
||||
def test_clear_keeps_report_dir_when_asked(self):
|
||||
with libear.temporary_directory() as tmpdir:
|
||||
make = make_args(tmpdir) + ['build_clean']
|
||||
outdir = self.run_analyzer(tmpdir, ['--keep-empty'], make)
|
||||
self.assertTrue(os.path.isdir(outdir))
|
||||
|
||||
|
||||
class RunAnalyzerTest(unittest.TestCase):
|
||||
|
||||
@staticmethod
|
||||
def get_plist_count(directory):
|
||||
return len(glob.glob(os.path.join(directory, 'report-*.plist')))
|
||||
|
||||
def test_interposition_works(self):
|
||||
with libear.temporary_directory() as tmpdir:
|
||||
make = make_args(tmpdir) + ['build_regular']
|
||||
outdir = check_call_and_report(
|
||||
['scan-build', '--plist', '-o', tmpdir, '--override-compiler'],
|
||||
make)
|
||||
|
||||
self.assertTrue(os.path.isdir(outdir))
|
||||
self.assertEqual(self.get_plist_count(outdir), 5)
|
||||
|
||||
def test_intercept_wrapper_works(self):
|
||||
with libear.temporary_directory() as tmpdir:
|
||||
make = make_args(tmpdir) + ['build_regular']
|
||||
outdir = check_call_and_report(
|
||||
['scan-build', '--plist', '-o', tmpdir, '--intercept-first',
|
||||
'--override-compiler'],
|
||||
make)
|
||||
|
||||
self.assertTrue(os.path.isdir(outdir))
|
||||
self.assertEqual(self.get_plist_count(outdir), 5)
|
||||
|
||||
def test_intercept_library_works(self):
|
||||
with libear.temporary_directory() as tmpdir:
|
||||
make = make_args(tmpdir) + ['build_regular']
|
||||
outdir = check_call_and_report(
|
||||
['scan-build', '--plist', '-o', tmpdir, '--intercept-first'],
|
||||
make)
|
||||
|
||||
self.assertTrue(os.path.isdir(outdir))
|
||||
self.assertEqual(self.get_plist_count(outdir), 5)
|
||||
|
||||
@staticmethod
|
||||
def compile_empty_source_file(target_dir, is_cxx):
|
||||
compiler = '$CXX' if is_cxx else '$CC'
|
||||
src_file_name = 'test.cxx' if is_cxx else 'test.c'
|
||||
src_file = os.path.join(target_dir, src_file_name)
|
||||
obj_file = os.path.join(target_dir, 'test.o')
|
||||
create_empty_file(src_file)
|
||||
command = ' '.join([compiler, '-c', src_file, '-o', obj_file])
|
||||
return ['sh', '-c', command]
|
||||
|
||||
def test_interposition_cc_works(self):
|
||||
with libear.temporary_directory() as tmpdir:
|
||||
outdir = check_call_and_report(
|
||||
['scan-build', '--plist', '-o', tmpdir, '--override-compiler'],
|
||||
self.compile_empty_source_file(tmpdir, False))
|
||||
self.assertEqual(self.get_plist_count(outdir), 1)
|
||||
|
||||
def test_interposition_cxx_works(self):
|
||||
with libear.temporary_directory() as tmpdir:
|
||||
outdir = check_call_and_report(
|
||||
['scan-build', '--plist', '-o', tmpdir, '--override-compiler'],
|
||||
self.compile_empty_source_file(tmpdir, True))
|
||||
self.assertEqual(self.get_plist_count(outdir), 1)
|
||||
|
||||
def test_intercept_cc_works(self):
|
||||
with libear.temporary_directory() as tmpdir:
|
||||
outdir = check_call_and_report(
|
||||
['scan-build', '--plist', '-o', tmpdir, '--override-compiler',
|
||||
'--intercept-first'],
|
||||
self.compile_empty_source_file(tmpdir, False))
|
||||
self.assertEqual(self.get_plist_count(outdir), 1)
|
||||
|
||||
def test_intercept_cxx_works(self):
|
||||
with libear.temporary_directory() as tmpdir:
|
||||
outdir = check_call_and_report(
|
||||
['scan-build', '--plist', '-o', tmpdir, '--override-compiler',
|
||||
'--intercept-first'],
|
||||
self.compile_empty_source_file(tmpdir, True))
|
||||
self.assertEqual(self.get_plist_count(outdir), 1)
