clang-tool-chain 1.1.3__py3-none-any.whl → 1.1.5__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- clang_tool_chain/__init__.py +2 -0
- clang_tool_chain/__version__.py +1 -1
- clang_tool_chain/env_utils.py +59 -1
- clang_tool_chain/execution/__init__.py +2 -0
- clang_tool_chain/execution/arg_transformers.py +14 -5
- clang_tool_chain/execution/sanitizer_env.py +77 -3
- clang_tool_chain/linker/lld.py +10 -10
- {clang_tool_chain-1.1.3.dist-info → clang_tool_chain-1.1.5.dist-info}/METADATA +1 -1
- {clang_tool_chain-1.1.3.dist-info → clang_tool_chain-1.1.5.dist-info}/RECORD +12 -12
- {clang_tool_chain-1.1.3.dist-info → clang_tool_chain-1.1.5.dist-info}/WHEEL +0 -0
- {clang_tool_chain-1.1.3.dist-info → clang_tool_chain-1.1.5.dist-info}/entry_points.txt +0 -0
- {clang_tool_chain-1.1.3.dist-info → clang_tool_chain-1.1.5.dist-info}/licenses/LICENSE +0 -0
clang_tool_chain/__init__.py
CHANGED
|
@@ -9,6 +9,7 @@ from clang_tool_chain.env_utils import (
|
|
|
9
9
|
)
|
|
10
10
|
from clang_tool_chain.execution.sanitizer_env import (
|
|
11
11
|
detect_sanitizers_from_flags,
|
|
12
|
+
get_runtime_dll_paths,
|
|
12
13
|
get_symbolizer_path,
|
|
13
14
|
prepare_sanitizer_environment,
|
|
14
15
|
)
|
|
@@ -27,6 +28,7 @@ __all__ = [
|
|
|
27
28
|
"CONTROLLABLE_FEATURES",
|
|
28
29
|
# Sanitizer environment
|
|
29
30
|
"prepare_sanitizer_environment",
|
|
31
|
+
"get_runtime_dll_paths",
|
|
30
32
|
"get_symbolizer_path",
|
|
31
33
|
"detect_sanitizers_from_flags",
|
|
32
34
|
]
|
clang_tool_chain/__version__.py
CHANGED
clang_tool_chain/env_utils.py
CHANGED
|
@@ -26,13 +26,20 @@ CONTROLLABLE_FEATURES = {
|
|
|
26
26
|
"DIRECTIVES": "Inlined build directives (@link, @std, @cflags)",
|
|
27
27
|
"SHARED_ASAN": "Automatic -shared-libasan injection (Linux)",
|
|
28
28
|
"SANITIZER_ENV": "Automatic ASAN_OPTIONS/LSAN_OPTIONS injection",
|
|
29
|
-
"SANITIZER_NOTE": "Sanitizer flag injection note to stderr",
|
|
30
29
|
"RPATH": "Automatic rpath injection for library loading",
|
|
31
30
|
"SYSROOT": "Automatic macOS SDK detection (-isysroot)",
|
|
32
31
|
"DEPLOY_LIBS": "Cross-platform library deployment (all outputs)",
|
|
33
32
|
"DEPLOY_SHARED_LIB": "Library deployment for shared library outputs only (.dll, .so, .dylib)",
|
|
34
33
|
"BUNDLED_UNWIND": "Bundled libunwind paths on Linux",
|
|
35
34
|
"MACOS_UNWIND_FIX": "Automatic -lunwind removal on macOS (libunwind in libSystem)",
|
|
35
|
+
# Sanitizer notes (hierarchical)
|
|
36
|
+
"SANITIZER_NOTE": "All sanitizer-related notes (category master)",
|
|
37
|
+
"SHARED_ASAN_NOTE": "-shared-libasan injection note",
|
|
38
|
+
"ALLOW_SHLIB_UNDEFINED_NOTE": "-Wl,--allow-shlib-undefined injection note",
|
|
39
|
+
# Linker notes (hierarchical)
|
|
40
|
+
"LINKER_NOTE": "All linker-related notes (category master)",
|
|
41
|
+
"LINKER_COMPAT_NOTE": "Removed GNU linker flags note",
|
|
42
|
+
"LD64_LLD_CONVERT_NOTE": "-fuse-ld=ld64.lld conversion note",
|
|
36
43
|
}
|
|
37
44
|
|
|
38
45
|
|
|
@@ -137,3 +144,54 @@ def log_disabled_features_summary() -> None:
|
|
|
137
144
|
logger.info("All automatic features disabled via CLANG_TOOL_CHAIN_NO_AUTO=1")
|
|
138
145
|
else:
|
|
139
146
|
logger.info(f"Disabled features: {', '.join(disabled)}")
|
|
147
|
+
|
|
148
|
+
|
|
149
|
+
def is_note_disabled(specific: str, category: str | None = None) -> bool:
|
|
150
|
+
"""
|
|
151
|
+
Check if a specific note is disabled using hierarchical suppression.
