| # Copyright 2015 The Chromium Authors |
| # Use of this source code is governed by a BSD-style license that can be |
| # found in the LICENSE file. |
| |
| # ============================================================================== |
| # TEST SETUP |
| # ============================================================================== |
| |
| import("//build/config/chromeos/args.gni") |
| import("//build/config/chromeos/ui_mode.gni") |
| import("//build/config/devtools.gni") |
| import("//build/config/gclient_args.gni") |
| import("//build/config/rts.gni") |
| import("//build/rust/rust_static_library.gni") |
| import("//build_overrides/build.gni") |
| |
| declare_args() { |
| # Some component repos (e.g. ANGLE) import //testing but do not have |
| # "location_tags.json", and so we don't want to try and upload the tags |
| # for their tests. |
| # And, some build configs may simply turn off generation altogether. |
| tests_have_location_tags = generate_location_tags |
| } |
| |
| # On Fuchsia, the test executable has a suffix and is a dependency of the |
| # common |target_name| target. For `visibility`, the executable must be |
| # specified. Cross-platform targets that include `test` targets in their |
| # visibility lists, add `${exec_target_suffix}` immediately after the test |
| # target name. This is not necessary when the target is a `source_set`. |
| if (is_fuchsia) { |
| exec_target_suffix = "__exec" |
| } else { |
| exec_target_suffix = "" |
| } |
| |
| if (is_android) { |
| import("//build/android/test_wrapper/logdog_wrapper.gni") |
| import("//build/config/android/config.gni") |
| import("//build/config/android/create_unwind_table.gni") |
| import("//build/config/android/extract_unwind_tables.gni") |
| import("//build/config/android/rules.gni") |
| import("//build/config/sanitizers/sanitizers.gni") |
| } else if (is_fuchsia) { |
| import("//build/config/fuchsia/generate_runner_scripts.gni") |
| import("//third_party/fuchsia-gn-sdk/src/cmc.gni") |
| import("//third_party/fuchsia-gn-sdk/src/component.gni") |
| import("//third_party/fuchsia-gn-sdk/src/package.gni") |
| } else if (is_chromeos && is_chromeos_device) { |
| import("//build/config/chromeos/rules.gni") |
| import("//build/config/sanitizers/sanitizers.gni") |
| import("//build/util/generate_wrapper.gni") |
| } else if (is_ios) { |
| import("//build/config/ios/ios_sdk.gni") |
| import("//build/config/ios/ios_test_runner_wrapper.gni") |
| import("//build/config/ios/rules.gni") |
| } else { |
| import("//build/config/sanitizers/sanitizers.gni") |
| import("//build/util/generate_wrapper.gni") |
| } |
| |
| # This template represents the core common functionality of a test target |
| # on each platform. It includes: |
| # * the ability to generate a rust library that includes all .rs files found |
| # in sources and depends on that from the test target. |
| # * the ability to recognize any declare fuzztests and build runners for them. |
| template("mixed_test") { |
| assert(defined(invoker.target_type) && invoker.target_type != "") |
| |
| # The crate_root variable would transform the target into a Rust binary |
| # which is incorrect. To not use a generated crate root set: |
| # ``` |
| # test_crate_root = "path/to/root.rs" |
| # ``` |
| assert(!defined(invoker.crate_root)) |
| |
| _rs_vars = [ |
| "sources", # We split this list into two. |
| "crate_name", # Android test template overrides the crate name. |
| ] |
| |
| if (defined(invoker.sources)) { |
| _rs_sources = filter_include(invoker.sources, [ "*.rs" ]) |
| _cc_sources = filter_exclude(invoker.sources, [ "*.rs" ]) |
| } else { |
| _rs_sources = [] |
| _cc_sources = [] |
| } |
| |
| if (_rs_sources != []) { |
| # Note: as a weak convention, __ is usually used before a suffix for |
| # internally-generated targets. However, rust_target requires a strict |
| # snake_case name. |
| if (defined(invoker.crate_name)) { |
| _rust_target_name = "${invoker.crate_name}_rust_objects" |
| } else { |
| _rust_target_name = "${target_name}_rust_objects" |
| } |
| |
| # We could automatically add `deps += [ "//testing/rust_gtest_interop" ]` |
| # if `rs_sources` is non-empty. But we don't automatically provide |
| # //testing/gtest either so it would be asymmetric and could break in that |
| # case. So, we act instead as if //testing/rust_gtest_interop is part of |
| # the //testing/gtest dependency. If you add one, and have `rs_sources` |
| # listed, you get both. |
| _gtest_is_in_deps = false |
| if (defined(invoker.deps) && invoker.deps != []) { |
| foreach(dep, invoker.deps) { |
| if (get_label_info(dep, "label_no_toolchain") == |
| "//testing/gtest:gtest") { |
| _gtest_is_in_deps = true |
| } |
| } |
| } |
| |
| # TODO(danakj): This could be a rust_source_set perhaps, the point being |
| # that we need to link in all the .o object files inside the library, |
| # instead of dropping unreachable ones during linking (which would drop the |
| # tests). Alternatively we could use a special name suffix or other similar |
| # trick perhaps to ensure that all object files are linked in here. |
| rust_static_library(_rust_target_name) { |
| forward_variables_from(invoker, |
| TESTONLY_AND_VISIBILITY + [ |
| "allow_unsafe", |
| "deps", |