|
||||
18
tests/functional/lit.local.cfg
Normal file
18
tests/functional/lit.local.cfg
Normal file
@@ -0,0 +1,18 @@
|
||||
# -*- coding: utf-8 -*-
|
||||
# The LLVM Compiler Infrastructure
|
||||
#
|
||||
# This file is distributed under the University of Illinois Open Source
|
||||
# License. See LICENSE.TXT for details.
|
||||
|
||||
import os.path
|
||||
import lit.util
|
||||
|
||||
# test_source_root: The root path where tests are located.
|
||||
this_dir = os.path.dirname(__file__)
|
||||
bin_dir = os.path.join(this_dir, 'bin')
|
||||
|
||||
config.environment['PATH'] = ':'.join([bin_dir, config.environment['PATH']])
|
||||
config.environment['CC'] = 'cc'
|
||||
config.environment['CXX'] = 'c++'
|
||||
config.environment['test_input_dir'] = os.path.join(this_dir, 'Input')
|
||||
config.environment['test_output_dir'] = os.path.join(this_dir, 'Output')
|
||||
@@ -1,42 +0,0 @@
|
||||
SRCDIR := ..
|
||||
OBJDIR := .
|
||||
|
||||
CFLAGS = -Wall -DDEBUG -Dvariable="value with space" -I $(SRCDIR)/include
|
||||
LDFLAGS =
|
||||
PROGRAM = $(OBJDIR)/prg
|
||||
|
||||
$(OBJDIR)/main.o: $(SRCDIR)/main.c
|
||||
$(CC) $(CFLAGS) -c -o $@ $(SRCDIR)/main.c
|
||||
|
||||
$(OBJDIR)/clean-one.o: $(SRCDIR)/clean-one.c
|
||||
$(CC) $(CFLAGS) -c -o $@ $(SRCDIR)/clean-one.c
|
||||
|
||||
$(OBJDIR)/clean-two.o: $(SRCDIR)/clean-two.c
|
||||
$(CC) $(CFLAGS) -c -o $@ $(SRCDIR)/clean-two.c
|
||||
|
||||
$(OBJDIR)/emit-one.o: $(SRCDIR)/emit-one.c
|
||||
$(CC) $(CFLAGS) -c -o $@ $(SRCDIR)/emit-one.c
|
||||
|
||||
$(OBJDIR)/emit-two.o: $(SRCDIR)/emit-two.c
|
||||
$(CC) $(CFLAGS) -c -o $@ $(SRCDIR)/emit-two.c
|
||||
|
||||
$(OBJDIR)/broken-one.o: $(SRCDIR)/broken-one.c
|
||||
$(CC) $(CFLAGS) -c -o $@ $(SRCDIR)/broken-one.c
|
||||
|
||||
$(OBJDIR)/broken-two.o: $(SRCDIR)/broken-two.c
|
||||
$(CC) $(CFLAGS) -c -o $@ $(SRCDIR)/broken-two.c
|
||||
|
||||
$(PROGRAM): $(OBJDIR)/main.o $(OBJDIR)/clean-one.o $(OBJDIR)/clean-two.o $(OBJDIR)/emit-one.o $(OBJDIR)/emit-two.o
|
||||
$(CC) $(LDFLAGS) -o $@ $(OBJDIR)/main.o $(OBJDIR)/clean-one.o $(OBJDIR)/clean-two.o $(OBJDIR)/emit-one.o $(OBJDIR)/emit-two.o
|
||||
|
||||
build_regular: $(PROGRAM)
|
||||
|
||||
build_clean: $(OBJDIR)/main.o $(OBJDIR)/clean-one.o $(OBJDIR)/clean-two.o
|
||||
|
||||
build_broken: $(OBJDIR)/main.o $(OBJDIR)/broken-one.o $(OBJDIR)/broken-two.o
|
||||
|
||||
build_all_in_one: $(SRCDIR)/main.c $(SRCDIR)/clean-one.c $(SRCDIR)/clean-two.c $(SRCDIR)/emit-one.c $(SRCDIR)/emit-two.c
|
||||
