1// Copyright 2019 The Android Open Source Project
2//
3// Licensed under the Apache License, Version 2.0 (the "License");
4// you may not use this file except in compliance with the License.
5// You may obtain a copy of the License at
6//
7//     http://www.apache.org/licenses/LICENSE-2.0
8//
9// Unless required by applicable law or agreed to in writing, software
10// distributed under the License is distributed on an "AS IS" BASIS,
11// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12// See the License for the specific language governing permissions and
13// limitations under the License.
14
15package rust
16
17import (
18	"path/filepath"
19
20	"android/soong/android"
21	"android/soong/cc"
22)
23
24type AndroidMkContext interface {
25	Name() string
26	Target() android.Target
27	SubAndroidMk(*android.AndroidMkEntries, interface{})
28}
29
30type SubAndroidMkProvider interface {
31	AndroidMk(AndroidMkContext, *android.AndroidMkEntries)
32}
33
34func (mod *Module) SubAndroidMk(data *android.AndroidMkEntries, obj interface{}) {
35	if mod.subAndroidMkOnce == nil {
36		mod.subAndroidMkOnce = make(map[SubAndroidMkProvider]bool)
37	}
38	if androidmk, ok := obj.(SubAndroidMkProvider); ok {
39		if !mod.subAndroidMkOnce[androidmk] {
40			mod.subAndroidMkOnce[androidmk] = true
41			androidmk.AndroidMk(mod, data)
42		}
43	}
44}
45
46func (mod *Module) AndroidMkEntries() []android.AndroidMkEntries {
47	if mod.Properties.HideFromMake || mod.hideApexVariantFromMake {
48
49		return []android.AndroidMkEntries{android.AndroidMkEntries{Disabled: true}}
50	}
51
52	ret := android.AndroidMkEntries{
53		OutputFile: mod.unstrippedOutputFile,
54		Include:    "$(BUILD_SYSTEM)/soong_rust_prebuilt.mk",
55		ExtraEntries: []android.AndroidMkExtraEntriesFunc{
56			func(ctx android.AndroidMkExtraEntriesContext, entries *android.AndroidMkEntries) {
57				entries.AddStrings("LOCAL_RLIB_LIBRARIES", mod.Properties.AndroidMkRlibs...)
58				entries.AddStrings("LOCAL_DYLIB_LIBRARIES", mod.Properties.AndroidMkDylibs...)
59				entries.AddStrings("LOCAL_PROC_MACRO_LIBRARIES", mod.Properties.AndroidMkProcMacroLibs...)
60				entries.AddStrings("LOCAL_SHARED_LIBRARIES", mod.Properties.AndroidMkSharedLibs...)
61				entries.AddStrings("LOCAL_STATIC_LIBRARIES", mod.Properties.AndroidMkStaticLibs...)
62				entries.AddStrings("LOCAL_SOONG_LINK_TYPE", mod.makeLinkType)
63				if mod.UseVndk() {
64					entries.SetBool("LOCAL_USE_VNDK", true)
65				}
66
67			},
68		},
69	}
70
71	if mod.compiler != nil && !mod.compiler.Disabled() {
72		mod.SubAndroidMk(&ret, mod.compiler)
73	} else if mod.sourceProvider != nil {
74		// If the compiler is disabled, this is a SourceProvider.
75		mod.SubAndroidMk(&ret, mod.sourceProvider)
76	}
77
78	if mod.sanitize != nil {
79		mod.SubAndroidMk(&ret, mod.sanitize)
80	}
81
82	ret.SubName += mod.Properties.RustSubName
83	ret.SubName += mod.Properties.SubName
84
85	return []android.AndroidMkEntries{ret}
86}
87
88func (binary *binaryDecorator) AndroidMk(ctx AndroidMkContext, ret *android.AndroidMkEntries) {
89	ctx.SubAndroidMk(ret, binary.baseCompiler)
90
91	if binary.distFile.Valid() {
92		ret.DistFiles = android.MakeDefaultDistFiles(binary.distFile.Path())
93	}
94	ret.Class = "EXECUTABLES"
95}
96
97func (test *testDecorator) AndroidMk(ctx AndroidMkContext, ret *android.AndroidMkEntries) {
98	ctx.SubAndroidMk(ret, test.binaryDecorator)
99
100	ret.Class = "NATIVE_TESTS"
101	ret.ExtraEntries = append(ret.ExtraEntries,
102		func(ctx android.AndroidMkExtraEntriesContext, entries *android.AndroidMkEntries) {
103			entries.AddCompatibilityTestSuites(test.Properties.Test_suites...)
104			if test.testConfig != nil {
105				entries.SetString("LOCAL_FULL_TEST_CONFIG", test.testConfig.String())
106			}
107			entries.SetBoolIfTrue("LOCAL_DISABLE_AUTO_GENERATE_TEST_CONFIG", !BoolDefault(test.Properties.Auto_gen_config, true))
108			entries.SetBoolIfTrue("LOCAL_IS_UNIT_TEST", Bool(test.Properties.Test_options.Unit_test))
109		})
110
111	cc.AndroidMkWriteTestData(test.data, ret)
112}
113
114func (benchmark *benchmarkDecorator) AndroidMk(ctx AndroidMkContext, ret *android.AndroidMkEntries) {
115	benchmark.binaryDecorator.AndroidMk(ctx, ret)
116	ret.Class = "NATIVE_TESTS"
117	ret.ExtraEntries = append(ret.ExtraEntries,
118		func(ctx android.AndroidMkExtraEntriesContext, entries *android.AndroidMkEntries) {
119			entries.AddCompatibilityTestSuites(benchmark.Properties.Test_suites...)