| "generate_crate_root", |
| "public_deps", |
| ]) |
| configs += [ "//build/rust:test" ] |
| if (defined(invoker.test_crate_root)) { |
| crate_root = invoker.test_crate_root |
| } else { |
| generate_crate_root = true |
| } |
| sources = _rs_sources |
| is_gtest_unittests = true |
| |
| if (_gtest_is_in_deps) { |
| deps += [ "//testing/rust_gtest_interop" ] |
| } |
| } |
| } else { |
| not_needed(invoker, _rs_vars) |
| } |
| |
| if (invoker.target_type == "shared_library_with_jni") { |
| # Needed for shared_library_with_jni. Keeping this import guarded so |
| # that projects who import //testing but not //third_party/jni_zero |
| # don't have issues. |
| import("//third_party/jni_zero/jni_zero.gni") |
| } |
| |
| _building_fuzztest_fuzzer = |
| defined(invoker.fuzztests) && use_fuzzing_engine && (is_linux || is_mac) |
| |
| # Fuzz tests are small fuzzers that do not require particularly-powerful |
| # machines to run, so we do not build them when `high_end_fuzzer_targets` |
| # is true and we are building fuzztests in fuzzing mode. |
| if (_building_fuzztest_fuzzer && high_end_fuzzer_targets) { |
| not_needed(invoker, "*") |
| not_needed("*") |
| |
| # We still want a reachable target, so make it a no-op empty group. This |
| # will let the fuzzer builders crawl the build graph and invoke ninja in |
| # the same way regardless of GN args. |
| group(target_name) { |
| } |
| } else { |
| target(invoker.target_type, target_name) { |
| forward_variables_from( |
| invoker, |
| "*", |
| TESTONLY_AND_VISIBILITY + _rs_vars + [ "fuzztests" ]) |
| forward_variables_from(invoker, TESTONLY_AND_VISIBILITY) |
| sources = _cc_sources |
| if (!defined(deps)) { |
| deps = [] |
| } |
| if (!defined(ldflags)) { |
| ldflags = [] |
| } |
| |
| if (_rs_sources != []) { |
| deps += [ ":${_rust_target_name}" ] |
| } |
| if (defined(invoker.fuzztests)) { |
| deps += [ |
| "//third_party/fuzztest", |
| |
| # The following target contains a static initializer which |
| # will ensure that the code in base/test:test_support |
| # ends up calling through to fuzztest::InitFuzzTest. |
| "//testing/libfuzzer:confirm_fuzztest_init", |
| ] |
| } |
| } |
| } |
| |
| if (_building_fuzztest_fuzzer && !high_end_fuzzer_targets) { |
| # This test contains fuzztests. We want to package them up in a way |
| # which ClusterFuzz knows how to extract. We need to: |
| # 1) make an executable for each individual fuzz test; |
| # 2) check that the fuzztests variable is correct. |
| # At present, all this is likely to work only if invoker.target_type |
| # is 'executable', since we generate a wrapper script that assumes so. |
| # At the moment, we aim to fuzz these fuzztests only on Linux so that's |
| # fine. In future we may need to broaden this. |
| if (defined(invoker.output_name)) { |
| _output_name = invoker.output_name |
| } else { |
| _output_name = target_name |
| } |
| |
| _fuzzer_binary_extension = "" |
| if (is_win) { |
| _fuzzer_binary_extension = ".exe" |
| } |
| |
| # This will be the actual name of the fuzzer binary generated by |
| # `target_name`. |
| _fuzzer_binary_name = _output_name + _fuzzer_binary_extension |
| _fuzztest_target_name = target_name |
| |
| # Confirming that the "fuzztests =" directive is correct can only |
| # be done on builds where we can confidently run the fuzzing binary. |
| # Let's be conservative about that -- so long as any failures are |
| # spotted by at least one CI bot we should be good. |
| confirm_fuzztest_contents = is_asan || !using_sanitizer |
| |
| if (confirm_fuzztest_contents) { |
| # Confirm that the fuzztests GN variable matches with the |
| # actual fuzztests in the binary. The output of this action is unused. |
| # It just exists to fail the build if there's an error. |
| # We only do this on Linux, and not for any sanitizers other than |
| # ASAN, because that's specific for CI to show problems and there |
| # may be unknown problems running the fuzztest binary on other |
| # platforms. |
| _fuzztest_check_action = target_name + "__fuzztest_check" |
| action(_fuzztest_check_action) { |
| deps = [ ":" + _fuzztest_target_name ] |
| testonly = true |
| script = "//testing/libfuzzer/confirm_fuzztests.py" |
| _output_name = "$target_gen_dir/${target_name}__checked.txt" |
| outputs = [ _output_name ] |
| |
| args = [ |
| "--executable", |
| rebase_path( |
| get_label_info(_fuzztest_target_name, "root_out_dir") + |
| "/" + _fuzzer_binary_name), |
| "--output", |
| rebase_path(_output_name), |
| "--fuzztests", |
| ] + invoker.fuzztests |
| } |
| } |
| |
| # Make a wrapper executable for each individual fuzz test |
| foreach(fuzztest_unit, invoker.fuzztests) { |
| _fuzzer_name = target_name + "_" + |
| string_replace(fuzztest_unit, ".", "_") + "_fuzzer" |
| |
| # We generate an actual executable because currently our fuzz |
| # builder recipes use `gn refs --type=executable` to find things |
| # to build. Otherwise we could use generate_wrapper or equivalent |
| # to make a python script. We could alter the recipe, or rearrange |
| # deps arragenements so that some other executable depends on these |
| # scripts, but that seems worse. The executable might be more cross- |
| # platform too. |
| _fuzztest_generate_fuzzer = _fuzzer_name + "__generate" |
