1// Copyright 2019 The Android Open Source Project 2// 3// Licensed under the Apache License, Version 2.0 (the "License"); 4// you may not use this file except in compliance with the License. 5// You may obtain a copy of the License at 6// 7// http://www.apache.org/licenses/LICENSE-2.0 8// 9// Unless required by applicable law or agreed to in writing, software 10// distributed under the License is distributed on an "AS IS" BASIS, 11// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 12// See the License for the specific language governing permissions and 13// limitations under the License. 14 15package rust 16 17import ( 18 "path/filepath" 19 20 "android/soong/android" 21 "android/soong/cc" 22) 23 24type AndroidMkContext interface { 25 Name() string 26 Target() android.Target 27 SubAndroidMk(*android.AndroidMkEntries, interface{}) 28} 29 30type SubAndroidMkProvider interface { 31 AndroidMk(AndroidMkContext, *android.AndroidMkEntries) 32} 33 34func (mod *Module) SubAndroidMk(data *android.AndroidMkEntries, obj interface{}) { 35 if mod.subAndroidMkOnce == nil { 36 mod.subAndroidMkOnce = make(map[SubAndroidMkProvider]bool) 37 } 38 if androidmk, ok := obj.(SubAndroidMkProvider); ok { 39 if !mod.subAndroidMkOnce[androidmk] { 40 mod.subAndroidMkOnce[androidmk] = true 41 androidmk.AndroidMk(mod, data) 42 } 43 } 44} 45 46func (mod *Module) AndroidMkEntries() []android.AndroidMkEntries { 47 if mod.Properties.HideFromMake || mod.hideApexVariantFromMake { 48 49 return []android.AndroidMkEntries{android.AndroidMkEntries{Disabled: true}} 50 } 51 52 ret := android.AndroidMkEntries{ 53 OutputFile: mod.unstrippedOutputFile, 54 Include: "$(BUILD_SYSTEM)/soong_rust_prebuilt.mk", 55 ExtraEntries: []android.AndroidMkExtraEntriesFunc{ 56 func(ctx android.AndroidMkExtraEntriesContext, entries *android.AndroidMkEntries) { 57 entries.AddStrings("LOCAL_RLIB_LIBRARIES", mod.Properties.AndroidMkRlibs...) 58 entries.AddStrings("LOCAL_DYLIB_LIBRARIES", mod.Properties.AndroidMkDylibs...) 59 entries.AddStrings("LOCAL_PROC_MACRO_LIBRARIES", mod.Properties.AndroidMkProcMacroLibs...) 60 entries.AddStrings("LOCAL_SHARED_LIBRARIES", mod.Properties.AndroidMkSharedLibs...) 61 entries.AddStrings("LOCAL_STATIC_LIBRARIES", mod.Properties.AndroidMkStaticLibs...) 62 entries.AddStrings("LOCAL_SOONG_LINK_TYPE", mod.makeLinkType) 63 if mod.UseVndk() { 64 entries.SetBool("LOCAL_USE_VNDK", true) 65 } 66 67 }, 68 }, 69 } 70 71 if mod.compiler != nil && !mod.compiler.Disabled() { 72 mod.SubAndroidMk(&ret, mod.compiler) 73 } else if mod.sourceProvider != nil { 74 // If the compiler is disabled, this is a SourceProvider. 75 mod.SubAndroidMk(&ret, mod.sourceProvider) 76 } 77 78 if mod.sanitize != nil { 79 mod.SubAndroidMk(&ret, mod.sanitize) 80 } 81 82 ret.SubName += mod.Properties.RustSubName 83 ret.SubName += mod.Properties.SubName 84 85 return []android.AndroidMkEntries{ret} 86} 87 88func (binary *binaryDecorator) AndroidMk(ctx AndroidMkContext, ret *android.AndroidMkEntries) { 89 ctx.SubAndroidMk(ret, binary.baseCompiler) 90 91 if binary.distFile.Valid() { 92 ret.DistFiles = android.MakeDefaultDistFiles(binary.distFile.Path()) 93 } 94 ret.Class = "EXECUTABLES" 95} 96 97func (test *testDecorator) AndroidMk(ctx AndroidMkContext, ret *android.AndroidMkEntries) { 98 ctx.SubAndroidMk(ret, test.binaryDecorator) 99 100 ret.Class = "NATIVE_TESTS" 101 ret.ExtraEntries = append(ret.ExtraEntries, 102 func(ctx android.AndroidMkExtraEntriesContext, entries *android.AndroidMkEntries) { 103 entries.AddCompatibilityTestSuites(test.Properties.Test_suites...) 104 if test.testConfig != nil { 105 entries.SetString("LOCAL_FULL_TEST_CONFIG", test.testConfig.String()) 106 } 107 entries.SetBoolIfTrue("LOCAL_DISABLE_AUTO_GENERATE_TEST_CONFIG", !BoolDefault(test.Properties.Auto_gen_config, true)) 108 entries.SetBoolIfTrue("LOCAL_IS_UNIT_TEST", Bool(test.Properties.Test_options.Unit_test)) 109 }) 110 111 cc.AndroidMkWriteTestData(test.data, ret) 112} 113 114func (benchmark *benchmarkDecorator) AndroidMk(ctx AndroidMkContext, ret *android.AndroidMkEntries) { 115 benchmark.binaryDecorator.AndroidMk(ctx, ret) 116 ret.Class = "NATIVE_TESTS" 117 ret.ExtraEntries = append(ret.ExtraEntries, 118 func(ctx android.AndroidMkExtraEntriesContext, entries *android.AndroidMkEntries) { 119 entries.AddCompatibilityTestSuites(benchmark.Properties.Test_suites...) 