2013-07-15 17:31:34 +02:00
|
|
|
#!/usr/bin/env python
|
|
|
|
# encoding: utf-8
|
|
|
|
# Copyright Garmin International or its subsidiaries, 2012-2013
|
|
|
|
|
|
|
|
'''
|
|
|
|
Off-load dependency scanning from Python code to MSVC compiler
|
|
|
|
|
|
|
|
This tool is safe to load in any environment; it will only activate the
|
|
|
|
MSVC exploits when it finds that a particular taskgen uses MSVC to
|
|
|
|
compile.
|
|
|
|
|
|
|
|
Empirical testing shows about a 10% execution time savings from using
|
|
|
|
this tool as compared to c_preproc.
|
|
|
|
|
|
|
|
The technique of gutting scan() and pushing the dependency calculation
|
|
|
|
down to post_run() is cribbed from gccdeps.py.
|
2016-07-26 19:41:57 +02:00
|
|
|
|
|
|
|
This affects the cxx class, so make sure to load Qt5 after this tool.
|
2017-09-21 17:30:08 +02:00
|
|
|
|
|
|
|
Usage::
|
|
|
|
|
|
|
|
def options(opt):
|
|
|
|
opt.load('compiler_cxx')
|
|
|
|
def configure(conf):
|
|
|
|
conf.load('compiler_cxx msvcdeps')
|
2013-07-15 17:31:34 +02:00
|
|
|
'''
|
|
|
|
|
2020-06-25 00:55:46 +02:00
|
|
|
import os, sys, tempfile, threading
|
2013-07-15 17:31:34 +02:00
|
|
|
|
|
|
|
from waflib import Context, Errors, Logs, Task, Utils
|
|
|
|
from waflib.Tools import c_preproc, c, cxx, msvc
|
|
|
|
from waflib.TaskGen import feature, before_method
|
|
|
|
|
|
|
|
lock = threading.Lock()
|
|
|
|
nodes = {} # Cache the path -> Node lookup
|
|
|
|
|
|
|
|
PREPROCESSOR_FLAG = '/showIncludes'
|
|
|
|
INCLUDE_PATTERN = 'Note: including file:'
|
|
|
|
|
|
|
|
# Extensible by outside tools
|
|
|
|
supported_compilers = ['msvc']
|
|
|
|
|
|
|
|
@feature('c', 'cxx')
|
|
|
|
@before_method('process_source')
|
|
|
|
def apply_msvcdeps_flags(taskgen):
|
2016-07-25 22:12:35 +02:00
|
|
|
if taskgen.env.CC_NAME not in supported_compilers:
|
|
|
|
return
|
2013-07-15 17:31:34 +02:00
|
|
|
|
2016-07-25 22:12:35 +02:00
|
|
|
for flag in ('CFLAGS', 'CXXFLAGS'):
|
|
|
|
if taskgen.env.get_flat(flag).find(PREPROCESSOR_FLAG) < 0:
|
|
|
|
taskgen.env.append_value(flag, PREPROCESSOR_FLAG)
|
2013-07-15 17:31:34 +02:00
|
|
|
|
|
|
|
def path_to_node(base_node, path, cached_nodes):
|
2019-04-30 00:03:57 +02:00
|
|
|
'''
|
|
|
|
Take the base node and the path and return a node
|
|
|
|
Results are cached because searching the node tree is expensive
|
|
|
|
The following code is executed by threads, it is not safe, so a lock is needed...
|
|
|
|
'''