| |
| generated_file(_fuzztest_generate_fuzzer + "_constants") { |
| outputs = [ "$target_gen_dir/$target_name/constants.cpp" ] |
| |
| # If we're building for libfuzzer, we have to pass -undefok=max_len |
| # etc. for every conceivable libfuzzer argument, so that gtest doesn't |
| # get discombobulated by them. List is from https://llvm.org/docs/LibFuzzer.html |
| if (use_libfuzzer) { |
| known_libfuzzer_args = [ |
| "help", |
| "seed", |
| "runs", |
| "max_len", |
| "len_control", |
| "timeout", |
| "rss_limit_mb", |
| "malloc_limit_mb", |
| "timeout_exitcode", |
| "error_exitcode", |
| "max_total_time", |
| "merge", |
| "merge_control_file", |
| "minimize_crash", |
| "reload", |
| "jobs", |
| "workers", |
| "dict", |
| "use_counters", |
| "reduce_inputs", |
| "use_value_profile", |
| "only_ascii", |
| "artifact_prefix", |
| "exact_artifact_path", |
| "print_pcs", |
| "print_final_stats", |
| "detect_leaks", |
| "close_fd_mask", |
| "fork", |
| ] |
| fuzzer_args = |
| "-undefok=" + string_join(",", known_libfuzzer_args) + " " |
| } else { |
| fuzzer_args = "" |
| } |
| fuzzer_args += "--fuzz=$fuzztest_unit --corpus_database=\"\"" |
| contents = [ "const char* kFuzzerArgs = \"${fuzzer_args}\"; const char* kFuzzerBinary = \"${_fuzzer_binary_name}\";" ] |
| } |
| |
| _fuzzer_target_name = target_name |
| executable(_fuzztest_generate_fuzzer) { |
| testonly = true |
| data_deps = [ |
| ":" + _fuzztest_target_name, |
| ":" + _fuzzer_target_name, |
| ] |
| deps = [ |
| "//testing/libfuzzer:individual_fuzztest_wrapper", |
| ":" + _fuzztest_generate_fuzzer + "_constants", |
| ] |
| if (confirm_fuzztest_contents) { |
| deps += [ ":" + _fuzztest_check_action ] |
| } |
| output_name = _fuzzer_name |
| sources = |
| get_target_outputs(":" + _fuzztest_generate_fuzzer + "_constants") |
| write_runtime_deps = "$root_build_dir/${_fuzzer_name}.runtime_deps" |
| } |
| } |
| } |
| } |
| |
| # Define a test as an executable (or apk on Android) with the "testonly" flag |
| # set. |
| # Variable: |
| # use_xvfb: (optional) whether to run the executable under Xvfb. |
| # use_raw_android_executable: Use executable() rather than android_apk(). |
| # use_native_activity: Test implements ANativeActivity_onCreate(). |
| # test_runner_shard: (Fuchsia, optional): for CFv2 tests, use the given test |
| # runner shard rather than the default shard for the ELF runner when |
| # assembling the test component. This is useful, for example, to use the |
| # elf_test_ambient_exec_runner for tests that require |
| # job_policy_ambient_mark_vmo_exec. |
| # fuchsia_package_deps: (Fuchsia, optional) List of fuchsia_component() |
| # targets that this test package contains. |
| # is_xctest: (iOS, optional) whether to build the executable as XCTest. |
| # Similar to the GN arg 'enable_run_ios_unittests_with_xctest' but |
| # for build targets. |
| # allow_cleartext_traffic: (Android, optional) whether to allow cleartext |
| # network requests during the test. |
| # fuzztests: a list of instances of the FUZZ_TEST macro to |
| # include fuzzing tests alongside unit tests. This introduces an |
| # extra dependency and also creates additional metadata so that our |
| # fuzzing infrastructure can find and run such tests. |
| # This should be a list of the test names, for example |
| # fuzztests = [ "MyTestClass.MyTestName" ] |
| template("test") { |
| # Ensures a test filter file exists and if not, creates a dummy file. |
| # The Regression Test Selection (rts) flag is passed in mb.py and used |
| # to filter out test cases. Flag ensures that a file exists. |
| if (use_rts) { |
| action("${target_name}__rts_filters") { |
| script = "//build/add_rts_filters.py" |
| rts_file = "${root_build_dir}/gen/rts/${invoker.target_name}.filter" |
| args = [ rebase_path(rts_file, root_build_dir) ] |
| outputs = [ rts_file ] |
| } |
| } |
| testonly = true |
| if (!is_ios) { |
| assert(!defined(invoker.is_xctest) || !invoker.is_xctest, |
| "is_xctest can be set only for iOS builds") |
| } |
| if (!is_android) { |
| assert(!defined(invoker.allow_cleartext_traffic), |
| "allow_cleartext_traffic can be set only for Android tests") |
| } |
| |
| if (is_android) { |
| assert(!defined(invoker.use_xvfb) || !invoker.use_xvfb) |
| |
| _use_default_launcher = |
| !defined(invoker.use_default_launcher) || invoker.use_default_launcher |
| if (!defined(invoker.use_raw_android_executable)) { |
| # Checkouts where build_with_chromium == false often have a custom GN |
| # template wrapper around test() which sets use_default_launcher == false. |
| # Set the _use_raw_android_executable default so that test() targets which |
| # do not use the custom wrapper |
| # (1) Do not cause "gn gen" to fail |
| # (2) Do not need to be moved into if(build_with_chromium) block. |
| _use_raw_android_executable = |
| !build_with_chromium && _use_default_launcher |
| } else { |
| not_needed([ "_use_default_launcher" ]) |
| _use_raw_android_executable = invoker.use_raw_android_executable |
| } |
| |
| # output_name is used to allow targets with the same name but in different |
| # packages to still produce unique runner scripts. |
| _output_name = invoker.target_name |
| if (defined(invoker.output_name)) { |