$(CC) $(CFLAGS) $(LDFLAGS) -o $(PROGRAM) $(SRCDIR)/main.c $(SRCDIR)/clean-one.c $(SRCDIR)/clean-two.c $(SRCDIR)/emit-one.c $(SRCDIR)/emit-two.c
|
||||
|
||||
clean:
|
||||
rm -f $(PROGRAM) $(OBJDIR)/*.o
|
||||
@@ -1,43 +0,0 @@
|
||||
[
|
||||
{
|
||||
"directory": "${path}",
|
||||
"command": "g++ -c -o main.o main.c -Wall -DDEBUG -Dvariable=value",
|
||||
"file": "${path}/main.c"
|
||||
}
|
||||
,
|
||||
{
|
||||
"directory": "${path}",
|
||||
"command": "cc -c -o broken-one.o broken-one.c -Wall -DDEBUG \"-Dvariable=value with space\"",
|
||||
"file": "${path}/broken-one.c"
|
||||
}
|
||||
,
|
||||
{
|
||||
"directory": "${path}",
|
||||
"command": "g++ -c -o broken-two.o broken-two.c -Wall -DDEBUG -Dvariable=value",
|
||||
"file": "${path}/broken-two.c"
|
||||
}
|
||||
,
|
||||
{
|
||||
"directory": "${path}",
|
||||
"command": "cc -c -o clean-one.o clean-one.c -Wall -DDEBUG \"-Dvariable=value with space\" -Iinclude",
|
||||
"file": "${path}/clean-one.c"
|
||||
}
|
||||
,
|
||||
{
|
||||
"directory": "${path}",
|
||||
"command": "g++ -c -o clean-two.o clean-two.c -Wall -DDEBUG -Dvariable=value -I ./include",
|
||||
"file": "${path}/clean-two.c"
|
||||
}
|
||||
,
|
||||
{
|
||||
"directory": "${path}",
|
||||
"command": "cc -c -o emit-one.o emit-one.c -Wall -DDEBUG \"-Dvariable=value with space\"",
|
||||
"file": "${path}/emit-one.c"
|
||||
}
|
||||
,
|
||||
{
|
||||
"directory": "${path}",
|
||||
"command": "g++ -c -o emit-two.o emit-two.c -Wall -DDEBUG -Dvariable=value",
|
||||
"file": "${path}/emit-two.c"
|
||||
}
|
||||
]
|
||||
@@ -1,31 +0,0 @@
|
||||
[
|
||||
{
|
||||
"directory": "${path}",
|
||||
"command": "g++ -c -o main.o main.c -Wall -DDEBUG -Dvariable=value",
|
||||
"file": "${path}/main.c"
|
||||
}
|
||||
,
|
||||
{
|
||||
"directory": "${path}",
|
||||
"command": "cc -c -o clean-one.o clean-one.c -Wall -DDEBUG \"-Dvariable=value with space\" -Iinclude",
|
||||
"file": "${path}/clean-one.c"
|
||||
}
|
||||
,
|
||||
{
|
||||
"directory": "${path}",
|
||||
"command": "g++ -c -o clean-two.o clean-two.c -Wall -DDEBUG -Dvariable=value -I ./include",
|
||||
"file": "${path}/clean-two.c"
|
||||
}
|
||||
,
|
||||
{
|
||||
"directory": "${path}",
|
||||
"command": "cc -c -o emit-one.o emit-one.c -Wall -DDEBUG \"-Dvariable=value with space\"",
|
||||
"file": "${path}/emit-one.c"
|
||||
}
|
||||
,
|
||||
{
|
||||
"directory": "${path}",
|
||||
"command": "g++ -c -o emit-two.o emit-two.c -Wall -DDEBUG -Dvariable=value",
|
||||
"file": "${path}/emit-two.c"
|
||||
}
|
||||
]