|
2019-04-30 00:09:54 +02:00
|
|
|
# normalize the path because ant_glob() does not understand
|
|
|
|
# parent path components (..)
|
|
|
|
path = os.path.normpath(path)
|
|
|
|
|
|
|
|
# normalize the path case to increase likelihood of a cache hit
|
|
|
|
path = os.path.normcase(path)
|
|
|
|
|
2019-05-10 23:13:01 +02:00
|
|
|
# ant_glob interprets [] and () characters, so those must be replaced
|
|
|
|
path = path.replace('[', '?').replace(']', '?').replace('(', '[(]').replace(')', '[)]')
|
|
|
|
|
2019-04-30 00:03:57 +02:00
|
|
|
node_lookup_key = (base_node, path)
|
2019-04-25 23:28:19 +02:00
|
|
|
|
2016-07-25 22:12:35 +02:00
|
|
|
try:
|
|
|
|
node = cached_nodes[node_lookup_key]
|
|
|
|
except KeyError:
|
2019-04-25 23:28:19 +02:00
|
|
|
# retry with lock on cache miss
|
|
|
|
with lock:
|
|
|
|
try:
|
|
|
|
node = cached_nodes[node_lookup_key]
|
|
|
|
except KeyError:
|
2019-05-10 23:13:01 +02:00
|
|
|
node_list = base_node.ant_glob([path], ignorecase=True, remove=False, quiet=True, regex=False)
|
2019-04-30 00:09:54 +02:00
|
|
|
node = cached_nodes[node_lookup_key] = node_list[0] if node_list else None
|
2019-04-25 23:28:19 +02:00
|
|
|
|
2016-07-25 22:12:35 +02:00
|
|
|
return node
|
2013-07-15 17:31:34 +02:00
|
|
|
|
2016-07-26 19:41:57 +02:00
|
|
|
def post_run(self):
|
|
|
|
if self.env.CC_NAME not in supported_compilers:
|
|
|
|
return super(self.derived_msvcdeps, self).post_run()
|
2016-07-25 22:12:35 +02:00
|
|
|
|
2016-07-27 20:22:48 +02:00
|
|
|
# TODO this is unlikely to work with netcache
|
2016-07-26 19:41:57 +02:00
|
|
|
if getattr(self, 'cached', None):
|
|
|
|
return Task.Task.post_run(self)
|
2016-07-25 22:12:35 +02:00
|
|
|
|
2016-07-26 19:41:57 +02:00
|
|
|
bld = self.generator.bld
|
|
|
|
unresolved_names = []
|
|
|
|
resolved_nodes = []
|
2016-07-25 22:12:35 +02:00
|
|
|
|
2016-07-26 19:41:57 +02:00
|
|
|
# Dynamically bind to the cache
|
|
|
|
try:
|
|
|
|
cached_nodes = bld.cached_nodes
|
|
|
|
except AttributeError:
|
|
|
|
cached_nodes = bld.cached_nodes = {}
|
|
|
|
|
|
|
|
for path in self.msvcdeps_paths:
|
|
|
|
node = None
|
|
|
|
if os.path.isabs(path):
|
|
|
|
node = path_to_node(bld.root, path, cached_nodes)
|
|
|
|
else:
|
2019-04-30 00:03:57 +02:00
|
|
|
# when calling find_resource, make sure the path does not begin with '..'
|
2016-07-26 19:41:57 +02:00
|
|
|
base_node = bld.bldnode
|
|
|
|
path = [k for k in Utils.split_path(path) if k and k != '.']
|
|
|
|
while path[0] == '..':
|
2019-04-30 00:03:57 +02:00
|
|
|
path.pop(0)
|
2016-07-26 19:41:57 +02:00
|
|
|
base_node = base_node.parent
|
2019-04-30 00:03:57 +02:00
|
|
|
path = os.sep.join(path)
|
2016-07-26 19:41:57 +02:00
|
|
|
|
|
|
|
node = path_to_node(base_node, path, cached_nodes)
|
|
|
|
|
|
|
|
if not node:
|
|
|
|
raise ValueError('could not find %r for %r' % (path, self))
