jade
3daeeaefb1
The principle of this is that you can either externally build it with
Nix (actual implementation will be in a future commit), or it can be
built with meson if the Nix one is not passed in.
The idea I have is that dev shells don't receive the one from Nix to
avoid having to build it, but CI can use the one from Nix and save some
gratuitous rebuilds.
The design of this is that you can run `ninja -C build clang-tidy` and
it will simply correctly clang-tidy the codebase in spite of PCH
bullshit caused by the cc-wrapper.
This is a truly horrendous number of hacks in a ball, caused by bugs in
several pieces of software, and I am not even getting started.
I don't consider this to fix the clang-tidy issue filing, since we still
have a fair number of issues to fix even on the existing minimal
configuration, and I have not yet implemented it in CI. Realistically we
will need to do something like https://github.com/Ericsson/codechecker
to be able to silence warnings without physically touching the code, or
at least *diff* reports between versions.
Also, the run-clang-tidy output design is rather atrocious and must
not be inflicted upon anyone I have respect for, since it buries the
diagnostics in a pile of invocation logs. We would do really well to
integrate with the Gerrit SARIF stuff so we can dump the reports on
people in a user-friendly manner.
Related: lix-project/lix#147
Change-Id: Ifefe533f3b56874795de231667046b2da6ff2461
75 lines
2.6 KiB
Meson
75 lines
2.6 KiB
Meson
# vim: filetype=meson
|
|
|
|
option('enable-build', type : 'boolean', value : true,
|
|
description : 'set to false to not actually build. Only really makes sense with -Dinternal-api-docs=true',
|
|
)
|
|
|
|
option('gc', type : 'feature',
|
|
description : 'enable garbage collection in the Nix expression evaluator (requires Boehm GC)',
|
|
)
|
|
|
|
option('enable-embedded-sandbox-shell', type : 'boolean', value : false,
|
|
description : 'include the sandbox shell in the Nix binary',
|
|
)
|
|
|
|
option('cpuid', type : 'feature',
|
|
description : 'determine microarchitecture levels with libcpuid (only relevant on x86_64)',
|
|
)
|
|
|
|
option('seccomp-sandboxing', type : 'feature',
|
|
description : 'build support for seccomp sandboxing (recommended unless your arch doesn\'t support libseccomp, only relevant on Linux)',
|
|
)
|
|
|
|
option('sandbox-shell', type : 'string', value : 'busybox',
|
|
description : 'path to a statically-linked shell to use as /bin/sh in sandboxes (usually busybox)',
|
|
)
|
|
|
|
option('enable-tests', type : 'boolean', value : true,
|
|
description : 'whether to enable tests or not (requires rapidcheck and gtest)',
|
|
)
|
|
|
|
option('tests-color', type : 'boolean', value : true,
|
|
description : 'set to false to disable color output in gtest',
|
|
)
|
|
|
|
option('tests-brief', type : 'boolean', value : false,
|
|
description : 'set to true for shorter tests output',
|
|
)
|
|
|
|
option('profile-build', type : 'feature', value: 'disabled',
|
|
description : 'whether to enable -ftime-trace in clang builds, allowing for diagnosing the cause of build time.'
|
|
)
|
|
|
|
option('store-dir', type : 'string', value : '/nix/store',
|
|
description : 'path of the Nix store',
|
|
)
|
|
|
|
option('state-dir', type : 'string', value : '/nix/var',
|
|
description : 'path to store state in for Nix',
|
|
)
|
|
|
|
option('log-dir', type : 'string', value : '/nix/var/log/nix',
|
|
description : 'path to store logs in for Nix',
|
|
)
|
|
|
|
option('enable-docs', type : 'boolean', value : true,
|
|
description : 'whether to build documentation',
|
|
)
|
|
|
|
option('internal-api-docs', type : 'feature', value : 'auto',
|
|
description : 'whether to build internal API documentation (requires doxygen)',
|
|
)
|
|
|
|
# A relative path means it gets appended to prefix.
|
|
option('profile-dir', type : 'string', value : 'etc/profile.d',
|
|
description : 'the path to install shell profile files',
|
|
)
|
|
|
|
option('enable-pch-std', type : 'boolean', value : true,
|
|
description : 'whether to use precompiled headers for C++\'s standard library (breaks clangd if you\'re using GCC)',
|
|
)
|
|
|
|
option('lix-clang-tidy-checks-path', type : 'string', value : '',
|
|
description: 'path to lix-clang-tidy-checks library file, if providing it externally. Uses an internal one if this is not set',
|
|
)
|