coverage_test.go 4.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114
  1. // Copyright 2020 The Android Open Source Project
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package rust
  15. import (
  16. "strings"
  17. "testing"
  18. "android/soong/android"
  19. )
  20. // Test that coverage flags are being correctly generated.
  21. func TestCoverageFlags(t *testing.T) {
  22. ctx := testRustCov(t, `
  23. rust_library {
  24. name: "libfoo_cov",
  25. srcs: ["foo.rs"],
  26. crate_name: "foo",
  27. }
  28. rust_binary {
  29. name: "fizz_cov",
  30. srcs: ["foo.rs"],
  31. }
  32. rust_binary {
  33. name: "buzzNoCov",
  34. srcs: ["foo.rs"],
  35. native_coverage: false,
  36. }
  37. rust_library {
  38. name: "libbar_nocov",
  39. srcs: ["foo.rs"],
  40. crate_name: "bar",
  41. native_coverage: false,
  42. }`)
  43. // Make sure native_coverage: false isn't creating a coverage variant.
  44. if android.InList("android_arm64_armv8-a_dylib_cov", ctx.ModuleVariantsForTests("libbar_nocov")) {
  45. t.Fatalf("coverage variant created for module 'libbar_nocov' with native coverage disabled")
  46. }
  47. // Just test the dylib variants unless the library coverage logic changes to distinguish between the types.
  48. libfooCov := ctx.ModuleForTests("libfoo_cov", "android_arm64_armv8-a_dylib_cov").Rule("rustc")
  49. libbarNoCov := ctx.ModuleForTests("libbar_nocov", "android_arm64_armv8-a_dylib").Rule("rustc")
  50. fizzCov := ctx.ModuleForTests("fizz_cov", "android_arm64_armv8-a_cov").Rule("rustc")
  51. buzzNoCov := ctx.ModuleForTests("buzzNoCov", "android_arm64_armv8-a").Rule("rustc")
  52. libfooCovLink := ctx.ModuleForTests("libfoo_cov", "android_arm64_armv8-a_dylib_cov").Rule("rustLink")
  53. libbarNoCovLink := ctx.ModuleForTests("libbar_nocov", "android_arm64_armv8-a_dylib").Rule("rustLink")
  54. fizzCovLink := ctx.ModuleForTests("fizz_cov", "android_arm64_armv8-a_cov").Rule("rustLink")
  55. buzzNoCovLink := ctx.ModuleForTests("buzzNoCov", "android_arm64_armv8-a").Rule("rustLink")
  56. rustcCoverageFlags := []string{"-C instrument-coverage", " -g "}
  57. for _, flag := range rustcCoverageFlags {
  58. missingErrorStr := "missing rustc flag '%s' for '%s' module with coverage enabled; rustcFlags: %#v"
  59. containsErrorStr := "contains rustc flag '%s' for '%s' module with coverage disabled; rustcFlags: %#v"
  60. if !strings.Contains(fizzCov.Args["rustcFlags"], flag) {
  61. t.Fatalf(missingErrorStr, flag, "fizz_cov", fizzCov.Args["rustcFlags"])
  62. }
  63. if !strings.Contains(libfooCov.Args["rustcFlags"], flag) {
  64. t.Fatalf(missingErrorStr, flag, "libfoo_cov dylib", libfooCov.Args["rustcFlags"])
  65. }
  66. if strings.Contains(buzzNoCov.Args["rustcFlags"], flag) {
  67. t.Fatalf(containsErrorStr, flag, "buzzNoCov", buzzNoCov.Args["rustcFlags"])
  68. }
  69. if strings.Contains(libbarNoCov.Args["rustcFlags"], flag) {
  70. t.Fatalf(containsErrorStr, flag, "libbar_cov", libbarNoCov.Args["rustcFlags"])
  71. }
  72. }
  73. linkCoverageFlags := []string{"-fprofile-instr-generate=/data/misc/trace/clang-%p-%m.profraw", " -g "}
  74. for _, flag := range linkCoverageFlags {
  75. missingErrorStr := "missing rust linker flag '%s' for '%s' module with coverage enabled; rustcFlags: %#v"
  76. containsErrorStr := "contains rust linker flag '%s' for '%s' module with coverage disabled; rustcFlags: %#v"
  77. if !strings.Contains(fizzCovLink.Args["linkFlags"], flag) {
  78. t.Fatalf(missingErrorStr, flag, "fizz_cov", fizzCovLink.Args["linkFlags"])
  79. }
  80. if !strings.Contains(libfooCovLink.Args["linkFlags"], flag) {
  81. t.Fatalf(missingErrorStr, flag, "libfoo_cov dylib", libfooCovLink.Args["linkFlags"])
  82. }
  83. if strings.Contains(buzzNoCovLink.Args["linkFlags"], flag) {
  84. t.Fatalf(containsErrorStr, flag, "buzzNoCov", buzzNoCovLink.Args["linkFlags"])
  85. }
  86. if strings.Contains(libbarNoCovLink.Args["linkFlags"], flag) {
  87. t.Fatalf(containsErrorStr, flag, "libbar_cov", libbarNoCovLink.Args["linkFlags"])
  88. }
  89. }
  90. }
  91. func TestCoverageDeps(t *testing.T) {
  92. ctx := testRustCov(t, `
  93. rust_binary {
  94. name: "fizz",
  95. srcs: ["foo.rs"],
  96. }`)
  97. fizz := ctx.ModuleForTests("fizz", "android_arm64_armv8-a_cov").Rule("rustLink")
  98. if !strings.Contains(fizz.Args["linkFlags"], "libprofile-clang-extras.a") {
  99. t.Fatalf("missing expected coverage 'libprofile-clang-extras' dependency in linkFlags: %#v", fizz.Args["linkFlags"])
  100. }
  101. }