|
|
152
|
+
|
|
153
|
+
A note is disabled if ANY of:
|
|
154
|
+
1. CLANG_TOOL_CHAIN_NO_AUTO=1 (global master)
|
|
155
|
+
2. CLANG_TOOL_CHAIN_NO_{category}=1 (category master, if provided)
|
|
156
|
+
3. CLANG_TOOL_CHAIN_NO_{specific}=1 (specific note)
|
|
157
|
+
|
|
158
|
+
This allows users to:
|
|
159
|
+
- Disable all automatic features with NO_AUTO=1
|
|
160
|
+
- Disable a category of notes (e.g., all sanitizer notes) with NO_SANITIZER_NOTE=1
|
|
161
|
+
- Disable a specific note with its dedicated variable (e.g., NO_SHARED_ASAN_NOTE=1)
|
|
162
|
+
|
|
163
|
+
Args:
|
|
164
|
+
specific: The specific note name (e.g., "SHARED_ASAN_NOTE")
|
|
165
|
+
category: Optional category master (e.g., "SANITIZER_NOTE")
|
|
166
|
+
|
|
167
|
+
Returns:
|
|
168
|
+
True if the note should be suppressed
|
|
169
|
+
|
|
170
|
+
Example:
|
|
171
|
+
>>> os.environ["CLANG_TOOL_CHAIN_NO_SANITIZER_NOTE"] = "1"
|
|
172
|
+
>>> is_note_disabled("SHARED_ASAN_NOTE", "SANITIZER_NOTE")
|
|
173
|
+
True # Disabled via category
|
|
174
|
+
|
|
175
|
+
>>> os.environ["CLANG_TOOL_CHAIN_NO_SHARED_ASAN_NOTE"] = "1"
|
|
176
|
+
>>> is_note_disabled("SHARED_ASAN_NOTE", "SANITIZER_NOTE")
|
|
177
|
+
True # Disabled via specific variable
|
|
178
|
+
"""
|
|
179
|
+
# Check the global master (NO_AUTO)
|
|
180
|
+
if is_auto_disabled():
|
|
181
|
+
logger.debug(f"Note {specific} disabled via CLANG_TOOL_CHAIN_NO_AUTO=1")
|
|
182
|
+
return True
|
|
183
|
+
|
|
184
|
+
# Check the category master (if provided)
|
|
185
|
+
if category:
|
|
186
|
+
var_name = f"CLANG_TOOL_CHAIN_NO_{category}"
|
|
187
|
+
if _is_truthy(os.environ.get(var_name)):
|
|
188
|
+
logger.debug(f"Note {specific} disabled via {var_name}=1 (category master)")
|
|
189
|
+
return True
|
|
190
|
+
|
|
191
|
+
# Check the specific note variable
|
|
192
|
+
var_name = f"CLANG_TOOL_CHAIN_NO_{specific}"
|
|
193
|
+
if _is_truthy(os.environ.get(var_name)):
|
|
194
|
+
logger.debug(f"Note {specific} disabled via {var_name}=1")
|
|
195
|
+
return True
|
|
196
|
+
|
|
197
|
+
return False
|
|
@@ -12,6 +12,7 @@ from clang_tool_chain.execution.build import build_main, build_run_main
|
|
|
12
12
|
from clang_tool_chain.execution.core import execute_tool, run_tool, sccache_clang_cpp_main, sccache_clang_main