| _output_name = invoker.output_name |
| } |
| |
| _test_runner_target = "${_output_name}__test_runner_script" |
| _wrapper_script_vars = [ |
| "android_test_runner_script", |
| "extra_args", |
| "ignore_all_data_deps", |
| "shard_timeout", |
| ] |
| |
| assert(_use_raw_android_executable || enable_java_templates) |
| |
| if (_use_raw_android_executable) { |
| not_needed(invoker, [ "add_unwind_tables_in_apk" ]) |
| |
| _exec_target = "${target_name}__exec" |
| _dist_target = "${target_name}__dist" |
| _exec_output = |
| "$target_out_dir/${invoker.target_name}/${invoker.target_name}" |
| _crate_name = "${target_name}" |
| |
| mixed_test(_exec_target) { |
| target_type = "executable" |
| |
| # Use a crate name that avoids creating a warning due to double |
| # underscore (ie. `__`). |
| crate_name = _crate_name |
| |
| # Configs will always be defined since we set_defaults in |
| # BUILDCONFIG.gn. |
| configs = [] |
| forward_variables_from( |
| invoker, |
| "*", |
| TESTONLY_AND_VISIBILITY + _wrapper_script_vars + [ |
| "data_deps", |
| "extra_dist_files", |
| ]) |
| |
| # Thanks to the set_defaults() for test(), configs are initialized with |
| # the default shared_library configs rather than executable configs. |
| configs -= [ |
| "//build/config:shared_library_config", |
| "//build/config/android:hide_all_but_jni", |
| ] |
| configs += [ "//build/config:executable_config" ] |
| |
| if (defined(invoker.data_deps)) { |
| data_deps = invoker.data_deps |
| } else { |
| data_deps = [] |
| } |
| if (!defined(data)) { |
| data = [] |
| } |
| if (tests_have_location_tags) { |
| data += [ "//testing/location_tags.json" ] |
| } |
| if (!defined(deps)) { |
| deps = [] |
| } |
| |
| # Don't output to the root or else conflict with the group() below. |
| output_name = rebase_path(_exec_output, root_out_dir) |
| |
| if (use_rts) { |
| data_deps += [ ":${invoker.target_name}__rts_filters" ] |
| } |
| } |
| |
| create_native_executable_dist(_dist_target) { |
| dist_dir = "$root_out_dir/$target_name" |
| binary = _exec_output |
| deps = [ ":$_exec_target" ] |
| if (defined(invoker.extra_dist_files)) { |
| extra_files = invoker.extra_dist_files |
| } |
| if (use_rts) { |
| if (!defined(data_deps)) { |
| data_deps = [] |
| } |
| data_deps += [ ":${invoker.target_name}__rts_filters" ] |
| } |
| } |
| } else { |
| _library_target_name = "${target_name}__library" |
| _library_crate_name = "${target_name}_library" |
| _apk_target_name = "${target_name}__apk" |
| _apk_specific_vars = [ |
| "allow_cleartext_traffic", |
| "android_manifest", |
| "android_manifest_dep", |
| "android_manifest_template", |
| "app_as_shared_lib", |
| "keystore_name", |
| "keystore_password", |
| "keystore_path", |
| "loadable_module_deps", |
| "loadable_modules", |
| "min_sdk_version", |
| "product_config_java_packages", |
| "proguard_configs", |
| "proguard_enabled", |
| "srcjar_deps", |
| "target_sdk_version", |
| "use_default_launcher", |
| "use_native_activity", |
| ] |
| |
| _add_unwind_tables_in_apk = |
| defined(invoker.add_unwind_tables_in_apk) && |
| invoker.add_unwind_tables_in_apk && target_cpu == "arm" |
| |
| # Adds the unwind tables from unstripped binary as an asset file in the |
| # apk, if |add_unwind_tables_in_apk| is specified by the test. |
| if (_add_unwind_tables_in_apk) { |
| # TODO(crbug.com/40833600): Remove generation of v1 unwind asset when |
| # `CFIBacktraceAndroid` is replaced with `ChromeUnwinderAndroid`. |
| _unwind_table_name = "${_library_target_name}_unwind_v1" |
| unwind_table_v1(_unwind_table_name) { |
| library_target = ":$_library_target_name" |
| } |
| |
| if (use_android_unwinder_v2) { |
| _unwind_table_v2_name = "${_library_target_name}_unwind_v2" |
| unwind_table_v2(_unwind_table_v2_name) { |
| library_target = ":$_library_target_name" |
| } |
| } |
| |
| _unwind_table_asset_name = "${target_name}__unwind_assets" |
| android_assets(_unwind_table_asset_name) { |
| sources = [ "$target_out_dir/$_unwind_table_name/$unwind_table_asset_v1_filename" ] |
| disable_compression = true |
| deps = [ ":$_unwind_table_name" ] |
| if (use_android_unwinder_v2) { |
| sources += [ "$target_out_dir/$_unwind_table_v2_name/$unwind_table_asset_v2_filename" ] |
| deps += [ ":$_unwind_table_v2_name" ] |
| } |
| } |
| } |
| |
| _generate_final_jni = |
| !defined(invoker.generate_final_jni) || invoker.generate_final_jni |
| mixed_test(_library_target_name) { |
| if (_generate_final_jni) { |
| target_type = "shared_library_with_jni" |
| java_targets = [ ":$_apk_target_name" ] |
| } else { |
| target_type = "shared_library" |
| } |
| |
| # Configs will always be defined since we set_defaults in |
| # BUILDCONFIG.gn. |
| configs = [] # Prevent list overwriting warning. |
| configs = invoker.configs |
| |
| forward_variables_from( |
| invoker, |
| "*", |
| [ |
| "configs", |
| "deps", |
| ] + _apk_specific_vars + _wrapper_script_vars + |
| TESTONLY_AND_VISIBILITY) |
| |
| # Use a crate name that avoids creating a warning due to double |
| # underscore (ie. `__`). |
| crate_name = _library_crate_name |
| |
| # Native targets do not need to depend on java targets. Filter them out |
| # so that the shared library can be built without needing to wait for |
| # dependent java targets. |