|
|
|
|
else:
|
|
|
|
if not c_preproc.go_absolute:
|
|
|
|
if not (node.is_child_of(bld.srcnode) or node.is_child_of(bld.bldnode)):
|
|
|
|
# System library
|
|
|
|
Logs.debug('msvcdeps: Ignoring system include %r', node)
|
|
|
|
continue
|
2016-07-25 22:12:35 +02:00
|
|
|
|
2016-07-26 19:41:57 +02:00
|
|
|
if id(node) == id(self.inputs[0]):
|
|
|
|
# Self-dependency
|
|
|
|
continue
|
2016-07-25 22:12:35 +02:00
|
|
|
|
2016-07-26 19:41:57 +02:00
|
|
|
resolved_nodes.append(node)
|
2016-07-25 22:12:35 +02:00
|
|
|
|
2016-07-26 19:41:57 +02:00
|
|
|
bld.node_deps[self.uid()] = resolved_nodes
|
|
|
|
bld.raw_deps[self.uid()] = unresolved_names
|
2016-07-25 22:12:35 +02:00
|
|
|
|
2016-07-26 19:41:57 +02:00
|
|
|
try:
|
|
|
|
del self.cache_sig
|
|
|
|
except AttributeError:
|
|
|
|
pass
|
2016-07-25 22:12:35 +02:00
|
|
|
|
2016-07-26 19:41:57 +02:00
|
|
|
Task.Task.post_run(self)
|
2016-07-25 22:12:35 +02:00
|
|
|
|
2016-07-26 19:41:57 +02:00
|
|
|
def scan(self):
|
|
|
|
if self.env.CC_NAME not in supported_compilers:
|
|
|
|
return super(self.derived_msvcdeps, self).scan()
|
2016-07-25 22:12:35 +02:00
|
|
|
|
2016-07-26 19:41:57 +02:00
|
|
|
resolved_nodes = self.generator.bld.node_deps.get(self.uid(), [])
|
|
|
|
unresolved_names = []
|
|
|
|
return (resolved_nodes, unresolved_names)
|
2016-07-25 22:12:35 +02:00
|
|
|
|
2016-07-26 19:41:57 +02:00
|
|
|
def sig_implicit_deps(self):
|
|
|
|
if self.env.CC_NAME not in supported_compilers:
|
|
|
|
return super(self.derived_msvcdeps, self).sig_implicit_deps()
|
2020-06-25 00:55:46 +02:00
|
|
|
bld = self.generator.bld
|
2016-07-25 22:12:35 +02:00
|
|
|
|
2016-07-26 19:41:57 +02:00
|
|
|
try:
|
2020-06-25 00:55:46 +02:00
|
|
|
return self.compute_sig_implicit_deps()
|
|
|
|
except Errors.TaskNotReady:
|
|
|
|
raise ValueError("Please specify the build order precisely with msvcdeps (c/c++ tasks)")
|
|
|
|
except EnvironmentError:
|
|
|
|
# If a file is renamed, assume the dependencies are stale and must be recalculated
|
|
|
|
for x in bld.node_deps.get(self.uid(), []):
|
|
|
|
if not x.is_bld() and not x.exists():
|
|
|
|
try:
|
|
|
|
del x.parent.children[x.name]
|
|
|
|
except KeyError:
|
|
|
|
pass
|
|
|
|
|
|
|
|
key = self.uid()
|
|
|
|
bld.node_deps[key] = []
|
|
|
|
bld.raw_deps[key] = []
|
|
|
|
return Utils.SIG_NIL
|
2016-07-26 19:41:57 +02:00
|
|
|
|
|
|
|
def exec_command(self, cmd, **kw):
|
|
|
|
if self.env.CC_NAME not in supported_compilers:
|
|
|
|
return super(self.derived_msvcdeps, self).exec_command(cmd, **kw)
|
|
|
|
|
|
|
|
if not 'cwd' in kw:
|
|
|
|
kw['cwd'] = self.get_cwd()
|
|
|
|
|
|
|
|
if self.env.PATH:
|
|
|
|
env = kw['env'] = dict(kw.get('env') or self.env.env or os.environ)
|
|
|
|
env['PATH'] = self.env.PATH if isinstance(self.env.PATH, str) else os.pathsep.join(self.env.PATH)