|
|
13
13
|
from clang_tool_chain.execution.sanitizer_env import (
|
|
14
14
|
detect_sanitizers_from_flags,
|
|
15
|
+
get_runtime_dll_paths,
|
|
15
16
|
get_symbolizer_path,
|
|
16
17
|
prepare_sanitizer_environment,
|
|
17
18
|
)
|
|
@@ -29,5 +30,6 @@ __all__ = [
|
|
|
29
30
|
# Sanitizer utilities
|
|
30
31
|
"prepare_sanitizer_environment",
|
|
31
32
|
"detect_sanitizers_from_flags",
|
|
33
|
+
"get_runtime_dll_paths",
|
|
32
34
|
"get_symbolizer_path",
|
|
33
35
|
]
|
|
@@ -39,7 +39,7 @@ from dataclasses import dataclass
|
|
|
39
39
|
from pathlib import Path
|
|
40
40
|
from typing import TYPE_CHECKING
|
|
41
41
|
|
|
42
|
-
from clang_tool_chain.env_utils import is_feature_disabled
|
|
42
|
+
from clang_tool_chain.env_utils import is_feature_disabled, is_note_disabled
|
|
43
43
|
|
|
44
44
|
if TYPE_CHECKING:
|
|
45
45
|
from clang_tool_chain.directives.parser import ParsedDirectives
|
|
@@ -487,11 +487,20 @@ class ASANRuntimeTransformer(ArgumentTransformer):
|
|
|
487
487
|
result = ["-Wl,--allow-shlib-undefined"] + result
|
|
488
488
|
injected_flags.append("-Wl,--allow-shlib-undefined")
|
|
489
489
|
|
|
490
|
-
#
|
|
491
|
-
if injected_flags and not
|
|
490
|
+
# Emit individual notes for each injected flag (hierarchical suppression)
|
|
491
|
+
if "-shared-libasan" in injected_flags and not is_note_disabled("SHARED_ASAN_NOTE", "SANITIZER_NOTE"):
|
|
492
492
|
print(
|
|
493
|
-
|
|
494
|
-
"(disable with
|
|
493
|
+
"clang-tool-chain: note: automatically injected -shared-libasan for ASAN runtime linking "
|
|
494
|
+
"(disable with CLANG_TOOL_CHAIN_NO_SHARED_ASAN_NOTE=1)",
|
|
495
|
+
file=sys.stderr,
|
|
496
|
+
)
|
|
497
|
+
|
|
498
|
+
if "-Wl,--allow-shlib-undefined" in injected_flags and not is_note_disabled(
|
|
499
|
+
"ALLOW_SHLIB_UNDEFINED_NOTE", "SANITIZER_NOTE"
|
|
500
|
+
):
|
|
501
|
+
print(
|
|
502
|
+
"clang-tool-chain: note: automatically injected -Wl,--allow-shlib-undefined for shared library ASAN "
|
|
503
|
+
"(disable with CLANG_TOOL_CHAIN_NO_ALLOW_SHLIB_UNDEFINED_NOTE=1)",
|
|
495
504
|
file=sys.stderr,
|
|
496
505
|
)
|
|
497
506
|
|
|
@@ -1,9 +1,9 @@
|
|
|
1
1
|
"""
|
|
2
2
|
Sanitizer runtime environment configuration.