| if (!defined(deps)) { |
| deps = [] |
| } |
| if (defined(invoker.deps)) { |
| deps += filter_exclude(invoker.deps, java_target_patterns) |
| } |
| |
| if (_use_default_launcher) { |
| deps += [ "//testing/android/native_test:native_test_native_code" ] |
| } |
| } |
| unittest_apk(_apk_target_name) { |
| forward_variables_from(invoker, _apk_specific_vars) |
| shared_library = ":$_library_target_name" |
| if (_generate_final_jni) { |
| srcjar_deps = [ "${shared_library}__jni_registration" ] |
| } |
| apk_name = invoker.target_name |
| if (defined(invoker.output_name)) { |
| apk_name = invoker.output_name |
| } |
| |
| if (defined(invoker.deps)) { |
| deps = invoker.deps |
| } else { |
| deps = [] |
| } |
| if (defined(loadable_module_deps)) { |
| deps += loadable_module_deps |
| } |
| |
| # Add the Java classes so that each target does not have to do it. |
| if (_use_default_launcher) { |
| deps += [ "//base/test:test_support_java" ] |
| } |
| |
| if (defined(_unwind_table_asset_name)) { |
| deps += [ ":${_unwind_table_asset_name}" ] |
| } |
| |
| if (use_rts) { |
| data_deps = [ ":${invoker.target_name}__rts_filters" ] |
| } |
| } |
| } |
| |
| test_runner_script(_test_runner_target) { |
| forward_variables_from(invoker, _wrapper_script_vars) |
| |
| if (_use_raw_android_executable) { |
| executable_dist_dir = "$root_out_dir/$_dist_target" |
| data_deps = [ ":$_exec_target" ] |
| } else { |
| apk_target = ":$_apk_target_name" |
| incremental_apk = incremental_install |
| |
| # Dep needed for the test runner .runtime_deps file to pick up data |
| # deps from the forward_variables_from(invoker, "*") on the library. |
| data_deps = [ ":$_library_target_name" ] |
| } |
| test_name = _output_name |
| test_suite = _output_name |
| test_type = "gtest" |
| if (use_rts) { |
| data_deps += [ ":${invoker.target_name}__rts_filters" ] |
| } |
| } |
| |
| # Create a wrapper script rather than using a group() in order to ensure |
| # "ninja $target_name" always works. If this was a group(), then GN would |
| # not create a top-level alias for it if a target exists in another |
| # directory with the same $target_name. |
| # Also - bots run this script directly for "components_perftests". |
| generate_wrapper(target_name) { |
| forward_variables_from(invoker, [ "visibility" ]) |
| executable = "$root_build_dir/bin/run_$_output_name" |
| wrapper_script = "$root_build_dir/$_output_name" |
| deps = [ ":$_test_runner_target" ] |
| if (_use_raw_android_executable) { |
| deps += [ ":$_dist_target" ] |
| } else { |
| # Dep needed for the swarming .isolate file to pick up data |
| # deps from the forward_variables_from(invoker, "*") on the library. |
| deps += [ |
| ":$_apk_target_name", |
| ":$_library_target_name", |
| ] |
| } |
| |
| if (defined(invoker.data_deps)) { |
| data_deps = invoker.data_deps |
| } else { |
| data_deps = [] |
| } |
| |
| data_deps += [ "//testing:test_scripts_shared" ] |
| |
| if (tests_have_location_tags) { |
| data = [ "//testing/location_tags.json" ] |
| } |
| if (use_rts) { |
| data_deps += [ ":${invoker.target_name}__rts_filters" ] |
| } |
| } |
| } else if (is_fuchsia) { |
| assert(!defined(invoker.use_xvfb) || !invoker.use_xvfb) |
| |
| _output_name = invoker.target_name |
| _pkg_target = "${_output_name}_pkg" |
| _exec_target = "${_output_name}__exec" |
| _program_name = get_label_info(":${_exec_target}", "name") |
| _crate_name = _output_name |
| |
| # Generate a CML fragment that provides the program name. |
| _test_program_fragment_target = "${target_name}_program-fragment" |
| _test_program_fragment = "${target_out_dir}/${target_name}_program.test-cml" |
| generated_file(_test_program_fragment_target) { |
| contents = { |
| program = { |
| binary = _program_name |
| } |
| } |
| outputs = [ _test_program_fragment ] |
| output_conversion = "json" |
| } |
| |
| _test_runner_shard = |
| "//build/config/fuchsia/test/elf_test_runner.shard.test-cml" |
| if (defined(invoker.test_runner_shard)) { |
| _test_runner_shard = invoker.test_runner_shard |
| } |
| |
| # Collate the complete set of elements to include in the test component's |
| # manifest. |
| |
| _manifest_fragments = [ |
| _test_program_fragment, |
| _test_runner_shard, |
| ] |
| |
| # Select the Fuchsia test realm in which to run the test. |
| if (defined(invoker.run_as_chromium_system_test) && |
| invoker.run_as_chromium_system_test) { |
| _manifest_fragments += [ |
| "//build/config/fuchsia/test/chromium_system_test_facet.shard.test-cml", |
| "//build/config/fuchsia/test/system_test_minimum.shard.test-cml", |
| ] |
| } else { |
| _manifest_fragments += [ |
| "//build/config/fuchsia/test/chromium_test_facet.shard.test-cml", |
| "//build/config/fuchsia/test/minimum.shard.test-cml", |
| ] |
| } |
| |
| if (is_asan) { |
| # TODO(crbug.com/40276216): Remove the extra cml segment for asan. |
| _manifest_fragments += |
| [ "//build/config/fuchsia/test/asan_options.shard.test-cml" ] |
| } |
| |
| _test_component_manifest = "${target_out_dir}/${target_name}.cml" |
| _merged_manifest_name = "${_output_name}.cml" |
| |
| if (defined(invoker.additional_manifest_fragments)) { |
| _manifest_fragments += invoker.additional_manifest_fragments |
| } |
| |
