diff options
author | Android Build Coastguard Worker <android-build-coastguard-worker@google.com> | 2022-11-13 00:20:25 +0000 |
---|---|---|
committer | Android Build Coastguard Worker <android-build-coastguard-worker@google.com> | 2022-11-13 00:20:25 +0000 |
commit | 517424dcc11380511bc34f4a081f119104ff9e80 (patch) | |
tree | 77dc031614745bb406dbd90cea9a082a1b5cdd54 /binary_search_tool/compiler_wrapper.py | |
parent | 4d310bf178aa94bdc46c1b86b9937312ddac644a (diff) | |
parent | 40214b48188358a80b7478bfff21d4814dd9177c (diff) | |
download | toolchain-utils-android14-tests-release.tar.gz |
Snap for 9286241 from 40214b48188358a80b7478bfff21d4814dd9177c to udc-releaseandroid-vts-14.0_r4android-vts-14.0_r3android-vts-14.0_r2android-vts-14.0_r1android-security-14.0.0_r9android-security-14.0.0_r8android-security-14.0.0_r7android-security-14.0.0_r6android-security-14.0.0_r5android-security-14.0.0_r4android-security-14.0.0_r3android-security-14.0.0_r2android-security-14.0.0_r1android-platform-14.0.0_r1android-cts-14.0_r4android-cts-14.0_r3android-cts-14.0_r2android-cts-14.0_r1android-14.0.0_r28android-14.0.0_r2android-14.0.0_r15android-14.0.0_r14android-14.0.0_r13android-14.0.0_r1android14-tests-releaseandroid14-security-releaseandroid14-s2-releaseandroid14-s1-releaseandroid14-releaseandroid14-platform-releaseandroid14-gsi
Change-Id: I709f9d23cce32c5c2c81fc2d5869983d17b416ed
Diffstat (limited to 'binary_search_tool/compiler_wrapper.py')
-rwxr-xr-x | binary_search_tool/compiler_wrapper.py | 54 |
1 files changed, 27 insertions, 27 deletions
diff --git a/binary_search_tool/compiler_wrapper.py b/binary_search_tool/compiler_wrapper.py index 0fd92c67..c32826b0 100755 --- a/binary_search_tool/compiler_wrapper.py +++ b/binary_search_tool/compiler_wrapper.py @@ -1,6 +1,6 @@ #!/usr/bin/env python3 # -*- coding: utf-8 -*- -# Copyright 2020 The Chromium OS Authors. All rights reserved. +# Copyright 2020 The ChromiumOS Authors # Use of this source code is governed by a BSD-style license that can be # found in the LICENSE file. @@ -20,7 +20,6 @@ Design doc: https://docs.google.com/document/d/1yDgaUIa2O5w6dc3sSTe1ry-1ehKajTGJGQCbyn0fcEM """ -from __future__ import print_function import os import shlex @@ -28,41 +27,42 @@ import sys from binary_search_tool import bisect_driver -WRAPPED = '%s.real' % sys.argv[0] -BISECT_STAGE = os.environ.get('BISECT_STAGE') -DEFAULT_BISECT_DIR = os.path.expanduser('~/ANDROID_BISECT') -BISECT_DIR = os.environ.get('BISECT_DIR') or DEFAULT_BISECT_DIR + +WRAPPED = "%s.real" % sys.argv[0] +BISECT_STAGE = os.environ.get("BISECT_STAGE") +DEFAULT_BISECT_DIR = os.path.expanduser("~/ANDROID_BISECT") +BISECT_DIR = os.environ.get("BISECT_DIR") or DEFAULT_BISECT_DIR def ProcessArgFile(arg_file): - args = [] - # Read in entire file at once and parse as if in shell - with open(arg_file, 'r', encoding='utf-8') as f: - args.extend(shlex.split(f.read())) + args = [] + # Read in entire file at once and parse as if in shell + with open(arg_file, "r", encoding="utf-8") as f: + args.extend(shlex.split(f.read())) - return args + return args def Main(_): - if not os.path.islink(sys.argv[0]): - print("Compiler wrapper can't be called directly!") - return 1 + if not os.path.islink(sys.argv[0]): + print("Compiler wrapper can't be called directly!") + return 1 - execargs = [WRAPPED] + sys.argv[1:] + execargs = [WRAPPED] + sys.argv[1:] - if BISECT_STAGE not in bisect_driver.VALID_MODES or '-o' not in execargs: - os.execv(WRAPPED, [WRAPPED] + sys.argv[1:]) + if BISECT_STAGE not in bisect_driver.VALID_MODES or "-o" not in execargs: + os.execv(WRAPPED, [WRAPPED] + sys.argv[1:]) - # Handle @file argument syntax with compiler - for idx, _ in enumerate(execargs): - # @file can be nested in other @file arguments, use While to re-evaluate - # the first argument of the embedded file. - while execargs[idx][0] == '@': - args_in_file = ProcessArgFile(execargs[idx][1:]) - execargs = execargs[0:idx] + args_in_file + execargs[idx + 1:] + # Handle @file argument syntax with compiler + for idx, _ in enumerate(execargs): + # @file can be nested in other @file arguments, use While to re-evaluate + # the first argument of the embedded file. + while execargs[idx][0] == "@": + args_in_file = ProcessArgFile(execargs[idx][1:]) + execargs = execargs[0:idx] + args_in_file + execargs[idx + 1 :] - bisect_driver.bisect_driver(BISECT_STAGE, BISECT_DIR, execargs) + bisect_driver.bisect_driver(BISECT_STAGE, BISECT_DIR, execargs) -if __name__ == '__main__': - sys.exit(Main(sys.argv[1:])) +if __name__ == "__main__": + sys.exit(Main(sys.argv[1:])) |