|
|
3
3
|
|
|
4
|
-
This module provides automatic injection of ASAN_OPTIONS, LSAN_OPTIONS,
|
|
5
|
-
ASAN_SYMBOLIZER_PATH environment variables to
|
|
6
|
-
|
|
4
|
+
This module provides automatic injection of ASAN_OPTIONS, LSAN_OPTIONS,
|
|
5
|
+
ASAN_SYMBOLIZER_PATH, and PATH environment variables to ensure executables
|
|
6
|
+
compiled with Address Sanitizer or Leak Sanitizer can run correctly.
|
|
7
7
|
|
|
8
8
|
The default options fix <unknown module> entries in stack traces from
|
|
9
9
|
dlopen()'d shared libraries by enabling slow unwinding and symbolization.
|
|
@@ -11,6 +11,10 @@ dlopen()'d shared libraries by enabling slow unwinding and symbolization.
|
|
|
11
11
|
The symbolizer path is automatically detected from the clang-tool-chain
|
|
12
12
|
installation, enabling proper address-to-symbol resolution without manual
|
|
13
13
|
configuration.
|
|
14
|
+
|
|
15
|
+
On Windows with shared ASAN runtime (-shared-libasan), the clang runtime
|
|
16
|
+
DLL directory is automatically added to PATH to ensure the ASAN DLL can
|
|
17
|
+
be found at runtime.
|
|
14
18
|
"""
|
|
15
19
|
|
|
16
20
|
import logging
|
|
@@ -71,6 +75,62 @@ def get_symbolizer_path() -> str | None:
|
|
|
71
75
|
return None
|
|
72
76
|
|
|
73
77
|
|
|
78
|
+
def get_runtime_dll_paths() -> list[str]:
|
|
79
|
+
"""
|
|
80
|
+
Get paths to directories containing runtime DLLs (Windows only).
|
|
81
|
+
|
|
82
|
+
On Windows, when using shared ASAN runtime (-shared-libasan), the
|
|
83
|
+
libclang_rt.asan_dynamic-x86_64.dll must be findable at runtime.
|
|
84
|
+
This function returns the paths that should be added to PATH.
|
|
85
|
+
|
|
86
|
+
Returns:
|
|
87
|
+
List of directory paths containing runtime DLLs, or empty list
|
|
88
|
+
if not applicable (non-Windows or DLLs not found).
|
|
89
|
+
|
|
90
|
+
Example:
|
|
91
|
+
>>> paths = get_runtime_dll_paths()
|
|
92
|
+
>>> if paths:
|
|
93
|
+
... os.environ["PATH"] = os.pathsep.join(paths) + os.pathsep + os.environ.get("PATH", "")
|
|
94
|
+
"""
|
|
95
|
+
if platform.system() != "Windows":
|
|
96
|
+
return []
|
|
97
|
+
|
|
98
|
+
paths = []
|
|
99
|
+
|
|
100
|
+
try:
|
|
101
|
+
from clang_tool_chain.platform.detection import get_platform_binary_dir, get_platform_info
|
|
102
|
+
|
|
103
|
+
# Get platform info for sysroot lookup
|
|
104
|
+
_platform_name, arch = get_platform_info()
|
|
105
|
+
|
|
106
|
+
# Get the clang bin directory and sysroot bin directory
|
|
107
|
+
clang_bin_dir = get_platform_binary_dir()
|
|
108
|
+
clang_root = clang_bin_dir.parent
|
|
109
|
+
|
|
110
|
+
# Add clang bin directory (for some sanitizer DLLs)
|
|
111
|
+
if clang_bin_dir.exists():
|
|
112
|
+
paths.append(str(clang_bin_dir))
|
|
113
|
+
|
|
114
|
+
# Add MinGW sysroot bin directory (where libclang_rt.asan_dynamic-x86_64.dll lives)
|
|
115
|
+
if arch == "x86_64":
|
|
116
|
+
sysroot_name = "x86_64-w64-mingw32"
|
|
117
|
+
elif arch == "arm64":
|
|
118
|
+
sysroot_name = "aarch64-w64-mingw32"
|
|
119
|
+
else:
|
|
120
|
+
sysroot_name = None
|
|
121
|
+
|
|
122
|
+
if sysroot_name:
|
|
123
|
+
sysroot_bin = clang_root / sysroot_name / "bin"
|
|
124
|
+
if sysroot_bin.exists():
|
|
125
|
+
paths.append(str(sysroot_bin))
|
|
126
|
+
logger.debug(f"Found MinGW sysroot bin: {sysroot_bin}")
|
|
127
|
+
|
|
128
|
+
except (ImportError, RuntimeError) as e:
|
|
129
|
+
logger.debug(f"Could not get runtime DLL paths: {e}")
|
|
130
|
+
|
|
131
|
+
return paths
|
|
132
|
+
|
|
133
|
+
|
|
74
134
|
def detect_sanitizers_from_flags(compiler_flags: list[str]) -> tuple[bool, bool]:
|
|
75
135
|
"""
|
|
76
136
|
Detect which sanitizers are enabled from compiler flags.