| # Generate the test component manifest from the specified elements. |
| _test_component_manifest_target = "${target_name}_component-manifest" |
| cmc_merge(_test_component_manifest_target) { |
| sources = _manifest_fragments |
| output_name = "${_merged_manifest_name}" |
| deps = [ ":${_test_program_fragment_target}" ] |
| } |
| |
| # Define the test component, dependent on the generated manifest, and the |
| # test executable target. |
| _test_component_target = "${target_name}_component" |
| fuchsia_component(_test_component_target) { |
| deps = [ ":$_test_component_manifest_target" ] |
| data_deps = [ ":$_exec_target" ] |
| manifest = _test_component_manifest |
| visibility = [ ":*" ] |
| } |
| |
| _test_component_targets = [ ":${_test_component_target}" ] |
| |
| # Define components for each entry in |additional_manifests|, if any. Since |
| # manifests may themselves depend-on the outputs of |deps|, these components |
| # must each individually depend on |invoker.deps|. |
| if (defined(invoker.additional_manifests)) { |
| foreach(filename, invoker.additional_manifests) { |
| _additional_component_target = |
| target_name + "_" + get_path_info(filename, "name") |
| _test_component_targets += [ ":${_additional_component_target}" ] |
| fuchsia_component(_additional_component_target) { |
| forward_variables_from(invoker, [ "testonly" ]) |
| data_deps = [ ":$_exec_target" ] |
| visibility = [ ":*" ] |
| manifest = filename |
| |
| # Depend on |invoker.deps|, in case it includes a dependency that |
| # creates this additional component's manifest. |
| if (defined(invoker.deps)) { |
| deps = invoker.deps |
| } |
| } |
| } |
| } |
| |
| # Define the package target that will bundle the test and additional |
| # components and their data. |
| fuchsia_package(_pkg_target) { |
| forward_variables_from(invoker, |
| [ |
| "excluded_files", |
| "excluded_dirs", |
| "excluded_paths", |
| ]) |
| package_name = _output_name |
| deps = _test_component_targets |
| |
| if (defined(invoker.fuchsia_package_deps)) { |
| deps += invoker.fuchsia_package_deps |
| } |
| if (!defined(excluded_paths)) { |
| excluded_paths = [] |
| } |
| excluded_paths += [ |
| "${devtools_root_location}/*", |
| "*.git/*", |
| "*.svn/*", |
| "*.hg/*", |
| ] |
| if (devtools_root_location != "") { |
| excluded_paths += [ "${devtools_root_location}/*" ] |
| } |
| } |
| |
| # |target_name| refers to the package-runner rule, so that building |
| # "base_unittests" will build not only the executable, component, and |
| # package, but also the script required to run them. |
| fuchsia_test_runner(target_name) { |
| forward_variables_from(invoker, |
| [ |
| "data", |
| "data_deps", |
| "package_deps", |
| "use_test_server", |
| ]) |
| |
| is_test_exe = true |
| package = ":$_pkg_target" |
| package_name = _output_name |
| |
| if (!defined(deps)) { |
| deps = [] |
| } |
| if (defined(invoker.deps)) { |
| deps += invoker.deps |
| } |
| |
| if (!defined(data)) { |
| data = [] |
| } |
| if (tests_have_location_tags) { |
| data += [ "//testing/location_tags.json" ] |
| } |
| |
| if (!defined(data_deps)) { |
| data_deps = [] |
| } |
| |
| data_deps += [ "//testing:test_scripts_shared" ] |
| } |
| |
| mixed_test(_exec_target) { |
| target_type = "executable" |
| forward_variables_from(invoker, "*", TESTONLY_AND_VISIBILITY) |
| output_name = _exec_target |
| |
| if (!defined(deps)) { |
| deps = [] |
| } |
| |
| # Use a crate name that avoids creating a warning due to double |
| # underscore (ie. `__`). |
| crate_name = _crate_name |
| } |
| } else if (is_ios) { |
| assert(!defined(invoker.use_xvfb) || !invoker.use_xvfb) |
| _runtime_deps_file = "$root_out_dir/${target_name}.runtime_deps" |
| |
| declare_args() { |
| # Keep the unittest-as-xctest functionality defaulted to off for |
| # local builds and test executions. |
| enable_run_ios_unittests_with_xctest = false |
| } |
| |
| _test_target = target_name |
| |
| _wrapper_output_name = "run_${target_name}" |
| ios_test_runner_wrapper(_wrapper_output_name) { |
| forward_variables_from(invoker, |
| [ |
| "clones", |
| "data", |
| "deps", |
| "executable_args", |
| "retries", |
| ]) |
| |
| _root_build_dir = rebase_path("${root_build_dir}", root_build_dir) |
| |
| if (!defined(executable_args)) { |
| executable_args = [] |
| } |
| executable_args += [ |
| "--app", |
| "@WrappedPath(${_root_build_dir}/${_test_target}.app)", |
| ] |
| |
| wrapper_output_name = "${_wrapper_output_name}" |
| |
| if (!defined(data)) { |
| data = [] |
| } |
| if (tests_have_location_tags) { |
| data += [ "//testing/location_tags.json" ] |
| } |
| } |
| |
| _resources_bundle_data = target_name + "_resources_bundle_data" |
| |
| bundle_data(_resources_bundle_data) { |
| visibility = [ ":$_test_target" ] |
| sources = [ "//testing/gtest_ios/Default.png" ] |
| outputs = [ "{{bundle_resources_dir}}/{{source_file_part}}" ] |
| } |
| |
| force_xctest = enable_run_ios_unittests_with_xctest || |
| (defined(invoker.is_xctest) && invoker.is_xctest) |
| |
| mixed_test(_test_target) { |
| if (force_xctest) { |
| target_type = "ios_xctest_test" |
| } else { |
| target_type = "ios_app_bundle" |
| } |
| testonly = true |
| |
| if (force_xctest && build_with_chromium) { |
| xctest_module_target = "//base/test:google_test_runner" |