|
||||
43
tests/lit.cfg
Normal file
43
tests/lit.cfg
Normal file
@@ -0,0 +1,43 @@
|
||||
# -*- coding: utf-8 -*-
|
||||
# The LLVM Compiler Infrastructure
|
||||
#
|
||||
# This file is distributed under the University of Illinois Open Source
|
||||
# License. See LICENSE.TXT for details.
|
||||
|
||||
import sys
|
||||
import os
|
||||
import os.path
|
||||
import subprocess
|
||||
import lit.util
|
||||
|
||||
this_dir = os.path.dirname(__file__)
|
||||
project_dir = os.path.dirname(this_dir)
|
||||
bin_dir = os.path.join(project_dir, 'bin')
|
||||
|
||||
config.name = 'scan-build'
|
||||
|
||||
config.test_format = lit.formats.ShTest()
|
||||
config.test_exec_root = this_dir
|
||||
config.test_source_root = this_dir
|
||||
|
||||
config.suffixes = ['.sh', '.py']
|
||||
config.excludes = ['Input']
|
||||
|
||||
config.substitutions.append(('%{python}', sys.executable))
|
||||
|
||||
config.environment['PATH'] = ':'.join([bin_dir, os.environ['PATH']])
|
||||
|
||||
|
||||
# check pep8 util is available
|
||||
try:
|
||||
subprocess.call(['pep8', '--version'], stdout=subprocess.PIPE)
|
||||
except:
|
||||
pass
|
||||
else:
|
||||
config.available_features.add('pep8')
|
||||
|
||||
# check for library preload is available
|
||||
sys.path.append(project_dir)
|
||||
from libscanbuild.intercept import is_preload_disabled
|
||||
if not is_preload_disabled(sys.platform):
|
||||
config.available_features.add('preload')
|
||||
5
tests/run_pep8.sh
Normal file
5
tests/run_pep8.sh
Normal file
@@ -0,0 +1,5 @@
|
||||
# REQUIRES: pep8
|
||||
# RUN: pep8 --show-source --show-pep8 .
|
||||
# RUN: pep8 --show-source --show-pep8 ../bin
|
||||
# RUN: pep8 --show-source --show-pep8 ../libscanbuild
|
||||
# RUN: pep8 --show-source --show-pep8 ../libear
|
||||
@@ -1,26 +0,0 @@
|
||||
# -*- coding: utf-8 -*-
|
||||
# The LLVM Compiler Infrastructure
|
||||
#
|
||||
# This file is distributed under the University of Illinois Open Source
|
||||
# License. See LICENSE.TXT for details.
|
||||
|
||||
from . import test_libear
|
||||
from . import test_compilation
|
||||
from . import test_clang
|
||||
from . import test_runner
|
||||
from . import test_report
|
||||
from . import test_analyze
|
||||
from . import test_intercept
|
||||
from . import test_shell
|
||||
|
||||
|
||||
def load_tests(loader, suite, _):
|
||||
suite.addTests(loader.loadTestsFromModule(test_libear))
|
||||
suite.addTests(loader.loadTestsFromModule(test_compilation))
|
||||
suite.addTests(loader.loadTestsFromModule(test_clang))
|
||||
suite.addTests(loader.loadTestsFromModule(test_runner))
|
||||
suite.addTests(loader.loadTestsFromModule(test_report))
|
||||
suite.addTests(loader.loadTestsFromModule(test_analyze))
|
||||
suite.addTests(loader.loadTestsFromModule(test_intercept))
|
||||
suite.addTests(loader.loadTestsFromModule(test_shell))
|
||||
return suite
|
||||
16
tests/unit/lit.local.cfg
Normal file
16
tests/unit/lit.local.cfg
Normal file
@@ -0,0 +1,16 @@
|
||||
# -*- coding: utf-8 -*-
|
||||
# The LLVM Compiler Infrastructure
|
||||
#
|
||||
# This file is distributed under the University of Illinois Open Source
|
||||
# License. See LICENSE.TXT for details.
|
||||
|
||||
import os.path
|
||||
import lit.util
|
||||
|
||||
# test_source_root: The root path where tests are located.
|
||||
this_dir = os.path.dirname(__file__)
|
||||
parent_dir = os.path.dirname(this_dir)
|
||||
project_dir = os.path.dirname(parent_dir)