|
|
@@ -224,6 +284,20 @@ def prepare_sanitizer_environment(
|
|
|
224
284
|
"or ensure clang-tool-chain is properly installed."
|
|
225
285
|
)
|
|
226
286
|
|
|
287
|
+
# On Windows, add runtime DLL paths to PATH for shared ASAN runtime
|
|
288
|
+
# This ensures libclang_rt.asan_dynamic-x86_64.dll can be found at runtime
|
|
289
|
+
if asan_enabled and platform.system() == "Windows":
|
|
290
|
+
dll_paths = get_runtime_dll_paths()
|
|
291
|
+
if dll_paths:
|
|
292
|
+
current_path = env.get("PATH", "")
|
|
293
|
+
# Prepend DLL paths to ensure they take priority
|
|
294
|
+
new_path = os.pathsep.join(dll_paths)
|
|
295
|
+
if current_path:
|
|
296
|
+
env["PATH"] = new_path + os.pathsep + current_path
|
|
297
|
+
else:
|
|
298
|
+
env["PATH"] = new_path
|
|
299
|
+
logger.info(f"Injecting runtime DLL paths to PATH: {dll_paths}")
|
|
300
|
+
|
|
227
301
|
# Add platform-specific LSan suppressions if LSAN is enabled
|
|
228
302
|
if lsan_enabled:
|
|
229
303
|
# Check if user explicitly disabled built-in suppressions with ""
|
clang_tool_chain/linker/lld.py
CHANGED
|
@@ -12,7 +12,7 @@ import logging
|
|
|
12
12
|
import os
|
|
13
13
|
import sys
|
|
14
14
|
|
|
15
|
-
from clang_tool_chain.env_utils import
|
|
15
|
+
from clang_tool_chain.env_utils import is_note_disabled
|
|
16
16
|
from clang_tool_chain.interrupt_utils import handle_keyboard_interrupt_properly
|
|
17
17
|
from clang_tool_chain.llvm_versions import get_llvm_version_tuple, supports_ld64_lld_flag
|
|
18
18
|
|
|
@@ -272,10 +272,8 @@ def _translate_linker_flags_for_macos_lld(args: list[str]) -> list[str]:
|
|
|
272
272
|
|
|
273
273
|
i += 1
|
|
274
274
|
|
|
275
|
-
# Emit warning for removed flags (unless silenced)
|
|
276
|
-
if removed_flags and not
|
|
277
|
-
import sys
|
|
278
|
-
|
|
275
|
+
# Emit warning for removed flags (unless silenced via hierarchical suppression)
|
|
276
|
+
if removed_flags and not is_note_disabled("LINKER_COMPAT_NOTE", "LINKER_NOTE"):
|
|
279
277
|
print(
|
|
280
278
|
f"clang-tool-chain: note: removed GNU linker flags not supported by ld64.lld: "
|
|
281
279
|
f"{', '.join(removed_flags)} (disable with CLANG_TOOL_CHAIN_NO_LINKER_COMPAT_NOTE=1)",
|
|
@@ -379,11 +377,13 @@ def _add_lld_linker_if_needed(platform_name: str, args: list[str]) -> list[str]:
|
|
|
379
377
|
# Check if user specified -fuse-ld=ld64.lld (which is not a valid clang driver option)
|
|
380
378
|
# and emit a warning about the auto-conversion to -fuse-ld=lld
|
|
381
379
|
if _user_specified_ld64_lld(args):
|
|
382
|
-
|
|
383
|
-
|
|
384
|
-
|
|
385
|
-
|
|
386
|
-
|
|
380
|
+
if not is_note_disabled("LD64_LLD_CONVERT_NOTE", "LINKER_NOTE"):
|
|
381
|
+
print(
|
|
382
|
+
"clang-tool-chain: warning: -fuse-ld=ld64.lld is not a valid clang driver option. "
|
|
383
|
+
"Auto-converting to -fuse-ld=lld (clang driver auto-dispatches to ld64.lld on Darwin). "
|
|
384
|
+
"(disable with CLANG_TOOL_CHAIN_NO_LD64_LLD_CONVERT_NOTE=1)",
|
|
385
|
+
file=sys.stderr,
|
|
386
|
+
)
|
|
387
387
|
args = _convert_ld64_lld_to_lld(args)
|
|
388
388
|
|
|
389
389
|
return _translate_linker_flags_for_macos_lld(args)
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
Metadata-Version: 2.4
|
|
2
2
|
Name: clang-tool-chain
|
|
3
|
-
Version: 1.1.
|
|
3
|
+
Version: 1.1.5
|
|
4
4
|
Summary: Clang Tool Chain - C/C++ compilation toolchain utilities
|
|
5
5
|
Project-URL: Homepage, https://github.com/zackees/clang-tool-chain
|
|
6
6
|
Project-URL: Repository, https://github.com/zackees/clang-tool-chain
|
|
@@ -1,5 +1,5 @@
|
|
|
1
|
-
clang_tool_chain/__init__.py,sha256=
|
|
2
|
-
clang_tool_chain/__version__.py,sha256=
|
|
1
|
+
clang_tool_chain/__init__.py,sha256=nLK5yA3seauLHvtQN3Qfe8_XLfbs8b-noek_3baRRZc,936
|
|
2
|
+
clang_tool_chain/__version__.py,sha256=jG7OiD1U-R4k5RPrITUrVwY2AnwCm3EQkm__FP_IjMI,71
|
|
3
3
|
clang_tool_chain/archive.py,sha256=t3reh7cm5XP2rhTqfRIDAQZv5XQq7SsstyiROYg8wFA,27697
|
|
4
4
|
clang_tool_chain/archive_cache.py,sha256=5ZmlwXIJZDcrDFkTbdgBQYN9sulGn0WyI6qwWqC4HEU,6806
|
|
5
5
|
clang_tool_chain/checksums.py,sha256=KFXeAeDz5ZlcZVOxsHDpNDCrm9UDoJ8bMA4PeNhuzdA,9868
|
|
@@ -9,7 +9,7 @@ clang_tool_chain/cli_parsers.py,sha256=cHVDyW75N_Kao1VYeAgw_L-1K65DjyvWUigQScTFi
|
|
|
9
9
|
clang_tool_chain/component_db.py,sha256=ohtlycsrEokui83iZyPsTyxmvXgkD7_OpVwAn1Cq8gI,9096
|
|
10
10
|
clang_tool_chain/downloader.py,sha256=fqErxTaI3oEYbloLZnrWXJ26j2iGOngPnl4i8kqOWNs,6041
|
|
11
11
|
clang_tool_chain/env_breadcrumbs.py,sha256=bvPTz8xABILhzrXTEBzdGrSbpEXLf2YVgcYEe-IdhNY,2335
|
|
12
|
