3daeeaefb1
The principle of this is that you can either externally build it with Nix (actual implementation will be in a future commit), or it can be built with meson if the Nix one is not passed in. The idea I have is that dev shells don't receive the one from Nix to avoid having to build it, but CI can use the one from Nix and save some gratuitous rebuilds. The design of this is that you can run `ninja -C build clang-tidy` and it will simply correctly clang-tidy the codebase in spite of PCH bullshit caused by the cc-wrapper. This is a truly horrendous number of hacks in a ball, caused by bugs in several pieces of software, and I am not even getting started. I don't consider this to fix the clang-tidy issue filing, since we still have a fair number of issues to fix even on the existing minimal configuration, and I have not yet implemented it in CI. Realistically we will need to do something like https://github.com/Ericsson/codechecker to be able to silence warnings without physically touching the code, or at least *diff* reports between versions. Also, the run-clang-tidy output design is rather atrocious and must not be inflicted upon anyone I have respect for, since it buries the diagnostics in a pile of invocation logs. We would do really well to integrate with the Gerrit SARIF stuff so we can dump the reports on people in a user-friendly manner. Related: https://git.lix.systems/lix-project/lix/issues/147 Change-Id: Ifefe533f3b56874795de231667046b2da6ff2461
74 lines
2.6 KiB
Meson
74 lines
2.6 KiB
Meson
# vim: filetype=meson
|
|
|
|
option('enable-build', type : 'boolean', value : true,
|
|
description : 'set to false to not actually build. Only really makes sense with -Dinternal-api-docs=true',
|
|
)
|
|
|
|
option('gc', type : 'feature',
|
|
description : 'enable garbage collection in the Nix expression evaluator (requires Boehm GC)',
|
|
)
|
|
|
|
option('enable-embedded-sandbox-shell', type : 'boolean', value : false,
|
|
description : 'include the sandbox shell in the Nix binary',
|
|
)
|
|
|
|
option('cpuid', type : 'feature',
|
|
description : 'determine microarchitecture levels with libcpuid (only relevant on x86_64)',
|
|
)
|
|
|
|
option('seccomp-sandboxing', type : 'feature',
|
|
description : 'build support for seccomp sandboxing (recommended unless your arch doesn\'t support libseccomp, only relevant on Linux)',
|
|
)
|
|
|
|
option('sandbox-shell', type : 'string', value : 'busybox',
|
|
description : 'path to a statically-linked shell to use as /bin/sh in sandboxes (usually busybox)',
|
|
)
|
|
|
|
option('enable-tests', type : 'boolean', value : true,
|
|
description : 'whether to enable tests or not (requires rapidcheck and gtest)',
|
|
)
|
|
|
|
option('tests-color', type : 'boolean', value : true,
|
|
description : 'set to false to disable color output in gtest',
|
|
)
|
|
|
|
option('tests-brief', type : 'boolean', value : false,
|
|
description : 'set to true for shorter tests output',
|
|
)
|
|
|
|
option('profile-build', type : 'feature', value: 'disabled',
|
|
description : 'whether to enable -ftime-trace in clang builds, allowing for diagnosing the cause of build time.'
|
|
)
|
|
|
|
option('store-dir', type : 'string', value : '/nix/store',
|
|
description : 'path of the Nix store',
|
|
)
|
|
|
|
option('state-dir', type : 'string', value : '/nix/var',
|
|
description : 'path to store state in for Nix',
|
|
)
|
|
|
|
option('log-dir', type : 'string', value : '/nix/var/log/nix',
|
|
description : 'path to store logs in for Nix',
|
|
)
|
|
|
|
option('enable-docs', type : 'boolean', value : true,
|
|
description : 'whether to build documentation',
|
|
)
|
|
|
|
option('internal-api-docs', type : 'feature', value : 'auto',
|
|
description : 'whether to build internal API documentation (requires doxygen)',
|
|
)
|
|
|
|
# A relative path means it gets appended to prefix.
|
|
option('profile-dir', type : 'string', value : 'etc/profile.d',
|
|
description : 'the path to install shell profile files',
|
|
)
|
|
|
|
option('enable-pch-std', type : 'boolean', value : true,
|
|
description : 'whether to use precompiled headers for C++\'s standard library (breaks clangd if you\'re using GCC)',
|
|
)
|
|
|
|
option('lix-clang-tidy-checks-path', type : 'string', value : '',
|
|
description: 'path to lix-clang-tidy-checks library file, if providing it externally. Uses an internal one if this is not set',
|
|
)
|