forked from envoyproxy/envoy
-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathBUILD
117 lines (107 loc) · 3.17 KB
/
BUILD
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
load(
"//bazel:envoy_build_system.bzl",
"envoy_cc_test",
"envoy_package",
"envoy_sh_test",
)
licenses(["notice"]) # Apache 2
envoy_package()
envoy_sh_test(
name = "build_id_test",
srcs = ["build_id_test.sh"],
coverage = False,
data = [
"//bazel:raw_build_id.ldscript",
"//source/exe:envoy-static",
],
# The Windows equivalent of a binaries' "link stamp" is a resource file descriptor of the
# executable. Our build revision API and output of --version flags are sufficient for now.
tags = ["skip_on_windows"],
)
envoy_sh_test(
name = "envoy_static_test",
srcs = ["envoy_static_test.sh"],
coverage = False,
data = ["//source/exe:envoy-static"],
# TODO(Windows): expect to test to leverage dumpbin.exe to confirm we avoid msvcrt, see
# https://github.com/envoyproxy/envoy/pull/8280#pullrequestreview-290187328
# Sanitizers doesn't like statically linked lib(std)c++ and libgcc, skip this test in that context.
tags = [
"no_san",
"skip_on_windows",
],
)
envoy_sh_test(
name = "pie_test",
srcs = ["pie_test.sh"],
coverage = False,
data = ["//source/exe:envoy-static"],
# Since VS2015 or even earlier, link.exe defaults to PIE generation
tags = [
"nofips",
"skip_on_windows",
],
)
envoy_sh_test(
name = "version_out_test",
srcs = ["version_out_test.sh"],
coverage = False,
data = [
"//:VERSION",
"//bazel:raw_build_id.ldscript",
"//source/exe:envoy-static",
],
)
envoy_cc_test(
name = "main_common_test",
srcs = ["main_common_test.cc"],
data = [
"//test/config/integration:google_com_proxy_port_0",
],
deps = [
"//source/common/api:api_lib",
"//source/exe:main_common_lib",
"//test/mocks/runtime:runtime_mocks",
"//test/test_common:contention_lib",
"//test/test_common:environment_lib",
],
)
envoy_cc_test(
name = "extra_extensions_test",
srcs = ["extra_extensions_test.cc"],
deps = [
# This dependency MUST be main_common_lib to meet the purpose of this test
"//source/exe:main_common_lib",
"//test/test_common:environment_lib",
],
)
envoy_cc_test(
name = "terminate_handler_test",
srcs = ["terminate_handler_test.cc"],
tags = ["backtrace"],
deps = [
"//source/exe:terminate_handler_lib",
"//test/test_common:utility_lib",
],
)
# Due to the limitiations of how Windows signals work
# this test cannot be executed through bazel and it must
# be executed as a standalone executable.
# e.g.: `./bazel-bin/test/exe/win32_outofproc_main_test.exe`
envoy_cc_test(
name = "win32_outofproc_main_test",
srcs = ["win32_outofproc_main_test.cc"],
data = [
"//source/exe:envoy-static",
"//test/config/integration:google_com_proxy_port_0",
],
# TODO(envoyproxy/windows-dev): Disable the manual tag.
tags = ["manual"],
deps = [
"//source/common/api:api_lib",
"//source/exe:main_common_lib",
"//test/mocks/runtime:runtime_mocks",
"//test/test_common:contention_lib",
"//test/test_common:environment_lib",
],
)