-
clang_tool_chain/env_utils.py,sha256=
|
|
12
|
+
clang_tool_chain/env_utils.py,sha256=XFcjc_tJWiHLb_o90D0G3t_mT42X2kVLP6rwaIxfOO0,6679
|
|
13
13
|
clang_tool_chain/fetch.py,sha256=DwsNl5DZkNqEYXL-FbCTnp6IA2iCAa9pMl5oPjyuOS4,4696
|
|
14
14
|
clang_tool_chain/installer.py,sha256=GuGeUvVcAw4HMj9jrub-I11ixmksw-vgtSOFrlupmPA,3323
|
|
15
15
|
clang_tool_chain/interrupt_utils.py,sha256=7YvazvGzyItRVDZ_pzUSK6at8PCw-Dgih69HLSz0tT4,1153
|
|
@@ -38,8 +38,8 @@ clang_tool_chain/deployment/libdeploy.py,sha256=cfyDFmbuUmimss5fv7exO7NOulDnw7ag
|
|
|
38
38
|
clang_tool_chain/deployment/so_deployer.py,sha256=eAygmGojioi1iz5cHeqmKjJ5fI-5XooG9Ro-5TIA0gw,12867
|
|
39
39
|
clang_tool_chain/directives/__init__.py,sha256=MJDNYL_MD2MF0HFsrTsSTX645bYo6vtjq2pOTtfykaU,198
|
|
40
40
|
clang_tool_chain/directives/parser.py,sha256=6J7mO1JtvuHkkKS0Xges5b_jT9b3uTF6ULI0ZiwGAdw,11179
|
|
41
|
-
clang_tool_chain/execution/__init__.py,sha256
|
|
42
|
-
clang_tool_chain/execution/arg_transformers.py,sha256=
|
|
41
|
+
clang_tool_chain/execution/__init__.py,sha256=-jrL19U2UkP6qcUQVNq2qB0txg2TGXXTpXn_wXjVemg,996
|
|
42
|
+
clang_tool_chain/execution/arg_transformers.py,sha256=Vut8XHp4IHkEUhVRI-NSvFaX6EvrGDd3FCEHbDe9gHo,26268
|
|
43
43
|
clang_tool_chain/execution/build.py,sha256=YHS1BJTZg5pBS9czVko41mBdfswSPad5hxfitMoLvsI,13275
|
|
44
44
|
clang_tool_chain/execution/build_pipeline.py,sha256=ORJEJ8WYp8c7bhWAa-e3w_ySXwenpUczlmXgoGByToY,17823
|
|
45
45
|
clang_tool_chain/execution/core.py,sha256=7CJ0azznC5lq5bw8amk2kwCIN2I_OnDiKytpapkvrdY,25273
|
|
@@ -49,7 +49,7 @@ clang_tool_chain/execution/iwyu.py,sha256=bmP0d_PZObA1JfmFYp3qIOKCb7y32AWPm2_ReF
|
|
|
49
49
|
clang_tool_chain/execution/lldb.py,sha256=VpxkWTPS6PsyskaKTALeziR5Z5NLwarW174Fm1SMX9k,20718
|
|
50
50
|
clang_tool_chain/execution/nodejs_resolver.py,sha256=8QsJWvIfmt5mBDV7n0ypSjsPyXS-eZTizhBli937I-g,11172
|
|
51
51
|
clang_tool_chain/execution/platform_executor.py,sha256=sF4GyW0ujy2EewG8y2Eo1gUWGzss5G5iIkv02w7-2_o,14362
|
|
52
|
-
clang_tool_chain/execution/sanitizer_env.py,sha256=
|
|
52
|
+
clang_tool_chain/execution/sanitizer_env.py,sha256=OE00wOEaLm-HIWL1fdjhQWEZ9D1hVN3bYfMxUEo8ZiQ,13364
|
|
53
53
|
clang_tool_chain/installers/__init__.py,sha256=NAV5woPCEDKSbFr1UmfQsrg4Ua5UdghN4q7H3ymvRsg,279
|
|
54
54