|
||||
|
||||
|
||||
config.environment['PYTHONPATH'] = project_dir
|
||||
@@ -1,7 +0,0 @@
|
||||
# -*- coding: utf-8 -*-
|
||||
# The LLVM Compiler Infrastructure
|
||||
#
|
||||
# This file is distributed under the University of Illinois Open Source
|
||||
# License. See LICENSE.TXT for details.
|
||||
|
||||
import libscanbuild.analyze as sut
|
||||
@@ -3,6 +3,8 @@
|
||||
#
|
||||
# This file is distributed under the University of Illinois Open Source
|
||||
# License. See LICENSE.TXT for details.
|
||||
#
|
||||
# RUN: %{python} %s
|
||||
|
||||
import libear
|
||||
import libscanbuild.clang as sut
|
||||
@@ -92,3 +94,7 @@ class ClangGetCheckersTest(unittest.TestCase):
|
||||
self.assertEqual('Checker One description', result.get('checker.one'))
|
||||
self.assertTrue('checker.two' in result)
|
||||
self.assertEqual('Checker Two description', result.get('checker.two'))
|
||||
|
||||
|
||||
if __name__ == '__main__':
|
||||
unittest.main()
|
||||
|
||||
@@ -3,6 +3,8 @@
|
||||
#
|
||||
# This file is distributed under the University of Illinois Open Source
|
||||
# License. See LICENSE.TXT for details.
|
||||
#
|
||||
# RUN: %{python} %s
|
||||
|
||||
import libscanbuild.compilation as sut
|
||||
import unittest
|
||||
@@ -158,3 +160,7 @@ class SourceClassifierTest(unittest.TestCase):
|
||||
self.assertEqual('c++', sut.classify_source('file.c', False))
|
||||
self.assertEqual('c++', sut.classify_source('./file.c', False))
|
||||
self.assertEqual('c++', sut.classify_source('/path/file.c', False))
|
||||
|
||||
|
||||
if __name__ == '__main__':
|
||||
unittest.main()
|
||||
|
||||
@@ -3,6 +3,8 @@
|
||||
#
|
||||
# This file is distributed under the University of Illinois Open Source
|
||||
# License. See LICENSE.TXT for details.
|
||||
#
|
||||
# RUN: %{python} %s
|
||||
|
||||
import libear
|
||||
import libscanbuild.intercept as sut
|
||||
@@ -109,3 +111,7 @@ class InterceptUtilTest(unittest.TestCase):
|
||||
self.assertFalse(sut.is_preload_disabled('unix'))
|
||||
finally:
|
||||
os.environ['PATH'] = saved
|
||||
|
||||
|
||||
if __name__ == '__main__':
|
||||
unittest.main()
|
||||
|
||||
@@ -3,6 +3,8 @@
|
||||
#
|
||||
# This file is distributed under the University of Illinois Open Source
|
||||
# License. See LICENSE.TXT for details.
|
||||
#
|
||||
# RUN: %{python} %s
|
||||
|
||||
import libear as sut
|
||||
import unittest
|
||||
@@ -28,3 +30,7 @@ class TemporaryDirectoryTest(unittest.TestCase):
|
||||
except:
|
||||
self.assertIsNotNone(dir_name)
|
||||
self.assertFalse(os.path.exists(dir_name))
|
||||
|
||||
|
||||
if __name__ == '__main__':
|
||||
unittest.main()
|
||||
|
||||
@@ -3,6 +3,8 @@
|
||||
#
|
||||
# This file is distributed under the University of Illinois Open Source
|
||||
# License. See LICENSE.TXT for details.
|
||||
#
|
||||
# RUN: %{python} %s
|
||||
|
||||
import libear
|
||||
import libscanbuild.report as sut
|
||||
@@ -160,3 +162,7 @@ class ReportDirectoryTest(unittest.TestCase):
|
||||
sut.report_directory(tmp_dir, False) as report_dir3:
|
||||
self.assertLess(report_dir1, report_dir2)
|
||||
self.assertLess(report_dir2, report_dir3)
|
||||
|
||||
|
||||
if __name__ == '__main__':
|
||||
unittest.main()
|
||||
|
||||
@@ -3,6 +3,8 @@
|
||||
#
|
||||
# This file is distributed under the University of Illinois Open Source
|
||||
# License. See LICENSE.TXT for details.
|
||||
#
|
||||
# RUN: %{python} %s
|
||||
|
||||
import libear
|
||||
import libscanbuild.runner as sut
|
||||
|
||||
@@ -3,6 +3,8 @@
|
||||
#
|
||||
# This file is distributed under the University of Illinois Open Source
|
||||
# License. See LICENSE.TXT for details.
|
||||
#
|
||||
# RUN: %{python} %s
|
||||
|
||||
import libscanbuild.shell as sut
|
||||
import unittest
|
||||
|
||||
Reference in New Issue
Block a user