120			if benchmark.testConfig != nil {
121				entries.SetString("LOCAL_FULL_TEST_CONFIG", benchmark.testConfig.String())
122			}
123			entries.SetBool("LOCAL_NATIVE_BENCHMARK", true)
124			entries.SetBoolIfTrue("LOCAL_DISABLE_AUTO_GENERATE_TEST_CONFIG", !BoolDefault(benchmark.Properties.Auto_gen_config, true))
125		})
126}
127
128func (library *libraryDecorator) AndroidMk(ctx AndroidMkContext, ret *android.AndroidMkEntries) {
129	ctx.SubAndroidMk(ret, library.baseCompiler)
130
131	if library.rlib() {
132		ret.Class = "RLIB_LIBRARIES"
133	} else if library.dylib() {
134		ret.Class = "DYLIB_LIBRARIES"
135	} else if library.static() {
136		ret.Class = "STATIC_LIBRARIES"
137	} else if library.shared() {
138		ret.Class = "SHARED_LIBRARIES"
139	}
140
141	if library.distFile.Valid() {
142		ret.DistFiles = android.MakeDefaultDistFiles(library.distFile.Path())
143	}
144}
145
146func (procMacro *procMacroDecorator) AndroidMk(ctx AndroidMkContext, ret *android.AndroidMkEntries) {
147	ctx.SubAndroidMk(ret, procMacro.baseCompiler)
148
149	ret.Class = "PROC_MACRO_LIBRARIES"
150	if procMacro.distFile.Valid() {
151		ret.DistFiles = android.MakeDefaultDistFiles(procMacro.distFile.Path())
152	}
153
154}
155
156func (sourceProvider *BaseSourceProvider) AndroidMk(ctx AndroidMkContext, ret *android.AndroidMkEntries) {
157	outFile := sourceProvider.OutputFiles[0]
158	ret.Class = "ETC"
159	ret.OutputFile = android.OptionalPathForPath(outFile)
160	ret.SubName += sourceProvider.subName
161	ret.ExtraEntries = append(ret.ExtraEntries,
162		func(ctx android.AndroidMkExtraEntriesContext, entries *android.AndroidMkEntries) {
163			_, file := filepath.Split(outFile.String())
164			stem, suffix, _ := android.SplitFileExt(file)
165			entries.SetString("LOCAL_MODULE_SUFFIX", suffix)
166			entries.SetString("LOCAL_MODULE_STEM", stem)
167			entries.SetBool("LOCAL_UNINSTALLABLE_MODULE", true)
168		})
169}
170
171func (bindgen *bindgenDecorator) AndroidMk(ctx AndroidMkContext, ret *android.AndroidMkEntries) {
172	ctx.SubAndroidMk(ret, bindgen.BaseSourceProvider)
173}
174
175func (proto *protobufDecorator) AndroidMk(ctx AndroidMkContext, ret *android.AndroidMkEntries) {
176	ctx.SubAndroidMk(ret, proto.BaseSourceProvider)
177}
178
179func (compiler *baseCompiler) AndroidMk(ctx AndroidMkContext, ret *android.AndroidMkEntries) {
180	if compiler.path == (android.InstallPath{}) {
181		return
182	}
183
184	var unstrippedOutputFile android.OptionalPath
185	// Soong installation is only supported for host modules. Have Make
186	// installation trigger Soong installation.
187	if ctx.Target().Os.Class == android.Host {
188		ret.OutputFile = android.OptionalPathForPath(compiler.path)
189	} else if compiler.strippedOutputFile.Valid() {
190		unstrippedOutputFile = ret.OutputFile
191		ret.OutputFile = compiler.strippedOutputFile
192	}
193	ret.ExtraEntries = append(ret.ExtraEntries,
194		func(ctx android.AndroidMkExtraEntriesContext, entries *android.AndroidMkEntries) {
195			entries.SetOptionalPath("LOCAL_SOONG_UNSTRIPPED_BINARY", unstrippedOutputFile)
196			path, file := filepath.Split(compiler.path.ToMakePath().String())
197			stem, suffix, _ := android.SplitFileExt(file)
198			entries.SetString("LOCAL_MODULE_SUFFIX", suffix)
199			entries.SetString("LOCAL_MODULE_PATH", path)
200			entries.SetString("LOCAL_MODULE_STEM", stem)
201		})
202}
203
204func (fuzz *fuzzDecorator) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
205	ctx.SubAndroidMk(entries, fuzz.binaryDecorator)
206
207	var fuzzFiles []string
208	for _, d := range fuzz.corpus {
209		fuzzFiles = append(fuzzFiles,
210			filepath.Dir(fuzz.corpusIntermediateDir.String())+":corpus/"+d.Base())
211	}
212
213	for _, d := range fuzz.data {
214		fuzzFiles = append(fuzzFiles,
215			filepath.Dir(fuzz.dataIntermediateDir.String())+":data/"+d.Rel())
216	}
217
218	if fuzz.dictionary != nil {
219		fuzzFiles = append(fuzzFiles,
220			filepath.Dir(fuzz.dictionary.String())+":"+fuzz.dictionary.Base())
221	}
222
223	if fuzz.config != nil {
224		fuzzFiles = append(fuzzFiles,
225			filepath.Dir(fuzz.config.String())+":config.json")
226	}
227
228	entries.ExtraEntries = append(entries.ExtraEntries, func(ctx android.AndroidMkExtraEntriesContext,
229		entries *android.AndroidMkEntries) {
230		entries.SetBool("LOCAL_IS_FUZZ_TARGET", true)
231		if len(fuzzFiles) > 0 {
232			entries.AddStrings("LOCAL_TEST_DATA", fuzzFiles...)
233		}
234	})
235}
236