120 if benchmark.testConfig != nil { 121 entries.SetString("LOCAL_FULL_TEST_CONFIG", benchmark.testConfig.String()) 122 } 123 entries.SetBool("LOCAL_NATIVE_BENCHMARK", true) 124 entries.SetBoolIfTrue("LOCAL_DISABLE_AUTO_GENERATE_TEST_CONFIG", !BoolDefault(benchmark.Properties.Auto_gen_config, true)) 125 }) 126} 127 128func (library *libraryDecorator) AndroidMk(ctx AndroidMkContext, ret *android.AndroidMkEntries) { 129 ctx.SubAndroidMk(ret, library.baseCompiler) 130 131 if library.rlib() { 132 ret.Class = "RLIB_LIBRARIES" 133 } else if library.dylib() { 134 ret.Class = "DYLIB_LIBRARIES" 135 } else if library.static() { 136 ret.Class = "STATIC_LIBRARIES" 137 } else if library.shared() { 138 ret.Class = "SHARED_LIBRARIES" 139 } 140 141 if library.distFile.Valid() { 142 ret.DistFiles = android.MakeDefaultDistFiles(library.distFile.Path()) 143 } 144} 145 146func (procMacro *procMacroDecorator) AndroidMk(ctx AndroidMkContext, ret *android.AndroidMkEntries) { 147 ctx.SubAndroidMk(ret, procMacro.baseCompiler) 148 149 ret.Class = "PROC_MACRO_LIBRARIES" 150 if procMacro.distFile.Valid() { 151 ret.DistFiles = android.MakeDefaultDistFiles(procMacro.distFile.Path()) 152 } 153 154} 155 156func (sourceProvider *BaseSourceProvider) AndroidMk(ctx AndroidMkContext, ret *android.AndroidMkEntries) { 157 outFile := sourceProvider.OutputFiles[0] 158 ret.Class = "ETC" 159 ret.OutputFile = android.OptionalPathForPath(outFile) 160 ret.SubName += sourceProvider.subName 161 ret.ExtraEntries = append(ret.ExtraEntries, 162 func(ctx android.AndroidMkExtraEntriesContext, entries *android.AndroidMkEntries) { 163 _, file := filepath.Split(outFile.String()) 164 stem, suffix, _ := android.SplitFileExt(file) 165 entries.SetString("LOCAL_MODULE_SUFFIX", suffix) 166 entries.SetString("LOCAL_MODULE_STEM", stem) 167 entries.SetBool("LOCAL_UNINSTALLABLE_MODULE", true) 168 }) 169} 170 171func (bindgen *bindgenDecorator) AndroidMk(ctx AndroidMkContext, ret *android.AndroidMkEntries) { 172 ctx.SubAndroidMk(ret, bindgen.BaseSourceProvider) 173} 174 175func (proto *protobufDecorator) AndroidMk(ctx AndroidMkContext, ret *android.AndroidMkEntries) { 176 ctx.SubAndroidMk(ret, proto.BaseSourceProvider) 177} 178 179func (compiler *baseCompiler) AndroidMk(ctx AndroidMkContext, ret *android.AndroidMkEntries) { 180 if compiler.path == (android.InstallPath{}) { 181 return 182 } 183 184 var unstrippedOutputFile android.OptionalPath 185 // Soong installation is only supported for host modules. Have Make 186 // installation trigger Soong installation. 187 if ctx.Target().Os.Class == android.Host { 188 ret.OutputFile = android.OptionalPathForPath(compiler.path) 189 } else if compiler.strippedOutputFile.Valid() { 190 unstrippedOutputFile = ret.OutputFile 191 ret.OutputFile = compiler.strippedOutputFile 192 } 193 ret.ExtraEntries = append(ret.ExtraEntries, 194 func(ctx android.AndroidMkExtraEntriesContext, entries *android.AndroidMkEntries) { 195 entries.SetOptionalPath("LOCAL_SOONG_UNSTRIPPED_BINARY", unstrippedOutputFile) 196 path, file := filepath.Split(compiler.path.ToMakePath().String()) 197 stem, suffix, _ := android.SplitFileExt(file) 198 entries.SetString("LOCAL_MODULE_SUFFIX", suffix) 199 entries.SetString("LOCAL_MODULE_PATH", path) 200 entries.SetString("LOCAL_MODULE_STEM", stem) 201 }) 202} 203 204func (fuzz *fuzzDecorator) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) { 205 ctx.SubAndroidMk(entries, fuzz.binaryDecorator) 206 207 var fuzzFiles []string 208 for _, d := range fuzz.corpus { 209 fuzzFiles = append(fuzzFiles, 210 filepath.Dir(fuzz.corpusIntermediateDir.String())+":corpus/"+d.Base()) 211 } 212 213 for _, d := range fuzz.data { 214 fuzzFiles = append(fuzzFiles, 215 filepath.Dir(fuzz.dataIntermediateDir.String())+":data/"+d.Rel()) 216 } 217 218 if fuzz.dictionary != nil { 219 fuzzFiles = append(fuzzFiles, 220 filepath.Dir(fuzz.dictionary.String())+":"+fuzz.dictionary.Base()) 221 } 222 223 if fuzz.config != nil { 224 fuzzFiles = append(fuzzFiles, 225 filepath.Dir(fuzz.config.String())+":config.json") 226 } 227 228 entries.ExtraEntries = append(entries.ExtraEntries, func(ctx android.AndroidMkExtraEntriesContext, 229 entries *android.AndroidMkEntries) { 230 entries.SetBool("LOCAL_IS_FUZZ_TARGET", true) 231 if len(fuzzFiles) > 0 { 232 entries.AddStrings("LOCAL_TEST_DATA", fuzzFiles...) 233 } 234 }) 235} 236