|
clang_tool_chain/installers/base.py,sha256=OS78bau9zoYPitmhla7pKsfCPEj-zLY0DkvVzjE31Tw,15437
|
|
55
55
|
clang_tool_chain/installers/clang.py,sha256=rUtheVRF7mq_1YdmQ3XzIybrJqsHbm2Xf0cbhRbH7RQ,16994
|
|
@@ -59,7 +59,7 @@ clang_tool_chain/installers/iwyu.py,sha256=9aAhdGtOTY6BrLuPtladY8Y2mz1i7FjgbMxZf
|
|
|
59
59
|
clang_tool_chain/installers/lldb.py,sha256=FpG8NMNQk8PoNfg6aeU_plmSQrVET7zo-pTvoK8z838,2261
|
|
60
60
|
clang_tool_chain/installers/nodejs.py,sha256=5N07rotgmCfUaDm1uJfBlIAFKC1iTpgZT0HBRuoYwKI,9343
|
|
61
61
|
clang_tool_chain/linker/__init__.py,sha256=ghzDFpZ2-gPmdDO6K05C7yNbY6pZLANPuUks9TaQwVY,537
|
|
62
|
-
clang_tool_chain/linker/lld.py,sha256=
|
|
62
|
+
clang_tool_chain/linker/lld.py,sha256=PaJ2tuo95t79BCaAIu3E_NPSrv1F24-4N0MJKwfrybo,15577
|
|
63
63
|
clang_tool_chain/platform/__init__.py,sha256=WkV9Y25ua0mtzEGcsIxF-qExtroSTAMKkcElWuQF2BE,342
|
|
64
64
|
clang_tool_chain/platform/detection.py,sha256=PLHyUfmQ5xuohhpz0KSXJWK3d0u0fCsjx1DbM8f1CxQ,5470
|
|
65
65
|
clang_tool_chain/platform/paths.py,sha256=K0IjeVwbmgPlAWQO8mS3r1WS4C2dN6IYrSqPpckeT5c,6088
|
|
@@ -71,8 +71,8 @@ clang_tool_chain/symbolizer/unwind_windows.h,sha256=XTWhJDv13AAMUPAzWCfRN7tO6EbN
|
|
|
71
71
|
clang_tool_chain/testing/__init__.py,sha256=-sYqOOCuTV_u-MkmExrD4uKdTHG4RmMwR3D1kIG281Q,208
|
|
72
72
|
clang_tool_chain/testing/diagnostic_runner.py,sha256=mnmFUEOQulY3-Ggu6hKVGZwjrKQNmV6kY80PRTUu2qU,5293
|
|
73
73
|
clang_tool_chain/testing/diagnostic_tests.py,sha256=GmtKWrDcddZTpx9_yIKfhRAy6YOde8dj7SksCWVEME4,6019
|
|
74
|
-
clang_tool_chain-1.1.
|
|
75
|
-
clang_tool_chain-1.1.
|
|
76
|
-
clang_tool_chain-1.1.
|
|
77
|
-
clang_tool_chain-1.1.
|
|
78
|
-
clang_tool_chain-1.1.
|
|
74
|
+
clang_tool_chain-1.1.5.dist-info/METADATA,sha256=V3_teL2iXVtyGp-CJKBjeYgC2UhYj0KlTXc2d9pWZtQ,60267
|
|
75
|
+
clang_tool_chain-1.1.5.dist-info/WHEEL,sha256=WLgqFyCfm_KASv4WHyYy0P3pM_m7J5L9k2skdKLirC8,87
|
|
76
|
+
clang_tool_chain-1.1.5.dist-info/entry_points.txt,sha256=N0a0OVPkCFbf6BisRkHj-m2TcZ-f1mqxfXxAHQxfrQg,2800
|
|
77
|
+
clang_tool_chain-1.1.5.dist-info/licenses/LICENSE,sha256=51FO1oc2pZbQNI0v0_THnznnZIF4iFgawG1xnQ58kKo,10997
|
|
78
|
+
clang_tool_chain-1.1.5.dist-info/RECORD,,
|
|
File without changes
|
|
File without changes
|
|
File without changes
|