|
|
|
|
|
|
|
|
# The Visual Studio IDE adds an environment variable that causes
|
|
|
|
# the MS compiler to send its textual output directly to the
|
|
|
|
# debugging window rather than normal stdout/stderr.
|
|
|
|
#
|
|
|
|
# This is unrecoverably bad for this tool because it will cause
|
|
|
|
# all the dependency scanning to see an empty stdout stream and
|
|
|
|
# assume that the file being compiled uses no headers.
|
|
|
|
#
|
|
|
|
# See http://blogs.msdn.com/b/freik/archive/2006/04/05/569025.aspx
|
|
|
|
#
|
|
|
|
# Attempting to repair the situation by deleting the offending
|
|
|
|
# envvar at this point in tool execution will not be good enough--
|
|
|
|
# its presence poisons the 'waf configure' step earlier. We just
|
|
|
|
# want to put a sanity check here in order to help developers
|
|
|
|
# quickly diagnose the issue if an otherwise-good Waf tree
|
|
|
|
# is then executed inside the MSVS IDE.
|
|
|
|
assert 'VS_UNICODE_OUTPUT' not in kw['env']
|
|
|
|
|
|
|
|
cmd, args = self.split_argfile(cmd)
|
|
|
|
try:
|
|
|
|
(fd, tmp) = tempfile.mkstemp()
|
|
|
|
os.write(fd, '\r\n'.join(args).encode())
|
|
|
|
os.close(fd)
|
|
|
|
|
|
|
|
self.msvcdeps_paths = []
|
|
|
|
kw['env'] = kw.get('env', os.environ.copy())
|
|
|
|
kw['cwd'] = kw.get('cwd', os.getcwd())
|
|
|
|
kw['quiet'] = Context.STDOUT
|
|
|
|
kw['output'] = Context.STDOUT
|
|
|
|
|
|
|
|
out = []
|
2016-10-11 18:34:35 +02:00
|
|
|
if Logs.verbose:
|
|
|
|
Logs.debug('argfile: @%r -> %r', tmp, args)
|
2016-07-25 22:12:35 +02:00
|
|
|
try:
|
2016-07-26 19:41:57 +02:00
|
|
|
raw_out = self.generator.bld.cmd_and_log(cmd + ['@' + tmp], **kw)
|
|
|
|
ret = 0
|
|
|
|
except Errors.WafError as e:
|
2018-05-14 16:21:30 +02:00
|
|
|
# Use e.msg if e.stdout is not set
|
|
|
|
raw_out = getattr(e, 'stdout', e.msg)
|
|
|
|
|
|
|
|
# Return non-zero error code even if we didn't
|
|
|
|
# get one from the exception object
|
|
|
|
ret = getattr(e, 'returncode', 1)
|
2016-07-26 19:41:57 +02:00
|
|
|
|
2020-04-23 02:04:28 +02:00
|
|
|
Logs.debug('msvcdeps: Running for: %s' % self.inputs[0])
|
2016-07-26 19:41:57 +02:00
|
|
|
for line in raw_out.splitlines():
|
|
|
|
if line.startswith(INCLUDE_PATTERN):
|
2020-04-23 02:04:28 +02:00
|
|
|
# Only strip whitespace after log to preserve
|
|
|
|
# dependency structure in debug output
|
|
|
|
inc_path = line[len(INCLUDE_PATTERN):]
|
2016-07-26 19:41:57 +02:00
|
|
|
Logs.debug('msvcdeps: Regex matched %s', inc_path)
|
2020-04-23 02:04:28 +02:00
|
|
|
self.msvcdeps_paths.append(inc_path.strip())
|
2016-07-25 22:12:35 +02:00
|
|
|
else:
|
2016-07-26 19:41:57 +02:00
|
|
|
out.append(line)
|
2016-07-25 22:12:35 +02:00
|
|
|
|
2016-07-26 19:41:57 +02:00
|
|
|
# Pipe through the remaining stdout content (not related to /showIncludes)
|
|
|
|
if self.generator.bld.logger:
|
|
|
|
self.generator.bld.logger.debug('out: %s' % os.linesep.join(out))
|
|
|
|
else:
|
|
|
|
sys.stdout.write(os.linesep.join(out) + os.linesep)
|
2016-07-25 22:12:35 +02:00
|
|
|
|
2016-07-26 19:41:57 +02:00
|
|
|
return ret
|
|
|
|
finally:
|
|
|
|
try:
|
|
|
|
os.remove(tmp)
|
|
|
|
except OSError:
|
|
|
|
# anti-virus and indexers can keep files open -_-
|
|
|
|
pass
|
|
|
|
|
|
|
|
|
|
|
|
def wrap_compiled_task(classname):
|
|
|
|
derived_class = type(classname, (Task.classes[classname],), {})
|
|
|
|
derived_class.derived_msvcdeps = derived_class
|
2016-07-25 22:12:35 +02:00
|
|
|
derived_class.post_run = post_run
|
|
|
|
derived_class.scan = scan
|
|
|
|
derived_class.sig_implicit_deps = sig_implicit_deps
|
|
|
|
derived_class.exec_command = exec_command
|
2013-07-15 17:31:34 +02:00
|
|
|
|
|
|
|
for k in ('c', 'cxx'):
|
2016-07-26 19:41:57 +02:00
|
|
|
if k in Task.classes:
|
|
|
|
wrap_compiled_task(k)
|
2016-07-25 22:12:35 +02:00
|
|
|
|
2017-09-21 17:30:08 +02:00
|
|
|
def options(opt):
|
|
|
|
raise ValueError('Do not load msvcdeps options')
|
|
|
|
|