| } |
| |
| forward_variables_from(invoker, "*", TESTONLY_AND_VISIBILITY) |
| |
| # Provide sensible defaults in case invoker did not define any of those |
| # required variables. |
| if (!defined(info_plist) && !defined(info_plist_target)) { |
| info_plist = "//testing/gtest_ios/unittest-Info.plist" |
| } |
| |
| bundle_identifier = shared_bundle_id_for_test_apps |
| |
| if (!defined(bundle_deps)) { |
| bundle_deps = [] |
| } |
| bundle_deps += [ ":$_resources_bundle_data" ] |
| |
| if (!defined(data_deps)) { |
| data_deps = [] |
| } |
| |
| data_deps += [ "//testing:test_scripts_shared" ] |
| |
| # Include the generate_wrapper as part of data_deps |
| data_deps += [ ":${_wrapper_output_name}" ] |
| write_runtime_deps = _runtime_deps_file |
| if (use_rts) { |
| data_deps += [ ":${invoker.target_name}__rts_filters" ] |
| } |
| if (!defined(deps)) { |
| deps = [] |
| } |
| } |
| } else if (is_chromeos && cros_board != "") { |
| assert(!defined(invoker.use_xvfb) || !invoker.use_xvfb) |
| |
| # Building for a cros board (ie: not linux-chromeos). |
| |
| _gen_runner_target = "${target_name}__runner" |
| _runtime_deps_file = |
| "$root_out_dir/gen.runtime/" + get_label_info(target_name, "dir") + |
| "/" + get_label_info(target_name, "name") + ".runtime_deps" |
| |
| if (is_skylab && (defined(tast_attr_expr) || defined(tast_tests) || |
| defined(tast_disabled_tests))) { |
| generate_skylab_tast_filter(_gen_runner_target) { |
| } |
| } else { |
| generate_runner_script(_gen_runner_target) { |
| generated_script = "$root_build_dir/bin/run_" + invoker.target_name |
| test_exe = invoker.target_name |
| runtime_deps_file = _runtime_deps_file |
| |
| if (tests_have_location_tags) { |
| data = [ "//testing/location_tags.json" ] |
| } |
| if (use_rts) { |
| data_deps = [ ":${invoker.target_name}__rts_filters" ] |
| } |
| } |
| } |
| |
| mixed_test(target_name) { |
| target_type = "executable" |
| forward_variables_from(invoker, "*", TESTONLY_AND_VISIBILITY) |
| forward_variables_from(invoker, [ "visibility" ]) |
| if (!defined(deps)) { |
| deps = [] |
| } |
| if (!defined(data)) { |
| data = [] |
| } |
| |
| # We use a special trigger script for CrOS hardware tests. |
| data += [ "//testing/trigger_scripts/chromeos_device_trigger.py" ] |
| |
| write_runtime_deps = _runtime_deps_file |
| data += [ _runtime_deps_file ] |
| deps += [ ":$_gen_runner_target" ] |
| |
| if (!defined(data_deps)) { |
| data_deps = [] |
| } |
| |
| data_deps += [ "//testing:test_scripts_shared" ] |
| if (use_rts) { |
| data_deps += [ ":${invoker.target_name}__rts_filters" ] |
| } |
| } |
| } else if (!is_nacl) { |
| if (is_mac || is_win) { |
| assert(!defined(invoker.use_xvfb) || !invoker.use_xvfb) |
| } |
| |
| _runtime_deps_file = "$root_out_dir/${target_name}.runtime_deps" |
| _executable = target_name |
| _gen_runner_target = "${target_name}__runner" |
| |
| if ((is_linux || is_chromeos) && defined(invoker.use_xvfb)) { |
| _use_xvfb = invoker.use_xvfb |
| } else { |
| _use_xvfb = false |
| } |
| |
| generate_wrapper(_gen_runner_target) { |
| wrapper_script = "$root_build_dir/bin/run_" + _executable |
| |
| data = [] |
| data_deps = [ "//testing:test_scripts_shared" ] |
| |
| if (_use_xvfb) { |
| executable = "//testing/xvfb.py" |
| } else { |
| executable = "//testing/test_env.py" |
| } |
| if (tests_have_location_tags) { |
| data += [ "//testing/location_tags.json" ] |
| } |
| |
| executable_args = [ |
| "@WrappedPath(./${_executable})", |
| "--test-launcher-bot-mode", |
| ] |
| if (is_asan) { |
| executable_args += [ "--asan=1" ] |
| } |
| if (is_msan) { |
| executable_args += [ "--msan=1" ] |
| } |
| if (is_tsan) { |
| executable_args += [ "--tsan=1" ] |
| } |
| if (use_cfi_diag) { |
| executable_args += [ "--cfi-diag=1" ] |
| } |
| if (fail_on_san_warnings) { |
| executable_args += [ "--fail-san=1" ] |
| } |
| if (use_rts) { |
| data_deps += [ ":${invoker.target_name}__rts_filters" ] |
| } |
| } |
| |
| mixed_test(target_name) { |
| target_type = "executable" |
| forward_variables_from(invoker, |
| "*", |
| TESTONLY_AND_VISIBILITY + [ "use_xvfb" ]) |
| forward_variables_from(invoker, [ "visibility" ]) |
| if (!defined(deps)) { |
| deps = [] |
| } |
| |
| deps += [ |
| # Give tests the default manifest on Windows (a no-op elsewhere). |
| "//build/win:default_exe_manifest", |
| ] |
| |
| write_runtime_deps = _runtime_deps_file |
| deps += [ ":$_gen_runner_target" ] |
| |
| if (!defined(data_deps)) { |
| data_deps = [] |
| } |
| |
| data_deps += [ "//testing:test_scripts_shared" ] |
| if (use_rts) { |
| data_deps += [ ":${invoker.target_name}__rts_filters" ] |
| } |
| } |
| } else { |
| # This is a catch-all clause for NaCl toolchains and other random |
| # configurations that might define tests; test() in these configs |
| # will just define the underlying executables. |
| assert(!defined(invoker.use_xvfb) || !invoker.use_xvfb, |
| "use_xvfb should not be defined for a non-linux configuration") |
| mixed_test(target_name) { |
| target_type = "executable" |
| forward_variables_from(invoker, "*", TESTONLY_AND_VISIBILITY) |
| forward_variables_from(invoker, [ "visibility" ]) |
| if (!defined(deps)) { |
| deps = [] |
| } |
| |
| if (!defined(data_deps)) { |
| data_deps = [] |
| } |
| |
| data_deps += [ "//testing:test_scripts_shared" ] |
| if (use_rts) { |
| data_deps += [ ":${invoker.target_name}__rts_filters" ] |
| } |
| } |
| } |
| } |
| |
| # Defines a type of test that invokes a script to run, rather than |
| # invoking an executable. |
| # |
| # The script must implement the |
| # [test executable API](//docs/testing/test_executable_api.md). |
| # |
| # The template must be passed the `script` parameter, which specifies the path |
| # to the script to run. It may optionally be passed a `args` parameter, which |
| # can be used to include a list of args to be specified by default. The |
| # template will produce a `$root_build_dir/run_$target_name` wrapper and write |
| # the runtime_deps for the target to |
| # $root_build_dir/${target_name}.runtime_deps, as per the conventions listed in |
| # the [test wrapper API](//docs/testing/test_wrapper_api.md). |
| # |
| # Variables: |
| # script: Path to underlying test script. |
| # args: Args to the test script. |
| # enable_android_wrapper: (optional) If true, the test will get wrapped in the |
| # logdog_wrapper on Android, which will stream logcats from the device. |
| # enable_cros_wrapper: (optional) If true, the test will get wrapped by the |
| # cros_test_wrapper on ChromeOS, which will prep the device for testing. |
| template("script_test") { |
| _enable_logdog_wrapper = defined(invoker.enable_android_wrapper) && |
| invoker.enable_android_wrapper && is_android |
| _enable_cros_wrapper = |
| defined(invoker.enable_cros_wrapper) && invoker.enable_cros_wrapper && |
| is_chromeos && is_chromeos_device |
| assert(!(_enable_logdog_wrapper && _enable_cros_wrapper), |
| "The logdog and cros_test wrappers are mutually exclusive") |
| |
| if (use_rts) { |
| action("${target_name}__rts_filters") { |
| script = "//build/add_rts_filters.py" |
| rts_file = "${root_build_dir}/gen/rts/${invoker.target_name}.filter" |
| args = [ rebase_path(rts_file, root_build_dir) ] |
| outputs = [ rts_file ] |
| } |
| } |
| |
| _shared_data = [ invoker.script ] |
| if (defined(invoker.data)) { |
| _shared_data += invoker.data |
| } |
| if (tests_have_location_tags) { |
| _shared_data += [ "//testing/location_tags.json" ] |
| } |
| |
| _shared_data_deps = [ "//testing:test_scripts_shared" ] |
| if (defined(invoker.data_deps)) { |
| _shared_data_deps += invoker.data_deps |
| } |
| |
| _wrapped_script = |
| "@WrappedPath(" + rebase_path(invoker.script, root_build_dir) + ")" |
| if (_enable_logdog_wrapper) { |
| logdog_wrapper_script_test(target_name) { |
| testonly = true |
| args = [ _wrapped_script ] |
| if (defined(invoker.args)) { |
| args += invoker.args |
| } |
| data = _shared_data |
| data_deps = _shared_data_deps |
| |
| forward_variables_from(invoker, |
| "*", |
| TESTONLY_AND_VISIBILITY + [ |
| "args", |
| "data", |
| "data_deps", |
| "script", |
| ]) |
| } |
| } else if (_enable_cros_wrapper) { |
| cros_test_wrapper_script_test(target_name) { |
| args = [ _wrapped_script ] |
| if (defined(invoker.args)) { |
| args += invoker.args |
| } |
| data = _shared_data |
| data_deps = _shared_data_deps |
| |
| forward_variables_from(invoker, |
| "*", |
| TESTONLY_AND_VISIBILITY + [ |
| "args", |
| "data", |
| "data_deps", |
| "script", |
| ]) |
| } |
| } else { |
| generate_wrapper(target_name) { |
| testonly = true |
| wrapper_script = "${root_build_dir}/bin/run_${target_name}" |
| |
| executable = "//testing/test_env.py" |
| |
| executable_args = [ _wrapped_script ] |
| if (defined(invoker.args)) { |
| executable_args += invoker.args |
| } |
| |
| data = _shared_data |
| data_deps = _shared_data_deps |
| |
| forward_variables_from(invoker, |
| "*", |
| TESTONLY_AND_VISIBILITY + [ |
| "args", |
| "data", |
| "data_deps", |
| "script", |
| ]) |
| forward_variables_from(invoker, [ "visibility" ]) |
| |
| write_runtime_deps = "${root_build_dir}/${target_name}.runtime_deps" |
| } |
| } |
| } |
| |
| # Defines a test target that uses exit code for pass/fail. |
| template("isolated_script_test") { |
| script_test(target_name) { |
| forward_variables_from(invoker, |
| "*", |
| TESTONLY_AND_VISIBILITY + [ |
| "args", |
| "data", |
| "deps", |
| "script", |
| ]) |
| forward_variables_from(invoker, [ "visibility" ]) |
| deps = [ "//testing:run_isolated_script_test" ] |
| if (defined(invoker.deps)) { |
| deps += invoker.deps |
| } |
| script = "//testing/scripts/run_isolated_script_test.py" |
| data = [ invoker.script ] |
| if (defined(invoker.data)) { |
| data += invoker.data |
| } |
| args = [ |
| rebase_path(invoker.script, root_build_dir), |
| "--script-type=bare", |
| ] |
| if (defined(invoker.args)) { |
| args += invoker.args |
| } |
| } |
| } |
| |
| # Test defaults. |
| set_defaults("test") { |
| if (is_android) { |
| # Should be kept in sync with set_defaults("cronet_test") in |
| # //components/cronet/android/cronet_test_templates.gni |
| # LINT.IfChange |
| configs = default_shared_library_configs |
| configs -= [ "//build/config/android:hide_all_but_jni_onload" ] |
| configs += [ "//build/config/android:hide_all_but_jni" ] |
| |
| # LINT.ThenChange(/components/cronet/android/cronet_test_templates.gni) |
| } else { |
| configs = default_executable_configs |
| } |
| } |